/dports/security/openvpn/openvpn-2.5.6/tests/ |
H A D | t_lpback.sh | 28 CIPHERS=$(${top_builddir}/src/openvpn/openvpn --show-ciphers | \ 36 CIPHERS=$(echo "$CIPHERS" | egrep -v '^(DES-EDE3-CFB1|DES-CFB1|RC5-)' ) 39 if [ -z "$CIPHERS" ] ; then 45 CIPHERS=${CIPHERS}$(printf "\nnone") 50 for cipher in ${CIPHERS}
|
/dports/security/openvpn-mbedtls/openvpn-2.5.6/tests/ |
H A D | t_lpback.sh | 28 CIPHERS=$(${top_builddir}/src/openvpn/openvpn --show-ciphers | \ 36 CIPHERS=$(echo "$CIPHERS" | egrep -v '^(DES-EDE3-CFB1|DES-CFB1|RC5-)' ) 39 if [ -z "$CIPHERS" ] ; then 45 CIPHERS=${CIPHERS}$(printf "\nnone") 50 for cipher in ${CIPHERS}
|
/dports/net/p5-Net-SSH-Perl/Net-SSH-Perl-2.14/lib/Net/SSH/Perl/ |
H A D | Cipher.pm | 10 use vars qw( %CIPHERS %CIPHERS_SSH2 %CIPH_REVERSE %SUPPORTED ); 12 %CIPHERS = ( 39 %CIPH_REVERSE = reverse %CIPHERS; 43 for my $ciph (keys %CIPHERS) { 46 $SUPPORTED{$CIPHERS{$ciph}}++ unless $@; 89 $CIPHERS{$type}; 120 return [ grep $SUPPORTED{$_}, map $CIPHERS{$_}, values %CIPHERS_SSH2 ];
|
/dports/net/pichi/pichi-1.4.0/test/ |
H A D | cryptogram.cpp | 53 static vector<vector<uint8_t>> const CIPHERS; member 60 vector<vector<uint8_t>> const Ciphers<CryptoMethod::RC4_MD5>::CIPHERS = { member in pichi::unit_test::Ciphers<CryptoMethod::RC4_MD5> 77 vector<vector<uint8_t>> const Ciphers<CryptoMethod::BF_CFB>::CIPHERS = { member in pichi::unit_test::Ciphers<CryptoMethod::BF_CFB> 95 vector<vector<uint8_t>> const Ciphers<CryptoMethod::AES_128_CTR>::CIPHERS = { member in pichi::unit_test::Ciphers<CryptoMethod::AES_128_CTR> 112 vector<vector<uint8_t>> const Ciphers<CryptoMethod::AES_192_CTR>::CIPHERS = { member in pichi::unit_test::Ciphers<CryptoMethod::AES_192_CTR> 248 vector<vector<uint8_t>> const Ciphers<CryptoMethod::CHACHA20>::CIPHERS = { member in pichi::unit_test::Ciphers<CryptoMethod::CHACHA20> 265 vector<vector<uint8_t>> const Ciphers<CryptoMethod::SALSA20>::CIPHERS = { member in pichi::unit_test::Ciphers<CryptoMethod::SALSA20> 477 BOOST_CHECK_EQUAL(plains.size(), Case::CIPHERS.size()); in BOOST_AUTO_TEST_CASE_TEMPLATE() 492 BOOST_CHECK_EQUAL(plains.size(), Case::CIPHERS.size()); in BOOST_AUTO_TEST_CASE_TEMPLATE() 509 auto expect = accumulate(cbegin(Case::CIPHERS), cend(Case::CIPHERS), vector<uint8_t>{}, in BOOST_AUTO_TEST_CASE_TEMPLATE() [all …]
|
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/tests/ |
H A D | t_lpback.sh | 28 CIPHERS=$(${top_builddir}/src/openvpn/openvpn --show-ciphers | \ 36 CIPHERS=$(echo "$CIPHERS" | egrep -v '^(DES-EDE3-CFB1|DES-CFB1|RC5-)' ) 39 CIPHERS=${CIPHERS}$(printf "\nnone") 45 for cipher in ${CIPHERS}
|
/dports/security/suricata/suricata-6.0.4/rust/vendor/tls-parser/src/ |
H A D | tls_ciphers.rs | 112 CIPHERS.get(&id) in from_id() 116 CIPHERS.values().find(|&v| v.name == name) in from_name() 122 use crate::tls_ciphers::{TlsCipherKx, TlsCipherSuite, CIPHERS}; 126 println!("loaded: {} cipher suites", CIPHERS.len()); in test_cipher_count() 127 assert!(CIPHERS.len() > 0); in test_cipher_count() 152 let ecdhe_ciphers: Vec<&TlsCipherSuite> = CIPHERS in test_cipher_filter()
|
/dports/security/libssh/libssh-0.9.6/tests/client/ |
H A D | torture_client_config.c | 15 #define CIPHERS "aes256-gcm@openssh.com,chacha20-poly1305@openssh.com" macro 50 torture_write_file(filename, "Ciphers "CIPHERS"\nTestBogus1\nUser "TORTURE_CONFIG_USER); in setup_config_files() 98 fips_ciphers = ssh_keep_fips_algos(SSH_CRYPT_C_S, CIPHERS); in torture_client_config_system() 118 CIPHERS); in torture_client_config_system() 120 CIPHERS); in torture_client_config_system() 145 fips_ciphers = ssh_keep_fips_algos(SSH_CRYPT_C_S, CIPHERS); in torture_client_config_emulate() 170 CIPHERS); in torture_client_config_emulate() 172 CIPHERS); in torture_client_config_emulate()
|
/dports/security/p5-Crypt-RSA/Crypt-RSA-1.99/lib/Crypt/RSA/Key/Private/ |
H A D | SSH.pm | 41 use vars qw( %CIPHERS ); 44 %CIPHERS = ( 81 my $cipher_name = $CIPHERS{$cipher_type} or 143 my $cipher_name = $CIPHERS{$cipher_type};
|
/dports/security/p5-Crypt-SSLeay/Crypt-SSLeay-0.72/ |
H A D | SSLeay.pm | 20 use vars qw(%CIPHERS); 21 %CIPHERS = (
|
/dports/security/p5-Alt-Crypt-RSA-BigInt/Alt-Crypt-RSA-BigInt-0.06/lib/Crypt/RSA/Key/Private/ |
H A D | SSH.pm | 38 use vars qw( %CIPHERS %CIPHERS_TEXT ); 46 %CIPHERS = ( 125 my $cipher_names = $CIPHERS{$cipher_type} or 221 my $cipher_names = $CIPHERS{$cipher_type};
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/func_tests/ |
H A D | encrypt_with_gpg.sh | 14 CIPHERS=`awk '$1 == "cipher" { print $2 }' algos.txt` 22 for CIPHER in $CIPHERS
|
H A D | encrypt_with_epd.sh | 19 CIPHERS=`awk '$1 == "cipher" { print $2 }' algos.txt` 27 for CIPHER in $CIPHERS
|
/dports/security/libssh/libssh-0.9.6/tests/unittests/ |
H A D | torture_bind_config.c | 46 #define CIPHERS "aes128-ctr,aes192-ctr,aes256-ctr" macro 215 "Ciphers "CIPHERS"\n"); in setup_config_files() 219 "Ciphers "CIPHERS"\n" in setup_config_files() 222 "Ciphers "CIPHERS"\n" in setup_config_files() 252 "Ciphers "CIPHERS"\n" in setup_config_files() 608 fips_ciphers = ssh_keep_fips_algos(SSH_CRYPT_C_S, CIPHERS); in torture_bind_config_ciphers() 622 assert_string_equal(bind->wanted_methods[SSH_CRYPT_C_S], CIPHERS); in torture_bind_config_ciphers() 623 assert_string_equal(bind->wanted_methods[SSH_CRYPT_S_C], CIPHERS); in torture_bind_config_ciphers() 635 assert_string_equal(bind->wanted_methods[SSH_CRYPT_C_S], CIPHERS); in torture_bind_config_ciphers() 636 assert_string_equal(bind->wanted_methods[SSH_CRYPT_S_C], CIPHERS); in torture_bind_config_ciphers() [all …]
|
/dports/security/s2n/s2n-tls-1.1.2/tests/integrationv2/ |
H A D | test_well_known_endpoints.py | 50 CIPHERS = [ variable 92 @pytest.mark.parametrize("cipher", CIPHERS, ids=get_parameter_name)
|
H A D | test_pq_handshake.py | 10 CIPHERS = [ variable 140 @pytest.mark.parametrize("client_cipher", CIPHERS, ids=get_parameter_name) 141 @pytest.mark.parametrize("server_cipher", CIPHERS, ids=get_parameter_name)
|
/dports/security/openssl-unsafe/openssl-c9ba19c/VMS/ |
H A D | openssl_utils.com | 43 $ CIPHERS :== $SSLEXE:OPENSSL CIPHERS
|
/dports/security/openssl-legacy-static/openssl-1.0.2u/VMS/ |
H A D | openssl_utils.com | 43 $ CIPHERS :== $SSLEXE:OPENSSL CIPHERS
|
/dports/games/fillets-ng/fillets-ng-1.0.1/src/menu/ |
H A D | Pedometer.cpp | 191 static const int CIPHERS = 5; in drawNumbers() local 199 for (int i = CIPHERS - 1; i >= 0; --i) { in drawNumbers()
|
/dports/security/py-ssh-audit/ssh-audit-2.5.0/src/ssh_audit/ |
H A D | ssh1_publickeymessage.py | 93 for i in range(len(SSH1.CIPHERS)): # pylint: disable=consider-using-enumerate 95 ciphers.append(Utils.to_text(SSH1.CIPHERS[i]))
|
H A D | ssh1.py | 33 CIPHERS = ['none', 'idea', 'des', '3des', 'tss', 'rc4', 'blowfish'] variable in SSH1
|
/dports/security/nmap/nmap-7.91/scripts/ |
H A D | rdp-enum-encryption.nse | 129 local CIPHERS = { 151 if ( not(CIPHERS[i]) ) then return end 152 for k,v in pairs(CIPHERS[i]) do
|
H A D | ssl-poodle.nse | 161 if tls.CIPHERS[v] <= 255 then 243 sorted_keys(tls.CIPHERS) 293 tls.CIPHERS["TLS_FALLBACK_SCSV"] = 0x5600 300 tls.CIPHERS["TLS_FALLBACK_SCSV"] = nil
|
/dports/net/py-python-glanceclient/python-glanceclient-3.5.0/glanceclient/common/ |
H A D | https.py | 151 CIPHERS = 'ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:'\ variable in VerifiedHTTPSConnection 185 self.context.set_cipher_list(self.CIPHERS)
|
/dports/security/keepassxc/keepassxc-2.6.6/src/cli/ |
H A D | Info.cpp | 41 for (auto& cipher : asConst(KeePass2::CIPHERS)) { in executeWithDatabase()
|
/dports/security/keepassxc/keepassxc-2.6.6/src/format/ |
H A D | KeePass2.h | 72 extern const QList<QPair<QUuid, QString>> CIPHERS;
|