Searched refs:ciphersuite (Results 1 – 25 of 26) sorted by relevance
12
41 $self->{ciphersuite} = 0;64 my $ciphersuite = unpack('n', substr($self->data, $ptr));115 $self->ciphersuite($ciphersuite);116 TLSProxy::Proxy->ciphersuite($ciphersuite);125 print " Ciphersuite:".$ciphersuite."\n";135 TLSProxy::Message->ciphersuite($self->ciphersuite);149 $data .= pack('n', $self->ciphersuite);202 sub ciphersuite subroutine206 $self->{ciphersuite} = shift;208 return $self->{ciphersuite};
72 my $ciphersuite = undef;159 $ciphersuite = undef;720 sub ciphersuite subroutine724 $ciphersuite = shift;726 return $ciphersuite;
48 return if TLSProxy::Proxy->ciphersuite()50 && TLSProxy::Proxy->ciphersuite()
146 my $ciphersuite = 0;441 sub ciphersuite subroutine445 $ciphersuite = shift;447 return $ciphersuite;
49 case the server will have specified a ciphersuite to use already and the PSK50 must be compatible with the digest for that ciphersuite. The digest will be69 =item A ciphersuite71 Only the handshake digest associated with the ciphersuite is relevant for the72 PSK (the server may go on to negotiate any ciphersuite which is compatible with73 the digest). The application can use any TLSv1.3 ciphersuite. If B<md> is74 not NULL the handshake digest for the ciphersuite should be the same.75 The ciphersuite can be set via a call to <SSL_SESSION_set_cipher(3)>. The
39 ciphersuite names in order of preference. Valid TLSv1.3 ciphersuite names are:107 ciphersuite list was configured, and 0 otherwise.
24 SSL_SESSION_set_cipher() can be used to set the ciphersuite associated with the
127 The minimum protocol version that the ciphersuite supports, such as B<TLSv1.2>.129 ciphersuite was first defined because some ciphersuites are backwards compatible
45 suitable for the ciphersuite associated with the SSL_SESSION.
72 a ciphersuite is available (i.e. it is configured in the cipher list) and shared
50 the ciphersuite and the protocol version. See
172 Sets the TLSv1.2 and below ciphersuite list to B<ciphers>. This list will be180 colon-separated list of TLSv1.3 ciphersuite names in order of preference. This278 Sets the ciphersuite list for TLSv1.2 and below to B<value>. This list will be286 colon-separated list of TLSv1.3 ciphersuite names in order of preference. This
68 when GOST ciphersuite is negotiated. Required for interoperability with CryptoPro
940 cipher in use and will be defined in the RFC for the relevant ciphersuite.
124 my @ciphersuite = (0x002f);125 $message->ciphersuites(\@ciphersuite);
96 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
45 * Fixed a bug where the RC4-MD5 ciphersuite incorrectly used the363 * Kerberos ciphersuite support removed884 * SSL/TLS GOST ciphersuite support.886 * RFC4279 PSK ciphersuite support.952 * Various ciphersuite selection fixes.959 * Changes to ciphersuite selection algorithm1058 * Various ciphersuite selection fixes.1108 * Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
274 the handshake when using this ciphersuite.281 the RC4-MD5 ciphersuite. This ciphersuite is not compiled by default in283 ciphersuite list. This ciphersuite will never be used if TLSv1.3 has been293 3) The ciphersuite must have been explicitly added to the ciphersuite list2669 * Separated TLSv1.3 ciphersuite configuration out from TLSv1.2 ciphersuite6182 hello and checking the requested ciphersuite.9055 ciphersuite support.9265 The temporary ciphersuite alias "ECCdraft" is no longer10391 ciphersuite selects this one ciphersuite, and any other similar10394 ciphersuite and the SSL 3.0/TLS 1.0 ciphersuite.[all …]
111 simple colon (":") separated list of TLSv1.3 ciphersuite names.
639 configured. Although the server determines which ciphersuite is used it should650 colon (":") separated list of TLSv1.3 ciphersuite names.
99 list is a simple colon (":") separated list of TLSv1.3 ciphersuite names. By
672 a simple colon (":") separated list of TLSv1.3 ciphersuite names.
681 test-676 = 676-ciphersuite-sanity-check-client682 test-677 = 677-ciphersuite-sanity-check-server18775 [676-ciphersuite-sanity-check-client]18776 ssl_conf = 676-ciphersuite-sanity-check-client-ssl18778 [676-ciphersuite-sanity-check-client-ssl]18782 [676-ciphersuite-sanity-check-client-server]18788 [676-ciphersuite-sanity-check-client-client]18800 [677-ciphersuite-sanity-check-server]18803 [677-ciphersuite-sanity-check-server-ssl]18807 [677-ciphersuite-sanity-check-server-server][all …]
9359 const char *ciphersuite = "DHE-RSA-AES128-SHA"; in test_dh_auto() local9405 ciphersuite = "ADH-AES128-SHA256:@SECLEVEL=0"; in test_dh_auto()9409 ciphersuite = "ADH-AES256-SHA256:@SECLEVEL=0"; in test_dh_auto()9431 || !TEST_true(SSL_set_cipher_list(serverssl, ciphersuite)) in test_dh_auto()9432 || !TEST_true(SSL_set_cipher_list(clientssl, ciphersuite))) in test_dh_auto()
1305 SSL_R_CIPHERSUITE_DIGEST_HAS_CHANGED:218:ciphersuite digest has changed1423 Peer haven't sent GOST certificate, required for selected ciphersuite
Completed in 176 milliseconds