| /src/external/mpl/bind/dist/bin/tests/system/forward/ns2/ |
| named-tls.conf.j2 | 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 17 prefer-server-ciphers yes; 25 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 26 prefer-server-ciphers yes; 35 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 36 prefer-server-ciphers yes;
|
| /src/external/mpl/bind/dist/bin/tests/system/notify/ns2/ |
| named-tls.conf.j2 | 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 17 prefer-server-ciphers yes; 25 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 26 prefer-server-ciphers yes; 35 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 36 prefer-server-ciphers yes;
|
| /src/external/mpl/bind/dist/bin/tests/system/nsupdate/ns1/ |
| tls.conf.j2 | 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 17 prefer-server-ciphers yes; 25 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 26 prefer-server-ciphers yes; 35 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 36 prefer-server-ciphers yes;
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| gosttest.c | 23 } ciphers[] = { variable in typeref:struct:__anon2244 46 ciphers[idx].certnum == 0 ? cert1 48 ciphers[idx].certnum == 0 ? privkey1 52 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, ciphers[idx].cipher)) 53 || !TEST_true(SSL_CTX_set_cipher_list(sctx, ciphers[idx].cipher)) 58 if (ciphers[idx].expected_prot == 0) { 66 ciphers[idx].expected_prot)) 89 ADD_ALL_TESTS(test_tls13, OSSL_NELEM(ciphers));
|
| /src/crypto/external/apache2/openssl/dist/crypto/engine/ |
| tb_cipher.c | 29 if (e->ciphers) { 31 int num_nids = e->ciphers(e, NULL, &nids, 0); 50 if (e->ciphers) { 52 int num_nids = e->ciphers(e, NULL, &nids, 0); 87 return e->ciphers; 93 e->ciphers = f;
|
| /src/crypto/external/bsd/openssl/dist/crypto/engine/ |
| tb_cipher.c | 29 if (e->ciphers) { 31 int num_nids = e->ciphers(e, NULL, &nids, 0); 50 if (e->ciphers) { 52 int num_nids = e->ciphers(e, NULL, &nids, 0); 87 return e->ciphers; 93 e->ciphers = f;
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/engine/ |
| tb_cipher.c | 26 if (e->ciphers) { 28 int num_nids = e->ciphers(e, NULL, &nids, 0); 47 if (e->ciphers) { 49 int num_nids = e->ciphers(e, NULL, &nids, 0); 83 return e->ciphers; 89 e->ciphers = f;
|
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 20-test_enc_more.t | 30 my @ciphers = 33 run(app([$cmd, "enc", "-ciphers"]), 36 plan tests => 2 + scalar @ciphers; 39 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 40 unless ok($ciphersstatus, "Running 'openssl enc -ciphers'"); 43 skip "Not initialized, skipping...", scalar(@ciphers); 46 foreach my $cipher (@ciphers) {
|
| 20-test_enc.t | 31 my @ciphers = 36 plan tests => 2 + (scalar @ciphers)*2; 39 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 43 skip "Not initialized, skipping...", scalar(@ciphers); 46 foreach my $c (@ciphers) {
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 20-test_enc_more.t | 35 my @ciphers = 40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb 41 |desx|idea|rc2|rc4|seed)/x} @ciphers 44 plan tests => 2 + scalar @ciphers; 47 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 51 skip "Not initialized, skipping...", scalar(@ciphers); 54 foreach my $cipher (@ciphers) {
|
| 70-test_tls13downgrade.t | 72 my $ciphers = "AES128-SHA:\@SECLEVEL=0"; 79 $proxy->ciphers($ciphers); 88 $proxy->ciphers($ciphers); 98 $proxy->ciphers($ciphers); 107 $proxy->ciphers($ciphers); 116 $proxy->ciphers($ciphers) [all...] |
| 20-test_enc.t | 36 my @ciphers = 40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea 41 |rc2|rc4|seed)/x} @ciphers 44 plan tests => 5 + (scalar @ciphers)*2; 47 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 51 skip "Not initialized, skipping...", scalar(@ciphers); 54 foreach my $c (@ciphers) {
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 20-test_enc.t | 36 my @ciphers = 40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea 41 |rc2|rc4|seed)/x} @ciphers 44 plan tests => 2 + (scalar @ciphers)*2; 47 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 51 skip "Not initialized, skipping...", scalar(@ciphers); 54 foreach my $c (@ciphers) {
|
| 20-test_enc_more.t | 35 my @ciphers = 40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb 41 |desx|idea|rc2|rc4|seed)/x} @ciphers 44 plan tests => 2 + scalar @ciphers; 47 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 51 skip "Not initialized, skipping...", scalar(@ciphers); 54 foreach my $cipher (@ciphers) {
|
| /src/external/mpl/bind/dist/bin/tests/system/doth/ns3/ |
| named.conf.j2 | 58 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 59 prefer-server-ciphers no; 72 ciphers "AES128:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 73 prefer-server-ciphers no;
|
| /src/external/mpl/bind/dist/bin/tests/system/forward/ns4/ |
| named-tls.conf.j2 | 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 35 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 44 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 45 prefer-server-ciphers yes;
|
| /src/external/mpl/bind/dist/bin/tests/system/checkconf/ |
| bad-forwarders-dot-badtls-1.conf | 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 17 prefer-server-ciphers yes;
|
| bad-forwarders-dot-badtls-2.conf | 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 17 prefer-server-ciphers yes;
|
| good-dot-primaries.conf | 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 17 prefer-server-ciphers no;
|
| good-dot-tlsopts.conf | 19 ciphers "HIGH:!aNULL:!MD5:!RC4"; 20 prefer-server-ciphers yes;
|
| good-forwarders-dot.conf | 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 17 prefer-server-ciphers yes;
|
| good-proxy.conf | 19 ciphers "HIGH:!aNULL:!MD5:!RC4"; 20 prefer-server-ciphers yes;
|
| /src/external/mpl/bind/dist/bin/tests/system/doth/ns1/ |
| named.conf.j2 | 27 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 28 prefer-server-ciphers yes; 36 ciphers "AES256:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 37 prefer-server-ciphers yes; 45 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 46 prefer-server-ciphers yes; 54 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 55 prefer-server-ciphers yes; 63 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 64 prefer-server-ciphers yes [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/notify/ns3/ |
| named-tls.conf.j2 | 16 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 35 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 44 ciphers "HIGH:!kRSA:!aNULL:!eNULL:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS:!SHA1:!SHA256:!SHA384"; 45 prefer-server-ciphers yes;
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| cipherlist_test.c | 56 * All ciphers in the DEFAULT cipherlist meet the default security level. 57 * However, default supported ciphers exclude SRP and PSK ciphersuites 60 * Supported ciphers also exclude TLSv1.2 ciphers if TLSv1.2 is disabled, 149 STACK_OF(SSL_CIPHER) *ciphers = NULL; 158 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) 162 num_ciphers = sk_SSL_CIPHER_num(ciphers); 168 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); 178 sk_SSL_CIPHER_free(ciphers); 215 /* SSL_CTX_set_cipher_list() should fail if it clears all TLSv1.2 ciphers. * [all...] |