Searched refs:ciphersuite (Results 1 – 25 of 30) sorted by relevance
12
51 $self->{ciphersuite} = 0;74 my $ciphersuite = unpack('n', substr($self->data, $ptr));125 $self->ciphersuite($ciphersuite);126 TLSProxy::Proxy->ciphersuite($ciphersuite);135 print " Ciphersuite:".$ciphersuite."\n";145 TLSProxy::Message->ciphersuite($self->ciphersuite);159 $data .= pack('n', $self->ciphersuite);212 sub ciphersuite subroutine216 $self->{ciphersuite} = shift;218 return $self->{ciphersuite};
75 my $ciphersuite = undef;161 $ciphersuite = undef;751 sub ciphersuite subroutine755 $ciphersuite = shift;757 return $ciphersuite;
56 return if TLSProxy::Proxy->ciphersuite()58 && TLSProxy::Proxy->ciphersuite()
158 my $ciphersuite = 0;553 sub ciphersuite subroutine557 $ciphersuite = shift;559 return $ciphersuite;
49 case the server will have specified a ciphersuite to use already and the PSK50 must be compatible with the digest for that ciphersuite. The digest will be69 =item A ciphersuite71 Only the handshake digest associated with the ciphersuite is relevant for the72 PSK (the server may go on to negotiate any ciphersuite which is compatible with73 the digest). The application can use any TLSv1.3 ciphersuite. If B<md> is74 not NULL the handshake digest for the ciphersuite should be the same.75 The ciphersuite can be set via a call to <SSL_SESSION_set_cipher(3)>. The
39 ciphersuite names in order of preference. Valid TLSv1.3 ciphersuite names are:111 ciphersuite list was configured, and 0 otherwise.
37 ciphersuite by setting it in I<*cipher>.41 the B<SSL_SESSION> - but it does not affect the ciphersuite selected by the
24 SSL_SESSION_set_cipher() can be used to set the ciphersuite associated with the
127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>.129 ciphersuite was first defined because some ciphersuites are backwards compatible
45 suitable for the ciphersuite associated with the SSL_SESSION.
72 a ciphersuite is available (i.e. it is configured in the cipher list) and shared
50 the ciphersuite and the protocol version. See
205 Sets the TLSv1.2 and below ciphersuite list to B<ciphers>. This list will be213 colon-separated list of TLSv1.3 ciphersuite names in order of preference. This317 Sets the ciphersuite list for TLSv1.2 and below to B<value>. This list will be325 colon-separated list of TLSv1.3 ciphersuite names in order of preference. This
69 when GOST ciphersuite is negotiated. Required for interoperability with CryptoPro
194 my @ciphersuite = (0x002f);195 $message->ciphersuites(\@ciphersuite);
130 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
179 #ciphersuite
681 test-676 = 676-ciphersuite-sanity-check-client682 test-677 = 677-ciphersuite-sanity-check-server18775 [676-ciphersuite-sanity-check-client]18776 ssl_conf = 676-ciphersuite-sanity-check-client-ssl18778 [676-ciphersuite-sanity-check-client-ssl]18782 [676-ciphersuite-sanity-check-client-server]18788 [676-ciphersuite-sanity-check-client-client]18800 [677-ciphersuite-sanity-check-server]18803 [677-ciphersuite-sanity-check-server-ssl]18807 [677-ciphersuite-sanity-check-server-server][all …]
87 ciphersuite. Such a set is represented by an B<SSL_CIPHER> object.
360 * Support for using the IANA standard names in TLS ciphersuite configuration481 * Fixed a bug where the RC4-MD5 ciphersuite incorrectly used the799 * Kerberos ciphersuite support removed1320 * SSL/TLS GOST ciphersuite support.1322 * RFC4279 PSK ciphersuite support.1388 * Various ciphersuite selection fixes.1395 * Changes to ciphersuite selection algorithm1494 * Various ciphersuite selection fixes.1544 * Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
1821 the handshake when using this ciphersuite.1828 the RC4-MD5 ciphersuite. This ciphersuite is not compiled by default in1830 ciphersuite list. This ciphersuite will never be used if TLSv1.3 has been1840 3) The ciphersuite must have been explicitly added to the ciphersuite list4217 * Separated TLSv1.3 ciphersuite configuration out from TLSv1.2 ciphersuite7730 hello and checking the requested ciphersuite.10603 ciphersuite support.10813 The temporary ciphersuite alias "ECCdraft" is no longer11939 ciphersuite selects this one ciphersuite, and any other similar11942 ciphersuite and the SSL 3.0/TLS 1.0 ciphersuite.[all …]
112 simple colon (":") separated list of TLSv1.3 ciphersuite names.
676 configured. Although the server determines which ciphersuite is used it should687 colon (":") separated list of TLSv1.3 ciphersuite names.
839 layer has not negotiated a ciphersuite so it has no “current” cipher. We could847 ciphersuite has been negotiated and NULL can be used to infer that Initial
10520 const char *ciphersuite = "DHE-RSA-AES128-SHA"; in test_dh_auto() local10566 ciphersuite = "ADH-AES128-SHA256:@SECLEVEL=0"; in test_dh_auto()10570 ciphersuite = "ADH-AES256-SHA256:@SECLEVEL=0"; in test_dh_auto()10592 || !TEST_true(SSL_set_cipher_list(serverssl, ciphersuite)) in test_dh_auto()10593 || !TEST_true(SSL_set_cipher_list(clientssl, ciphersuite))) in test_dh_auto()
Completed in 124 milliseconds