HomeSort by: relevance | last modified time | path
    Searched refs:ciphers (Results 1 - 25 of 150) sorted by relevancy

1 2 3 4 5 6

  /src/external/mpl/bind/dist/bin/tests/system/forward/ns2/
named-tls.conf.j2 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
17 prefer-server-ciphers yes;
25 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
26 prefer-server-ciphers yes;
35 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
36 prefer-server-ciphers yes;
  /src/external/mpl/bind/dist/bin/tests/system/notify/ns2/
named-tls.conf.j2 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
17 prefer-server-ciphers yes;
25 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
26 prefer-server-ciphers yes;
35 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
36 prefer-server-ciphers yes;
  /src/external/mpl/bind/dist/bin/tests/system/nsupdate/ns1/
tls.conf.j2 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
17 prefer-server-ciphers yes;
25 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
26 prefer-server-ciphers yes;
35 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
36 prefer-server-ciphers yes;
  /src/crypto/external/bsd/openssl.old/dist/test/
gosttest.c 23 } ciphers[] = { variable in typeref:struct:__anon2244
46 ciphers[idx].certnum == 0 ? cert1
48 ciphers[idx].certnum == 0 ? privkey1
52 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, ciphers[idx].cipher))
53 || !TEST_true(SSL_CTX_set_cipher_list(sctx, ciphers[idx].cipher))
58 if (ciphers[idx].expected_prot == 0) {
66 ciphers[idx].expected_prot))
89 ADD_ALL_TESTS(test_tls13, OSSL_NELEM(ciphers));
  /src/crypto/external/apache2/openssl/dist/crypto/engine/
tb_cipher.c 29 if (e->ciphers) {
31 int num_nids = e->ciphers(e, NULL, &nids, 0);
50 if (e->ciphers) {
52 int num_nids = e->ciphers(e, NULL, &nids, 0);
87 return e->ciphers;
93 e->ciphers = f;
  /src/crypto/external/bsd/openssl/dist/crypto/engine/
tb_cipher.c 29 if (e->ciphers) {
31 int num_nids = e->ciphers(e, NULL, &nids, 0);
50 if (e->ciphers) {
52 int num_nids = e->ciphers(e, NULL, &nids, 0);
87 return e->ciphers;
93 e->ciphers = f;
  /src/crypto/external/bsd/openssl.old/dist/crypto/engine/
tb_cipher.c 26 if (e->ciphers) {
28 int num_nids = e->ciphers(e, NULL, &nids, 0);
47 if (e->ciphers) {
49 int num_nids = e->ciphers(e, NULL, &nids, 0);
83 return e->ciphers;
89 e->ciphers = f;
  /src/crypto/external/bsd/openssl.old/dist/test/recipes/
20-test_enc_more.t 30 my @ciphers =
33 run(app([$cmd, "enc", "-ciphers"]),
36 plan tests => 2 + scalar @ciphers;
39 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
40 unless ok($ciphersstatus, "Running 'openssl enc -ciphers'");
43 skip "Not initialized, skipping...", scalar(@ciphers);
46 foreach my $cipher (@ciphers) {
20-test_enc.t 31 my @ciphers =
36 plan tests => 2 + (scalar @ciphers)*2;
39 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
43 skip "Not initialized, skipping...", scalar(@ciphers);
46 foreach my $c (@ciphers) {
  /src/crypto/external/apache2/openssl/dist/test/recipes/
20-test_enc_more.t 35 my @ciphers =
40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb
41 |desx|idea|rc2|rc4|seed)/x} @ciphers
44 plan tests => 2 + scalar @ciphers;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $cipher (@ciphers) {
70-test_tls13downgrade.t 72 my $ciphers = "AES128-SHA:\@SECLEVEL=0";
79 $proxy->ciphers($ciphers);
88 $proxy->ciphers($ciphers);
98 $proxy->ciphers($ciphers);
107 $proxy->ciphers($ciphers);
116 $proxy->ciphers($ciphers)
    [all...]
20-test_enc.t 36 my @ciphers =
40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea
41 |rc2|rc4|seed)/x} @ciphers
44 plan tests => 5 + (scalar @ciphers)*2;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $c (@ciphers) {
  /src/crypto/external/bsd/openssl/dist/test/recipes/
20-test_enc.t 36 my @ciphers =
40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea
41 |rc2|rc4|seed)/x} @ciphers
44 plan tests => 2 + (scalar @ciphers)*2;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $c (@ciphers) {
20-test_enc_more.t 35 my @ciphers =
40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb
41 |desx|idea|rc2|rc4|seed)/x} @ciphers
44 plan tests => 2 + scalar @ciphers;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $cipher (@ciphers) {
  /src/external/mpl/bind/dist/bin/tests/system/doth/ns3/
named.conf.j2 58 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
59 prefer-server-ciphers no;
72 ciphers "AES128:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
73 prefer-server-ciphers no;
  /src/external/mpl/bind/dist/bin/tests/system/forward/ns4/
named-tls.conf.j2 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
35 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
44 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
45 prefer-server-ciphers yes;
  /src/external/mpl/bind/dist/bin/tests/system/checkconf/
bad-forwarders-dot-badtls-1.conf 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
17 prefer-server-ciphers yes;
bad-forwarders-dot-badtls-2.conf 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
17 prefer-server-ciphers yes;
good-dot-primaries.conf 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
17 prefer-server-ciphers no;
good-dot-tlsopts.conf 19 ciphers "HIGH:!aNULL:!MD5:!RC4";
20 prefer-server-ciphers yes;
good-forwarders-dot.conf 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
17 prefer-server-ciphers yes;
good-proxy.conf 19 ciphers "HIGH:!aNULL:!MD5:!RC4";
20 prefer-server-ciphers yes;
  /src/external/mpl/bind/dist/bin/tests/system/doth/ns1/
named.conf.j2 27 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
28 prefer-server-ciphers yes;
36 ciphers "AES256:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
37 prefer-server-ciphers yes;
45 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
46 prefer-server-ciphers yes;
54 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
55 prefer-server-ciphers yes;
63 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
64 prefer-server-ciphers yes
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/notify/ns3/
named-tls.conf.j2 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
35 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
44 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384";
45 prefer-server-ciphers yes;
  /src/crypto/external/apache2/openssl/dist/test/
cipherlist_test.c 56 * All ciphers in the DEFAULT cipherlist meet the default security level.
57 * However, default supported ciphers exclude SRP and PSK ciphersuites
60 * Supported ciphers also exclude TLSv1.2 ciphers if TLSv1.2 is disabled,
149 STACK_OF(SSL_CIPHER) *ciphers = NULL;
158 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl)))
162 num_ciphers = sk_SSL_CIPHER_num(ciphers);
168 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i));
178 sk_SSL_CIPHER_free(ciphers);
215 /* SSL_CTX_set_cipher_list() should fail if it clears all TLSv1.2 ciphers. *
    [all...]

Completed in 23 milliseconds

1 2 3 4 5 6