Lines Matching defs:cipher

113  * ECC cipher suite support in OpenSSL originally developed by
222 const SSL_CIPHER *cipher;
496 c = s->cipher;
827 co_list[co_list_num].cipher = c;
890 *ca_curr = ciph_curr->cipher;
899 * or represent a cipher strength value (will be added in any case because algorithms=0).
983 cp = curr->cipher;
1028 /* add the cipher if it has not been added yet. */
1036 /* Move the added cipher to this location */
1089 if (curr->active && (curr->cipher->strength_bits > max_strength_bits))
1090 max_strength_bits = curr->cipher->strength_bits;
1107 number_uses[curr->cipher->strength_bits]++;
1212 * Now search for the cipher alias in the ca_list. Be careful
1214 * will make the rule "ADH:SOME" and the cipher
1216 * So additionally check whether the cipher name found
1431 /* AES is our preferred symmetric cipher */
1481 * We also need cipher aliases for selecting based on the rule_str.
1484 * For 1) we need the available ciphers and for 2) the cipher
1534 * The cipher selection for the list is done. The ciphers are added
1540 && (!FIPS_mode() || curr->cipher->algo_strength & SSL_FIPS))
1545 sk_SSL_CIPHER_push(cipherstack, curr->cipher);
1547 fprintf(stderr, "<%s>\n", curr->cipher->name);
1571 char *SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len)
1585 alg_mkey = cipher->algorithm_mkey;
1586 alg_auth = cipher->algorithm_auth;
1587 alg_enc = cipher->algorithm_enc;
1588 alg_mac = cipher->algorithm_mac;
1589 alg_ssl = cipher->algorithm_ssl;
1591 alg2 = cipher->algorithm2;
1593 is_export = SSL_C_IS_EXPORT(cipher);
1594 pkl = SSL_C_EXPORT_PKEYLENGTH(cipher);
1595 kl = SSL_C_EXPORT_KEYLENGTH(cipher);
1769 BIO_snprintf(buf, len, format, cipher->name, ver, kx, au, enc, mac,
1772 BIO_snprintf(buf, len, format, cipher->name, ver, kx, au, enc, mac,
1793 /* return the actual cipher being used */
1801 /* number of bits for symmetric cipher */