Home | History | Annotate | Download | only in openssl

Lines Matching defs:ciphers

622 /* SSL_OP_CIPHER_SERVER_PREFERENCE configures servers to select ciphers and
1260 * ciphers return the string "GENERIC". */
1273 * maintains an ordered list of enabled ciphers, along with an ordered list of
1274 * disabled but available ciphers. Initially, all ciphers are disabled with a
1279 * selector which matches a subset of available ciphers.
1283 * The empty opcode enables and appends all matching disabled ciphers to the
1284 * end of the enabled list. The newly appended ciphers are ordered relative to
1287 * |-| disables all matching enabled ciphers and prepends them to the disabled
1289 * most recently disabled ciphers get highest preference relative to other
1290 * disabled ciphers if re-enabled.
1292 * |+| moves all matching enabled ciphers to the end of the enabled list, with
1295 * |!| deletes all matching ciphers, enabled or not, from either list. Deleted
1296 * ciphers will not matched by future operations.
1301 * matches ECDSA-authenticated AES-GCM ciphers.
1305 * |ALL| matches all ciphers.
1307 * |kRSA|, |kDHE|, |kECDHE|, and |kPSK| match ciphers using plain RSA, DHE,
1311 * |aRSA|, |aECDSA|, and |aPSK| match ciphers authenticated by RSA, ECDSA, and
1318 * |3DES|, |AES128|, |AES256|, |AES|, |AESGCM|, |CHACHA20| match ciphers
1320 * |AES|, |AES128|, and |AES256| match both CBC and GCM ciphers.
1328 * Although implemented, authentication-only ciphers match no rules and must be
1340 * |SSLv3| and |TLSv1| match ciphers available in TLS 1.1 or earlier.
1341 * |TLSv1_2| matches ciphers new in TLS 1.2. This is confusing and should not
1348 * The special |@STRENGTH| directive will sort all enabled ciphers by strength.
1351 * to the default ordering of available ciphers.
1355 * |SSL_OP_CIPHER_SERVER_PREFERENCE| is enabled. Ciphers in an equal-preference
1366 * TLS 1.3 ciphers do not participate in this mechanism and instead have a
1369 * ciphers. */
3014 /* SSL_get_ivs sets |*out_iv_len| to the length of the IVs for the ciphers
4100 * The values in |ciphers| are in one-to-one correspondence with
4101 * |in_group_flags|. (That is, sk_SSL_CIPHER_num(ciphers) is the number of
4111 * ciphers: A B C D E F
4121 STACK_OF(SSL_CIPHER) *ciphers;