Home
last modified time | relevance | path

Searched refs:ciphersuites (Results 1 – 25 of 37) sorted by relevance

12

/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DClientHello.pm50 $self->{ciphersuites} = [];
80 my @ciphersuites = unpack('n*', substr($self->data, $ptr,
111 $self->ciphersuites(\@ciphersuites);
174 $data .= pack("n*", @{$self->ciphersuites});
256 sub ciphersuites subroutine
260 $self->{ciphersuites} = shift;
262 return $self->{ciphersuites};
/freebsd/crypto/openssl/test/recipes/
H A D80-test_ssl_old.t522 my %ciphersuites = ();
536 $ciphersuites{$protocol} = [ map { s|\R||; split(/:/, $_) }
538 $protocolciphersuitecount += scalar @{$ciphersuites{$protocol}};
544 if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0;
550 + scalar(keys %ciphersuites);
558 foreach my $protocol (sort keys %ciphersuites) {
563 my $ciphersuites = "";
564 foreach my $cipher (@{$ciphersuites{$protocol}}) {
574 $ciphersuites = $cipher;
581 "-ciphersuites", $ciphersuites,
H A D70-test_tls13downgrade.t163 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA);
164 $message->ciphersuite_len(2 * scalar @ciphersuites);
165 $message->ciphersuites(\@ciphersuites);
H A D70-test_tls13hrr.t195 my @ciphersuites = (TLSProxy::Message::CIPHER_TLS13_AES_128_GCM_SHA256);
196 $ch1->ciphersuite_len(2 * scalar @ciphersuites);
197 $ch1->ciphersuites(\@ciphersuites);
H A D70-test_renegotiation.t141 my $has_scsv = 255 ~~ @{$clientHello->ciphersuites};
159 my $has_scsv = 255 ~~ @{$clientHello->ciphersuites};
177 my $has_scsv = 255 ~~ @{$clientHello->ciphersuites};
196 $message->ciphersuites(\@ciphersuite);
/freebsd/crypto/openssl/apps/
H A Dciphers.c106 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local
169 ciphersuites = opt_arg(); in ciphers_main()
209 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) { in ciphers_main()
H A Ds_time.c140 char *cipher = NULL, *ciphersuites = NULL; in s_time_main() local
211 ciphersuites = opt_arg(); in s_time_main()
274 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) in s_time_main()
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_cipher_list.pod32 ciphersuites. Use SSL_CTX_set_ciphersuites() to configure those. B<ctx> B<MUST NOT> be NULL.
38 ciphersuites for B<ctx>. This is a simple colon (":") separated list of TLSv1.3
64 configures the ciphersuites for B<ssl>.
68 cipher string for TLSv1.3 ciphersuites.
H A DSSL_CTX_set_tmp_dh_callback.pod37 Some ciphersuites may use ephemeral Diffie-Hellman (DH) key exchange. In these
69 If there is no certificate (e.g. for PSK ciphersuites), then it it will be
100 cipher suites. Modern OpenSSL does not support export ciphersuites and so these
H A DSSL_set_session_secret_cb.pod35 On the server side the set of ciphersuites offered by the peer is provided in
H A DSSL_CONF_cmd.pod236 combined with any configured TLSv1.3 ciphersuites. Note: syntax checking
240 =item B<-ciphersuites> I<1.3ciphers>
242 Sets the available ciphersuites for TLSv1.3 to value. This is a
244 list will be combined any configured TLSv1.2 and below ciphersuites.
348 combined with any configured TLSv1.3 ciphersuites. Note: syntax
354 Sets the available ciphersuites for TLSv1.3 to B<value>. This is a
356 list will be combined any configured TLSv1.2 and below ciphersuites.
634 by the negotiated ciphersuites and extensions. Equivalent to
H A DSSL_get_ciphers.pod75 available shared ciphersuites whether or not they are enabled. This is a server
H A DSSL_CTX_use_psk_identity_hint.pod59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint()
H A DSSL_CTX_set_psk_client_callback.pod101 A client application wishing to use PSK ciphersuites for TLSv1.2 and below must
H A DSSL_CIPHER_get_name.pod129 ciphersuite was first defined because some ciphersuites are backwards compatible
H A DSSL_CTX_set_options.pod174 negotiated ciphersuites and extensions. The specific ciphersuites and extensions
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-s_time.pod.in27 [B<-ciphersuites> I<val>]
100 This list will be combined with any TLSv1.3 ciphersuites that have been
105 =item B<-ciphersuites> I<val>
107 This allows the TLSv1.3 ciphersuites sent by the client to be modified. This
108 list will be combined with any TLSv1.2 and below ciphersuites that have been
H A Dopenssl-ciphers.pod.in24 [B<-ciphersuites> I<val>]
94 =item B<-ciphersuites> I<val>
96 Sets the list of TLSv1.3 ciphersuites. This list will be combined with any
97 TLSv1.2 and below ciphersuites that have been configured. The format for this
105 A cipher list of TLSv1.2 and below ciphersuites to convert to a cipher
106 preference list. This list will be combined with any TLSv1.3 ciphersuites that
/freebsd/crypto/openssl/test/
H A Dssl_old_test.c618 static char *ciphersuites = NULL; variable
1062 ciphersuites = *(++argv); in main()
1467 if (ciphersuites != NULL) { in main()
1468 if (!SSL_CTX_set_ciphersuites(c_ctx, ciphersuites) in main()
1469 || !SSL_CTX_set_ciphersuites(s_ctx, ciphersuites) in main()
1470 || !SSL_CTX_set_ciphersuites(s_ctx2, ciphersuites)) { in main()
H A Dsslapitest.c3934 static const char *ciphersuites[] = { variable
3970 if (ciphersuites[cipher] == NULL) in early_data_skip_helper()
3984 if (!TEST_true(SSL_CTX_set_ciphersuites(sctx, ciphersuites[cipher])) in early_data_skip_helper()
3985 || !TEST_true(SSL_CTX_set_ciphersuites(cctx, ciphersuites[cipher]))) in early_data_skip_helper()
4142 idx % OSSL_NELEM(ciphersuites), in test_early_data_skip()
4143 idx / OSSL_NELEM(ciphersuites)); in test_early_data_skip()
4153 idx % OSSL_NELEM(ciphersuites), in test_early_data_skip_hrr()
4154 idx / OSSL_NELEM(ciphersuites)); in test_early_data_skip_hrr()
4165 idx % OSSL_NELEM(ciphersuites), in test_early_data_skip_hrr_fail()
4166 idx / OSSL_NELEM(ciphersuites)); in test_early_data_skip_hrr_fail()
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dossl-guide-libssl-introduction.pod89 The set of available ciphersuites that can be used are configured in the
/freebsd/crypto/openssl/
H A DCHANGES.md1560 * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489)
1561 to the list of ciphersuites providing Perfect Forward Secrecy as
1699 * Enable KTLS with the TLS 1.3 CCM mode ciphersuites. Note that some linux
1702 and all releases since 5.16. KTLS with CCM ciphersuites should be only used
2556 * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489)
2557 to the list of ciphersuites providing Perfect Forward Secrecy as
4850 * Added a new API for TLSv1.3 ciphersuites:
4886 configuration. TLSv1.3 ciphersuites are not compatible with TLSv1.2 and
4887 below. Similarly TLSv1.2 ciphersuites are not compatible with TLSv1.3.
4889 would otherwise inadvertently disable all TLSv1.3 ciphersuites the
[all …]
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_srvr.c1604 if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites, in tls_process_client_hello()
1668 if (!PACKET_get_length_prefixed_2(pkt, &clienthello->ciphersuites)) { in tls_process_client_hello()
1817 if (!ssl_cache_cipherlist(s, &clienthello->ciphersuites, in tls_early_post_process_client_hello()
1819 || !ossl_bytes_to_cipher_list(s, &clienthello->ciphersuites, &ciphers, in tls_early_post_process_client_hello()
/freebsd/crypto/openssl/ssl/
H A Dssl_ciph.c1263 STACK_OF(SSL_CIPHER) *ciphersuites = (STACK_OF(SSL_CIPHER) *)arg; in ciphersuite_cb()
1280 if (!sk_SSL_CIPHER_push(ciphersuites, cipher)) { in ciphersuite_cb()
/freebsd/crypto/openssl/doc/designs/quic-design/
H A Dquic-tls.md249 setting ciphersuites, providing client certificates, etc). However there are

12