mirror of
https://github.com/guanzhi/GmSSL.git
synced 2026-05-07 00:46:17 +08:00
889 lines
33 KiB
Plaintext
889 lines
33 KiB
Plaintext
=pod
|
||
|
||
=encoding utf8
|
||
|
||
=head1 NAME
|
||
|
||
ciphers - SSL cipher display and cipher list tool
|
||
|
||
=head1 SYNOPSIS
|
||
|
||
B<gmssl> B<ciphers>
|
||
[B<-help>]
|
||
[B<-s>]
|
||
[B<-v>]
|
||
[B<-V>]
|
||
[B<-ssl3>]
|
||
[B<-tls1>]
|
||
[B<-tls1_1>]
|
||
[B<-tls1_2>]
|
||
[B<-tls1_3>]
|
||
[B<-s>]
|
||
[B<-psk>]
|
||
[B<-srp>]
|
||
[B<-stdname>]
|
||
[B<cipherlist>]
|
||
|
||
=head1 DESCRIPTION
|
||
|
||
The B<ciphers> command converts textual GmSSL cipher lists into ordered
|
||
SSL cipher preference lists. It can be used as a test tool to determine
|
||
the appropriate cipherlist.
|
||
|
||
ciphers命令将GmSSL文本密码列表转换成有序的SSL密码偏好列表。它可以用作测试工具
|
||
来决定适当的密码列表。
|
||
|
||
=head1 OPTIONS
|
||
|
||
=over 4
|
||
|
||
=item B<-help>
|
||
|
||
Print a usage message.
|
||
|
||
打印使用信息。
|
||
|
||
=item B<-s>
|
||
|
||
Only list supported ciphers: those consistent with the security level, and
|
||
minimum and maximum protocol version. This is closer to the actual cipher list
|
||
an application will support.
|
||
|
||
PSK and SRP ciphers are not enabled by default: they require B<-psk> or B<-srp>
|
||
to enable them.
|
||
|
||
It also does not change the default list of supported signature algorithms.
|
||
|
||
On a server the list of supported ciphers might also exclude other ciphers
|
||
depending on the configured certificates and presence of DH parameters.
|
||
|
||
If this option is not used then all ciphers that match the cipherlist will be
|
||
listed.
|
||
|
||
只列出了支持的密码:那些与安全级别一致的密码,最小和最大的协议版本。
|
||
这更接近应用程序将支持的实际密码列表。
|
||
默认情况下,PSK和SRP密码未启用
|
||
它也不会更改支持的签名算法的默认列表。
|
||
在服务器上,支持的密码列表也可能会根据配置的证书和DH参数的存在来排除其他密码。
|
||
如果不使用此选项,则将列出与密码列表匹配的所有密码。
|
||
|
||
=item B<-psk>
|
||
|
||
When combined with B<-s> includes cipher suites which require PSK.
|
||
|
||
当与-s组合时包含了需要PSK的密码套件。
|
||
|
||
=item B<-srp>
|
||
|
||
When combined with B<-s> includes cipher suites which require SRP.
|
||
|
||
当与-s组合时包含了需要SRP的密码套件。
|
||
|
||
=item B<-v>
|
||
|
||
Verbose output: For each ciphersuite, list details as provided by
|
||
L<SSL_CIPHER_description(3)>.
|
||
|
||
详细的列出所有加密套件。
|
||
|
||
=item B<-V>
|
||
|
||
Like B<-v>, but include the official cipher suite values in hex.
|
||
|
||
和-v相似,但包含十六进制官方密码套件。
|
||
|
||
=item B<-tls1_3>
|
||
|
||
In combination with the B<-s> option, list the ciphers which would be used if
|
||
TLSv1.3 were negotiated.
|
||
|
||
结合了-s选项。列出了如果TVSv1.3达成协议要使用的密码。
|
||
|
||
=item B<-tls1_2>
|
||
|
||
In combination with the B<-s> option, list the ciphers which would be used if
|
||
TLSv1.2 were negotiated.
|
||
|
||
结合了-s选项。列出了如果TVSv1.2达成协议要使用的密码。
|
||
|
||
=item B<-ssl3>
|
||
|
||
In combination with the B<-s> option, list the ciphers which would be used if
|
||
SSLv3 were negotiated.
|
||
|
||
结合了-s选项。列出了如果SSLv3达成协议要使用的密码。
|
||
|
||
=item B<-tls1>
|
||
|
||
In combination with the B<-s> option, list the ciphers which would be used if
|
||
TLSv1 were negotiated.
|
||
|
||
结合了-s选项。列出了如果TVSv1达成协议要使用的密码。
|
||
|
||
|
||
=item B<-tls1_1>
|
||
|
||
In combination with the B<-s> option, list the ciphers which would be used if
|
||
TLSv1.1 were negotiated.
|
||
|
||
结合了-s选项。列出了如果TVSv1.1达成协议要使用的密码。
|
||
|
||
|
||
=item B<-stdname>
|
||
|
||
precede each ciphersuite by its standard name: only available is GmSSL
|
||
is built with tracing enabled (B<enable-ssl-trace> argument to Configure).
|
||
|
||
在每个密码套件之前加上其标准名称:只有可用的GmSSL是使用跟踪启用(enable-ssl-trace参数配置)构建的。
|
||
|
||
=item B<cipherlist>
|
||
|
||
a cipher list to convert to a cipher preference list. If it is not included
|
||
then the default cipher list will be used. The format is described below.
|
||
|
||
一个用于转换为密码偏好列表的密码表。如果不包括,那么将使用默认密码列表。格式如下所述。
|
||
|
||
=back
|
||
|
||
=head1 CIPHER LIST FORMAT
|
||
|
||
The cipher list consists of one or more I<cipher strings> separated by colons.
|
||
Commas or spaces are also acceptable separators but colons are normally used.
|
||
|
||
The actual cipher string can take several different forms.
|
||
|
||
It can consist of a single cipher suite such as B<RC4-SHA>.
|
||
|
||
It can represent a list of cipher suites containing a certain algorithm, or
|
||
cipher suites of a certain type. For example B<SHA1> represents all ciphers
|
||
suites using the digest algorithm SHA1 and B<SSLv3> represents all SSL v3
|
||
algorithms.
|
||
|
||
Lists of cipher suites can be combined in a single cipher string using the
|
||
B<+> character. This is used as a logical B<and> operation. For example
|
||
B<SHA1+DES> represents all cipher suites containing the SHA1 B<and> the DES
|
||
algorithms.
|
||
|
||
Each cipher string can be optionally preceded by the characters B<!>,
|
||
B<-> or B<+>.
|
||
|
||
If B<!> is used then the ciphers are permanently deleted from the list.
|
||
The ciphers deleted can never reappear in the list even if they are
|
||
explicitly stated.
|
||
|
||
If B<-> is used then the ciphers are deleted from the list, but some or
|
||
all of the ciphers can be added again by later options.
|
||
|
||
If B<+> is used then the ciphers are moved to the end of the list. This
|
||
option doesn't add any new ciphers it just moves matching existing ones.
|
||
|
||
If none of these characters is present then the string is just interpreted
|
||
as a list of ciphers to be appended to the current preference list. If the
|
||
list includes any ciphers already present they will be ignored: that is they
|
||
will not moved to the end of the list.
|
||
|
||
The cipher string B<@STRENGTH> can be used at any point to sort the current
|
||
cipher list in order of encryption algorithm key length.
|
||
|
||
The cipher string B<@SECLEVEL=n> can be used at any point to set the security
|
||
level to B<n>.
|
||
|
||
密码列表由一个或多个由冒号分隔的密码串组成。逗号或空格也是可接受的分隔符,但通常使用冒号。
|
||
|
||
实际的密码串可以采取几种不同的形式。
|
||
|
||
它可以由单个加密套件组成,如RC4-SHA。
|
||
|
||
它可以表示包含某种算法或某种类型的密码套件的密码套件列表。例如,SHA1表示使用摘要算法SHA1的所有密码套件,SSLv3表示所有SSL v3算法。
|
||
|
||
密码套件列表可以使用+字符组合在单个密码字符串中。这被用作逻辑和操作。例如,SHA1 + DES表示包含SHA1和DES算法的所有密码套件。
|
||
|
||
每个密码字符串都可以前面加上字符!, - 或+。
|
||
|
||
如果!然后使用密码从列表中永久删除。删除的密码永远不会重新出现在列表中,即使它们被明确声明。
|
||
|
||
如果使用,则从列表中删除密码,但是可以通过稍后的选项再次添加一些或所有密码。
|
||
|
||
如果使用+,则将密码移动到列表的末尾。此选项不会添加任何新的密码,它只是移动匹配现有的密码。
|
||
|
||
如果这些字符都不存在,则该字符串将被解释为要附加到当前偏好列表的密码列表。如果列表中包含已经存在的任何密码,那么它们将被忽略:它们不会移动到列表的末尾。
|
||
|
||
可以在任何时候使用密码字符串@STRENGTH按照加密算法密钥长度的顺序对当前密码列表进行排序。
|
||
|
||
可以在任何时候使用密码字符串@ SECLEVEL = n来将安全级别设置为n。
|
||
|
||
=head1 CIPHER STRINGS
|
||
|
||
The following is a list of all permitted cipher strings and their meanings.
|
||
|
||
=over 4
|
||
|
||
=item B<DEFAULT>
|
||
|
||
The default cipher list.
|
||
This is determined at compile time and is normally
|
||
B<ALL:!COMPLEMENTOFDEFAULT:!eNULL>.
|
||
When used, this must be the first cipherstring specified.
|
||
|
||
默认密码列表。 这是在编译时确定的,通常是ALL:!COMPLEMENTOFDEFAULT:!eNULL。 使用时,必须是指定的第一个密码。
|
||
|
||
=item B<COMPLEMENTOFDEFAULT>
|
||
|
||
The ciphers included in B<ALL>, but not enabled by default. Currently
|
||
this includes all RC4 and anonymous ciphers. Note that this rule does
|
||
not cover B<eNULL>, which is not included by B<ALL> (use B<COMPLEMENTOFALL> if
|
||
necessary). Note that RC4 based ciphersuites are not built into GmSSL by
|
||
default (see the enable-weak-ssl-ciphers option to Configure).
|
||
|
||
密码包含在ALL中,但默认情况下未启用。 目前这包括所有RC4和匿名密码。 请注意,此规则不涵盖eNULL(不包括在所有内容中)(如有必要,请使用COMPLEMENTOFALL)。 请注意,默认情况下,基于RC4的密码套件不会内置到GmSSL中(请参阅配置的enable-weak-ssl-ciphers选项)。
|
||
|
||
=item B<ALL>
|
||
|
||
All cipher suites except the B<eNULL> ciphers (which must be explicitly enabled
|
||
if needed).
|
||
As of GmSSL 1.0.0, the B<ALL> cipher suites are sensibly ordered by default.
|
||
|
||
除eNULL密码之外的所有密码套件(必要时必须明确启用)。 从GmSSL 1.0.0开始,默认情况下,ALL密码套件被明确地排序。
|
||
|
||
=item B<COMPLEMENTOFALL>
|
||
|
||
The cipher suites not enabled by B<ALL>, currently B<eNULL>.
|
||
|
||
密码套件未被ALL启用,目前为eNULL
|
||
|
||
=item B<HIGH>
|
||
|
||
"high" encryption cipher suites. This currently means those with key lengths
|
||
larger than 128 bits, and some cipher suites with 128-bit keys.
|
||
|
||
“高”加密密码套件。 这当前是指密钥长度大于128位的密码,
|
||
以及一些128位密钥的密码套件。
|
||
|
||
=item B<MEDIUM>
|
||
|
||
"medium" encryption cipher suites, currently some of those using 128 bit
|
||
encryption.
|
||
|
||
“中”加密密码套件,目前有些使用128位加密。
|
||
|
||
=item B<LOW>
|
||
|
||
"low" encryption cipher suites, currently those using 64 or 56 bit
|
||
encryption algorithms but excluding export cipher suites. All these
|
||
ciphersuites have been removed as of GmSSL 1.1.0.
|
||
|
||
“低”加密密码套件,目前使用64或56位加密算法,但不包括导出密码套件。 所有这些密码套件已经从GmSSL 1.1.0移除。
|
||
|
||
=item B<eNULL>, B<NULL>
|
||
|
||
The "NULL" ciphers that is those offering no encryption. Because these offer no
|
||
encryption at all and are a security risk they are not enabled via either the
|
||
B<DEFAULT> or B<ALL> cipher strings.
|
||
Be careful when building cipherlists out of lower-level primitives such as
|
||
B<kRSA> or B<aECDSA> as these do overlap with the B<eNULL> ciphers. When in
|
||
doubt, include B<!eNULL> in your cipherlist.
|
||
|
||
“NULL”密码是不提供加密功能的密码。 因为这些不提供任何加密,并且是一个安全风险,它们不能通过DEFAULT或ALL密码字符串启用。 从低级原语(如kRSA或aECDSA)构建密码列表时要小心,因为它们与eNULL密码重叠。 如有疑问,请在您的密码列表中加入!eNULL。
|
||
|
||
=item B<aNULL>
|
||
|
||
The cipher suites offering no authentication. This is currently the anonymous
|
||
DH algorithms and anonymous ECDH algorithms. These cipher suites are vulnerable
|
||
to "man in the middle" attacks and so their use is discouraged.
|
||
These are excluded from the B<DEFAULT> ciphers, but included in the B<ALL>
|
||
ciphers.
|
||
Be careful when building cipherlists out of lower-level primitives such as
|
||
B<kDHE> or B<AES> as these do overlap with the B<aNULL> ciphers.
|
||
When in doubt, include B<!aNULL> in your cipherlist.
|
||
|
||
密码套件不提供认证。 这是目前的匿名DH算法和匿名ECDH算法。 这些密码套件容易受到“中间人”攻击,所以不鼓励使用它们。 这些被排除在DEFAULT密码之外,但被包含在ALL密码中。 在使用kDHE或AES等低级原语构建密码列表时要小心,因为它们与aNULL密码重叠。 如有疑问,请在您的密码列表中加入!aNULL。
|
||
|
||
=item B<kRSA>, B<aRSA>, B<RSA>
|
||
|
||
Cipher suites using RSA key exchange, authentication or either respectively.
|
||
|
||
密码套件使用RSA密钥交换,认证或分别。
|
||
|
||
=item B<kDHr>, B<kDHd>, B<kDH>
|
||
|
||
Cipher suites using static DH key agreement and DH certificates signed by CAs
|
||
with RSA and DSS keys or either respectively.
|
||
All these cipher suites have been removed in GmSSL 1.1.0.
|
||
|
||
使用静态DH密钥协议的密码套件和由CA与RSA和DSS密钥分别签署的DH证书。 所有这些密码套件已在GmSSL 1.1.0中删除。
|
||
|
||
=item B<kDHE>, B<kEDH>, B<DH>
|
||
|
||
Cipher suites using ephemeral DH key agreement, including anonymous cipher
|
||
suites.
|
||
|
||
密码套件使用短暂的DH密钥协议,包括匿名密码套件。
|
||
|
||
=item B<DHE>, B<EDH>
|
||
|
||
Cipher suites using authenticated ephemeral DH key agreement.
|
||
|
||
密码套件使用经认证的短时DH密钥协议。
|
||
|
||
=item B<ADH>
|
||
|
||
Anonymous DH cipher suites, note that this does not include anonymous Elliptic
|
||
Curve DH (ECDH) cipher suites.
|
||
|
||
匿名DH密码套件,请注意,这不包括匿名椭圆曲线DH(ECDH)密码套件。
|
||
|
||
=item B<kEECDH>, B<kECDHE>, B<ECDH>
|
||
|
||
Cipher suites using ephemeral ECDH key agreement, including anonymous
|
||
cipher suites.
|
||
|
||
密码套件使用短暂的ECDH密钥协议,包括匿名密码套件。
|
||
|
||
=item B<ECDHE>, B<EECDH>
|
||
|
||
Cipher suites using authenticated ephemeral ECDH key agreement.
|
||
|
||
密码套件使用经认证的短暂ECDH密钥协议。
|
||
|
||
=item B<AECDH>
|
||
|
||
Anonymous Elliptic Curve Diffie-Hellman cipher suites.
|
||
|
||
匿名椭圆曲线Diffie-Hellman密码套件。
|
||
|
||
=item B<aDSS>, B<DSS>
|
||
|
||
Cipher suites using DSS authentication, i.e. the certificates carry DSS keys.
|
||
|
||
使用DSS认证的密码套件,即证书携带DSS密钥.
|
||
|
||
=item B<aDH>
|
||
|
||
Cipher suites effectively using DH authentication, i.e. the certificates carry
|
||
DH keys.
|
||
All these cipher suites have been removed in GmSSL 1.1.0.
|
||
|
||
密码套件有效地使用DH认证,即证书携带DH密钥。
|
||
所有这些密码套件已在GmSSL 1.1.0中删除。
|
||
|
||
=item B<aECDSA>, B<ECDSA>
|
||
|
||
Cipher suites using ECDSA authentication, i.e. the certificates carry ECDSA
|
||
keys.
|
||
|
||
使用ECDSA身份验证的密码套件,即证书包含ECDSA键。
|
||
|
||
=item B<TLSv1.2>, B<TLSv1.0>, B<SSLv3>
|
||
|
||
Lists ciphersuites which are only supported in at least TLS v1.2, TLS v1.0 or
|
||
SSL v3.0 respectively.
|
||
Note: there are no ciphersuites specific to TLS v1.1.
|
||
Since this is only the minimum version, if, for example, TLSv1.0 is negotiated
|
||
then both TLSv1.0 and SSLv3.0 ciphersuites are available.
|
||
|
||
Note: these cipher strings B<do not> change the negotiated version of SSL or
|
||
TLS, they only affect the list of available cipher suites.
|
||
|
||
|
||
|
||
=item B<AES128>, B<AES256>, B<AES>
|
||
|
||
cipher suites using 128 bit AES, 256 bit AES or either 128 or 256 bit AES.
|
||
|
||
密码套件使用128位AES,256位AES或128或256位AES。
|
||
|
||
=item B<AESGCM>
|
||
|
||
AES in Galois Counter Mode (GCM): these ciphersuites are only supported
|
||
in TLS v1.2.
|
||
|
||
AES在Galois计数器模式(GCM)中:这些密码器仅在TLS v1.2中支持。
|
||
|
||
=item B<AESCCM>, B<AESCCM8>
|
||
|
||
AES in Cipher Block Chaining - Message Authentication Mode (CCM): these
|
||
ciphersuites are only supported in TLS v1.2. B<AESCCM> references CCM
|
||
cipher suites using both 16 and 8 octet Integrity Check Value (ICV)
|
||
while B<AESCCM8> only references 8 octet ICV.
|
||
|
||
密码块链中的AES - 消息认证模式(CCM):TLS v1.2中仅支持这些密码。 AESCCM参考CCM密码套件,使用16和8个字节的完整性检查值(ICV),而AESCCM8仅引用8个八位字节的ICV。
|
||
|
||
=item B<CAMELLIA128>, B<CAMELLIA256>, B<CAMELLIA>
|
||
|
||
cipher suites using 128 bit CAMELLIA, 256 bit CAMELLIA or either 128 or 256 bit
|
||
CAMELLIA.
|
||
|
||
密码套件使用128位CAMELLIA,256位CAMELLIA或128或256位CAMELLIA。
|
||
|
||
=item B<CHACHA20>
|
||
|
||
cipher suites using ChaCha20.
|
||
|
||
密码套件使用ChaCha20。
|
||
|
||
=item B<3DES>
|
||
|
||
cipher suites using triple DES.
|
||
|
||
密码套件使用三重DES
|
||
|
||
=item B<DES>
|
||
|
||
Cipher suites using DES (not triple DES).
|
||
All these cipher suites have been removed in GmSSL 1.1.0.
|
||
|
||
密码套件使用DES(不是三重DES)。 所有这些密码套件已在GmSSL 1.1.0中删除。
|
||
|
||
=item B<RC4>
|
||
|
||
Cipher suites using RC4.
|
||
|
||
密码套件使用RC4
|
||
|
||
=item B<RC2>
|
||
|
||
Cipher suites using RC2.
|
||
|
||
密码套件使用RC2
|
||
|
||
=item B<IDEA>
|
||
|
||
Cipher suites using IDEA.
|
||
|
||
密码套件使用IDEA
|
||
|
||
=item B<SEED>
|
||
|
||
Cipher suites using SEED.
|
||
|
||
密码套件使用SEED
|
||
|
||
=item B<MD5>
|
||
|
||
Cipher suites using MD5.
|
||
|
||
密码套件使用MD5
|
||
|
||
=item B<SHA1>, B<SHA>
|
||
|
||
Cipher suites using SHA1.
|
||
|
||
密码套件使用SHA1
|
||
|
||
=item B<SHA256>, B<SHA384>
|
||
|
||
Cipher suites using SHA256 or SHA384.
|
||
|
||
密码套件使用SHA256或SHA384
|
||
|
||
=item B<aGOST>
|
||
|
||
Cipher suites using GOST R 34.10 (either 2001 or 94) for authentication
|
||
(needs an engine supporting GOST algorithms).
|
||
|
||
密码套件使用GOST R34.10(2001或94)用来认证
|
||
|
||
=item B<aGOST01>
|
||
|
||
Cipher suites using GOST R 34.10-2001 authentication.
|
||
|
||
密码套件采用GOST R 34.10-2001认证。
|
||
|
||
=item B<kGOST>
|
||
|
||
Cipher suites, using VKO 34.10 key exchange, specified in the RFC 4357.
|
||
|
||
密码套件,使用VKO 34.10密钥交换,在RFC 4357中规定。
|
||
|
||
=item B<GOST94>
|
||
|
||
Cipher suites, using HMAC based on GOST R 34.11-94.
|
||
|
||
密码套件,使用基于GOST R 34.11-94的HMAC。
|
||
|
||
=item B<GOST89MAC>
|
||
|
||
Cipher suites using GOST 28147-89 MAC B<instead of> HMAC.
|
||
|
||
密码套件使用GOST 28147-89 MAC B <代替> HMAC。
|
||
|
||
=item B<PSK>
|
||
|
||
All cipher suites using pre-shared keys (PSK).
|
||
|
||
所有使用预共享密钥(PSK)的密码套件。
|
||
|
||
=item B<kPSK>, B<kECDHEPSK>, B<kDHEPSK>, B<kRSAPSK>
|
||
|
||
Cipher suites using PSK key exchange, ECDHE_PSK, DHE_PSK or RSA_PSK.
|
||
|
||
密码套件使用PSK密钥交换,ECDHE_PSK,DHE_PSK或RSA_PSK。
|
||
|
||
=item B<aPSK>
|
||
|
||
Cipher suites using PSK authentication (currently all PSK modes apart from
|
||
RSA_PSK).
|
||
|
||
使用PSK认证的密码套件(目前除了所有的PSK模式
|
||
RSA_PSK)。
|
||
|
||
=item B<SUITEB128>, B<SUITEB128ONLY>, B<SUITEB192>
|
||
|
||
Enables suite B mode of operation using 128 (permitting 192 bit mode by peer)
|
||
128 bit (not permitting 192 bit by peer) or 192 bit level of security
|
||
respectively.
|
||
If used these cipherstrings should appear first in the cipher
|
||
list and anything after them is ignored.
|
||
Setting Suite B mode has additional consequences required to comply with
|
||
RFC6460.
|
||
In particular the supported signature algorithms is reduced to support only
|
||
ECDSA and SHA256 or SHA384, only the elliptic curves P-256 and P-384 can be
|
||
used and only the two suite B compliant ciphersuites
|
||
(ECDHE-ECDSA-AES128-GCM-SHA256 and ECDHE-ECDSA-AES256-GCM-SHA384) are
|
||
permissible.
|
||
|
||
启用套件B的操作模式,使用128位(允许对等体的192位模式)128位(不允许192位对等)或192位级别的安全性。 如果使用这些密码应该首先出现在密码列表中,并且忽略它们之后的任何内容。 设置Suite B模式需要符合RFC6460所需的其他后果。 特别地,支持的签名算法被简化为仅支持ECDSA和SHA256或SHA384,仅可以使用椭圆曲线P-256和P-384,并且只能使用两个套件B兼容密码(ECDHE-ECDSA-AES128-GCM-SHA256和 ECDHE-ECDSA-AES256-GCM-SHA384)。
|
||
|
||
=back
|
||
|
||
=head1 CIPHER SUITE NAMES
|
||
|
||
The following lists give the SSL or TLS cipher suites names from the
|
||
relevant specification and their GmSSL equivalents. It should be noted,
|
||
that several cipher suite names do not include the authentication used,
|
||
e.g. DES-CBC3-SHA. In these cases, RSA authentication is used.
|
||
|
||
=head2 SSL v3.0 cipher suites
|
||
|
||
SSL_RSA_WITH_NULL_MD5 NULL-MD5
|
||
SSL_RSA_WITH_NULL_SHA NULL-SHA
|
||
SSL_RSA_WITH_RC4_128_MD5 RC4-MD5
|
||
SSL_RSA_WITH_RC4_128_SHA RC4-SHA
|
||
SSL_RSA_WITH_IDEA_CBC_SHA IDEA-CBC-SHA
|
||
SSL_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA
|
||
|
||
SSL_DH_DSS_WITH_3DES_EDE_CBC_SHA DH-DSS-DES-CBC3-SHA
|
||
SSL_DH_RSA_WITH_3DES_EDE_CBC_SHA DH-RSA-DES-CBC3-SHA
|
||
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA DHE-DSS-DES-CBC3-SHA
|
||
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA
|
||
|
||
SSL_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5
|
||
SSL_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA
|
||
|
||
SSL_FORTEZZA_KEA_WITH_NULL_SHA Not implemented.
|
||
SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA Not implemented.
|
||
SSL_FORTEZZA_KEA_WITH_RC4_128_SHA Not implemented.
|
||
|
||
=head2 TLS v1.0 cipher suites
|
||
|
||
TLS_RSA_WITH_NULL_MD5 NULL-MD5
|
||
TLS_RSA_WITH_NULL_SHA NULL-SHA
|
||
TLS_RSA_WITH_RC4_128_MD5 RC4-MD5
|
||
TLS_RSA_WITH_RC4_128_SHA RC4-SHA
|
||
TLS_RSA_WITH_IDEA_CBC_SHA IDEA-CBC-SHA
|
||
TLS_RSA_WITH_3DES_EDE_CBC_SHA DES-CBC3-SHA
|
||
|
||
TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA Not implemented.
|
||
TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA Not implemented.
|
||
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA DHE-DSS-DES-CBC3-SHA
|
||
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA DHE-RSA-DES-CBC3-SHA
|
||
|
||
TLS_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5
|
||
TLS_DH_anon_WITH_3DES_EDE_CBC_SHA ADH-DES-CBC3-SHA
|
||
|
||
=head2 AES ciphersuites from RFC3268, extending TLS v1.0
|
||
|
||
TLS_RSA_WITH_AES_128_CBC_SHA AES128-SHA
|
||
TLS_RSA_WITH_AES_256_CBC_SHA AES256-SHA
|
||
|
||
TLS_DH_DSS_WITH_AES_128_CBC_SHA DH-DSS-AES128-SHA
|
||
TLS_DH_DSS_WITH_AES_256_CBC_SHA DH-DSS-AES256-SHA
|
||
TLS_DH_RSA_WITH_AES_128_CBC_SHA DH-RSA-AES128-SHA
|
||
TLS_DH_RSA_WITH_AES_256_CBC_SHA DH-RSA-AES256-SHA
|
||
|
||
TLS_DHE_DSS_WITH_AES_128_CBC_SHA DHE-DSS-AES128-SHA
|
||
TLS_DHE_DSS_WITH_AES_256_CBC_SHA DHE-DSS-AES256-SHA
|
||
TLS_DHE_RSA_WITH_AES_128_CBC_SHA DHE-RSA-AES128-SHA
|
||
TLS_DHE_RSA_WITH_AES_256_CBC_SHA DHE-RSA-AES256-SHA
|
||
|
||
TLS_DH_anon_WITH_AES_128_CBC_SHA ADH-AES128-SHA
|
||
TLS_DH_anon_WITH_AES_256_CBC_SHA ADH-AES256-SHA
|
||
|
||
=head2 Camellia ciphersuites from RFC4132, extending TLS v1.0
|
||
|
||
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA CAMELLIA128-SHA
|
||
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA CAMELLIA256-SHA
|
||
|
||
TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA DH-DSS-CAMELLIA128-SHA
|
||
TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA DH-DSS-CAMELLIA256-SHA
|
||
TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA DH-RSA-CAMELLIA128-SHA
|
||
TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA DH-RSA-CAMELLIA256-SHA
|
||
|
||
TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA DHE-DSS-CAMELLIA128-SHA
|
||
TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA DHE-DSS-CAMELLIA256-SHA
|
||
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA DHE-RSA-CAMELLIA128-SHA
|
||
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA DHE-RSA-CAMELLIA256-SHA
|
||
|
||
TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA ADH-CAMELLIA128-SHA
|
||
TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA ADH-CAMELLIA256-SHA
|
||
|
||
=head2 SEED ciphersuites from RFC4162, extending TLS v1.0
|
||
|
||
TLS_RSA_WITH_SEED_CBC_SHA SEED-SHA
|
||
|
||
TLS_DH_DSS_WITH_SEED_CBC_SHA DH-DSS-SEED-SHA
|
||
TLS_DH_RSA_WITH_SEED_CBC_SHA DH-RSA-SEED-SHA
|
||
|
||
TLS_DHE_DSS_WITH_SEED_CBC_SHA DHE-DSS-SEED-SHA
|
||
TLS_DHE_RSA_WITH_SEED_CBC_SHA DHE-RSA-SEED-SHA
|
||
|
||
TLS_DH_anon_WITH_SEED_CBC_SHA ADH-SEED-SHA
|
||
|
||
=head2 GOST ciphersuites from draft-chudov-cryptopro-cptls, extending TLS v1.0
|
||
|
||
Note: these ciphers require an engine which including GOST cryptographic
|
||
algorithms, such as the B<ccgost> engine, included in the GmSSL distribution.
|
||
|
||
TLS_GOSTR341094_WITH_28147_CNT_IMIT GOST94-GOST89-GOST89
|
||
TLS_GOSTR341001_WITH_28147_CNT_IMIT GOST2001-GOST89-GOST89
|
||
TLS_GOSTR341094_WITH_NULL_GOSTR3411 GOST94-NULL-GOST94
|
||
TLS_GOSTR341001_WITH_NULL_GOSTR3411 GOST2001-NULL-GOST94
|
||
|
||
=head2 Additional Export 1024 and other cipher suites
|
||
|
||
Note: these ciphers can also be used in SSL v3.
|
||
|
||
TLS_DHE_DSS_WITH_RC4_128_SHA DHE-DSS-RC4-SHA
|
||
|
||
=head2 Elliptic curve cipher suites.
|
||
|
||
TLS_ECDHE_RSA_WITH_NULL_SHA ECDHE-RSA-NULL-SHA
|
||
TLS_ECDHE_RSA_WITH_RC4_128_SHA ECDHE-RSA-RC4-SHA
|
||
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ECDHE-RSA-DES-CBC3-SHA
|
||
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ECDHE-RSA-AES128-SHA
|
||
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ECDHE-RSA-AES256-SHA
|
||
|
||
TLS_ECDHE_ECDSA_WITH_NULL_SHA ECDHE-ECDSA-NULL-SHA
|
||
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ECDHE-ECDSA-RC4-SHA
|
||
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ECDHE-ECDSA-DES-CBC3-SHA
|
||
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDHE-ECDSA-AES128-SHA
|
||
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ECDHE-ECDSA-AES256-SHA
|
||
|
||
TLS_ECDH_anon_WITH_NULL_SHA AECDH-NULL-SHA
|
||
TLS_ECDH_anon_WITH_RC4_128_SHA AECDH-RC4-SHA
|
||
TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA AECDH-DES-CBC3-SHA
|
||
TLS_ECDH_anon_WITH_AES_128_CBC_SHA AECDH-AES128-SHA
|
||
TLS_ECDH_anon_WITH_AES_256_CBC_SHA AECDH-AES256-SHA
|
||
|
||
=head2 TLS v1.2 cipher suites
|
||
|
||
TLS_RSA_WITH_NULL_SHA256 NULL-SHA256
|
||
|
||
TLS_RSA_WITH_AES_128_CBC_SHA256 AES128-SHA256
|
||
TLS_RSA_WITH_AES_256_CBC_SHA256 AES256-SHA256
|
||
TLS_RSA_WITH_AES_128_GCM_SHA256 AES128-GCM-SHA256
|
||
TLS_RSA_WITH_AES_256_GCM_SHA384 AES256-GCM-SHA384
|
||
|
||
TLS_DH_RSA_WITH_AES_128_CBC_SHA256 DH-RSA-AES128-SHA256
|
||
TLS_DH_RSA_WITH_AES_256_CBC_SHA256 DH-RSA-AES256-SHA256
|
||
TLS_DH_RSA_WITH_AES_128_GCM_SHA256 DH-RSA-AES128-GCM-SHA256
|
||
TLS_DH_RSA_WITH_AES_256_GCM_SHA384 DH-RSA-AES256-GCM-SHA384
|
||
|
||
TLS_DH_DSS_WITH_AES_128_CBC_SHA256 DH-DSS-AES128-SHA256
|
||
TLS_DH_DSS_WITH_AES_256_CBC_SHA256 DH-DSS-AES256-SHA256
|
||
TLS_DH_DSS_WITH_AES_128_GCM_SHA256 DH-DSS-AES128-GCM-SHA256
|
||
TLS_DH_DSS_WITH_AES_256_GCM_SHA384 DH-DSS-AES256-GCM-SHA384
|
||
|
||
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 DHE-RSA-AES128-SHA256
|
||
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 DHE-RSA-AES256-SHA256
|
||
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 DHE-RSA-AES128-GCM-SHA256
|
||
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 DHE-RSA-AES256-GCM-SHA384
|
||
|
||
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 DHE-DSS-AES128-SHA256
|
||
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 DHE-DSS-AES256-SHA256
|
||
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 DHE-DSS-AES128-GCM-SHA256
|
||
TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 DHE-DSS-AES256-GCM-SHA384
|
||
|
||
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ECDHE-RSA-AES128-SHA256
|
||
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ECDHE-RSA-AES256-SHA384
|
||
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ECDHE-RSA-AES128-GCM-SHA256
|
||
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ECDHE-RSA-AES256-GCM-SHA384
|
||
|
||
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ECDHE-ECDSA-AES128-SHA256
|
||
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ECDHE-ECDSA-AES256-SHA384
|
||
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDHE-ECDSA-AES128-GCM-SHA256
|
||
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ECDHE-ECDSA-AES256-GCM-SHA384
|
||
|
||
TLS_DH_anon_WITH_AES_128_CBC_SHA256 ADH-AES128-SHA256
|
||
TLS_DH_anon_WITH_AES_256_CBC_SHA256 ADH-AES256-SHA256
|
||
TLS_DH_anon_WITH_AES_128_GCM_SHA256 ADH-AES128-GCM-SHA256
|
||
TLS_DH_anon_WITH_AES_256_GCM_SHA384 ADH-AES256-GCM-SHA384
|
||
|
||
RSA_WITH_AES_128_CCM AES128-CCM
|
||
RSA_WITH_AES_256_CCM AES256-CCM
|
||
DHE_RSA_WITH_AES_128_CCM DHE-RSA-AES128-CCM
|
||
DHE_RSA_WITH_AES_256_CCM DHE-RSA-AES256-CCM
|
||
RSA_WITH_AES_128_CCM_8 AES128-CCM8
|
||
RSA_WITH_AES_256_CCM_8 AES256-CCM8
|
||
DHE_RSA_WITH_AES_128_CCM_8 DHE-RSA-AES128-CCM8
|
||
DHE_RSA_WITH_AES_256_CCM_8 DHE-RSA-AES256-CCM8
|
||
ECDHE_ECDSA_WITH_AES_128_CCM ECDHE-ECDSA-AES128-CCM
|
||
ECDHE_ECDSA_WITH_AES_256_CCM ECDHE-ECDSA-AES256-CCM
|
||
ECDHE_ECDSA_WITH_AES_128_CCM_8 ECDHE-ECDSA-AES128-CCM8
|
||
ECDHE_ECDSA_WITH_AES_256_CCM_8 ECDHE-ECDSA-AES256-CCM8
|
||
|
||
=head2 Camellia HMAC-Based ciphersuites from RFC6367, extending TLS v1.2
|
||
|
||
TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 ECDHE-ECDSA-CAMELLIA128-SHA256
|
||
TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 ECDHE-ECDSA-CAMELLIA256-SHA384
|
||
TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 ECDHE-RSA-CAMELLIA128-SHA256
|
||
TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 ECDHE-RSA-CAMELLIA256-SHA384
|
||
|
||
=head2 Pre-shared keying (PSK) ciphersuites
|
||
|
||
PSK_WITH_NULL_SHA PSK-NULL-SHA
|
||
DHE_PSK_WITH_NULL_SHA DHE-PSK-NULL-SHA
|
||
RSA_PSK_WITH_NULL_SHA RSA-PSK-NULL-SHA
|
||
|
||
PSK_WITH_RC4_128_SHA PSK-RC4-SHA
|
||
PSK_WITH_3DES_EDE_CBC_SHA PSK-3DES-EDE-CBC-SHA
|
||
PSK_WITH_AES_128_CBC_SHA PSK-AES128-CBC-SHA
|
||
PSK_WITH_AES_256_CBC_SHA PSK-AES256-CBC-SHA
|
||
|
||
DHE_PSK_WITH_RC4_128_SHA DHE-PSK-RC4-SHA
|
||
DHE_PSK_WITH_3DES_EDE_CBC_SHA DHE-PSK-3DES-EDE-CBC-SHA
|
||
DHE_PSK_WITH_AES_128_CBC_SHA DHE-PSK-AES128-CBC-SHA
|
||
DHE_PSK_WITH_AES_256_CBC_SHA DHE-PSK-AES256-CBC-SHA
|
||
|
||
RSA_PSK_WITH_RC4_128_SHA RSA-PSK-RC4-SHA
|
||
RSA_PSK_WITH_3DES_EDE_CBC_SHA RSA-PSK-3DES-EDE-CBC-SHA
|
||
RSA_PSK_WITH_AES_128_CBC_SHA RSA-PSK-AES128-CBC-SHA
|
||
RSA_PSK_WITH_AES_256_CBC_SHA RSA-PSK-AES256-CBC-SHA
|
||
|
||
PSK_WITH_AES_128_GCM_SHA256 PSK-AES128-GCM-SHA256
|
||
PSK_WITH_AES_256_GCM_SHA384 PSK-AES256-GCM-SHA384
|
||
DHE_PSK_WITH_AES_128_GCM_SHA256 DHE-PSK-AES128-GCM-SHA256
|
||
DHE_PSK_WITH_AES_256_GCM_SHA384 DHE-PSK-AES256-GCM-SHA384
|
||
RSA_PSK_WITH_AES_128_GCM_SHA256 RSA-PSK-AES128-GCM-SHA256
|
||
RSA_PSK_WITH_AES_256_GCM_SHA384 RSA-PSK-AES256-GCM-SHA384
|
||
|
||
PSK_WITH_AES_128_CBC_SHA256 PSK-AES128-CBC-SHA256
|
||
PSK_WITH_AES_256_CBC_SHA384 PSK-AES256-CBC-SHA384
|
||
PSK_WITH_NULL_SHA256 PSK-NULL-SHA256
|
||
PSK_WITH_NULL_SHA384 PSK-NULL-SHA384
|
||
DHE_PSK_WITH_AES_128_CBC_SHA256 DHE-PSK-AES128-CBC-SHA256
|
||
DHE_PSK_WITH_AES_256_CBC_SHA384 DHE-PSK-AES256-CBC-SHA384
|
||
DHE_PSK_WITH_NULL_SHA256 DHE-PSK-NULL-SHA256
|
||
DHE_PSK_WITH_NULL_SHA384 DHE-PSK-NULL-SHA384
|
||
RSA_PSK_WITH_AES_128_CBC_SHA256 RSA-PSK-AES128-CBC-SHA256
|
||
RSA_PSK_WITH_AES_256_CBC_SHA384 RSA-PSK-AES256-CBC-SHA384
|
||
RSA_PSK_WITH_NULL_SHA256 RSA-PSK-NULL-SHA256
|
||
RSA_PSK_WITH_NULL_SHA384 RSA-PSK-NULL-SHA384
|
||
PSK_WITH_AES_128_GCM_SHA256 PSK-AES128-GCM-SHA256
|
||
PSK_WITH_AES_256_GCM_SHA384 PSK-AES256-GCM-SHA384
|
||
|
||
ECDHE_PSK_WITH_RC4_128_SHA ECDHE-PSK-RC4-SHA
|
||
ECDHE_PSK_WITH_3DES_EDE_CBC_SHA ECDHE-PSK-3DES-EDE-CBC-SHA
|
||
ECDHE_PSK_WITH_AES_128_CBC_SHA ECDHE-PSK-AES128-CBC-SHA
|
||
ECDHE_PSK_WITH_AES_256_CBC_SHA ECDHE-PSK-AES256-CBC-SHA
|
||
ECDHE_PSK_WITH_AES_128_CBC_SHA256 ECDHE-PSK-AES128-CBC-SHA256
|
||
ECDHE_PSK_WITH_AES_256_CBC_SHA384 ECDHE-PSK-AES256-CBC-SHA384
|
||
ECDHE_PSK_WITH_NULL_SHA ECDHE-PSK-NULL-SHA
|
||
ECDHE_PSK_WITH_NULL_SHA256 ECDHE-PSK-NULL-SHA256
|
||
ECDHE_PSK_WITH_NULL_SHA384 ECDHE-PSK-NULL-SHA384
|
||
|
||
PSK_WITH_CAMELLIA_128_CBC_SHA256 PSK-CAMELLIA128-SHA256
|
||
PSK_WITH_CAMELLIA_256_CBC_SHA384 PSK-CAMELLIA256-SHA384
|
||
|
||
DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 DHE-PSK-CAMELLIA128-SHA256
|
||
DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 DHE-PSK-CAMELLIA256-SHA384
|
||
|
||
RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 RSA-PSK-CAMELLIA128-SHA256
|
||
RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 RSA-PSK-CAMELLIA256-SHA384
|
||
|
||
ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 ECDHE-PSK-CAMELLIA128-SHA256
|
||
ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 ECDHE-PSK-CAMELLIA256-SHA384
|
||
|
||
PSK_WITH_AES_128_CCM PSK-AES128-CCM
|
||
PSK_WITH_AES_256_CCM PSK-AES256-CCM
|
||
DHE_PSK_WITH_AES_128_CCM DHE-PSK-AES128-CCM
|
||
DHE_PSK_WITH_AES_256_CCM DHE-PSK-AES256-CCM
|
||
PSK_WITH_AES_128_CCM_8 PSK-AES128-CCM8
|
||
PSK_WITH_AES_256_CCM_8 PSK-AES256-CCM8
|
||
DHE_PSK_WITH_AES_128_CCM_8 DHE-PSK-AES128-CCM8
|
||
DHE_PSK_WITH_AES_256_CCM_8 DHE-PSK-AES256-CCM8
|
||
|
||
=head2 ChaCha20-Poly1305 cipher suites, extending TLS v1.2
|
||
|
||
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ECDHE-RSA-CHACHA20-POLY1305
|
||
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ECDHE-ECDSA-CHACHA20-POLY1305
|
||
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 DHE-RSA-CHACHA20-POLY1305
|
||
TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 PSK-CHACHA20-POLY1305
|
||
TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 ECDHE-PSK-CHACHA20-POLY1305
|
||
TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 DHE-PSK-CHACHA20-POLY1305
|
||
TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256 RSA-PSK-CHACHA20-POLY1305
|
||
|
||
=head2 Older names used by GmSSL
|
||
|
||
The following names are accepted by older releases:
|
||
|
||
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA EDH-RSA-DES-CBC3-SHA (DHE-RSA-DES-CBC3-SHA)
|
||
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA EDH-DSS-DES-CBC3-SHA (DHE-DSS-DES-CBC3-SHA)
|
||
|
||
=head1 NOTES
|
||
|
||
Some compiled versions of GmSSL may not include all the ciphers
|
||
listed here because some ciphers were excluded at compile time.
|
||
|
||
=head1 EXAMPLES
|
||
|
||
Verbose listing of all GmSSL ciphers including NULL ciphers:
|
||
|
||
gmssl ciphers -v 'ALL:eNULL'
|
||
|
||
Include all ciphers except NULL and anonymous DH then sort by
|
||
strength:
|
||
|
||
gmssl ciphers -v 'ALL:!ADH:@STRENGTH'
|
||
|
||
Include all ciphers except ones with no encryption (eNULL) or no
|
||
authentication (aNULL):
|
||
|
||
gmssl ciphers -v 'ALL:!aNULL'
|
||
|
||
Include only 3DES ciphers and then place RSA ciphers last:
|
||
|
||
gmssl ciphers -v '3DES:+RSA'
|
||
|
||
Include all RC4 ciphers but leave out those without authentication:
|
||
|
||
gmssl ciphers -v 'RC4:!COMPLEMENTOFDEFAULT'
|
||
|
||
Include all ciphers with RSA authentication but leave out ciphers without
|
||
encryption.
|
||
|
||
gmssl ciphers -v 'RSA:!COMPLEMENTOFALL'
|
||
|
||
Set security level to 2 and display all ciphers consistent with level 2:
|
||
|
||
gmssl ciphers -s -v 'ALL:@SECLEVEL=2'
|
||
|
||
=head1 SEE ALSO
|
||
|
||
L<s_client(1)>, L<s_server(1)>, L<ssl(7)>
|
||
|
||
=head1 HISTORY
|
||
|
||
The B<-V> option for the B<ciphers> command was added in GmSSL 1.0.0.
|
||
|
||
=head1 COPYRIGHT
|
||
|
||
Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved.
|
||
|
||
Licensed under the GmSSL license (the "License"). You may not use
|
||
this file except in compliance with the License. You can obtain a copy
|
||
in the file LICENSE in the source distribution or at
|
||
L<https://www.openssl.org/source/license.html>.
|
||
|
||
=cut
|