Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 25 of 169) sorted by relevance

1234567

/freebsd/crypto/openssl/test/recipes/
H A D20-test_enc_more.t35 my @ciphers =
40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb
41 |desx|idea|rc2|rc4|seed)/x} @ciphers
44 plan tests => 2 + scalar @ciphers;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $cipher (@ciphers) {
H A D20-test_enc.t36 my @ciphers =
40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea
41 |rc2|rc4|seed)/x} @ciphers
44 plan tests => 2 + (scalar @ciphers)*2;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $c (@ciphers) {
H A D70-test_sslsigalgs.t132 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
148 $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=0");
158 $proxy->ciphers("DEFAULT:\@SECLEVEL=1");
168 $proxy->ciphers("DEFAULT:\@SECLEVEL=0");
176 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
184 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
193 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
201 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
212 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
220 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
[all …]
H A D70-test_sslrecords.t100 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
111 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
122 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
132 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
142 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
164 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_cipher_list.pod28 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below)
30 in L<openssl-ciphers(1)>. The list of ciphers is inherited by all
34 SSL_set_cipher_list() sets the list of ciphers (TLSv1.2 and below) only for
63 (and earlier) ciphers. OSSL_default_ciphersuites() returns the default
72 the corresponding ciphers are not compiled in or because they are mistyped,
79 additional restrictions apply. All ciphers have additional requirements.
80 ADH ciphers don't need a certificate, but DH-parameters must have been set.
81 All other ciphers need a corresponding certificate and key.
88 DSA ciphers always use DH key exchange and therefore need DH-parameters
92 client only supports export RSA ciphers with an asymmetric key length
[all …]
H A DSSL_get_ciphers.pod31 sorted by preference. If B<ssl> is NULL or no ciphers are available, NULL
40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings
42 The list of ciphers that would be sent in a ClientHello can differ from
43 the list of ciphers that would be acceptable when acting as a server.
44 For example, additional ciphers may be usable by a server if there is
45 a gap in the list of supported protocols, and some ciphers may not be
47 If B<ssl> is NULL or no ciphers are available, NULL is returned.
50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are
62 listed for B<ssl> with B<priority>. If B<ssl> is NULL, no ciphers are
63 available, or there are less ciphers than B<priority> available, NULL
[all …]
H A DOpenSSL_add_all_algorithms.pod24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses
25 this table to lookup ciphers via functions such as EVP_get_cipher_byname().
30 ciphers).
35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
/freebsd/crypto/openssl/crypto/engine/
H A Dtb_cipher.c29 if (e->ciphers) { in ENGINE_register_ciphers()
31 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers()
50 if (e->ciphers) { in ENGINE_set_default_ciphers()
52 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers()
87 return e->ciphers; in ENGINE_get_ciphers()
93 e->ciphers = f; in ENGINE_set_ciphers()
/freebsd/crypto/openssh/regress/
H A Dssh-com.sh90 ciphers="3des-cbc"
94 ciphers="$ciphers cast128-cbc"
98 ciphers="$ciphers aes128-cbc cast128-cbc"
104 for c in $ciphers; do
H A Dputty-ciphers.sh23 ciphers=""
26 ciphers="${ciphers} ${c}"
32 for c in default $ciphers; do
H A Dcipher-speed.sh7 ciphers=`${SSH} -Q Ciphers | tr '\n' , | sed 's/,$//'`
10 Ciphers $ciphers
H A Ddropbear-ciphers.sh15 ciphers=`$DBCLIENT -c help 2>&1 | awk '/ ciphers: /{print $4}' | tr ',' ' '`
19 for c in $ciphers ; do
/freebsd/crypto/openssl/providers/
H A Dfips.module.sources504 providers/implementations/ciphers/cipher_aes.c
505 providers/implementations/ciphers/cipher_aes.h
510 providers/implementations/ciphers/cipher_aes_ccm.c
511 providers/implementations/ciphers/cipher_aes_ccm.h
515 providers/implementations/ciphers/cipher_aes_gcm.c
519 providers/implementations/ciphers/cipher_aes_hw.c
529 providers/implementations/ciphers/cipher_cts.c
530 providers/implementations/ciphers/cipher_cts.h
531 providers/implementations/ciphers/cipher_tdes.c
532 providers/implementations/ciphers/cipher_tdes.h
[all …]
H A Dfips-sources.checksums504 4db1826ecce8b60cb641bcd7a61430ec8cef73d2fe3cbc06aa33526afe1c954a providers/implementations/ciphers
505 6ba7d817081cf0d87ba7bfb38cd9d70e41505480bb8bc796ef896f68d4514ea6 providers/implementations/ciphers
510 f37c3cf9e2e6fcfcbed941f3670b790fe09990349db72eb065bef51705d46e96 providers/implementations/ciphers
511 00f36bf48e522dbb5ec71df0ec13e387955fa3672e6ff90e8a412ae95c4a642f providers/implementations/ciphers
515 7e886ecc088b5903aa082eac72a4c46f9064392bdf5723a592368ecebfeb71c0 providers/implementations/ciphers
519 4c6f3a2818754a5aa7b6db36dae53e248504f9e82cc5af2ed68c723903d4f9d5 providers/implementations/ciphers
529 46ba8271917b53fd8fdf77aee19cc326a219c950b94e043d6d118dcac25ad7ad providers/implementations/ciphers
530 74640ce402acc704af72e055fb7f27e6aa8efd417babc56f710478e571d8631c providers/implementations/ciphers
531 fcc3bb0637864252402aaa9d543209909df9a39611127f777b168bc888498dc0 providers/implementations/ciphers
532 77709f7fc3f7c08986cd4f0ebf2ef6e44bacb975c1483ef444b3cf5e5071f9d6 providers/implementations/ciphers
[all …]
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-ciphers.pod.in10 B<openssl> B<ciphers>
56 On a server the list of supported ciphers might also exclude other ciphers
220 ciphers.
748 Verbose listing of all OpenSSL ciphers including NULL ciphers:
750 openssl ciphers -v 'ALL:eNULL'
755 openssl ciphers -v 'ALL:!ADH:@STRENGTH'
760 openssl ciphers -v 'ALL:!aNULL'
762 Include only 3DES ciphers and then place RSA ciphers last:
764 openssl ciphers -v '3DES:+RSA'
770 Include all ciphers with RSA authentication but leave out ciphers without
[all …]
H A Dopenssl-enc.pod.in14 [B<-ciphers>]
49 using various block and stream ciphers using keys based on passwords
67 List all supported ciphers.
69 =item B<-ciphers>
71 Alias of -list to display all supported ciphers.
215 engine-provided ciphers, because this form is processed before the
226 When the enc command lists supported ciphers, ciphers provided by engines,
244 Some of the ciphers do not have large keys and others have security
256 All RC2 ciphers have the same key and effective key length.
275 Note that some of these ciphers can be disabled at compile time
[all …]
/freebsd/crypto/openssl/test/
H A Dcipherlist_test.c150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist()
159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist()
163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist()
169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist()
179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
H A Ddtls_mtu_test.c147 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests()
165 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests()
166 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests()
167 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
H A Dsslcorrupttest.c189 STACK_OF(SSL_CIPHER) *ciphers; in test_ssl_corrupt()
206 || !TEST_ptr(ciphers = SSL_CTX_get_ciphers(cctx)) in test_ssl_corrupt()
207 || !TEST_int_eq(sk_SSL_CIPHER_num(ciphers), 1) in test_ssl_corrupt()
208 || !TEST_ptr(currcipher = sk_SSL_CIPHER_value(ciphers, 0))) in test_ssl_corrupt()
/freebsd/sys/net80211/
H A Dieee80211_crypto.c56 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable
144 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none; in ieee80211_crypto_attach()
268 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { in ieee80211_crypto_register()
273 ciphers[cip->ic_cipher] = cip; in ieee80211_crypto_register()
287 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { in ieee80211_crypto_unregister()
294 ciphers[cip->ic_cipher] = NULL; in ieee80211_crypto_unregister()
300 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL; in ieee80211_crypto_available()
359 cip = ciphers[cipher]; in ieee80211_crypto_newkey()
376 cip = ciphers[cipher]; in ieee80211_crypto_newkey()
/freebsd/crypto/openssh/regress/unittests/kex/
H A Dtest_proposal.c91 char *prop[PROPOSAL_MAX], *kexalgs, *ciphers, *macs, *hkalgs; in kex_proposal_populate_tests() local
98 ciphers = cipher_alg_list(',', 0); in kex_proposal_populate_tests()
111 ciphers, macs, hkalgs, comp); in kex_proposal_populate_tests()
121 free(ciphers); in kex_proposal_populate_tests()
/freebsd/crypto/openssl/util/perl/TLSProxy/
H A DProxy.pm102 ciphers => "AES128-SHA",
170 $self->{ciphers} = "AES128-SHA";
233 if ($self->ciphers ne "") {
234 $execcmd .= " -cipher ".$self->ciphers;
623 sub ciphers subroutine
627 $self->{ciphers} = shift;
629 return $self->{ciphers};
/freebsd/sys/dev/qat/qat_api/common/ctrl/
H A Dsal_crypto.c1544 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
1546 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
1548 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
1550 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
1552 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
1554 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
1556 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
1581 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
1613 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
1615 CPA_BITMAP_BIT_SET(pCapInfo->ciphers, in cpaCySymQueryCapabilities()
[all …]
/freebsd/crypto/openssl/apps/
H A Dciphers.c103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local
179 ciphers = argv[0]; in ciphers_main()
212 if (ciphers != NULL) { in ciphers_main()
213 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in ciphers_main()
/freebsd/contrib/wpa/src/common/
H A Dwpa_common.c2705 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites()
2709 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites()
2713 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites()
2717 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites()
2730 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites()
2753 if (ciphers & WPA_CIPHER_CCMP) in wpa_pick_pairwise_cipher()
2755 if (ciphers & WPA_CIPHER_GCMP) in wpa_pick_pairwise_cipher()
2757 if (ciphers & WPA_CIPHER_TKIP) in wpa_pick_pairwise_cipher()
2771 if (ciphers & WPA_CIPHER_CCMP) in wpa_pick_group_cipher()
2773 if (ciphers & WPA_CIPHER_GCMP) in wpa_pick_group_cipher()
[all …]

1234567