Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 20 of 20) sorted by relevance

/test/recipes/
A D70-test_tls13downgrade.t72 my $ciphers = "AES128-SHA:\@SECLEVEL=0";
79 $proxy->ciphers($ciphers);
88 $proxy->ciphers($ciphers);
98 $proxy->ciphers($ciphers);
107 $proxy->ciphers($ciphers);
116 $proxy->ciphers($ciphers);
A D20-test_enc_more.t35 my @ciphers =
40 @ciphers = grep {!/^-(bf|blowfish|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb
41 |desx|idea|rc2|rc4|seed)/x} @ciphers
44 plan tests => 2 + scalar @ciphers;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $cipher (@ciphers) {
A D20-test_enc.t36 my @ciphers =
40 @ciphers = grep {!/^(bf|cast|des$|des-cbc|des-cfb|des-ecb|des-ofb|desx|idea
41 |rc2|rc4|seed)/x} @ciphers
44 plan tests => 5 + (scalar @ciphers)*2;
47 skip "Problems getting ciphers...", 1 + scalar(@ciphers)
51 skip "Not initialized, skipping...", scalar(@ciphers);
54 foreach my $c (@ciphers) {
A D70-test_sslsigalgs.t143 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
159 $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=0");
169 $proxy->ciphers("DEFAULT:\@SECLEVEL=1");
179 $proxy->ciphers("DEFAULT:\@SECLEVEL=0");
187 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
195 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
204 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
212 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
223 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
231 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
[all …]
A D70-test_sslrecords.t149 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
160 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
171 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
181 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
191 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
228 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
A D70-test_sslskewith0p.t41 $proxy->ciphers('ADH-AES128-SHA:@SECLEVEL=0');
A D80-test_ssl_old.t505 my $ciphers = '-PSK:-SRP:@SECLEVEL=0';
530 my @ciphers = run(app(["openssl", "ciphers", "-s", $protocol,
532 "ALL:$ciphers"]),
537 @ciphers ];
A D70-test_sslsignature.t106 $proxy->ciphers('DHE-RSA-AES128-SHA');
A D70-test_sslversions.t100 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
A D70-test_renegotiation.t79 $proxy->ciphers("DEFAULT:\@SECLEVEL=0");
A D70-test_sslextension.t210 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
A D70-test_key_share.t302 $proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
A D70-test_sslmessages.t443 $proxy->ciphers("ECDHE-RSA-AES128-SHA");
/test/
A Dcipherlist_test.c150 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_default_cipherlist()
159 || !TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl))) in test_default_cipherlist()
163 num_ciphers = sk_SSL_CIPHER_num(ciphers); in test_default_cipherlist()
169 cipher_id = SSL_CIPHER_get_id(sk_SSL_CIPHER_value(ciphers, i)); in test_default_cipherlist()
179 sk_SSL_CIPHER_free(ciphers); in test_default_cipherlist()
A Ddtls_mtu_test.c151 STACK_OF(SSL_CIPHER) *ciphers; in run_mtu_tests()
169 ciphers = SSL_CTX_get_ciphers(ctx); in run_mtu_tests()
170 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { in run_mtu_tests()
171 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in run_mtu_tests()
A Dsslcorrupttest.c189 STACK_OF(SSL_CIPHER) *ciphers; in test_ssl_corrupt()
206 || !TEST_ptr(ciphers = SSL_CTX_get_ciphers(cctx)) in test_ssl_corrupt()
207 || !TEST_int_eq(sk_SSL_CIPHER_num(ciphers), 1) in test_ssl_corrupt()
208 || !TEST_ptr(currcipher = sk_SSL_CIPHER_value(ciphers, 0))) in test_ssl_corrupt()
A Dciphername_test.c387 const char *ciphers = "ALL:eNULL", *p, *q, *r; in test_cipher_name() local
416 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) { in test_cipher_name()
A Dquicapitest.c291 const STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_ciphersuites()
321 ciphers = SSL_get_ciphers(ssl); in test_ciphersuites()
326 cipher = sk_SSL_CIPHER_value(ciphers, j++); in test_ciphersuites()
334 if (!TEST_int_eq(sk_SSL_CIPHER_num(ciphers), j)) in test_ciphersuites()
703 static int ensure_valid_ciphers(const STACK_OF(SSL_CIPHER) *ciphers) in ensure_valid_ciphers() argument
708 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); ++i) { in ensure_valid_ciphers()
709 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(ciphers, i); in ensure_valid_ciphers()
780 STACK_OF(SSL_CIPHER) *ciphers = NULL; in test_quic_forbidden_apis()
801 if (!TEST_ptr(ciphers = SSL_get1_supported_ciphers(ssl)) in test_quic_forbidden_apis()
802 || !TEST_true(ensure_valid_ciphers(ciphers))) in test_quic_forbidden_apis()
[all …]
/test/recipes/30-test_evp_data/
A Devpciph_rc5.txt10 #provider ciphers have identical results.
A Devpmac_common.txt319 # (Most ciphers have fixed length keys - so it fails due to this restriction).

Completed in 35 milliseconds