https://man.openbsd.org/SSL_CTX_set_cipher_list.3#ECDHE

SSL_CTX_set_cipher_list() sets the list of available cipher suites for ctx using the control string. The list of cipher suites is inherited by all ssl objects created from ctx.

SSL_set_cipher_list() sets the list of cipher suites only for ssl.

The control string consists of one or more control words separated by colon characters (‘:’). Space (‘ ’), semicolon (‘;’), and comma (‘,’) characters can also be used as separators. Each control words selects a set of cipher suites and can take one of the following optional prefix characters:

No prefix:
Those of the selected cipher suites that have not been made available yet are added to the end of the list of available cipher suites, preserving their order.
Prefixed minus sign (‘-’):
Those of the selected cipher suites that have been made available earlier are moved back from the list of available cipher suites to the beginning of the list of unavailable cipher suites, also preserving their order.
Prefixed plus sign (‘+’):
Those of the selected cipher suites have been made available earlier are moved to end of the list of available cipher suites, reducing their priority, but preserving the order among themselves.
Prefixed exclamation mark (‘!’):
The selected cipher suites are permanently deleted, no matter whether they had earlier been made available or not, and can no longer be added or re-added by later words.

The following special words can only be used without a prefix:

DEFAULT
An alias for ALL:!aNULL:!eNULL. It can only be used as the first word.
@STRENGTH
Sort the list by decreasing encryption strength, preserving the order of cipher suites that have the same strength. It is usally given as the last word.

The following words can be used to select groups of cipher suites, with or without a prefix character. If two or more of these words are joined with plus signs (‘+’) to form a longer word, only the intersection of the specified sets is selected.

ADH
Cipher suites using ephemeral DH for key exchange without doing any server authentication. Equivalent to kEDH+aNULL.
aDSS
Cipher suites using DSS server authentication. LibreSSL does not provide any such cipher suites.
AEAD
Cipher suites using Authenticated Encryption with Additional Data.
AECDH
Cipher suites using ephemeral ECDH for key exchange without doing any server authentication. Equivalent to kEECDH+aNULL.
aECDSA
Cipher suites using ECDSA server authentication.
AES
Cipher suites using AES or AESGCM for symmetric encryption.
AES128
Cipher suites using AES(128) or AESGCM(128) for symmetric encryption.
AES256
Cipher suites using AES(256) or AESGCM(256) for symmetric encryption.
AESGCM
Cipher suites using AESGCM for symmetric encryption.
aGOST
An alias for aGOST01.
aGOST01
Cipher suites using GOST R 34.10-2001 server authentication.
ALL
All cipher suites except those selected by eNULL.
aNULL
Cipher suites that don't do any server authentication. Not enabled by DEFAULT. Beware of man-in-the-middle attacks.
aRSA
Cipher suites using RSA server authentication.
CAMELLIA
Cipher suites using Camellia for symmetric encryption.
CAMELLIA128
Cipher suites using Camellia(128) for symmetric encryption.
CAMELLIA256
Cipher suites using Camellia(256) for symmetric encryption.
CHACHA20
Cipher suites using ChaCha20-Poly1305 for symmetric encryption.
COMPLEMENTOFALL
Cipher suites that are not included in ALL. Currently an alias for eNULL.
COMPLEMENTOFDEFAULT
Cipher suites that are included in ALL, but not included in DEFAULT. Currently similar to aNULL:!eNULL except for the order of the cipher suites which are not selected.
DES
Cipher suites using single DES for symmetric encryption.
3DES
Cipher suites using triple DES for symmetric encryption.
DH
An alias for kEDH.
DHE
Cipher suites using ephemeral DH for key exchange, but excluding those that don't do any server authentication. Similar to kEDH:!aNULL except for the order of the cipher suites which are not selected.
DSS
An alias for aDSS.
ECDH
An alias for kEECHD.
ECDHE
Cipher suites using ephemeral ECDH for key exchange, but excluding those that don't do any server authentication. Similar to kEECDH:!aNULL except for the order of the cipher suites which are not selected.
ECDSA
An alias for aECDSA.
EDH
An alias for DHE.
EECHD
An alias for ECDHE.
eNULL
Cipher suites that do not use any encryption. Not enabled by DEFAULT, and not even included in ALL.
GOST89MAC
Cipher suites using GOST 28147-89 for message authentication instead of HMAC.
GOST94
Cipher suites using HMAC based on GOST R 34.11-94 for message authentication.
HIGH
Cipher suites of high strength. Currently, these are cipher suites using CHACHA20, AES, CAMELLIA, or GOST-28178-89-CNT symmetric encryption.
IDEA
Cipher suites using IDEA for symmetric encryption. LibreSSL does not provide any such cipher suites.
kEDH
Cipher suites using ephemeral DH for key exchange.
kEECDH
Cipher suites using ephemeral ECDH for key exchange.
kGOST
Cipher suites using VKO 34.10 key exchange, specified in RFC 4357.
kRSA
Cipher suites using RSA key exchange.
LOW
Cipher suites of low strength. Currently, these are cipher suites using DES or RC4 symmetric encryption.
MD5
Cipher suites using MD5 for message authentication.
MEDIUM
Cipher suites of medium strength. Currently, these are cipher suites using 3DES symmetric encryption.
NULL
An alias for eNULL.
RC4
Cipher suites using RC4 for symmetric encryption.
RSA
Cipher suites using RSA for both key exchange and server authentication. Equivalent to kRSA+aRSA.
SHA
An alias for SHA1.
SHA1
Cipher suites using SHA1 for message authentication.
SHA256
Cipher suites using SHA256 for message authentication.
SHA384
Cipher suites using SHA384 for message authentication.
SSLv3
An alias for TLSv1.
STREEBOG256
Cipher suites using STREEBOG256 for message authentication.
TLSv1
Cipher suites usable with any TLS protocol.
TLSv1.2
Cipher suites for the TLSv1.2 protocol.

The full words returned by the openssl(1) ciphers command can be used to select individual cipher suites.

Unknown words are silently ignored, selecting no cipher suites. Failure is only flagged if the control string contains invalid bytes or if no matching cipher suites are available at all.

On the client side, including a cipher suite into the list of available cipher suites is sufficient for using it. On the server side, all cipher suites have additional requirements. ADH ciphers don't need a certificate, but DH-parameters must have been set. All other cipher suites need a corresponding certificate and key.

A RSA cipher can only be chosen when an RSA certificate is available. RSA ciphers using DHE need a certificate and key and additional DH-parameters (see SSL_CTX_set_tmp_dh_callback(3)).

A DSA cipher can only be chosen when a DSA certificate is available. DSA ciphers always use DH key exchange and therefore need DH-parameters (see SSL_CTX_set_tmp_dh_callback(3)).

When these conditions are not met for any cipher suite in the list (for example, a client only supports export RSA ciphers with an asymmetric key length of 512 bits and the server is not configured to use temporary RSA keys), the “no shared cipher” (SSL_R_NO_SHARED_CIPHER) error is generated and the handshake will fail.

设置 cipher suite的更多相关文章

  1. 查看现有的 cipher suite

    openssl ciphers [-v] [-ssl2] [-ssl3] [-tls1] [cipherlist]

  2. testng执行多个suite

    由于testng.xml中只能设置一个<suite>标签,就无法创建多个测试集,通过<suite-files >标签可以实现允许多个测试集. 1.testng.xml中引入多个 ...

  3. Burp Suite的使用介绍

    在网上找了一篇关于Burp Suite的使用介绍,感觉写的基础的,下面就copy了,另外还有一篇<BurpSuite实战指南>的pdf是一位好心的“前辈”共享的https://www.gi ...

  4. HTTPS 互联网世界的安全基础

    近一年公司在努力推进全站的 HTTPS 化,作为负责应用系统的我们,在配合这个趋势的过程中,顺便也就想去搞清楚 HTTP 后面的这个 S 到底是个什么含义?有什么作用?带来了哪些影响?毕竟以前也就只是 ...

  5. https连接的前几毫秒发生了什么

    在讨论这个话题之前,先提几个问题: 为什么说https是安全的,安全在哪里? https是使用了证书保证它的安全的么? 为什么证书需要购买? 我们先来看https要解决什么问题 (手机读者推荐移步ht ...

  6. HTTPS 原理解析

    一 前言 在说HTTPS之前先说说什么是HTTP,HTTP就是我们平时浏览网页时候使用的一种协议.HTTP协议传输的数据都是未加密的,也就是明文的,因此使用HTTP协议传输隐私信息非常不安全.为了保证 ...

  7. HTTP 2.0的那些事

    转自:http://www.admin10000.com/document/9310.html 在我们所处的互联网世界中,HTTP协议算得上是使用最广泛的网络协议.最近http2.0的诞生使得它再次互 ...

  8. http2协议翻译(转)

    超文本传输协议版本 2 IETF HTTP2草案(draft-ietf-httpbis-http2-13) 摘要 本规范描述了一种优化的超文本传输协议(HTTP).HTTP/2通过引进报头字段压缩以及 ...

  9. iOS安全笔记

    这一篇文章, 加上里面链接的几篇文章(一个百度的, 两个阮一峰的), 全看完应该了解得差不多了 如何打造一个安全的App?这是每一个移动开发者必须面对的问题.在移动App开发领域,开发工程师对于安全方 ...

随机推荐

  1. python中的列表和元组都有哪些区别

    列表(list)和元组(tuple)的一些基础 list和tuple都是一个可以放置任意数据类型的有序集合,都是既可以存放数字.字符串.对象等 list和tuple都支持负索引 In [8]: num ...

  2. 是什么是递归?-[all]-[编程理论]

    递归是所有编程语言中,都会讨论到的一个问题. Content Of Table 递归的通俗认识 编程领域的抽象 一个最简单的示例 一点总结 栈溢出问题 本示例的一点拓展说明 ### 递归的通俗认识 编 ...

  3. thinkphp中array_diff运行无效 Invalid opcode 153/1/8

    经本人查证,发现是thinkPHP优化导致的与array_diff冲突.thinkPHP 报的错:Invalid opcode 153/1/8.有谁知道原理的,说说,让俺也明白.

  4. 【php】面向对象(五)

    一. 类型约束: a) 约束函数可传入的参数类型二. 类的遍历 a) Foreach b) 可以将类当中的所有成员属性遍历出来三. 关于操作类与对象的一些函数: a) 判断函数 i. Function ...

  5. 家庭记账本app进度之关于tap的相关操作1

    今天还主要学习关于怎样制作微信的先关的tap. 今天的主要成果是已经了解了相关的技术,以及相关的思路.代码经过一个下午的编写,基本接近尾声. 更详细的实验代码,以及相关的知识点将在明天完善后进行发表. ...

  6. 2059 - Authentication plugin 'caching_sha2_password' cannot be loaded dlope

    今天在mac上使用navicat连接mysql报错弄了一下午,各种查询踩坑,总算解决了. 即从mysql5.7版本之后,默认采用了caching_sha2_password验证方式,我用的mysql8 ...

  7. Javascript 获取随机颜色的几种方式

    先认识一下颜色值的表达方式 #FFFFFF,由6位16进制数组成.#FFFFFFFF,由8位16进制数组成,前6位表示颜色,后两位数表示透明度,数值越大,透明度越小.rgb(255,255,255), ...

  8. 2018蓝桥杯省赛(C/C++ C组)

    因进考场不让带优盘,顾想不起有些啥题了,静待更新吧! 再次强调C++最新标准,main函数必须指定返回类型为int,且返回值最好为0(人走的多了就是路了,有人偏返回999那也没办法) 1.大概是小明给 ...

  9. "文本加粗"组件:<b> —— 快应用组件库H-UI

     <import name="b" src="../Common/ui/h-ui/text/c_tag_b"></import> &l ...

  10. Python爬虫系列(四):Beautiful Soup解析HTML之把HTML转成Python对象

    在前几篇文章,我们学会了如何获取html文档内容,就是从url下载网页.今天开始,我们将讨论如何将html转成python对象,用python代码对文档进行分析. (牛小妹在学校折腾了好几天,也没把h ...