/third_party/node/lib/internal/tls/ |
H A D | secure-context.js | 96 function processCiphers(ciphers, name) { 97 ciphers = StringPrototypeSplit(ciphers || getDefaultCiphers(), ':'); 102 ciphers, 111 ciphers, 120 throw new ERR_INVALID_ARG_VALUE(name, ciphers); 131 ciphers = getDefaultCiphers(), 150 if (ciphers !== undefined && ciphers !== null) 151 validateString(ciphers, ` [all...] |
/third_party/node/test/parallel/ |
H A D | test-tls-multi-pfx.js | 20 const ciphers = []; 26 ciphers: 'ECDHE-ECDSA-AES256-GCM-SHA384', 30 ciphers.push(ecdsa.getCipher()); 32 ciphers: 'ECDHE-RSA-AES256-GCM-SHA384', 36 ciphers.push(rsa.getCipher()); 45 assert.deepStrictEqual(ciphers, [{
|
H A D | test-tls-getprotocol.js | 17 ciphers: (common.hasOpenSSL31 ? 'DEFAULT:@SECLEVEL=0' : 'DEFAULT') 21 ciphers: (common.hasOpenSSL31 ? 'DEFAULT:@SECLEVEL=0' : 'DEFAULT') 30 ciphers: 'RSA@SECLEVEL=0', 42 ciphers: v.ciphers,
|
H A D | test-tls-client-default-ciphers.js | 33 let ciphers = ''; 36 ciphers = options.ciphers; 42 assert.strictEqual(ciphers, tls.DEFAULT_CIPHERS);
|
H A D | test-tls-getcipher.js | 50 ciphers: 'AES128-SHA256', 65 ciphers: 'ECDHE-RSA-AES128-GCM-SHA256', 81 ciphers: 'TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_CCM_8_SHA256', 88 ciphers: 'TLS_AES_128_CCM_8_SHA256',
|
H A D | test-tls-set-ciphers-error.js | 15 ciphers: 'aes256-sha' 19 options.ciphers = 'FOOBARBAZ'; 22 options.ciphers = 'TLS_not_a_cipher';
|
H A D | test-tls-dhe.js | 44 const ciphers = `${dheCipher}:${ecdheCipher}`; 59 ciphers, 68 '-cipher', `${ciphers}:@SECLEVEL=1`];
|
H A D | test-tls-reduced-SECLEVEL-in-cipher.js | 15 ciphers: 'DEFAULT' 22 // Reducing SECLEVEL to 0 in ciphers retains compatibility with previous versions of OpenSSL like using a small key. 23 // As ciphers are getting set before the cert and key get loaded. 24 options.ciphers = 'DEFAULT:@SECLEVEL=0';
|
H A D | test-tls-ecdh-auto.js | 25 ciphers: '-ALL:ECDHE-RSA-AES128-SHA256', 36 '-cipher', `${options.ciphers}`,
|
H A D | test-tls-ecdh.js | 40 ciphers: '-ALL:ECDHE-RSA-AES128-SHA256', 53 options.ciphers} -connect 127.0.0.1:${this.address().port}`;
|
H A D | test-https-agent-session-eviction.js | 17 ciphers: 'RSA@SECLEVEL=0' 57 ciphers: (common.hasOpenSSL31 ? 'DEFAULT:@SECLEVEL=0' : 'DEFAULT'),
|
H A D | test-tls-ecdh-multiple.js | 25 ciphers: '-ALL:ECDHE-RSA-AES128-SHA256', 36 '-cipher', `${options.ciphers}`,
|
/third_party/node/deps/openssl/openssl/crypto/engine/ |
H A D | tb_cipher.c | 29 if (e->ciphers) { in ENGINE_register_ciphers() 31 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers() 50 if (e->ciphers) { in ENGINE_set_default_ciphers() 52 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers() 87 return e->ciphers; in ENGINE_get_ciphers() 93 e->ciphers = f; in ENGINE_set_ciphers()
|
/third_party/openssl/crypto/engine/ |
H A D | tb_cipher.c | 29 if (e->ciphers) { in ENGINE_register_ciphers() 31 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_register_ciphers() 50 if (e->ciphers) { in ENGINE_set_default_ciphers() 52 int num_nids = e->ciphers(e, NULL, &nids, 0); in ENGINE_set_default_ciphers() 87 return e->ciphers; in ENGINE_get_ciphers() 93 e->ciphers = f; in ENGINE_set_ciphers()
|
/third_party/nghttp2/ |
H A D | mkcipherlist.py | 295 ciphers = [] variable 306 ciphers.append((id, name)) 311 for id, name in ciphers: 318 for id, name in ciphers:
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.c | 2334 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument 2338 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites() 2342 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites() 2346 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites() 2350 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites() 2354 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites() 2358 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites() 2367 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument 2371 if (ciphers & WPA_CIPHER_CCMP) { in wpa_cipher_put_suites() 2375 if (ciphers in wpa_cipher_put_suites() 2388 wpa_pick_pairwise_cipher(int ciphers, int none_allowed) wpa_pick_pairwise_cipher() argument 2406 wpa_pick_group_cipher(int ciphers) wpa_pick_group_cipher() argument 2485 wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim) wpa_write_ciphers() argument [all...] |
/third_party/openssl/test/ |
H A D | cipherlist_test.c | 57 * All ciphers in the DEFAULT cipherlist meet the default security level. 58 * However, default supported ciphers exclude SRP and PSK ciphersuites 61 * Supported ciphers also exclude TLSv1.2 ciphers if TLSv1.2 is disabled, 150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist() 159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist() 163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist() 169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist() 179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist() 216 /* SSL_CTX_set_cipher_list() should fail if it clears all TLSv1.2 ciphers [all...] |
H A D | dtls_mtu_test.c | 147 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests() 165 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests() 166 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests() 167 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
|
H A D | sslcorrupttest.c | 134 * |cipher_list| is initialized with RSA ciphers' names. This 153 * The |cipher_list| will be filled only with names of RSA ciphers, in setup_cipher_list() 189 STACK_OF(SSL_CIPHER) *ciphers; in test_ssl_corrupt() 206 || !TEST_ptr(ciphers = SSL_CTX_get_ciphers(cctx)) in test_ssl_corrupt() 207 || !TEST_int_eq(sk_SSL_CIPHER_num(ciphers), 1) in test_ssl_corrupt() 208 || !TEST_ptr(currcipher = sk_SSL_CIPHER_value(ciphers, 0))) in test_ssl_corrupt() 212 * No ciphers we are using are TLSv1.3 compatible so we should not attempt in test_ssl_corrupt()
|
/third_party/mbedtls/tests/ |
H A D | compat.sh | 283 # Set $ciphers to the cipher suite name translations for the specified 284 # program (gnutls, mbedtls or openssl). $ciphers is a space-separated 288 ciphers=$(scripts/translate_ciphers.py "$@") 653 # Newer versions of OpenSSL have a syntax to enable all "ciphers", even 667 case $($OPENSSL ciphers ALL) in 1139 for i in $ciphers; do 1149 for i in $ciphers; do 1168 for i in $ciphers; do 1177 for i in $ciphers; do 1197 for i in $ciphers; d [all...] |
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
H A D | Proxy.pm | 102 ciphers => "AES128-SHA", 170 $self->{ciphers} = "AES128-SHA"; 233 if ($self->ciphers ne "") { 234 $execcmd .= " -cipher ".$self->ciphers; 623 sub ciphers subroutine 627 $self->{ciphers} = shift; 629 return $self->{ciphers};
|
/third_party/openssl/util/perl/TLSProxy/ |
H A D | Proxy.pm | 102 ciphers => "AES128-SHA", 170 $self->{ciphers} = "AES128-SHA"; 233 if ($self->ciphers ne "") { 234 $execcmd .= " -cipher ".$self->ciphers; 623 sub ciphers subroutine 627 $self->{ciphers} = shift; 629 return $self->{ciphers};
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | ciphers.c | 41 {"v", OPT_V, '-', "Verbose listing of the SSL/TLS ciphers"}, 47 {"s", OPT_S, '-', "Only supported ciphers"}, 103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local 179 ciphers = argv[0]; in ciphers_main() 212 if (ciphers != NULL) { in ciphers_main() 213 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in ciphers_main()
|
/third_party/openssl/apps/ |
H A D | ciphers.c | 41 {"v", OPT_V, '-', "Verbose listing of the SSL/TLS ciphers"}, 47 {"s", OPT_S, '-', "Only supported ciphers"}, 103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; in ciphers_main() local 179 ciphers = argv[0]; in ciphers_main() 212 if (ciphers != NULL) { in ciphers_main() 213 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in ciphers_main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.c | 1249 * PASN frame. SHA-256 is used as the hash algorithm, except for the ciphers 2779 int rsn_cipher_put_suites(u8 *start, int ciphers) in rsn_cipher_put_suites() argument 2783 if (ciphers & WPA_CIPHER_CCMP_256) { in rsn_cipher_put_suites() 2787 if (ciphers & WPA_CIPHER_GCMP_256) { in rsn_cipher_put_suites() 2791 if (ciphers & WPA_CIPHER_CCMP) { in rsn_cipher_put_suites() 2795 if (ciphers & WPA_CIPHER_GCMP) { in rsn_cipher_put_suites() 2799 if (ciphers & WPA_CIPHER_TKIP) { in rsn_cipher_put_suites() 2803 if (ciphers & WPA_CIPHER_NONE) { in rsn_cipher_put_suites() 2812 int wpa_cipher_put_suites(u8 *start, int ciphers) in wpa_cipher_put_suites() argument 2816 if (ciphers in wpa_cipher_put_suites() 2833 wpa_pick_pairwise_cipher(int ciphers, int none_allowed) wpa_pick_pairwise_cipher() argument 2855 wpa_pick_group_cipher(int ciphers) wpa_pick_group_cipher() argument 2946 wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim) wpa_write_ciphers() argument [all...] |