Lines Matching refs:ciphersuites
3836 static const char *ciphersuites[] = {
3877 if (!TEST_true(SSL_CTX_set_ciphersuites(sctx, ciphersuites[cipher]))
3878 || !TEST_true(SSL_CTX_set_ciphersuites(cctx, ciphersuites[cipher])))
4035 idx % OSSL_NELEM(ciphersuites),
4036 idx / OSSL_NELEM(ciphersuites));
4046 idx % OSSL_NELEM(ciphersuites),
4047 idx / OSSL_NELEM(ciphersuites));
4058 idx % OSSL_NELEM(ciphersuites),
4059 idx / OSSL_NELEM(ciphersuites));
4069 idx % OSSL_NELEM(ciphersuites),
4070 idx / OSSL_NELEM(ciphersuites));
4335 * Test TLSv1.3 PSK can be used to send early_data with all 5 ciphersuites
4578 * Test configuring the TLSv1.3 ciphersuites
4711 * Check attempting to resume a SHA-256 session with no SHA-256 ciphersuites
5298 * multiple ciphersuites
7621 * We can't establish a connection (even in TLSv1.1) with these ciphersuites if
7667 * This test combines TLSv1.3 and TLSv1.2 ciphersuites so they must both be
7709 * libctx, we want one peer to always use the full set of ciphersuites
7712 * having the full set of ciphersuites and once with the server side.
9293 /* Ensure we only use TLSv1.2 ciphersuites based on SHA256 */
10765 ADD_ALL_TESTS(test_early_data_skip, OSSL_NELEM(ciphersuites) * 3);
10766 ADD_ALL_TESTS(test_early_data_skip_hrr, OSSL_NELEM(ciphersuites) * 3);
10767 ADD_ALL_TESTS(test_early_data_skip_hrr_fail, OSSL_NELEM(ciphersuites) * 3);
10768 ADD_ALL_TESTS(test_early_data_skip_abort, OSSL_NELEM(ciphersuites) * 3);