Home | History | Annotate | Download | only in openssl

Lines Matching full:ciphers

552 /* SSL_OP_CIPHER_SERVER_PREFERENCE configures servers to select ciphers and
1094 * maintains an ordered list of enabled ciphers, along with an ordered list of
1095 * disabled but available ciphers. Initially, all ciphers are disabled with a
1100 * selector which matches a subset of available ciphers.
1104 * The empty opcode enables and appends all matching disabled ciphers to the
1105 * end of the enabled list. The newly appended ciphers are ordered relative to
1108 * |-| disables all matching enabled ciphers and prepends them to the disabled
1110 * most recently disabled ciphers get highest preference relative to other
1111 * disabled ciphers if re-enabled.
1113 * |+| moves all matching enabled ciphers to the end of the enabled list, with
1116 * |!| deletes all matching ciphers, enabled or not, from either list. Deleted
1117 * ciphers will not matched by future operations.
1122 * ECDSA-authenticated AES-GCM ciphers.
1126 * |ALL| matches all ciphers.
1128 * |kRSA|, |kDHE|, |kECDHE|, and |kPSK| match ciphers using plain RSA, DHE,
1132 * |aRSA|, |aECDSA|, and |aPSK| match ciphers authenticated by RSA, ECDSA, and
1140 * ciphers whose bulk cipher use the corresponding encryption scheme. Note
1141 * that |AES|, |AES128|, and |AES256| match both CBC and GCM ciphers.
1149 * Although implemented, authentication-only ciphers match no rules and must be
1157 * |MEDIUM| and |HIGH| match RC4-based ciphers and all others, respectively.
1161 * |SSLv3| and |TLSv1| match ciphers available in TLS 1.1 or earlier.
1162 * |TLSv1_2| matches ciphers new in TLS 1.2. This is confusing and should not
1167 * The special |@STRENGTH| directive will sort all enabled ciphers by strength.
1170 * to the default ordering of available ciphers.
1174 * |SSL_OP_CIPHER_SERVER_PREFERENCE| is enabled. Ciphers in an equal-preference
1807 * multiplicative group selected by the server. These ciphers are disabled for a
1825 * the group for DHE ciphers. |callback| should ignore |is_export| and
1835 * group for DHE ciphers. |callback| should ignore |is_export| and |keylength|
2585 /* SSL_get_ivs sets |*out_iv_len| to the length of the IVs for the ciphers
3441 * The values in |ciphers| are in one-to-one correspondence with
3442 * |in_group_flags|. (That is, sk_SSL_CIPHER_num(ciphers) is the number of
3452 * ciphers: A B C D E F
3462 STACK_OF(SSL_CIPHER) *ciphers;
3484 /* cipher_list_tls10 is the list of ciphers when TLS 1.0 or greater is in
3494 /* cipher_list_tls11 is the list of ciphers when TLS 1.1 or greater is in