/openbsd/regress/lib/libssl/unit/ |
H A D | cipher_list.c | 81 CHECK(*ciphers != NULL); in ssl_bytes_to_list_alloc() 84 cipher = sk_SSL_CIPHER_value(*ciphers, i); in ssl_bytes_to_list_alloc() 166 sk_SSL_CIPHER_free(*ciphers); in ssl_bytes_to_list_invalid() 171 CHECK(*ciphers == NULL); in ssl_bytes_to_list_invalid() 176 CHECK(*ciphers == NULL); in ssl_bytes_to_list_invalid() 184 STACK_OF(SSL_CIPHER) *ciphers = NULL; in main() 196 if (!ssl_bytes_to_list_alloc(s, &ciphers)) in main() 207 sk_SSL_CIPHER_free(ciphers); in main() 208 ciphers = NULL; in main() 211 if (!ssl_bytes_to_list_alloc(s, &ciphers)) in main() [all …]
|
H A D | ssl_get_shared_ciphers.c | 33 const char *ciphers; member 55 .ciphers = 65 .ciphers = 83 .ciphers = 92 .ciphers = 109 .ciphers = 122 .ciphers = 146 .ciphers = 159 .ciphers = 177 .ciphers = [all …]
|
/openbsd/lib/libssl/ |
H A D | ssl_ciphers.c | 61 if (ciphers == NULL) in ssl_cipher_list_to_bytes() 96 STACK_OF(SSL_CIPHER) *ciphers = NULL; in STACK_OF() 157 return (ciphers); in STACK_OF() 160 sk_SSL_CIPHER_free(ciphers); in STACK_OF() 206 STACK_OF(SSL_CIPHER) *ciphers; in ssl_parse_ciphersuites() 246 *out_ciphers = ciphers; in ssl_parse_ciphersuites() 247 ciphers = NULL; in ssl_parse_ciphersuites() 251 sk_SSL_CIPHER_free(ciphers); in ssl_parse_ciphersuites() 277 *out_cipherlist = ciphers; in ssl_merge_cipherlists() 278 ciphers = NULL; in ssl_merge_cipherlists() [all …]
|
H A D | ssl_lib.c | 221 STACK_OF(SSL_CIPHER) *ciphers; in SSL_CTX_set_ssl_version() 228 if (ciphers == NULL || sk_SSL_CIPHER_num(ciphers) <= 0) { in SSL_CTX_set_ssl_version() 1577 STACK_OF(SSL_CIPHER) *ciphers; in ssl_has_ecc_ciphers() 1586 cipher = sk_SSL_CIPHER_value(ciphers, i); in ssl_has_ecc_ciphers() 1602 STACK_OF(SSL_CIPHER) *ciphers; in SSL_get_cipher_list() 1627 STACK_OF(SSL_CIPHER) *ciphers; in SSL_CTX_set_cipher_list() 1638 if (ciphers == NULL) { in SSL_CTX_set_cipher_list() 1675 if (ciphers == NULL) { in SSL_set_cipher_list() 1688 STACK_OF(SSL_CIPHER) *ciphers; in SSL_set_ciphersuites() 1690 if ((ciphers = s->cipher_list) == NULL) in SSL_set_ciphersuites() [all …]
|
H A D | tls13_server.c | 148 STACK_OF(SSL_CIPHER) *ciphers = NULL; in tls13_client_hello_process() 265 if ((ciphers = ssl_bytes_to_cipher_list(s, &cipher_suites)) == NULL) { in tls13_client_hello_process() 269 cipher = ssl3_choose_cipher(s, ciphers, SSL_get_ciphers(s)); in tls13_client_hello_process() 279 s->s3->hs.client_ciphers = ciphers; in tls13_client_hello_process() 280 ciphers = NULL; in tls13_client_hello_process() 292 sk_SSL_CIPHER_free(ciphers); in tls13_client_hello_process()
|
H A D | ssl_srvr.c | 785 STACK_OF(SSL_CIPHER) *ciphers = NULL; in ssl3_get_client_hello() 971 if ((ciphers = ssl_bytes_to_cipher_list(s, in ssl3_get_client_hello() 981 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in ssl3_get_client_hello() 982 c = sk_SSL_CIPHER_value(ciphers, i); in ssl3_get_client_hello() 1065 s->session->master_key, &master_key_length, ciphers, in ssl3_get_client_hello() 1080 s->s3->hs.client_ciphers = ciphers; in ssl3_get_client_hello() 1081 ciphers = NULL; in ssl3_get_client_hello() 1112 if (ciphers == NULL) { in ssl3_get_client_hello() 1118 s->s3->hs.client_ciphers = ciphers; in ssl3_get_client_hello() 1119 ciphers = NULL; in ssl3_get_client_hello() [all …]
|
/openbsd/regress/lib/libssl/interop/cipher/ |
H A D | Makefile | 17 CLEANFILES = *.tmp *.ciphers ciphers.mk 20 client-${clib}.ciphers: 36 ciphers.mk: client-${clib}-server-${slib}.ciphers 37 client-${clib}-server-${slib}.ciphers: \ 38 client-${clib}.ciphers server-${slib}.ciphers client-libressl.ciphers 40 sort client-${clib}.ciphers server-${slib}.ciphers >$@.tmp 43 sort $@ client-libressl.ciphers >$@.tmp 54 ciphers.mk: 59 `cat client-${clib}-server-${slib}.ciphers` 65 .if exists(ciphers.mk) [all …]
|
/openbsd/regress/usr.bin/ssh/ |
H A D | ssh-com.sh | 90 ciphers="3des-cbc" 94 ciphers="$ciphers cast128-cbc" 98 ciphers="$ciphers aes128-cbc cast128-cbc" 104 for c in $ciphers; do
|
H A D | dropbear-ciphers.sh | 17 ciphers=`$DBCLIENT -c help hst 2>&1 | awk '/ ciphers: /{print $4}' | tr ',' ' '` 19 if [ -z "$macs" ] || [ -z "$ciphers" ]; then 20 skip "dbclient query ciphers '$ciphers' or macs '$macs' failed" 24 for c in $ciphers ; do
|
H A D | putty-ciphers.sh | 23 ciphers="" 26 ciphers="${ciphers} ${c}" 32 for c in default $ciphers; do
|
H A D | cipher-speed.sh | 7 ciphers=`${SSH} -Q Ciphers | tr '\n' , | sed 's/,$//'` 10 Ciphers $ciphers
|
H A D | Makefile | 35 try-ciphers \ 109 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers 110 INTEROP_TESTS+= dropbear-ciphers dropbear-kex
|
H A D | rekey.sh | 77 ciphers=`${SSH} -Q cipher` 83 for i in $ciphers; do
|
/openbsd/usr.bin/openssl/ |
H A D | ciphers.c | 93 STACK_OF(SSL_CIPHER) *ciphers; in ciphers_main() 144 ciphers = supported_ciphers; in ciphers_main() 146 if ((ciphers = SSL_get_ciphers(ssl)) == NULL) in ciphers_main() 150 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in ciphers_main() 151 cipher = sk_SSL_CIPHER_value(ciphers, i); in ciphers_main()
|
/openbsd/lib/libtls/ |
H A D | tls_config.c | 183 free((char *)config->ciphers); in tls_config_free() 487 if (ciphers == NULL || in tls_config_set_ciphers() 488 strcasecmp(ciphers, "default") == 0 || in tls_config_set_ciphers() 489 strcasecmp(ciphers, "secure") == 0) in tls_config_set_ciphers() 490 ciphers = TLS_CIPHERS_DEFAULT; in tls_config_set_ciphers() 492 ciphers = TLS_CIPHERS_COMPAT; in tls_config_set_ciphers() 494 ciphers = TLS_CIPHERS_LEGACY; in tls_config_set_ciphers() 496 strcasecmp(ciphers, "insecure") == 0) in tls_config_set_ciphers() 497 ciphers = TLS_CIPHERS_ALL; in tls_config_set_ciphers() 506 "no ciphers for '%s'", ciphers); in tls_config_set_ciphers() [all …]
|
/openbsd/regress/lib/libssl/ciphers/ |
H A D | cipherstest.c | 722 STACK_OF(SSL_CIPHER) *ciphers; in test_ssl_ciphers() 746 if ((ciphers = SSL_get_ciphers(ssl)) == NULL) { in test_ssl_ciphers() 757 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in test_ssl_ciphers() 760 cipher = sk_SSL_CIPHER_value(ciphers, i); in test_ssl_ciphers() 934 STACK_OF(SSL_CIPHER) *ciphers = NULL; in parse_ciphersuites_test() 943 ret = ssl_parse_ciphersuites(&ciphers, pct->str); in parse_ciphersuites_test() 954 cipher = sk_SSL_CIPHER_value(ciphers, j); in parse_ciphersuites_test() 972 sk_SSL_CIPHER_free(ciphers); in parse_ciphersuites_test() 1122 STACK_OF(SSL_CIPHER) *ciphers = NULL; in cipher_set_test() 1172 ciphers = SSL_get_ciphers(ssl); in cipher_set_test() [all …]
|
/openbsd/regress/usr.bin/ssh/unittests/kex/ |
H A D | test_proposal.c | 87 char *prop[PROPOSAL_MAX], *kexalgs, *ciphers, *macs, *hkalgs; in kex_proposal_populate_tests() local 94 ciphers = cipher_alg_list(',', 0); in kex_proposal_populate_tests() 107 ciphers, macs, hkalgs, comp); in kex_proposal_populate_tests() 117 free(ciphers); in kex_proposal_populate_tests()
|
/openbsd/regress/lib/libssl/interop/ |
H A D | client.c | 53 char *ca = NULL, *crt = NULL, *key = NULL, *ciphers = NULL; in main() local 71 ciphers = optarg; in main() 181 if (ciphers) { in main() 182 if (SSL_CTX_set_cipher_list(ctx, ciphers) <= 0) in main()
|
H A D | server.c | 54 char *ca = NULL, *crt = NULL, *key = NULL, *ciphers = NULL; in main() local 72 ciphers = optarg; in main() 220 if (ciphers) { in main() 221 if (SSL_CTX_set_cipher_list(ctx, ciphers) <= 0) in main()
|
/openbsd/regress/lib/libssl/ssl/ |
H A D | testssl | 58 for cipher in `$openssl ciphers -v "$protocol+aRSA" | 70 for cipher in `$openssl ciphers -v "$protocol" | 82 for cipher in `$openssl ciphers -v "$protocol" | 133 for cipher in `$openssl ciphers -v "RSA+$protocol" |
|
/openbsd/usr.sbin/smtpd/ |
H A D | smtp.c | 156 const char *ciphers; in smtp_setup_listener_tls() local 165 ciphers = env->sc_tls_ciphers; in smtp_setup_listener_tls() 167 ciphers = l->tls_ciphers; in smtp_setup_listener_tls() 168 if (ciphers && tls_config_set_ciphers(config, ciphers) == -1) in smtp_setup_listener_tls()
|
H A D | smtpc.c | 50 static const char *ciphers = NULL; variable 91 ciphers = value; in parse_tls_options() 233 if (ciphers && tls_config_set_ciphers(tls_config, ciphers) == -1) in main()
|
/openbsd/regress/lib/libssl/ |
H A D | Makefile | 7 SUBDIR += ciphers
|
/openbsd/usr.bin/ssh/ |
H A D | cipher.c | 82 static const struct sshcipher ciphers[] = { variable 117 for (c = ciphers; c->name != NULL; c++) { in cipher_alg_list() 200 for (c = ciphers; c->name != NULL; c++) in cipher_by_name()
|
/openbsd/regress/lib/libtls/tls/ |
H A D | tlstest.c | 295 test_tls(char *client_protocols, char *server_protocols, char *ciphers) in test_tls() argument 311 if (tls_config_set_ciphers(client_cfg, ciphers) == -1) in test_tls() 324 if (tls_config_set_ciphers(server_cfg, ciphers) == -1) in test_tls()
|