Home
last modified time | relevance | path

Searched refs:CIPHERS (Results 1 – 25 of 129) sorted by relevance

123456

/dports/security/openvpn/openvpn-2.5.6/tests/
H A Dt_lpback.sh28 CIPHERS=$(${top_builddir}/src/openvpn/openvpn --show-ciphers | \
36 CIPHERS=$(echo "$CIPHERS" | egrep -v '^(DES-EDE3-CFB1|DES-CFB1|RC5-)' )
39 if [ -z "$CIPHERS" ] ; then
45 CIPHERS=${CIPHERS}$(printf "\nnone")
50 for cipher in ${CIPHERS}
/dports/security/openvpn-mbedtls/openvpn-2.5.6/tests/
H A Dt_lpback.sh28 CIPHERS=$(${top_builddir}/src/openvpn/openvpn --show-ciphers | \
36 CIPHERS=$(echo "$CIPHERS" | egrep -v '^(DES-EDE3-CFB1|DES-CFB1|RC5-)' )
39 if [ -z "$CIPHERS" ] ; then
45 CIPHERS=${CIPHERS}$(printf "\nnone")
50 for cipher in ${CIPHERS}
/dports/net/p5-Net-SSH-Perl/Net-SSH-Perl-2.14/lib/Net/SSH/Perl/
H A DCipher.pm10 use vars qw( %CIPHERS %CIPHERS_SSH2 %CIPH_REVERSE %SUPPORTED );
12 %CIPHERS = (
39 %CIPH_REVERSE = reverse %CIPHERS;
43 for my $ciph (keys %CIPHERS) {
46 $SUPPORTED{$CIPHERS{$ciph}}++ unless $@;
89 $CIPHERS{$type};
120 return [ grep $SUPPORTED{$_}, map $CIPHERS{$_}, values %CIPHERS_SSH2 ];
/dports/net/pichi/pichi-1.4.0/test/
H A Dcryptogram.cpp53 static vector<vector<uint8_t>> const CIPHERS; member
60 vector<vector<uint8_t>> const Ciphers<CryptoMethod::RC4_MD5>::CIPHERS = { member in pichi::unit_test::Ciphers<CryptoMethod::RC4_MD5>
77 vector<vector<uint8_t>> const Ciphers<CryptoMethod::BF_CFB>::CIPHERS = { member in pichi::unit_test::Ciphers<CryptoMethod::BF_CFB>
95 vector<vector<uint8_t>> const Ciphers<CryptoMethod::AES_128_CTR>::CIPHERS = { member in pichi::unit_test::Ciphers<CryptoMethod::AES_128_CTR>
112 vector<vector<uint8_t>> const Ciphers<CryptoMethod::AES_192_CTR>::CIPHERS = { member in pichi::unit_test::Ciphers<CryptoMethod::AES_192_CTR>
248 vector<vector<uint8_t>> const Ciphers<CryptoMethod::CHACHA20>::CIPHERS = { member in pichi::unit_test::Ciphers<CryptoMethod::CHACHA20>
265 vector<vector<uint8_t>> const Ciphers<CryptoMethod::SALSA20>::CIPHERS = { member in pichi::unit_test::Ciphers<CryptoMethod::SALSA20>
477 BOOST_CHECK_EQUAL(plains.size(), Case::CIPHERS.size()); in BOOST_AUTO_TEST_CASE_TEMPLATE()
492 BOOST_CHECK_EQUAL(plains.size(), Case::CIPHERS.size()); in BOOST_AUTO_TEST_CASE_TEMPLATE()
509 auto expect = accumulate(cbegin(Case::CIPHERS), cend(Case::CIPHERS), vector<uint8_t>{}, in BOOST_AUTO_TEST_CASE_TEMPLATE()
[all …]
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/tests/
H A Dt_lpback.sh28 CIPHERS=$(${top_builddir}/src/openvpn/openvpn --show-ciphers | \
36 CIPHERS=$(echo "$CIPHERS" | egrep -v '^(DES-EDE3-CFB1|DES-CFB1|RC5-)' )
39 CIPHERS=${CIPHERS}$(printf "\nnone")
45 for cipher in ${CIPHERS}
/dports/security/suricata/suricata-6.0.4/rust/vendor/tls-parser/src/
H A Dtls_ciphers.rs112 CIPHERS.get(&id) in from_id()
116 CIPHERS.values().find(|&v| v.name == name) in from_name()
122 use crate::tls_ciphers::{TlsCipherKx, TlsCipherSuite, CIPHERS};
126 println!("loaded: {} cipher suites", CIPHERS.len()); in test_cipher_count()
127 assert!(CIPHERS.len() > 0); in test_cipher_count()
152 let ecdhe_ciphers: Vec<&TlsCipherSuite> = CIPHERS in test_cipher_filter()
/dports/security/libssh/libssh-0.9.6/tests/client/
H A Dtorture_client_config.c15 #define CIPHERS "aes256-gcm@openssh.com,chacha20-poly1305@openssh.com" macro
50 torture_write_file(filename, "Ciphers "CIPHERS"\nTestBogus1\nUser "TORTURE_CONFIG_USER); in setup_config_files()
98 fips_ciphers = ssh_keep_fips_algos(SSH_CRYPT_C_S, CIPHERS); in torture_client_config_system()
118 CIPHERS); in torture_client_config_system()
120 CIPHERS); in torture_client_config_system()
145 fips_ciphers = ssh_keep_fips_algos(SSH_CRYPT_C_S, CIPHERS); in torture_client_config_emulate()
170 CIPHERS); in torture_client_config_emulate()
172 CIPHERS); in torture_client_config_emulate()
/dports/security/p5-Crypt-RSA/Crypt-RSA-1.99/lib/Crypt/RSA/Key/Private/
H A DSSH.pm41 use vars qw( %CIPHERS );
44 %CIPHERS = (
81 my $cipher_name = $CIPHERS{$cipher_type} or
143 my $cipher_name = $CIPHERS{$cipher_type};
/dports/security/p5-Crypt-SSLeay/Crypt-SSLeay-0.72/
H A DSSLeay.pm20 use vars qw(%CIPHERS);
21 %CIPHERS = (
/dports/security/p5-Alt-Crypt-RSA-BigInt/Alt-Crypt-RSA-BigInt-0.06/lib/Crypt/RSA/Key/Private/
H A DSSH.pm38 use vars qw( %CIPHERS %CIPHERS_TEXT );
46 %CIPHERS = (
125 my $cipher_names = $CIPHERS{$cipher_type} or
221 my $cipher_names = $CIPHERS{$cipher_type};
/dports/editors/encryptpad/EncryptPad-0.5.0.1/func_tests/
H A Dencrypt_with_gpg.sh14 CIPHERS=`awk '$1 == "cipher" { print $2 }' algos.txt`
22 for CIPHER in $CIPHERS
H A Dencrypt_with_epd.sh19 CIPHERS=`awk '$1 == "cipher" { print $2 }' algos.txt`
27 for CIPHER in $CIPHERS
/dports/security/libssh/libssh-0.9.6/tests/unittests/
H A Dtorture_bind_config.c46 #define CIPHERS "aes128-ctr,aes192-ctr,aes256-ctr" macro
215 "Ciphers "CIPHERS"\n"); in setup_config_files()
219 "Ciphers "CIPHERS"\n" in setup_config_files()
222 "Ciphers "CIPHERS"\n" in setup_config_files()
252 "Ciphers "CIPHERS"\n" in setup_config_files()
608 fips_ciphers = ssh_keep_fips_algos(SSH_CRYPT_C_S, CIPHERS); in torture_bind_config_ciphers()
622 assert_string_equal(bind->wanted_methods[SSH_CRYPT_C_S], CIPHERS); in torture_bind_config_ciphers()
623 assert_string_equal(bind->wanted_methods[SSH_CRYPT_S_C], CIPHERS); in torture_bind_config_ciphers()
635 assert_string_equal(bind->wanted_methods[SSH_CRYPT_C_S], CIPHERS); in torture_bind_config_ciphers()
636 assert_string_equal(bind->wanted_methods[SSH_CRYPT_S_C], CIPHERS); in torture_bind_config_ciphers()
[all …]
/dports/security/s2n/s2n-tls-1.1.2/tests/integrationv2/
H A Dtest_well_known_endpoints.py50 CIPHERS = [ variable
92 @pytest.mark.parametrize("cipher", CIPHERS, ids=get_parameter_name)
H A Dtest_pq_handshake.py10 CIPHERS = [ variable
140 @pytest.mark.parametrize("client_cipher", CIPHERS, ids=get_parameter_name)
141 @pytest.mark.parametrize("server_cipher", CIPHERS, ids=get_parameter_name)
/dports/security/openssl-unsafe/openssl-c9ba19c/VMS/
H A Dopenssl_utils.com43 $ CIPHERS :== $SSLEXE:OPENSSL CIPHERS
/dports/security/openssl-legacy-static/openssl-1.0.2u/VMS/
H A Dopenssl_utils.com43 $ CIPHERS :== $SSLEXE:OPENSSL CIPHERS
/dports/games/fillets-ng/fillets-ng-1.0.1/src/menu/
H A DPedometer.cpp191 static const int CIPHERS = 5; in drawNumbers() local
199 for (int i = CIPHERS - 1; i >= 0; --i) { in drawNumbers()
/dports/security/py-ssh-audit/ssh-audit-2.5.0/src/ssh_audit/
H A Dssh1_publickeymessage.py93 for i in range(len(SSH1.CIPHERS)): # pylint: disable=consider-using-enumerate
95 ciphers.append(Utils.to_text(SSH1.CIPHERS[i]))
H A Dssh1.py33 CIPHERS = ['none', 'idea', 'des', '3des', 'tss', 'rc4', 'blowfish'] variable in SSH1
/dports/security/nmap/nmap-7.91/scripts/
H A Drdp-enum-encryption.nse129 local CIPHERS = {
151 if ( not(CIPHERS[i]) ) then return end
152 for k,v in pairs(CIPHERS[i]) do
H A Dssl-poodle.nse161 if tls.CIPHERS[v] <= 255 then
243 sorted_keys(tls.CIPHERS)
293 tls.CIPHERS["TLS_FALLBACK_SCSV"] = 0x5600
300 tls.CIPHERS["TLS_FALLBACK_SCSV"] = nil
/dports/net/py-python-glanceclient/python-glanceclient-3.5.0/glanceclient/common/
H A Dhttps.py151 CIPHERS = 'ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:'\ variable in VerifiedHTTPSConnection
185 self.context.set_cipher_list(self.CIPHERS)
/dports/security/keepassxc/keepassxc-2.6.6/src/cli/
H A DInfo.cpp41 for (auto& cipher : asConst(KeePass2::CIPHERS)) { in executeWithDatabase()
/dports/security/keepassxc/keepassxc-2.6.6/src/format/
H A DKeePass2.h72 extern const QList<QPair<QUuid, QString>> CIPHERS;

123456