ssl_cipher

DATA TYPES

cipher() = null | rc4_128 | idea_cbc | des40_cbc | des_cbc | '3des_ede_cbc' | aes_128_cbc | aes_256_cbc
cipher_enum() = integer()
cipher_suite() = binary()
erl_cipher_suite() = {key_algo(), cipher(), hash()}
hash() = null | sha | md5 | sha224 | sha256 | sha384 | sha512
int_cipher_suite() = {key_algo(), cipher(), hash(), hash() | default_prf}
key_algo() = null | rsa | dhe_rsa | dhe_dss | ecdhe_ecdsa | ecdh_ecdsa | ecdh_rsa | srp_rsa | srp_dss | psk | dhe_psk | rsa_psk | dh_anon | ecdh_anon | srp_anon
openssl_cipher_suite() = string()
tls_version() = {integer(), integer()}

Functions


security_parameters(CipherSuite::cipher_suite(), Security_parameters::#security_parameters{}) -> #security_parameters{}

security_parameters(Version::tls_version() | undefined, CipherSuite::cipher_suite(), Security_parameters::#security_parameters{}) -> #security_parameters{}

cipher(X1::cipher_enum(), Cipher_state::#cipher_state{}, Mac::binary(), Fragment::iolist(), Version::tls_version()) -> {binary(), #cipher_state{}}

decipher(X1::cipher_enum(), HashSz::integer(), Cipher_state::#cipher_state{}, Fragment::binary(), Version::tls_version()) -> {binary(), binary(), #cipher_state{}} | #alert{}

suites(X1::tls_version()) -> [cipher_suite()]

anonymous_suites() -> [cipher_suite()]

psk_suites(N::tls_version() | integer()) -> [cipher_suite()]

srp_suites() -> [cipher_suite()]

suite_definition(X1::cipher_suite()) -> int_cipher_suite()

suite(X1::erl_cipher_suite()) -> cipher_suite()

openssl_suite(X1::openssl_cipher_suite()) -> cipher_suite()

openssl_suite_name(Cipher::cipher_suite()) -> openssl_cipher_suite()

filter(DerCert::undefined | binary(), Ciphers::[cipher_suite()]) -> [cipher_suite()]

filter_suites(Suites::[cipher_suite()]) -> [cipher_suite()]

is_acceptable_hash(Hash, Algos) -> term()

hash_algorithm(X1) -> term()

sign_algorithm(X1) -> term()

ec_keyed_suites() -> term()