| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| ServerHello.pm | 51 $self->{ciphersuite} = 0; 74 my $ciphersuite = unpack('n', substr($self->data, $ptr)); 125 $self->ciphersuite($ciphersuite); 126 TLSProxy::Proxy->ciphersuite($ciphersuite); 135 print " Ciphersuite:".$ciphersuite."\n"; 145 TLSProxy::Message->ciphersuite($self->ciphersuite); 212 sub ciphersuite subroutine [all...] |
| ServerKeyExchange.pm | 55 #Minimal SKE parsing. Only supports one known DHE ciphersuite at the moment 56 return if TLSProxy::Proxy->ciphersuite() 58 && TLSProxy::Proxy->ciphersuite()
|
| Proxy.pm | 78 my $ciphersuite = undef; 219 $ciphersuite = undef; 848 sub ciphersuite subroutine 852 $ciphersuite = shift; 854 return $ciphersuite;
|
| Message.pm | 160 my $ciphersuite = 0; 555 sub ciphersuite subroutine 559 $ciphersuite = shift; 561 return $ciphersuite;
|
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| ServerHello.pm | 41 $self->{ciphersuite} = 0; 64 my $ciphersuite = unpack('n', substr($self->data, $ptr)); 115 $self->ciphersuite($ciphersuite); 116 TLSProxy::Proxy->ciphersuite($ciphersuite); 125 print " Ciphersuite:".$ciphersuite."\n"; 135 TLSProxy::Message->ciphersuite($self->ciphersuite); 202 sub ciphersuite subroutine [all...] |
| ServerKeyExchange.pm | 47 #Minimal SKE parsing. Only supports one known DHE ciphersuite at the moment 48 return if TLSProxy::Proxy->ciphersuite() 50 && TLSProxy::Proxy->ciphersuite()
|
| Proxy.pm | 73 my $ciphersuite = undef; 160 $ciphersuite = undef; 721 sub ciphersuite subroutine 725 $ciphersuite = shift; 727 return $ciphersuite;
|
| Message.pm | 146 my $ciphersuite = 0; 450 sub ciphersuite subroutine 454 $ciphersuite = shift; 456 return $ciphersuite;
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| ServerHello.pm | 41 $self->{ciphersuite} = 0; 64 my $ciphersuite = unpack('n', substr($self->data, $ptr)); 115 $self->ciphersuite($ciphersuite); 116 TLSProxy::Proxy->ciphersuite($ciphersuite); 125 print " Ciphersuite:".$ciphersuite."\n"; 135 TLSProxy::Message->ciphersuite($self->ciphersuite); 202 sub ciphersuite subroutine [all...] |
| ServerKeyExchange.pm | 47 #Minimal SKE parsing. Only supports one known DHE ciphersuite at the moment 48 return if TLSProxy::Proxy->ciphersuite() 50 && TLSProxy::Proxy->ciphersuite()
|
| Proxy.pm | 72 my $ciphersuite = undef; 159 $ciphersuite = undef; 720 sub ciphersuite subroutine 724 $ciphersuite = shift; 726 return $ciphersuite;
|
| Message.pm | 146 my $ciphersuite = 0; 441 sub ciphersuite subroutine 445 $ciphersuite = shift; 447 return $ciphersuite;
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 70-test_renegotiation.t | 125 my @ciphersuite = (0x002f); 126 $message->ciphersuites(\@ciphersuite);
|
| 70-test_tls13hrr.t | 45 #Test 1: A client should fail if the server changes the ciphersuite between the 56 ok(TLSProxy::Message->fail(), "Server ciphersuite changes"); 59 # we end up selecting a different ciphersuite between HRR and the SH 69 ok(TLSProxy::Message->fail(), "Client ciphersuite changes"); 116 # the ciphersuite will change will we get the ServerHello 117 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
|
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 70-test_renegotiation.t | 106 my @ciphersuite = (0x002f); 107 $message->ciphersuites(\@ciphersuite);
|
| 70-test_tls13hrr.t | 44 #Test 1: A client should fail if the server changes the ciphersuite between the 51 ok(TLSProxy::Message->fail(), "Server ciphersuite changes"); 54 # we end up selecting a different ciphersuite between HRR and the SH 60 ok(TLSProxy::Message->fail(), "Client ciphersuite changes"); 89 # the ciphersuite will change will we get the ServerHello 90 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
|
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_pwd_common.h | 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
| eap_pwd_common.c | 343 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id) 358 * first compute the session-id = TypeCode | H(ciphersuite | scal_p | 367 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32));
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 70-test_renegotiation.t | 195 my @ciphersuite = (0x002f); 196 $message->ciphersuites(\@ciphersuite);
|
| 70-test_tls13hrr.t | 45 #Test 1: A client should fail if the server changes the ciphersuite between the 56 ok(TLSProxy::Message->fail(), "Server ciphersuite changes"); 59 # we end up selecting a different ciphersuite between HRR and the SH 69 ok(TLSProxy::Message->fail(), "Client ciphersuite changes"); 129 # the ciphersuite will change will we get the ServerHello 130 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
|
| /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
| 02-protocol-version.conf | 681 test-676 = 676-ciphersuite-sanity-check-client 682 test-677 = 677-ciphersuite-sanity-check-server 18775 [676-ciphersuite-sanity-check-client] 18776 ssl_conf = 676-ciphersuite-sanity-check-client-ssl 18778 [676-ciphersuite-sanity-check-client-ssl] 18779 server = 676-ciphersuite-sanity-check-client-server 18780 client = 676-ciphersuite-sanity-check-client-client 18782 [676-ciphersuite-sanity-check-client-server] 18788 [676-ciphersuite-sanity-check-client-client] 18800 [677-ciphersuite-sanity-check-server [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| sslapitest.c | 4537 * So updating ciphersuite in 'sess' which will get reflected in 4727 * Test 0: Set a default ciphersuite in the SSL_CTX (no explicit cipher_list) 4728 * Test 1: Set a non-default ciphersuite in the SSL_CTX (no explicit cipher_list) 4729 * Test 2: Set a default ciphersuite in the SSL (no explicit cipher_list) 4730 * Test 3: Set a non-default ciphersuite in the SSL (no explicit cipher_list) 4731 * Test 4: Set a default ciphersuite in the SSL_CTX (SSL_CTX cipher_list) 4732 * Test 5: Set a non-default ciphersuite in the SSL_CTX (SSL_CTX cipher_list) 4733 * Test 6: Set a default ciphersuite in the SSL (SSL_CTX cipher_list) 4734 * Test 7: Set a non-default ciphersuite in the SSL (SSL_CTX cipher_list) 4735 * Test 8: Set a default ciphersuite in the SSL (SSL cipher_list 10851 const char *ciphersuite = "DHE-RSA-AES128-SHA"; local [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| sslapitest.c | 3375 * Any ciphersuite using SHA256 will do - it will be compatible with 3376 * the actual ciphersuite selected as long as it too is based on SHA256 4449 * So updating ciphersuite in 'sess' which will get reflected in 4640 * Test 0: Set a default ciphersuite in the SSL_CTX (no explicit cipher_list) 4641 * Test 1: Set a non-default ciphersuite in the SSL_CTX (no explicit cipher_list) 4642 * Test 2: Set a default ciphersuite in the SSL (no explicit cipher_list) 4643 * Test 3: Set a non-default ciphersuite in the SSL (no explicit cipher_list) 4644 * Test 4: Set a default ciphersuite in the SSL_CTX (SSL_CTX cipher_list) 4645 * Test 5: Set a non-default ciphersuite in the SSL_CTX (SSL_CTX cipher_list) 4646 * Test 6: Set a default ciphersuite in the SSL (SSL_CTX cipher_list 9771 const char *ciphersuite = "DHE-RSA-AES128-SHA"; local [all...] |