Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 25 of 122) sorted by relevance

12345

/openssl/test/recipes/
H A D20-test_enc_more.t35 my @ciphers =
40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb
41 |desx|idea|rc2|rc4|seed)/x} @ciphers
44 plan tests => 2 + scalar @ciphers;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $cipher (@ciphers) {
H A D20-test_enc.t36 my @ciphers =
40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea
41 |rc2|rc4|seed)/x} @ciphers
44 plan tests => 5 + (scalar @ciphers)*2;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $c (@ciphers) {
H A D70-test_sslsigalgs.t131 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
147 $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=0");
157 $proxy->ciphers("DEFAULT:\@SECLEVEL=1");
167 $proxy->ciphers("DEFAULT:\@SECLEVEL=0");
175 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
183 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
192 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
200 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
211 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
219 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
[all …]
H A D70-test_sslrecords.t149 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
160 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
171 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
181 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
191 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
228 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
H A D80-test_ssl_old.t505 my $ciphers = '-PSK:-SRP:@SECLEVEL=0';
530 my @ciphers = run(app(["openssl", "ciphers", "-s", $protocol,
532 "ALL:$ciphers"]),
537 @ciphers ];
H A D70-test_sslskewith0p.t41 $proxy->ciphers('ADH-AES128-SHA:@SECLEVEL=0');
/openssl/crypto/engine/
H A Dtb_cipher.c29 if (e->ciphers) { in ENGINE_register_ciphers()
31 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers()
50 if (e->ciphers) { in ENGINE_set_default_ciphers()
52 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers()
87 return e->ciphers; in ENGINE_get_ciphers()
93 e->ciphers = f; in ENGINE_set_ciphers()
/openssl/doc/man3/
H A DSSL_CTX_set_cipher_list.pod28 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below)
30 in L<openssl-ciphers(1)>. The list of ciphers is inherited by all
34 SSL_set_cipher_list() sets the list of ciphers (TLSv1.2 and below) only for
67 (and earlier) ciphers. OSSL_default_ciphersuites() returns the default
76 the corresponding ciphers are not compiled in or because they are mistyped,
83 additional restrictions apply. All ciphers have additional requirements.
84 ADH ciphers don't need a certificate, but DH-parameters must have been set.
85 All other ciphers need a corresponding certificate and key.
92 DSA ciphers always use DH key exchange and therefore need DH-parameters
96 client only supports export RSA ciphers with an asymmetric key length
[all …]
H A DSSL_get_ciphers.pod31 sorted by preference. If B<ssl> is NULL or no ciphers are available, NULL
40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings
42 The list of ciphers that would be sent in a ClientHello can differ from
43 the list of ciphers that would be acceptable when acting as a server.
44 For example, additional ciphers may be usable by a server if there is
45 a gap in the list of supported protocols, and some ciphers may not be
47 If B<ssl> is NULL or no ciphers are available, NULL is returned.
50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are
62 listed for B<ssl> with B<priority>. If B<ssl> is NULL, no ciphers are
63 available, or there are less ciphers than B<priority> available, NULL
[all …]
H A DOpenSSL_add_all_algorithms.pod24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses
25 this table to lookup ciphers via functions such as EVP_get_cipher_byname().
30 ciphers).
35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
H A DSSL_library_init.pod18 SSL_library_init() registers the available SSL/TLS ciphers and digests.
30 SSL_library_init() adds ciphers and digests used directly and indirectly by
H A DEVP_aes_128_gcm.pod104 some undocumented ctrl functions. These ciphers do not conform to the EVP AEAD
115 some undocumented ctrl functions. These ciphers do not conform to the EVP AEAD
129 (GCM) and OCB Mode respectively. These ciphers require additional control
/openssl/doc/man1/
H A Dopenssl-ciphers.pod.in10 B<openssl> B<ciphers>
56 On a server the list of supported ciphers might also exclude other ciphers
224 ciphers.
764 Verbose listing of all OpenSSL ciphers including NULL ciphers:
766 openssl ciphers -v 'ALL:eNULL'
771 openssl ciphers -v 'ALL:!ADH:@STRENGTH'
776 openssl ciphers -v 'ALL:!aNULL'
778 Include only 3DES ciphers and then place RSA ciphers last:
780 openssl ciphers -v '3DES:+RSA'
786 Include all ciphers with RSA authentication but leave out ciphers without
[all …]
H A Dopenssl-enc.pod.in14 [B<-ciphers>]
50 using various block and stream ciphers using keys based on passwords
68 List all supported ciphers.
70 =item B<-ciphers>
72 Alias of -list to display all supported ciphers.
232 engine-provided ciphers, because this form is processed before the
243 When the enc command lists supported ciphers, ciphers provided by engines,
273 All RC2 ciphers have the same key and effective key length.
292 Note that some of these ciphers can be disabled at compile time
296 a list of ciphers, supported by your version of OpenSSL, including
[all …]
/openssl/providers/
H A Dfips.module.sources571 providers/implementations/ciphers/cipher_aes.c
572 providers/implementations/ciphers/cipher_aes.h
577 providers/implementations/ciphers/cipher_aes_ccm.c
578 providers/implementations/ciphers/cipher_aes_ccm.h
582 providers/implementations/ciphers/cipher_aes_gcm.c
587 providers/implementations/ciphers/cipher_aes_hw.c
597 providers/implementations/ciphers/cipher_cts.c
598 providers/implementations/ciphers/cipher_cts.h
599 providers/implementations/ciphers/cipher_tdes.c
600 providers/implementations/ciphers/cipher_tdes.h
[all …]
H A Dfips-sources.checksums571 c2f1b12c64fc369dfc3b9bc9e76a76de7280e6429adaee55d332eb1971ad1879 providers/implementations/ciphers
572 6ba7d817081cf0d87ba7bfb38cd9d70e41505480bb8bc796ef896f68d4514ea6 providers/implementations/ciphers
577 f37c3cf9e2e6fcfcbed941f3670b790fe09990349db72eb065bef51705d46e96 providers/implementations/ciphers
578 00f36bf48e522dbb5ec71df0ec13e387955fa3672e6ff90e8a412ae95c4a642f providers/implementations/ciphers
582 7e886ecc088b5903aa082eac72a4c46f9064392bdf5723a592368ecebfeb71c0 providers/implementations/ciphers
587 d65415e14317e58673808b90a4dcd9aea47ae1ef2250edc1a8f1b872f0e9b1cf providers/implementations/ciphers
597 dc4626becaabc3990549483d9ef5f05c7dd9a9c2cf9be96ade3ba6a6e203f7f5 providers/implementations/ciphers
598 57ee5e4d0af6d6006b04e60c5727b43a71ed37b67aa2410e03ec8932ad4a69e4 providers/implementations/ciphers
599 fcc3bb0637864252402aaa9d543209909df9a39611127f777b168bc888498dc0 providers/implementations/ciphers
600 ccd6cc0ba06a8ecd8ce50019a6a62f8a185125d9ee045fd68a3c16e71c7a7794 providers/implementations/ciphers
[all …]
/openssl/test/
H A Dcipherlist_test.c150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist()
159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist()
163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist()
169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist()
179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
H A Ddtls_mtu_test.c150 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests()
168 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests()
169 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests()
170 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
H A Dsslcorrupttest.c189 STACK_OF(SSL_CIPHER) *ciphers; in test_ssl_corrupt()
206 || !TEST_ptr(ciphers = SSL_CTX_get_ciphers(cctx)) in test_ssl_corrupt()
207 || !TEST_int_eq(sk_SSL_CIPHER_num(ciphers), 1) in test_ssl_corrupt()
208 || !TEST_ptr(currcipher = sk_SSL_CIPHER_value(ciphers, 0))) in test_ssl_corrupt()
H A Dciphername_test.c387 const char *ciphers = "ALL:eNULL", *p, *q, *r; in test_cipher_name() local
416 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in test_cipher_name()
/openssl/apps/
H A Dciphers.c103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local
178 ciphers = argv[0]; in ciphers_main()
211 if (ciphers != NULL) { in ciphers_main()
212 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in ciphers_main()
/openssl/util/perl/TLSProxy/
H A DProxy.pm127 ciphers => "AES128-SHA",
172 $self->{ciphers} = "AES128-SHA";
281 if ($self->ciphers ne "") {
282 $execcmd .= " -cipher ".$self->ciphers;
654 sub ciphers subroutine
658 $self->{ciphers} = shift;
660 return $self->{ciphers};
/openssl/doc/designs/
H A Dhandling-some-max-defines.md64 buffers for keys. It is unlikely that symmetric ciphers with keys longer
85 This value is the most problematic one as in case there are ciphers with
114 or multiple blocks. It is unlikely that symmetric ciphers with block sizes
134 problematic as for HMAC/KMAC based AEAD ciphers the tag length can be
135 larger than block size. Even in case we would have block ciphers with
/openssl/.github/workflows/
H A Drun-checker-merge.yml36 no-integrity-only-ciphers,
37 enable-weak-ssl-ciphers,
/openssl/providers/implementations/
H A Dbuild.info1 SUBDIRS=digests ciphers rands macs kdfs exchange keymgmt signature asymciphers \

Completed in 65 milliseconds

12345