/openssl/test/recipes/ |
H A D | 20-test_enc_more.t | 35 my @ciphers = 40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb 41 |desx|idea|rc2|rc4|seed)/x} @ciphers 44 plan tests => 2 + scalar @ciphers; 47 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 51 skip "Not initialized, skipping...", scalar(@ciphers); 54 foreach my $cipher (@ciphers) {
|
H A D | 20-test_enc.t | 36 my @ciphers = 40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea 41 |rc2|rc4|seed)/x} @ciphers 44 plan tests => 5 + (scalar @ciphers)*2; 47 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 51 skip "Not initialized, skipping...", scalar(@ciphers); 54 foreach my $c (@ciphers) {
|
H A D | 70-test_sslsigalgs.t | 131 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 147 $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=0"); 157 $proxy->ciphers("DEFAULT:\@SECLEVEL=1"); 167 $proxy->ciphers("DEFAULT:\@SECLEVEL=0"); 175 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 183 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 192 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 200 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 211 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 219 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); [all …]
|
H A D | 70-test_sslrecords.t | 149 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 160 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 171 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 181 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 191 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 228 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
H A D | 80-test_ssl_old.t | 505 my $ciphers = '-PSK:-SRP:@SECLEVEL=0'; 530 my @ciphers = run(app(["openssl", "ciphers", "-s", $protocol, 532 "ALL:$ciphers"]), 537 @ciphers ];
|
H A D | 70-test_sslskewith0p.t | 41 $proxy->ciphers('ADH-AES128-SHA:@SECLEVEL=0');
|
/openssl/crypto/engine/ |
H A D | tb_cipher.c | 29 if (e->ciphers) { in ENGINE_register_ciphers() 31 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers() 50 if (e->ciphers) { in ENGINE_set_default_ciphers() 52 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers() 87 return e->ciphers; in ENGINE_get_ciphers() 93 e->ciphers = f; in ENGINE_set_ciphers()
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_cipher_list.pod | 28 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below) 30 in L<openssl-ciphers(1)>. The list of ciphers is inherited by all 34 SSL_set_cipher_list() sets the list of ciphers (TLSv1.2 and below) only for 67 (and earlier) ciphers. OSSL_default_ciphersuites() returns the default 76 the corresponding ciphers are not compiled in or because they are mistyped, 83 additional restrictions apply. All ciphers have additional requirements. 84 ADH ciphers don't need a certificate, but DH-parameters must have been set. 85 All other ciphers need a corresponding certificate and key. 92 DSA ciphers always use DH key exchange and therefore need DH-parameters 96 client only supports export RSA ciphers with an asymmetric key length [all …]
|
H A D | SSL_get_ciphers.pod | 31 sorted by preference. If B<ssl> is NULL or no ciphers are available, NULL 40 SRP and PSK ciphers are only enabled if the appropriate callbacks or settings 42 The list of ciphers that would be sent in a ClientHello can differ from 43 the list of ciphers that would be acceptable when acting as a server. 44 For example, additional ciphers may be usable by a server if there is 45 a gap in the list of supported protocols, and some ciphers may not be 47 If B<ssl> is NULL or no ciphers are available, NULL is returned. 50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are 62 listed for B<ssl> with B<priority>. If B<ssl> is NULL, no ciphers are 63 available, or there are less ciphers than B<priority> available, NULL [all …]
|
H A D | OpenSSL_add_all_algorithms.pod | 24 OpenSSL keeps an internal table of digest algorithms and ciphers. It uses 25 this table to lookup ciphers via functions such as EVP_get_cipher_byname(). 30 ciphers). 35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
|
H A D | SSL_library_init.pod | 18 SSL_library_init() registers the available SSL/TLS ciphers and digests. 30 SSL_library_init() adds ciphers and digests used directly and indirectly by
|
H A D | EVP_aes_128_gcm.pod | 104 some undocumented ctrl functions. These ciphers do not conform to the EVP AEAD 115 some undocumented ctrl functions. These ciphers do not conform to the EVP AEAD 129 (GCM) and OCB Mode respectively. These ciphers require additional control
|
/openssl/doc/man1/ |
H A D | openssl-ciphers.pod.in | 10 B<openssl> B<ciphers> 56 On a server the list of supported ciphers might also exclude other ciphers 224 ciphers. 764 Verbose listing of all OpenSSL ciphers including NULL ciphers: 766 openssl ciphers -v 'ALL:eNULL' 771 openssl ciphers -v 'ALL:!ADH:@STRENGTH' 776 openssl ciphers -v 'ALL:!aNULL' 778 Include only 3DES ciphers and then place RSA ciphers last: 780 openssl ciphers -v '3DES:+RSA' 786 Include all ciphers with RSA authentication but leave out ciphers without [all …]
|
H A D | openssl-enc.pod.in | 14 [B<-ciphers>] 50 using various block and stream ciphers using keys based on passwords 68 List all supported ciphers. 70 =item B<-ciphers> 72 Alias of -list to display all supported ciphers. 232 engine-provided ciphers, because this form is processed before the 243 When the enc command lists supported ciphers, ciphers provided by engines, 273 All RC2 ciphers have the same key and effective key length. 292 Note that some of these ciphers can be disabled at compile time 296 a list of ciphers, supported by your version of OpenSSL, including [all …]
|
/openssl/providers/ |
H A D | fips.module.sources | 571 providers/implementations/ciphers/cipher_aes.c 572 providers/implementations/ciphers/cipher_aes.h 577 providers/implementations/ciphers/cipher_aes_ccm.c 578 providers/implementations/ciphers/cipher_aes_ccm.h 582 providers/implementations/ciphers/cipher_aes_gcm.c 587 providers/implementations/ciphers/cipher_aes_hw.c 597 providers/implementations/ciphers/cipher_cts.c 598 providers/implementations/ciphers/cipher_cts.h 599 providers/implementations/ciphers/cipher_tdes.c 600 providers/implementations/ciphers/cipher_tdes.h [all …]
|
H A D | fips-sources.checksums | 571 c2f1b12c64fc369dfc3b9bc9e76a76de7280e6429adaee55d332eb1971ad1879 providers/implementations/ciphers… 572 6ba7d817081cf0d87ba7bfb38cd9d70e41505480bb8bc796ef896f68d4514ea6 providers/implementations/ciphers… 577 f37c3cf9e2e6fcfcbed941f3670b790fe09990349db72eb065bef51705d46e96 providers/implementations/ciphers… 578 00f36bf48e522dbb5ec71df0ec13e387955fa3672e6ff90e8a412ae95c4a642f providers/implementations/ciphers… 582 7e886ecc088b5903aa082eac72a4c46f9064392bdf5723a592368ecebfeb71c0 providers/implementations/ciphers… 587 d65415e14317e58673808b90a4dcd9aea47ae1ef2250edc1a8f1b872f0e9b1cf providers/implementations/ciphers… 597 dc4626becaabc3990549483d9ef5f05c7dd9a9c2cf9be96ade3ba6a6e203f7f5 providers/implementations/ciphers… 598 57ee5e4d0af6d6006b04e60c5727b43a71ed37b67aa2410e03ec8932ad4a69e4 providers/implementations/ciphers… 599 fcc3bb0637864252402aaa9d543209909df9a39611127f777b168bc888498dc0 providers/implementations/ciphers… 600 ccd6cc0ba06a8ecd8ce50019a6a62f8a185125d9ee045fd68a3c16e71c7a7794 providers/implementations/ciphers… [all …]
|
/openssl/test/ |
H A D | cipherlist_test.c | 150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist() 159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist() 163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist() 169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist() 179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
|
H A D | dtls_mtu_test.c | 150 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests() 168 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests() 169 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests() 170 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
|
H A D | sslcorrupttest.c | 189 STACK_OF(SSL_CIPHER) *ciphers; in test_ssl_corrupt() 206 || !TEST_ptr(ciphers = SSL_CTX_get_ciphers(cctx)) in test_ssl_corrupt() 207 || !TEST_int_eq(sk_SSL_CIPHER_num(ciphers), 1) in test_ssl_corrupt() 208 || !TEST_ptr(currcipher = sk_SSL_CIPHER_value(ciphers, 0))) in test_ssl_corrupt()
|
H A D | ciphername_test.c | 387 const char *ciphers = "ALL:eNULL", *p, *q, *r; in test_cipher_name() local 416 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in test_cipher_name()
|
/openssl/apps/ |
H A D | ciphers.c | 103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local 178 ciphers = argv[0]; in ciphers_main() 211 if (ciphers != NULL) { in ciphers_main() 212 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in ciphers_main()
|
/openssl/util/perl/TLSProxy/ |
H A D | Proxy.pm | 127 ciphers => "AES128-SHA", 172 $self->{ciphers} = "AES128-SHA"; 281 if ($self->ciphers ne "") { 282 $execcmd .= " -cipher ".$self->ciphers; 654 sub ciphers subroutine 658 $self->{ciphers} = shift; 660 return $self->{ciphers};
|
/openssl/doc/designs/ |
H A D | handling-some-max-defines.md | 64 buffers for keys. It is unlikely that symmetric ciphers with keys longer 85 This value is the most problematic one as in case there are ciphers with 114 or multiple blocks. It is unlikely that symmetric ciphers with block sizes 134 problematic as for HMAC/KMAC based AEAD ciphers the tag length can be 135 larger than block size. Even in case we would have block ciphers with
|
/openssl/.github/workflows/ |
H A D | run-checker-merge.yml | 36 no-integrity-only-ciphers, 37 enable-weak-ssl-ciphers,
|
/openssl/providers/implementations/ |
H A D | build.info | 1 SUBDIRS=digests ciphers rands macs kdfs exchange keymgmt signature asymciphers \
|