/openssl/test/ |
H A D | dtlstest.c | 71 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, "AES128-SHA"))) in test_dtls_unprocessed() 76 || !TEST_true(SSL_CTX_set_cipher_list(cctx, in test_dtls_unprocessed() 180 if (!TEST_true(SSL_CTX_set_cipher_list(sctx, "DEFAULT:@SECLEVEL=0")) in test_dtls_drop_records() 181 || !TEST_true(SSL_CTX_set_cipher_list(cctx, in test_dtls_drop_records() 308 || !TEST_true(SSL_CTX_set_cipher_list(cctx, in test_cookie() 344 || !TEST_true(SSL_CTX_set_cipher_list(cctx, in test_dtls_duplicate_records() 469 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, "AES128-SHA"))) in test_swap_epoch() 474 || !TEST_true(SSL_CTX_set_cipher_list(cctx, in test_swap_epoch() 545 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, "AES128-SHA"))) in test_swap_app_data() 550 || !TEST_true(SSL_CTX_set_cipher_list(cctx, in test_swap_app_data() [all …]
|
H A D | cipherlist_test.c | 207 if (!TEST_true(SSL_CTX_set_cipher_list(fixture->server, "DEFAULT")) in test_default_cipherlist_explicit() 208 || !TEST_true(SSL_CTX_set_cipher_list(fixture->client, "DEFAULT"))) { in test_default_cipherlist_explicit() 222 if (!TEST_int_eq(SSL_CTX_set_cipher_list(fixture->server, "no-such"), 0)) in test_default_cipherlist_clear() 251 if (!TEST_true(SSL_CTX_set_cipher_list(fixture->server, TLS1_RFC_RSA_WITH_AES_128_SHA)) in test_stdname_cipherlist() 252 … || !TEST_true(SSL_CTX_set_cipher_list(fixture->client, TLS1_RFC_RSA_WITH_AES_128_SHA))) { in test_stdname_cipherlist()
|
H A D | fatalerrtest.c | 40 if (!TEST_true(SSL_CTX_set_cipher_list(sctx, "AES128-SHA")) in test_fatalerr() 41 || !TEST_true(SSL_CTX_set_cipher_list(cctx, "AES256-SHA")) in test_fatalerr()
|
H A D | clienthellotest.c | 113 if (!TEST_false(SSL_CTX_set_cipher_list(ctx, ""))) in test_client_hello() 136 } else if (!TEST_true(SSL_CTX_set_cipher_list(ctx, in test_client_hello()
|
H A D | ciphername_test.c | 414 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in test_cipher_name()
|
H A D | dtls_mtu_test.c | 165 if (!TEST_true(SSL_CTX_set_cipher_list(ctx, "PSK"))) in run_mtu_tests()
|
H A D | sslcorrupttest.c | 206 || !TEST_true(SSL_CTX_set_cipher_list(cctx, cipher_list[testidx])) in test_ssl_corrupt()
|
H A D | sslapitest.c | 374 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, "RSA"))) in test_keylog() 767 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, in test_client_hello_cb() 987 || !TEST_true(SSL_CTX_set_cipher_list(cctx, in execute_test_large_message() 4708 if (!TEST_true(SSL_CTX_set_cipher_list(sctx, in test_key_exchange() 4719 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, in test_key_exchange() 4879 if (!TEST_true(SSL_CTX_set_cipher_list(sctx, in test_negotiated_group() 4884 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, in test_negotiated_group() 7536 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, in int_test_ssl_get_shared_ciphers() 7541 || !TEST_true(SSL_CTX_set_cipher_list(sctx, in int_test_ssl_get_shared_ciphers() 8950 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, in test_sigalgs_available() [all …]
|
H A D | ssl_old_test.c | 1418 if (!SSL_CTX_set_cipher_list(c_ctx, cipher)) { in main() 1431 if (!SSL_CTX_set_cipher_list(s_ctx, cipher)) { in main() 1444 if (!SSL_CTX_set_cipher_list(s_ctx2, cipher)) { in main() 1457 if (!SSL_CTX_set_cipher_list(c_ctx, cipher) in main() 1458 || !SSL_CTX_set_cipher_list(s_ctx, cipher) in main() 1459 || !SSL_CTX_set_cipher_list(s_ctx2, cipher)) { in main()
|
H A D | bad_dtls_test.c | 499 || !TEST_true(SSL_CTX_set_cipher_list(ctx, "AES128-SHA"))) in test_bad_dtls()
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_cipher_list.pod | 5 SSL_CTX_set_cipher_list, 17 int SSL_CTX_set_cipher_list(SSL_CTX *ctx, const char *str); 28 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below) 68 The control string B<str> for SSL_CTX_set_cipher_list(), SSL_set_cipher_list(), 103 SSL_CTX_set_cipher_list() and SSL_set_cipher_list() return 1 if any cipher
|
H A D | SSL_CTX_set_tmp_ecdh.pod | 37 L<ssl(7)>, L<SSL_CTX_set1_curves(3)>, L<SSL_CTX_set_cipher_list(3)>,
|
H A D | SSL_CTX_use_certificate.pod | 142 cipher selected, see also L<SSL_CTX_set_cipher_list(3)>. 191 L<SSL_CTX_set_cipher_list(3)>,
|
H A D | SSL_get_ciphers.pod | 105 L<ssl(7)>, L<SSL_CTX_set_cipher_list(3)>,
|
H A D | SSL_CTX_set_tmp_dh_callback.pod | 109 L<ssl(7)>, L<SSL_CTX_set_cipher_list(3)>,
|
/openssl/fuzz/ |
H A D | server.c | 546 ret = SSL_CTX_set_cipher_list(ctx, "ALL:eNULL:@SECLEVEL=0"); in FuzzerTestOneInput()
|
/openssl/apps/ |
H A D | ciphers.c | 212 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in ciphers_main()
|
H A D | s_time.c | 254 if (cipher != NULL && !SSL_CTX_set_cipher_list(ctx, cipher)) in s_time_main()
|
/openssl/ssl/ |
H A D | ssl_conf.c | 260 rv = SSL_CTX_set_cipher_list(cctx->ctx, value); in cmd_CipherString()
|
H A D | ssl_lib.c | 3144 int SSL_CTX_set_cipher_list(SSL_CTX *ctx, const char *str) in SSL_CTX_set_cipher_list() function
|
/openssl/util/ |
H A D | libssl.num | 4 SSL_CTX_set_cipher_list 4 3_0_0 EXIST::FUNCTION:
|
/openssl/doc/ |
H A D | build.info | 2178 DEPEND[html/man3/SSL_CTX_set_cipher_list.html]=man3/SSL_CTX_set_cipher_list.pod 2179 GENERATE[html/man3/SSL_CTX_set_cipher_list.html]=man3/SSL_CTX_set_cipher_list.pod 2180 DEPEND[man/man3/SSL_CTX_set_cipher_list.3]=man3/SSL_CTX_set_cipher_list.pod 2181 GENERATE[man/man3/SSL_CTX_set_cipher_list.3]=man3/SSL_CTX_set_cipher_list.pod 3294 html/man3/SSL_CTX_set_cipher_list.html \ 3893 man/man3/SSL_CTX_set_cipher_list.3 \
|
/openssl/include/openssl/ |
H A D | ssl.h.in | 1537 __owur int SSL_CTX_set_cipher_list(SSL_CTX *, const char *str);
|
/openssl/ |
H A D | CHANGES.md | 98 * The SSL_CTX_set_cipher_list family functions now accept ciphers using their
|