• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.10.1/OpenSSL098-52/src/ssl/

Lines Matching defs:cipher

113  * ECC cipher suite support in OpenSSL originally developed by 
164 SSL_CIPHER *cipher;
174 /* TODO: COMPLEMENT OF ALL and COMPLEMENT OF DEFAULT do not have ECC cipher suites handled properly. */
299 c=s->cipher;
504 co_list[co_list_num].cipher = c;
552 *ca_curr = ciph_curr->cipher;
560 * supported (not match any bit in mask) or represent a cipher
601 cp = curr->cipher;
603 /* If explicit cipher suite, match only that one for its own protocol version.
627 * cipher or not all of the bits were met, the
642 /* add the cipher if it has not been added yet. */
665 /* Move the added cipher to this location */
714 (curr->cipher->strength_bits > max_strength_bits))
715 max_strength_bits = curr->cipher->strength_bits;
734 number_uses[curr->cipher->strength_bits]++;
835 * Now search for the cipher alias in the ca_list. Be careful
837 * will make the rule "ADH:SOME" and the cipher
839 * So additionally check whether the cipher name found
978 * We also need cipher aliases for selecting based on the rule_str.
981 * For 1) we need the available ciphers and for 2) the cipher
1035 * The cipher selection for the list is done. The ciphers are added
1041 if (curr->active && (!FIPS_mode() || curr->cipher->algo_strength & SSL_FIPS))
1046 sk_SSL_CIPHER_push(cipherstack, curr->cipher);
1048 printf("<%s>\n",curr->cipher->name);
1072 char *SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len)
1084 alg=cipher->algorithms;
1085 alg2=cipher->algorithm2;
1087 is_export=SSL_C_IS_EXPORT(cipher);
1088 pkl=SSL_C_EXPORT_PKEYLENGTH(cipher);
1089 kl=SSL_C_EXPORT_KEYLENGTH(cipher);
1180 switch(cipher->strength_bits)
1189 switch(cipher->strength_bits)
1228 BIO_snprintf(buf,len,format,cipher->name,ver,kx,au,enc,mac,exp_str,alg);
1230 BIO_snprintf(buf,len,format,cipher->name,ver,kx,au,enc,mac,exp_str);
1249 /* return the actual cipher being used */
1257 /* number of bits for symmetric cipher */