HomeSort by: relevance | last modified time | path
    Searched refs:ciphersuite (Results 1 - 23 of 23) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/
ServerHello.pm 51 $self->{ciphersuite} = 0;
74 my $ciphersuite = unpack('n', substr($self->data, $ptr));
125 $self->ciphersuite($ciphersuite);
126 TLSProxy::Proxy->ciphersuite($ciphersuite);
135 print " Ciphersuite:".$ciphersuite."\n";
145 TLSProxy::Message->ciphersuite($self->ciphersuite);
212 sub ciphersuite subroutine
    [all...]
ServerKeyExchange.pm 55 #Minimal SKE parsing. Only supports one known DHE ciphersuite at the moment
56 return if TLSProxy::Proxy->ciphersuite()
58 && TLSProxy::Proxy->ciphersuite()
Proxy.pm 78 my $ciphersuite = undef;
219 $ciphersuite = undef;
848 sub ciphersuite subroutine
852 $ciphersuite = shift;
854 return $ciphersuite;
Message.pm 160 my $ciphersuite = 0;
555 sub ciphersuite subroutine
559 $ciphersuite = shift;
561 return $ciphersuite;
  /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
ServerHello.pm 41 $self->{ciphersuite} = 0;
64 my $ciphersuite = unpack('n', substr($self->data, $ptr));
115 $self->ciphersuite($ciphersuite);
116 TLSProxy::Proxy->ciphersuite($ciphersuite);
125 print " Ciphersuite:".$ciphersuite."\n";
135 TLSProxy::Message->ciphersuite($self->ciphersuite);
202 sub ciphersuite subroutine
    [all...]
ServerKeyExchange.pm 47 #Minimal SKE parsing. Only supports one known DHE ciphersuite at the moment
48 return if TLSProxy::Proxy->ciphersuite()
50 && TLSProxy::Proxy->ciphersuite()
Proxy.pm 73 my $ciphersuite = undef;
160 $ciphersuite = undef;
721 sub ciphersuite subroutine
725 $ciphersuite = shift;
727 return $ciphersuite;
Message.pm 146 my $ciphersuite = 0;
450 sub ciphersuite subroutine
454 $ciphersuite = shift;
456 return $ciphersuite;
  /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
ServerHello.pm 41 $self->{ciphersuite} = 0;
64 my $ciphersuite = unpack('n', substr($self->data, $ptr));
115 $self->ciphersuite($ciphersuite);
116 TLSProxy::Proxy->ciphersuite($ciphersuite);
125 print " Ciphersuite:".$ciphersuite."\n";
135 TLSProxy::Message->ciphersuite($self->ciphersuite);
202 sub ciphersuite subroutine
    [all...]
ServerKeyExchange.pm 47 #Minimal SKE parsing. Only supports one known DHE ciphersuite at the moment
48 return if TLSProxy::Proxy->ciphersuite()
50 && TLSProxy::Proxy->ciphersuite()
Proxy.pm 72 my $ciphersuite = undef;
159 $ciphersuite = undef;
720 sub ciphersuite subroutine
724 $ciphersuite = shift;
726 return $ciphersuite;
Message.pm 146 my $ciphersuite = 0;
441 sub ciphersuite subroutine
445 $ciphersuite = shift;
447 return $ciphersuite;
  /src/crypto/external/bsd/openssl/dist/test/recipes/
70-test_renegotiation.t 125 my @ciphersuite = (0x002f);
126 $message->ciphersuites(\@ciphersuite);
70-test_tls13hrr.t 45 #Test 1: A client should fail if the server changes the ciphersuite between the
56 ok(TLSProxy::Message->fail(), "Server ciphersuite changes");
59 # we end up selecting a different ciphersuite between HRR and the SH
69 ok(TLSProxy::Message->fail(), "Client ciphersuite changes");
116 # the ciphersuite will change will we get the ServerHello
117 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
  /src/crypto/external/bsd/openssl.old/dist/test/recipes/
70-test_renegotiation.t 106 my @ciphersuite = (0x002f);
107 $message->ciphersuites(\@ciphersuite);
70-test_tls13hrr.t 44 #Test 1: A client should fail if the server changes the ciphersuite between the
51 ok(TLSProxy::Message->fail(), "Server ciphersuite changes");
54 # we end up selecting a different ciphersuite between HRR and the SH
60 ok(TLSProxy::Message->fail(), "Client ciphersuite changes");
89 # the ciphersuite will change will we get the ServerHello
90 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
  /src/external/bsd/wpa/dist/src/eap_common/
eap_pwd_common.h 66 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
eap_pwd_common.c 343 const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id)
358 * first compute the session-id = TypeCode | H(ciphersuite | scal_p |
367 eap_pwd_h_update(hash, (const u8 *) ciphersuite, sizeof(u32));
  /src/crypto/external/apache2/openssl/dist/test/recipes/
70-test_renegotiation.t 195 my @ciphersuite = (0x002f);
196 $message->ciphersuites(\@ciphersuite);
70-test_tls13hrr.t 45 #Test 1: A client should fail if the server changes the ciphersuite between the
56 ok(TLSProxy::Message->fail(), "Server ciphersuite changes");
59 # we end up selecting a different ciphersuite between HRR and the SH
69 ok(TLSProxy::Message->fail(), "Client ciphersuite changes");
129 # the ciphersuite will change will we get the ServerHello
130 $hrr->ciphersuite(TLSProxy::Message::CIPHER_TLS13_AES_256_GCM_SHA384);
  /src/crypto/external/bsd/openssl.old/dist/test/ssl-tests/
02-protocol-version.conf 681 test-676 = 676-ciphersuite-sanity-check-client
682 test-677 = 677-ciphersuite-sanity-check-server
18775 [676-ciphersuite-sanity-check-client]
18776 ssl_conf = 676-ciphersuite-sanity-check-client-ssl
18778 [676-ciphersuite-sanity-check-client-ssl]
18779 server = 676-ciphersuite-sanity-check-client-server
18780 client = 676-ciphersuite-sanity-check-client-client
18782 [676-ciphersuite-sanity-check-client-server]
18788 [676-ciphersuite-sanity-check-client-client]
18800 [677-ciphersuite-sanity-check-server
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
sslapitest.c 4537 * So updating ciphersuite in 'sess' which will get reflected in
4727 * Test 0: Set a default ciphersuite in the SSL_CTX (no explicit cipher_list)
4728 * Test 1: Set a non-default ciphersuite in the SSL_CTX (no explicit cipher_list)
4729 * Test 2: Set a default ciphersuite in the SSL (no explicit cipher_list)
4730 * Test 3: Set a non-default ciphersuite in the SSL (no explicit cipher_list)
4731 * Test 4: Set a default ciphersuite in the SSL_CTX (SSL_CTX cipher_list)
4732 * Test 5: Set a non-default ciphersuite in the SSL_CTX (SSL_CTX cipher_list)
4733 * Test 6: Set a default ciphersuite in the SSL (SSL_CTX cipher_list)
4734 * Test 7: Set a non-default ciphersuite in the SSL (SSL_CTX cipher_list)
4735 * Test 8: Set a default ciphersuite in the SSL (SSL cipher_list
10851 const char *ciphersuite = "DHE-RSA-AES128-SHA"; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
sslapitest.c 3375 * Any ciphersuite using SHA256 will do - it will be compatible with
3376 * the actual ciphersuite selected as long as it too is based on SHA256
4449 * So updating ciphersuite in 'sess' which will get reflected in
4640 * Test 0: Set a default ciphersuite in the SSL_CTX (no explicit cipher_list)
4641 * Test 1: Set a non-default ciphersuite in the SSL_CTX (no explicit cipher_list)
4642 * Test 2: Set a default ciphersuite in the SSL (no explicit cipher_list)
4643 * Test 3: Set a non-default ciphersuite in the SSL (no explicit cipher_list)
4644 * Test 4: Set a default ciphersuite in the SSL_CTX (SSL_CTX cipher_list)
4645 * Test 5: Set a non-default ciphersuite in the SSL_CTX (SSL_CTX cipher_list)
4646 * Test 6: Set a default ciphersuite in the SSL (SSL_CTX cipher_list
9771 const char *ciphersuite = "DHE-RSA-AES128-SHA"; local
    [all...]

Completed in 52 milliseconds