| /freebsd/crypto/openssl/util/perl/TLSProxy/ |
| H A D | ClientHello.pm | 50 $self->{ciphersuites} = []; 80 my @ciphersuites = unpack('n*', substr($self->data, $ptr, 111 $self->ciphersuites(\@ciphersuites); 174 $data .= pack("n*", @{$self->ciphersuites}); 256 sub ciphersuites subroutine 260 $self->{ciphersuites} = shift; 262 return $self->{ciphersuites};
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 80-test_ssl_old.t | 522 my %ciphersuites = (); 536 $ciphersuites{$protocol} = [ map { s|\R||; split(/:/, $_) } 538 $protocolciphersuitecount += scalar @{$ciphersuites{$protocol}}; 544 if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0; 550 + scalar(keys %ciphersuites); 558 foreach my $protocol (sort keys %ciphersuites) { 563 my $ciphersuites = ""; 564 foreach my $cipher (@{$ciphersuites{$protocol}}) { 574 $ciphersuites = $cipher; 581 "-ciphersuites", $ciphersuites,
|
| H A D | 70-test_tls13downgrade.t | 163 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA); 164 $message->ciphersuite_len(2 * scalar @ciphersuites); 165 $message->ciphersuites(\@ciphersuites);
|
| H A D | 70-test_tls13hrr.t | 195 my @ciphersuites = (TLSProxy::Message::CIPHER_TLS13_AES_128_GCM_SHA256); 196 $ch1->ciphersuite_len(2 * scalar @ciphersuites); 197 $ch1->ciphersuites(\@ciphersuites);
|
| H A D | 70-test_renegotiation.t | 141 my $has_scsv = 255 ~~ @{$clientHello->ciphersuites}; 159 my $has_scsv = 255 ~~ @{$clientHello->ciphersuites}; 177 my $has_scsv = 255 ~~ @{$clientHello->ciphersuites}; 196 $message->ciphersuites(\@ciphersuite);
|
| /freebsd/crypto/openssl/apps/ |
| H A D | ciphers.c | 106 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local 169 ciphersuites = opt_arg(); in ciphers_main() 209 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) { in ciphers_main()
|
| H A D | s_time.c | 140 char *cipher = NULL, *ciphersuites = NULL; in s_time_main() local 211 ciphersuites = opt_arg(); in s_time_main() 274 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) in s_time_main()
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set_cipher_list.pod | 32 ciphersuites. Use SSL_CTX_set_ciphersuites() to configure those. B<ctx> B<MUST NOT> be NULL. 38 ciphersuites for B<ctx>. This is a simple colon (":") separated list of TLSv1.3 64 configures the ciphersuites for B<ssl>. 68 cipher string for TLSv1.3 ciphersuites.
|
| H A D | SSL_CTX_set_tmp_dh_callback.pod | 37 Some ciphersuites may use ephemeral Diffie-Hellman (DH) key exchange. In these 69 If there is no certificate (e.g. for PSK ciphersuites), then it it will be 100 cipher suites. Modern OpenSSL does not support export ciphersuites and so these
|
| H A D | SSL_set_session_secret_cb.pod | 35 On the server side the set of ciphersuites offered by the peer is provided in
|
| H A D | SSL_CONF_cmd.pod | 236 combined with any configured TLSv1.3 ciphersuites. Note: syntax checking 240 =item B<-ciphersuites> I<1.3ciphers> 242 Sets the available ciphersuites for TLSv1.3 to value. This is a 244 list will be combined any configured TLSv1.2 and below ciphersuites. 348 combined with any configured TLSv1.3 ciphersuites. Note: syntax 354 Sets the available ciphersuites for TLSv1.3 to B<value>. This is a 356 list will be combined any configured TLSv1.2 and below ciphersuites. 634 by the negotiated ciphersuites and extensions. Equivalent to
|
| H A D | SSL_get_ciphers.pod | 75 available shared ciphersuites whether or not they are enabled. This is a server
|
| H A D | SSL_CTX_use_psk_identity_hint.pod | 59 PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint()
|
| H A D | SSL_CTX_set_psk_client_callback.pod | 101 A client application wishing to use PSK ciphersuites for TLSv1.2 and below must
|
| H A D | SSL_CIPHER_get_name.pod | 129 ciphersuite was first defined because some ciphersuites are backwards compatible
|
| H A D | SSL_CTX_set_options.pod | 174 negotiated ciphersuites and extensions. The specific ciphersuites and extensions
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-s_time.pod.in | 27 [B<-ciphersuites> I<val>] 100 This list will be combined with any TLSv1.3 ciphersuites that have been 105 =item B<-ciphersuites> I<val> 107 This allows the TLSv1.3 ciphersuites sent by the client to be modified. This 108 list will be combined with any TLSv1.2 and below ciphersuites that have been
|
| H A D | openssl-ciphers.pod.in | 24 [B<-ciphersuites> I<val>] 94 =item B<-ciphersuites> I<val> 96 Sets the list of TLSv1.3 ciphersuites. This list will be combined with any 97 TLSv1.2 and below ciphersuites that have been configured. The format for this 105 A cipher list of TLSv1.2 and below ciphersuites to convert to a cipher 106 preference list. This list will be combined with any TLSv1.3 ciphersuites that
|
| /freebsd/crypto/openssl/test/ |
| H A D | ssl_old_test.c | 618 static char *ciphersuites = NULL; variable 1062 ciphersuites = *(++argv); in main() 1467 if (ciphersuites != NULL) { in main() 1468 if (!SSL_CTX_set_ciphersuites(c_ctx, ciphersuites) in main() 1469 || !SSL_CTX_set_ciphersuites(s_ctx, ciphersuites) in main() 1470 || !SSL_CTX_set_ciphersuites(s_ctx2, ciphersuites)) { in main()
|
| H A D | sslapitest.c | 3934 static const char *ciphersuites[] = { variable 3970 if (ciphersuites[cipher] == NULL) in early_data_skip_helper() 3984 if (!TEST_true(SSL_CTX_set_ciphersuites(sctx, ciphersuites[cipher])) in early_data_skip_helper() 3985 || !TEST_true(SSL_CTX_set_ciphersuites(cctx, ciphersuites[cipher]))) in early_data_skip_helper() 4142 idx % OSSL_NELEM(ciphersuites), in test_early_data_skip() 4143 idx / OSSL_NELEM(ciphersuites)); in test_early_data_skip() 4153 idx % OSSL_NELEM(ciphersuites), in test_early_data_skip_hrr() 4154 idx / OSSL_NELEM(ciphersuites)); in test_early_data_skip_hrr() 4165 idx % OSSL_NELEM(ciphersuites), in test_early_data_skip_hrr_fail() 4166 idx / OSSL_NELEM(ciphersuites)); in test_early_data_skip_hrr_fail() [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | ossl-guide-libssl-introduction.pod | 89 The set of available ciphersuites that can be used are configured in the
|
| /freebsd/crypto/openssl/ |
| H A D | CHANGES.md | 1560 * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489) 1561 to the list of ciphersuites providing Perfect Forward Secrecy as 1699 * Enable KTLS with the TLS 1.3 CCM mode ciphersuites. Note that some linux 1702 and all releases since 5.16. KTLS with CCM ciphersuites should be only used 2556 * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489) 2557 to the list of ciphersuites providing Perfect Forward Secrecy as 4850 * Added a new API for TLSv1.3 ciphersuites: 4886 configuration. TLSv1.3 ciphersuites are not compatible with TLSv1.2 and 4887 below. Similarly TLSv1.2 ciphersuites are not compatible with TLSv1.3. 4889 would otherwise inadvertently disable all TLSv1.3 ciphersuites the [all …]
|
| /freebsd/crypto/openssl/ssl/statem/ |
| H A D | statem_srvr.c | 1604 if (!PACKET_get_sub_packet(pkt, &clienthello->ciphersuites, in tls_process_client_hello() 1668 if (!PACKET_get_length_prefixed_2(pkt, &clienthello->ciphersuites)) { in tls_process_client_hello() 1817 if (!ssl_cache_cipherlist(s, &clienthello->ciphersuites, in tls_early_post_process_client_hello() 1819 || !ossl_bytes_to_cipher_list(s, &clienthello->ciphersuites, &ciphers, in tls_early_post_process_client_hello()
|
| /freebsd/crypto/openssl/ssl/ |
| H A D | ssl_ciph.c | 1263 STACK_OF(SSL_CIPHER) *ciphersuites = (STACK_OF(SSL_CIPHER) *)arg; in ciphersuite_cb() 1280 if (!sk_SSL_CIPHER_push(ciphersuites, cipher)) { in ciphersuite_cb()
|
| /freebsd/crypto/openssl/doc/designs/quic-design/ |
| H A D | quic-tls.md | 249 setting ciphersuites, providing client certificates, etc). However there are
|