Lines Matching defs:cipher
764 /* The gimpy cipher list we configure can't do TLS 1.3. */
842 * from one cipher to a different cipher (i.e., not changing from null
857 * a different cipher in the second connection.
876 /* Resume, preferring a different cipher. Our server will force the
877 * same cipher to be used as the initial handshake. */
896 * cipher on it.
925 /* sesspre and sesspost should be different since the cipher changed. */
1153 int tls_version, const char *cipher)
1170 if (is_fips && strstr(cipher, "CHACHA") != NULL) {
1183 if (!TEST_true(SSL_CTX_set_ciphersuites(cctx, cipher))
1184 || !TEST_true(SSL_CTX_set_ciphersuites(sctx, cipher)))
1187 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, cipher))
1188 || !TEST_true(SSL_CTX_set_cipher_list(sctx, cipher)))
1210 * The running kernel may not support a given cipher suite
1252 testresult = TEST_skip("KTLS not supported for %s cipher %s",
1254 "TLS 1.2", cipher);
1285 static int execute_test_ktls_sendfile(int tls_version, const char *cipher)
1309 if (is_fips && strstr(cipher, "CHACHA") != NULL) {
1322 if (!TEST_true(SSL_CTX_set_ciphersuites(cctx, cipher))
1323 || !TEST_true(SSL_CTX_set_ciphersuites(sctx, cipher)))
1326 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, cipher))
1327 || !TEST_true(SSL_CTX_set_cipher_list(sctx, cipher)))
1343 testresult = TEST_skip("Failed to enable KTLS for %s cipher %s",
1345 "TLS 1.2", cipher);
1418 const char *cipher;
1457 struct ktls_test_cipher *cipher;
1461 cipher = &ktls_test_ciphers[test / 4];
1466 return execute_test_ktls(cis_ktls, sis_ktls, cipher->tls_version,
1467 cipher->cipher);
1472 struct ktls_test_cipher *cipher;
1475 cipher = &ktls_test_ciphers[tst];
1477 return execute_test_ktls_sendfile(cipher->tls_version, cipher->cipher);
3345 const SSL_CIPHER *cipher = NULL;
3356 cipher = SSL_CIPHER_find(ssl, TLS13_AES_256_GCM_SHA384_BYTES);
3362 cipher = SSL_CIPHER_find(ssl, TLS13_AES_128_GCM_SHA256_BYTES);
3369 || !TEST_ptr(cipher)
3371 || !TEST_true(SSL_SESSION_set_cipher(sess, cipher))
3854 static int early_data_skip_helper(int testtype, int cipher, int idx)
3863 if (is_fips && cipher == 4)
3872 if (cipher == 0) {
3877 if (!TEST_true(SSL_CTX_set_ciphersuites(sctx, ciphersuites[cipher]))
3878 || !TEST_true(SSL_CTX_set_ciphersuites(cctx, ciphersuites[cipher])))
3883 cipher == 2 ? SHA384_DIGEST_LENGTH
4350 const SSL_CIPHER *cipher;
4397 cipher = SSL_CIPHER_find(clientssl, cipher_bytes[idx]);
4398 if (!TEST_ptr(cipher) || !TEST_true(SSL_SESSION_set_cipher(sess, cipher)))
4605 /* SSL_CTX explicit cipher list */
4627 /* SSL explicit cipher list */
4763 clntsess->cipher = aes_128_gcm_sha256;
4764 clntsess->cipher_id = clntsess->cipher->id;
5192 * Test 0 = Set TLS1.3 cipher on context
5193 * Test 1 = Set TLS1.3 cipher on SSL
5194 * Test 2 = Set TLS1.3 and TLS1.2 cipher on context
5195 * Test 3 = Set TLS1.3 and TLS1.2 cipher on SSL
5343 const SSL_CIPHER *cipher = NULL;
5442 cipher = SSL_CIPHER_find(clientssl, TLS13_AES_128_GCM_SHA256_BYTES);
5445 || !TEST_ptr(cipher)
5448 || !TEST_true(SSL_SESSION_set_cipher(clientpsk, cipher))
8759 * Check if the cipher exists before attempting to use it since it only has
8764 TEST_skip("Multiblock cipher is not available for %s", cipherlist);
10228 * Test TLSv1.2 with a pipeline capable cipher. TLSv1.3 and DTLS do not
10229 * support this yet. The only pipeline capable cipher that we have is in the