| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| ClientHello.pm | 50 $self->{ciphersuites} = []; 80 my @ciphersuites = unpack('n*', substr($self->data, $ptr, 111 $self->ciphersuites(\@ciphersuites); 174 $data .= pack("n*", @{$self->ciphersuites}); 256 sub ciphersuites subroutine 260 $self->{ciphersuites} = shift; 262 return $self->{ciphersuites};
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 70-test_tls13downgrade.t | 110 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA); 111 $message->ciphersuite_len(2 * scalar @ciphersuites); 112 $message->ciphersuites(\@ciphersuites);
|
| 70-test_tls13hrr.t | 58 #Test 2: It is an error if the client changes the offered ciphersuites so that 163 my @ciphersuites = (TLSProxy::Message::CIPHER_TLS13_AES_128_GCM_SHA256); 164 $ch1->ciphersuite_len(2 * scalar @ciphersuites); 165 $ch1->ciphersuites(\@ciphersuites);
|
| 80-test_ssl_old.t | 434 subtest "Testing ciphersuites" => sub { 454 my %ciphersuites = (); 468 $ciphersuites{$protocol} = [ map { s|\R||; split(/:/, $_) } 470 $protocolciphersuitecount += scalar @{$ciphersuites{$protocol}}; 475 plan skip_all => "None of the ciphersuites to test are available in this OpenSSL build" 476 if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0; 478 # The count of protocols is because in addition to the ciphersuites 482 + scalar(keys %ciphersuites); 490 foreach my $protocol (sort keys %ciphersuites) { 491 note "Testing ciphersuites for $protocol" [all...] |
| 70-test_renegotiation.t | 124 #Remove any SCSV ciphersuites - just leave AES128-SHA (0x002f) 126 $message->ciphersuites(\@ciphersuite);
|
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| ClientHello.pm | 37 $self->{ciphersuites} = []; 59 my @ciphersuites = unpack('n*', substr($self->data, $ptr, 88 $self->ciphersuites(\@ciphersuites); 142 $data .= pack("n*", @{$self->ciphersuites}); 208 sub ciphersuites subroutine 212 $self->{ciphersuites} = shift; 214 return $self->{ciphersuites};
|
| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 70-test_tls13downgrade.t | 107 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA); 108 $message->ciphersuite_len(2 * scalar @ciphersuites); 109 $message->ciphersuites(\@ciphersuites);
|
| 70-test_tls13hrr.t | 53 #Test 2: It is an error if the client changes the offered ciphersuites so that 136 my @ciphersuites = (TLSProxy::Message::CIPHER_TLS13_AES_128_GCM_SHA256); 137 $ch1->ciphersuite_len(2 * scalar @ciphersuites); 138 $ch1->ciphersuites(\@ciphersuites);
|
| 80-test_ssl_old.t | 396 subtest "Testing ciphersuites" => sub { 416 my %ciphersuites = (); 425 $ciphersuites{$protocol} = [ map { s|\R||; split(/:/, $_) } 427 $protocolciphersuitecount += scalar @{$ciphersuites{$protocol}}; 431 plan skip_all => "None of the ciphersuites to test are available in this OpenSSL build" 432 if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0; 434 # The count of protocols is because in addition to the ciphersuites 438 + scalar(keys %ciphersuites); 446 foreach my $protocol (sort keys %ciphersuites) { 447 note "Testing ciphersuites for $protocol" [all...] |
| 70-test_renegotiation.t | 105 #Remove any SCSV ciphersuites - just leave AES128-SHA (0x002f) 107 $message->ciphersuites(\@ciphersuite);
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| ClientHello.pm | 37 $self->{ciphersuites} = []; 59 my @ciphersuites = unpack('n*', substr($self->data, $ptr, 88 $self->ciphersuites(\@ciphersuites); 142 $data .= pack("n*", @{$self->ciphersuites}); 208 sub ciphersuites subroutine 212 $self->{ciphersuites} = shift; 214 return $self->{ciphersuites};
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 70-test_tls13downgrade.t | 163 my @ciphersuites = (TLSProxy::Message::CIPHER_RSA_WITH_AES_128_CBC_SHA); 164 $message->ciphersuite_len(2 * scalar @ciphersuites); 165 $message->ciphersuites(\@ciphersuites);
|
| 70-test_tls13hrr.t | 58 #Test 2: It is an error if the client changes the offered ciphersuites so that 195 my @ciphersuites = (TLSProxy::Message::CIPHER_TLS13_AES_128_GCM_SHA256); 196 $ch1->ciphersuite_len(2 * scalar @ciphersuites); 197 $ch1->ciphersuites(\@ciphersuites);
|
| 80-test_ssl_old.t | 502 subtest "Testing ciphersuites" => sub { 522 my %ciphersuites = (); 536 $ciphersuites{$protocol} = [ map { s|\R||; split(/:/, $_) } 538 $protocolciphersuitecount += scalar @{$ciphersuites{$protocol}}; 543 plan skip_all => "None of the ciphersuites to test are available in this OpenSSL build" 544 if $protocolciphersuitecount + scalar(keys %ciphersuites) == 0; 546 # The count of protocols is because in addition to the ciphersuites 550 + scalar(keys %ciphersuites); 558 foreach my $protocol (sort keys %ciphersuites) { 559 note "Testing ciphersuites for $protocol" [all...] |
| 70-test_renegotiation.t | 141 my $has_scsv = 255 ~~ @{$clientHello->ciphersuites}; 159 my $has_scsv = 255 ~~ @{$clientHello->ciphersuites}; 177 my $has_scsv = 255 ~~ @{$clientHello->ciphersuites}; 194 #Remove any SCSV ciphersuites - just leave AES128-SHA (0x002f) 196 $message->ciphersuites(\@ciphersuite);
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| ciphers.c | 67 { "psk", OPT_PSK, '-', "Include ciphersuites requiring PSK" }, 70 { "srp", OPT_SRP, '-', "(deprecated) Include ciphersuites requiring SRP" }, 72 { "ciphersuites", OPT_CIPHERSUITES, 's', 73 "Configure the TLSv1.3 ciphersuites to use" }, 106 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local 169 ciphersuites = opt_arg(); 209 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) { 210 BIO_printf(bio_err, "Error setting TLSv1.3 ciphersuites\n");
|
| s_time.c | 84 { "ciphersuites", OPT_CIPHERSUITES, 's', 85 "Specify TLSv1.3 ciphersuites to be used" }, 140 char *cipher = NULL, *ciphersuites = NULL; local 211 ciphersuites = opt_arg(); 274 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites))
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| ciphers.c | 64 {"psk", OPT_PSK, '-', "Include ciphersuites requiring PSK"}, 67 {"srp", OPT_SRP, '-', "(deprecated) Include ciphersuites requiring SRP"}, 69 {"ciphersuites", OPT_CIPHERSUITES, 's', 70 "Configure the TLSv1.3 ciphersuites to use"}, 103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local 166 ciphersuites = opt_arg(); 207 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) { 208 BIO_printf(bio_err, "Error setting TLSv1.3 ciphersuites\n");
|
| s_time.c | 66 {"ciphersuites", OPT_CIPHERSUITES, 's', 67 "Specify TLSv1.3 ciphersuites to be used"}, 122 char *cipher = NULL, *ciphersuites = NULL; local 193 ciphersuites = opt_arg(); 257 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites))
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| ciphers.c | 55 {"psk", OPT_PSK, '-', "include ciphersuites requiring PSK"}, 58 {"srp", OPT_SRP, '-', "include ciphersuites requiring SRP"}, 61 {"ciphersuites", OPT_CIPHERSUITES, 's', 62 "Configure the TLSv1.3 ciphersuites to use"}, 97 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local 160 ciphersuites = opt_arg(); 196 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites)) { 197 BIO_printf(bio_err, "Error setting TLSv1.3 ciphersuites\n");
|
| s_time.c | 58 {"ciphersuites", OPT_CIPHERSUITES, 's', 59 "Specify TLSv1.3 ciphersuites to be used"}, 97 char *CApath = NULL, *CAfile = NULL, *cipher = NULL, *ciphersuites = NULL; local 163 ciphersuites = opt_arg(); 204 if (ciphersuites != NULL && !SSL_CTX_set_ciphersuites(ctx, ciphersuites))
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| ssl_old_test.c | 618 static char *ciphersuites = NULL; variable 687 fprintf(stderr, " -ciphersuites arg - The TLSv1.3 ciphersuites\n"); 1059 } else if (strcmp(*argv, "-ciphersuites") == 0) { 1062 ciphersuites = *(++argv); 1396 * Since we will use low security ciphersuites and keys for testing set 1467 if (ciphersuites != NULL) { 1468 if (!SSL_CTX_set_ciphersuites(c_ctx, ciphersuites) 1469 || !SSL_CTX_set_ciphersuites(s_ctx, ciphersuites) 1470 || !SSL_CTX_set_ciphersuites(s_ctx2, ciphersuites)) { [all...] |
| sslapitest.c | 3934 static const char *ciphersuites[] = { variable 3970 if (ciphersuites[cipher] == NULL) 3984 if (!TEST_true(SSL_CTX_set_ciphersuites(sctx, ciphersuites[cipher])) 3985 || !TEST_true(SSL_CTX_set_ciphersuites(cctx, ciphersuites[cipher]))) 4142 idx % OSSL_NELEM(ciphersuites), 4143 idx / OSSL_NELEM(ciphersuites)); 4153 idx % OSSL_NELEM(ciphersuites), 4154 idx / OSSL_NELEM(ciphersuites)); 4165 idx % OSSL_NELEM(ciphersuites), 4166 idx / OSSL_NELEM(ciphersuites)); [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| ssl_old_test.c | 612 static char *ciphersuites = NULL; variable 681 fprintf(stderr, " -ciphersuites arg - The TLSv1.3 ciphersuites\n"); 1054 } else if (strcmp(*argv, "-ciphersuites") == 0) { 1057 ciphersuites = *(++argv); 1395 * Since we will use low security ciphersuites and keys for testing set 1466 if (ciphersuites != NULL) { 1467 if (!SSL_CTX_set_ciphersuites(c_ctx, ciphersuites) 1468 || !SSL_CTX_set_ciphersuites(s_ctx, ciphersuites) 1469 || !SSL_CTX_set_ciphersuites(s_ctx2, ciphersuites)) { [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| ssltest_old.c | 617 static char *ciphersuites = NULL; variable 688 fprintf(stderr, " -ciphersuites arg - The TLSv1.3 ciphersuites\n"); 1081 } else if (strcmp(*argv, "-ciphersuites") == 0) { 1084 ciphersuites = *(++argv); 1401 * Since we will use low security ciphersuites and keys for testing set 1472 if (ciphersuites != NULL) { 1473 if (!SSL_CTX_set_ciphersuites(c_ctx, ciphersuites) 1474 || !SSL_CTX_set_ciphersuites(s_ctx, ciphersuites) 1475 || !SSL_CTX_set_ciphersuites(s_ctx2, ciphersuites)) { [all...] |