Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 - 25 of 125) sorted by relevance

12345

/third_party/node/lib/internal/tls/
H A Dsecure-context.js96 function processCiphers(ciphers, name) {
97 ciphers = StringPrototypeSplit(ciphers || getDefaultCiphers(), ':');
102 ciphers,
111 ciphers,
120 throw new ERR_INVALID_ARG_VALUE(name, ciphers);
131 ciphers = getDefaultCiphers(),
150 if (ciphers !== undefined && ciphers !== null)
151 validateString(ciphers, `
[all...]
/third_party/node/test/parallel/
H A Dtest-tls-multi-pfx.js20 const ciphers = [];
26 ciphers: 'ECDHE-ECDSA-AES256-GCM-SHA384',
30 ciphers.push(ecdsa.getCipher());
32 ciphers: 'ECDHE-RSA-AES256-GCM-SHA384',
36 ciphers.push(rsa.getCipher());
45 assert.deepStrictEqual(ciphers, [{
H A Dtest-tls-getprotocol.js17 ciphers: (common.hasOpenSSL31 ? 'DEFAULT:@SECLEVEL=0' : 'DEFAULT')
21 ciphers: (common.hasOpenSSL31 ? 'DEFAULT:@SECLEVEL=0' : 'DEFAULT')
30 ciphers: 'RSA@SECLEVEL=0',
42 ciphers: v.ciphers,
H A Dtest-tls-client-default-ciphers.js33 let ciphers = '';
36 ciphers = options.ciphers;
42 assert.strictEqual(ciphers, tls.DEFAULT_CIPHERS);
H A Dtest-tls-getcipher.js50 ciphers: 'AES128-SHA256',
65 ciphers: 'ECDHE-RSA-AES128-GCM-SHA256',
81 ciphers: 'TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_CCM_8_SHA256',
88 ciphers: 'TLS_AES_128_CCM_8_SHA256',
H A Dtest-tls-set-ciphers-error.js15 ciphers: 'aes256-sha'
19 options.ciphers = 'FOOBARBAZ';
22 options.ciphers = 'TLS_not_a_cipher';
H A Dtest-tls-dhe.js44 const ciphers = `${dheCipher}:${ecdheCipher}`;
59 ciphers,
68 '-cipher', `${ciphers}:@SECLEVEL=1`];
H A Dtest-tls-reduced-SECLEVEL-in-cipher.js15 ciphers: 'DEFAULT'
22 // Reducing SECLEVEL to 0 in ciphers retains compatibility with previous versions of OpenSSL like using a small key.
23 // As ciphers are getting set before the cert and key get loaded.
24 options.ciphers = 'DEFAULT:@SECLEVEL=0';
H A Dtest-tls-ecdh-auto.js25 ciphers: '-ALL:ECDHE-RSA-AES128-SHA256',
36 '-cipher', `${options.ciphers}`,
H A Dtest-tls-ecdh.js40 ciphers: '-ALL:ECDHE-RSA-AES128-SHA256',
53 options.ciphers} -connect 127.0.0.1:${this.address().port}`;
H A Dtest-https-agent-session-eviction.js17 ciphers: 'RSA@SECLEVEL=0'
57 ciphers: (common.hasOpenSSL31 ? 'DEFAULT:@SECLEVEL=0' : 'DEFAULT'),
H A Dtest-tls-ecdh-multiple.js25 ciphers: '-ALL:ECDHE-RSA-AES128-SHA256',
36 '-cipher', `${options.ciphers}`,
/third_party/node/deps/openssl/openssl/crypto/engine/
H A Dtb_cipher.c29 if (e->ciphers) { in ENGINE_register_ciphers()
31 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers()
50 if (e->ciphers) { in ENGINE_set_default_ciphers()
52 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers()
87 return e->ciphers; in ENGINE_get_ciphers()
93 e->ciphers = f; in ENGINE_set_ciphers()
/third_party/openssl/crypto/engine/
H A Dtb_cipher.c29 if (e->ciphers) { in ENGINE_register_ciphers()
31 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers()
50 if (e->ciphers) { in ENGINE_set_default_ciphers()
52 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers()
87 return e->ciphers; in ENGINE_get_ciphers()
93 e->ciphers = f; in ENGINE_set_ciphers()
/third_party/nghttp2/
H A Dmkcipherlist.py295 ciphers = [] variable
306 ciphers.append((id, name))
311 for id, name in ciphers:
318 for id, name in ciphers:
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
H A Dwpa_common.c2334 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument
2338 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites()
2342 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites()
2346 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites()
2350 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites()
2354 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites()
2358 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites()
2367 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument
2371 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites()
2375 if (ciphers in wpa_cipher_put_suites()
2388 wpa_pick_pairwise_cipher(int ciphers, int none_allowed) wpa_pick_pairwise_cipher() argument
2406 wpa_pick_group_cipher(int ciphers) wpa_pick_group_cipher() argument
2485 wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim) wpa_write_ciphers() argument
[all...]
/third_party/openssl/test/
H A Dcipherlist_test.c57 * All ciphers in the DEFAULT cipherlist meet the default security level.
58 * However, default supported ciphers exclude SRP and PSK ciphersuites
61 * Supported ciphers also exclude TLSv1.2 ciphers if TLSv1.2 is disabled,
150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist()
159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist()
163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist()
169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist()
179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
216 /* SSL_CTX_set_cipher_list() should fail if it clears all TLSv1.2 ciphers
[all...]
H A Ddtls_mtu_test.c147 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests()
165 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests()
166 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests()
167 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
H A Dsslcorrupttest.c134 * |cipher_list| is initialized with RSA ciphers' names. This
153 * The |cipher_list| will be filled only with names of RSA ciphers, in setup_cipher_list()
189 STACK_OF(SSL_CIPHER) *ciphers; in test_ssl_corrupt()
206 || !TEST_ptr(ciphers = SSL_CTX_get_ciphers(cctx)) in test_ssl_corrupt()
207 || !TEST_int_eq(sk_SSL_CIPHER_num(ciphers), 1) in test_ssl_corrupt()
208 || !TEST_ptr(currcipher = sk_SSL_CIPHER_value(ciphers, 0))) in test_ssl_corrupt()
212 * No ciphers we are using are TLSv1.3 compatible so we should not attempt in test_ssl_corrupt()
/third_party/mbedtls/tests/
H A Dcompat.sh283 # Set $ciphers to the cipher suite name translations for the specified
284 # program (gnutls, mbedtls or openssl). $ciphers is a space-separated
288 ciphers=$(scripts/translate_ciphers.py "$@")
653 # Newer versions of OpenSSL have a syntax to enable all "ciphers", even
667 case $($OPENSSL ciphers ALL) in
1139 for i in $ciphers; do
1149 for i in $ciphers; do
1168 for i in $ciphers; do
1177 for i in $ciphers; do
1197 for i in $ciphers; d
[all...]
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/
H A DProxy.pm102 ciphers => "AES128-SHA",
170 $self->{ciphers} = "AES128-SHA";
233 if ($self->ciphers ne "") {
234 $execcmd .= " -cipher ".$self->ciphers;
623 sub ciphers subroutine
627 $self->{ciphers} = shift;
629 return $self->{ciphers};
/third_party/openssl/util/perl/TLSProxy/
H A DProxy.pm102 ciphers => "AES128-SHA",
170 $self->{ciphers} = "AES128-SHA";
233 if ($self->ciphers ne "") {
234 $execcmd .= " -cipher ".$self->ciphers;
623 sub ciphers subroutine
627 $self->{ciphers} = shift;
629 return $self->{ciphers};
/third_party/node/deps/openssl/openssl/apps/
H A Dciphers.c41 {"v", OPT_V, '-', "Verbose listing of the SSL/TLS ciphers"},
47 {"s", OPT_S, '-', "Only supported ciphers"},
103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local
179 ciphers = argv[0]; in ciphers_main()
212 if (ciphers != NULL) { in ciphers_main()
213 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in ciphers_main()
/third_party/openssl/apps/
H A Dciphers.c41 {"v", OPT_V, '-', "Verbose listing of the SSL/TLS ciphers"},
47 {"s", OPT_S, '-', "Only supported ciphers"},
103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local
179 ciphers = argv[0]; in ciphers_main()
212 if (ciphers != NULL) { in ciphers_main()
213 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in ciphers_main()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Dwpa_common.c1249 * PASN frame. SHA-256 is used as the hash algorithm, except for the ciphers
2779 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument
2783 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites()
2787 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites()
2791 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites()
2795 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites()
2799 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites()
2803 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites()
2812 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument
2816 if (ciphers in wpa_cipher_put_suites()
2833 wpa_pick_pairwise_cipher(int ciphers, int none_allowed) wpa_pick_pairwise_cipher() argument
2855 wpa_pick_group_cipher(int ciphers) wpa_pick_group_cipher() argument
2946 wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim) wpa_write_ciphers() argument
[all...]

Completed in 14 milliseconds

12345