Home
last modified time | relevance | path

Searched refs:suites (Results 1 – 25 of 56) sorted by relevance

123

/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-ciphers.pod.in64 When combined with B<-s> includes cipher suites which require PSK.
68 When combined with B<-s> includes cipher suites which require SRP. This option
122 It can represent a list of cipher suites containing a certain algorithm, or
123 cipher suites of a certain type. For example B<SHA1> represents all ciphers
124 suites using the digest algorithm SHA1 and B<SSLv3> represents all SSL v3
127 Lists of cipher suites can be combined in a single cipher string using the
129 B<SHA1+DES> represents all cipher suites containing the SHA1 B<and> the DES
176 necessary). Note that RC4 based cipher suites are not built into OpenSSL by
181 All cipher suites except the B<eNULL> ciphers (which must be explicitly enabled
183 As of OpenSSL 1.0.0, the B<ALL> cipher suites are sensibly ordered by default.
[all …]
/freebsd/contrib/wpa/src/tls/
H A Dtlsv1_server.c381 u16 *suites; in tlsv1_server_init() local
399 suites = conn->cipher_suites; in tlsv1_server_init()
400 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA256; in tlsv1_server_init()
401 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA256; in tlsv1_server_init()
402 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA; in tlsv1_server_init()
403 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA; in tlsv1_server_init()
404 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA256; in tlsv1_server_init()
405 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA256; in tlsv1_server_init()
406 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA; in tlsv1_server_init()
407 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA; in tlsv1_server_init()
[all …]
H A Dtlsv1_client.c469 u16 *suites; in tlsv1_client_init() local
485 suites = conn->cipher_suites; in tlsv1_client_init()
486 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA256; in tlsv1_client_init()
487 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA256; in tlsv1_client_init()
488 suites[count++] = TLS_DHE_RSA_WITH_AES_256_CBC_SHA; in tlsv1_client_init()
489 suites[count++] = TLS_RSA_WITH_AES_256_CBC_SHA; in tlsv1_client_init()
490 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA256; in tlsv1_client_init()
491 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA256; in tlsv1_client_init()
492 suites[count++] = TLS_DHE_RSA_WITH_AES_128_CBC_SHA; in tlsv1_client_init()
493 suites[count++] = TLS_RSA_WITH_AES_128_CBC_SHA; in tlsv1_client_init()
[all …]
/freebsd/contrib/bearssl/samples/
H A Dcustom_profile.c55 static const uint16_t suites[] = { in example_client_profile() local
165 br_ssl_engine_set_suites(&cc->eng, suites, in example_client_profile()
166 (sizeof suites) / (sizeof suites[0])); in example_client_profile()
461 static const uint16_t suites[] = { in example_server_profile() local
501 br_ssl_engine_set_suites(&cc->eng, suites, in example_server_profile()
502 (sizeof suites) / (sizeof suites[0])); in example_server_profile()
/freebsd/contrib/bearssl/src/ssl/
H A Dssl_server_minr2g.c33 static const uint16_t suites[] = { in br_ssl_server_init_minr2g() local
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minr2g()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minr2g()
H A Dssl_server_minu2g.c33 static const uint16_t suites[] = { in br_ssl_server_init_minu2g() local
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minu2g()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minu2g()
H A Dssl_server_minv2g.c33 static const uint16_t suites[] = { in br_ssl_server_init_minv2g() local
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minv2g()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minv2g()
H A Dssl_server_mine2c.c33 static const uint16_t suites[] = { in br_ssl_server_init_mine2c() local
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_mine2c()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_mine2c()
H A Dssl_server_mine2g.c33 static const uint16_t suites[] = { in br_ssl_server_init_mine2g() local
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_mine2g()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_mine2g()
H A Dssl_server_minf2c.c33 static const uint16_t suites[] = { in br_ssl_server_init_minf2c() local
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minf2c()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minf2c()
H A Dssl_server_minf2g.c33 static const uint16_t suites[] = { in br_ssl_server_init_minf2g() local
46 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_minf2g()
47 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_minf2g()
H A Dssl_server_full_rsa.c46 static const uint16_t suites[] = { in br_ssl_server_init_full_rsa() local
94 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_full_rsa()
95 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_full_rsa()
H A Dssl_server_full_ec.c50 static const uint16_t suites[] = { in br_ssl_server_init_full_ec() local
105 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_server_init_full_ec()
106 (sizeof suites) / (sizeof suites[0])); in br_ssl_server_init_full_ec()
H A Dssl_client_full.c52 static const uint16_t suites[] = { in br_ssl_client_init_full() local
136 br_ssl_engine_set_suites(&cc->eng, suites, in br_ssl_client_init_full()
137 (sizeof suites) / (sizeof suites[0])); in br_ssl_client_init_full()
H A Dssl_engine.c1021 const uint16_t *suites, size_t suites_num) in br_ssl_engine_set_suites() argument
1023 if ((suites_num * sizeof *suites) > sizeof cc->suites_buf) { in br_ssl_engine_set_suites()
1027 memcpy(cc->suites_buf, suites, suites_num * sizeof *suites); in br_ssl_engine_set_suites()
/freebsd/contrib/bearssl/tools/
H A Dtwrch.c247 cipher_suite *suites; in do_twrch() local
282 suites = NULL; in do_twrch()
475 if (suites != NULL) { in do_twrch()
481 suites = parse_suites(arg, &num_suites); in do_twrch()
482 if (suites == NULL) { in do_twrch()
602 if (suites == NULL) { in do_twrch()
612 suites = xmalloc(num_suites * sizeof *suites); in do_twrch()
618 suites[num_suites ++] = cipher_suites[u]; in do_twrch()
696 req = suites[u].req; in do_twrch()
697 suite_ids[u] = suites[u].suite; in do_twrch()
[all …]
H A Dclient.c522 cipher_suite *suites; in do_client() local
553 suites = NULL; in do_client()
733 if (suites != NULL) { in do_client()
739 suites = parse_suites(arg, &num_suites); in do_client()
740 if (suites == NULL) { in do_client()
857 if (suites == NULL) { in do_client()
867 suites = xmalloc(num_suites * sizeof *suites); in do_client()
873 suites[num_suites ++] = cipher_suites[u]; in do_client()
925 req = suites[u].req; in do_client()
926 suite_ids[u] = suites[u].suite; in do_client()
[all …]
H A Dserver.c636 cipher_suite *suites; in do_server() local
666 suites = NULL; in do_server()
866 if (suites != NULL) { in do_server()
872 suites = parse_suites(arg, &num_suites); in do_server()
873 if (suites == NULL) { in do_server()
930 if (suites == NULL) { in do_server()
940 suites = xmalloc(num_suites * sizeof *suites); in do_server()
946 suites[num_suites ++] = cipher_suites[u]; in do_server()
1031 req = suites[u].req; in do_server()
1032 suite_ids[u] = suites[u].suite; in do_server()
[all …]
H A Dnames.c950 VECTOR(cipher_suite) suites = VEC_INIT; in parse_suites()
973 VEC_ADD(suites, cipher_suites[u]); in parse_suites()
978 if (VEC_LEN(suites) == 0) { in parse_suites()
981 r = VEC_TOARRAY(suites); in parse_suites()
982 *num = VEC_LEN(suites); in parse_suites()
983 VEC_CLEAR(suites); in parse_suites()
/freebsd/crypto/openssl/test/
H A DREADME-external.md1 Running external test suites with OpenSSL
4 It is possible to integrate external test suites into OpenSSL's `make test`.
90 Updating test suites
93 To update the commit for any of the above test suites:
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_security_level.pod78 are prohibited. All export cipher suites are prohibited since they all offer
95 In addition to the level 2 exclusions cipher suites not offering forward
103 prohibited. Cipher suites using SHA1 for the MAC are prohibited. TLS
136 then only cipher suites consistent with the security level are permissible.
145 Some restrictions can be gracefully handled: for example cipher suites
H A DSSL_CIPHER_get_name.pod64 If there is no cipher (e.g. for cipher suites with no encryption) then
69 for AEAD cipher suites) then B<NID_undef> is returned.
78 cipher suites) B<NID_kx_any> is returned. Examples (not comprehensive):
88 TLS 1.3 cipher suites) B<NID_auth_any> is returned. Examples (not comprehensive):
H A DSSL_get_ciphers.pod56 SSLv3/TLS wire format), and parses the cipher suites supported by the library
58 Values scsvs. Unsupported cipher suites are ignored. Returns 1 on success
/freebsd/contrib/googletest/docs/
H A Dprimer.md19 code. GoogleTest groups related tests into test suites that can share data
90 suites that reflect the structure of the tested code. When multiple tests in a
94 A *test program* can contain multiple test suites.
97 assertion level and building up to tests and test suites.
167 and its individual name. Tests from different test suites can have the same
193 GoogleTest groups the test results by test suites, so logically related tests
199 When naming your test suites and tests, you should follow the same convention as
346 test suites, or even different source files.
387 cannot be expressed within the framework of fixtures and test suites.
/freebsd/contrib/openbsm/
H A DTODO15 praudit in test suites processing single-token files without header and

123