Lines Matching refs:ciphersuite

3359          * Any ciphersuite using SHA256 will do - it will be compatible with
3360 * the actual ciphersuite selected as long as it too is based on SHA256
4394 * So updating ciphersuite in 'sess' which will get reflected in
4580 * Test 0: Set a default ciphersuite in the SSL_CTX (no explicit cipher_list)
4581 * Test 1: Set a non-default ciphersuite in the SSL_CTX (no explicit cipher_list)
4582 * Test 2: Set a default ciphersuite in the SSL (no explicit cipher_list)
4583 * Test 3: Set a non-default ciphersuite in the SSL (no explicit cipher_list)
4584 * Test 4: Set a default ciphersuite in the SSL_CTX (SSL_CTX cipher_list)
4585 * Test 5: Set a non-default ciphersuite in the SSL_CTX (SSL_CTX cipher_list)
4586 * Test 6: Set a default ciphersuite in the SSL (SSL_CTX cipher_list)
4587 * Test 7: Set a non-default ciphersuite in the SSL (SSL_CTX cipher_list)
4588 * Test 8: Set a default ciphersuite in the SSL (SSL cipher_list)
4589 * Test 9: Set a non-default ciphersuite in the SSL (SSL cipher_list)
4611 /* Default ciphersuite */
4616 /* Non default ciphersuite */
4633 /* Default ciphersuite */
4638 /* Non default ciphersuite */
4691 /* Check we can resume a session with a different SHA-256 ciphersuite */
4768 * ciphersuite, but client thinks the session is for SHA-256, so it should
4917 * Must include an EC ciphersuite so that we send supported groups in
5360 * We use a ciphersuite with SHA256 to ease testing old style PSK
9696 const char *ciphersuite = "DHE-RSA-AES128-SHA";
9733 ciphersuite = "ADH-AES128-SHA256:@SECLEVEL=0";
9737 ciphersuite = "ADH-AES256-SHA256:@SECLEVEL=0";
9759 || !TEST_true(SSL_set_cipher_list(serverssl, ciphersuite))
9760 || !TEST_true(SSL_set_cipher_list(clientssl, ciphersuite)))