Searched refs:ciphers (Results 1 – 20 of 20) sorted by relevance
/test/recipes/ |
A D | 70-test_tls13downgrade.t | 72 my $ciphers = "AES128-SHA:\@SECLEVEL=0"; 79 $proxy->ciphers($ciphers); 88 $proxy->ciphers($ciphers); 98 $proxy->ciphers($ciphers); 107 $proxy->ciphers($ciphers); 116 $proxy->ciphers($ciphers);
|
A D | 20-test_enc_more.t | 35 my @ciphers = 40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb 41 |desx|idea|rc2|rc4|seed)/x} @ciphers 44 plan tests => 2 + scalar @ciphers; 47 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 51 skip "Not initialized, skipping...", scalar(@ciphers); 54 foreach my $cipher (@ciphers) {
|
A D | 20-test_enc.t | 36 my @ciphers = 40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea 41 |rc2|rc4|seed)/x} @ciphers 44 plan tests => 5 + (scalar @ciphers)*2; 47 skip "Problems getting ciphers...", 1 + scalar(@ciphers) 51 skip "Not initialized, skipping...", scalar(@ciphers); 54 foreach my $c (@ciphers) {
|
A D | 70-test_sslsigalgs.t | 143 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 159 $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=0"); 169 $proxy->ciphers("DEFAULT:\@SECLEVEL=1"); 179 $proxy->ciphers("DEFAULT:\@SECLEVEL=0"); 187 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 195 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 204 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 212 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 223 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); 231 $proxy->ciphers("ECDHE-RSA-AES128-SHA"); [all …]
|
A D | 70-test_sslrecords.t | 149 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 160 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 171 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 181 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 191 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0"); 228 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
A D | 70-test_sslskewith0p.t | 41 $proxy->ciphers('ADH-AES128-SHA:@SECLEVEL=0');
|
A D | 80-test_ssl_old.t | 505 my $ciphers = '-PSK:-SRP:@SECLEVEL=0'; 530 my @ciphers = run(app(["openssl", "ciphers", "-s", $protocol, 532 "ALL:$ciphers"]), 537 @ciphers ];
|
A D | 70-test_sslsignature.t | 106 $proxy->ciphers('DHE-RSA-AES128-SHA');
|
A D | 70-test_sslversions.t | 100 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
A D | 70-test_renegotiation.t | 79 $proxy->ciphers("DEFAULT:\@SECLEVEL=0");
|
A D | 70-test_sslextension.t | 210 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
A D | 70-test_key_share.t | 302 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
A D | 70-test_sslmessages.t | 443 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
|
/test/ |
A D | cipherlist_test.c | 150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist() 159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist() 163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist() 169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist() 179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
|
A D | dtls_mtu_test.c | 151 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests() 169 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests() 170 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests() 171 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
|
A D | sslcorrupttest.c | 189 STACK_OF(SSL_CIPHER) *ciphers; in test_ssl_corrupt() 206 || !TEST_ptr(ciphers = SSL_CTX_get_ciphers(cctx)) in test_ssl_corrupt() 207 || !TEST_int_eq(sk_SSL_CIPHER_num(ciphers), 1) in test_ssl_corrupt() 208 || !TEST_ptr(currcipher = sk_SSL_CIPHER_value(ciphers, 0))) in test_ssl_corrupt()
|
A D | ciphername_test.c | 387 const char *ciphers = "ALL:eNULL", *p, *q, *r; in test_cipher_name() local 416 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in test_cipher_name()
|
A D | quicapitest.c | 291 const STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_ciphersuites() 321 ciphers = SSL_get_ciphers(ssl); in test_ciphersuites() 326 cipher = sk_SSL_CIPHER_value(ciphers, j++); in test_ciphersuites() 334 if (!TEST_int_eq(sk_SSL_CIPHER_num(ciphers), j)) in test_ciphersuites() 703 static int ensure_valid_ciphers(const STACK_OF(SSL_CIPHER) *ciphers) in ensure_valid_ciphers() argument 708 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); ++i) { in ensure_valid_ciphers() 709 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in ensure_valid_ciphers() 780 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_quic_forbidden_apis() 801 if (!TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl)) in test_quic_forbidden_apis() 802 || !TEST_true(ensure_valid_ciphers(ciphers))) in test_quic_forbidden_apis() [all …]
|
/test/recipes/30-test_evp_data/ |
A D | evpciph_rc5.txt | 10 #provider ciphers have identical results.
|
A D | evpmac_common.txt | 319 # (Most ciphers have fixed length keys - so it fails due to this restriction).
|
Completed in 35 milliseconds