Searched refs:ciphers (Results 51 - 75 of 216) sorted by relevance

123456789

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/ssl/
H A Ds3_srvr.c806 STACK_OF(SSL_CIPHER) *ciphers=NULL;
968 if ((i > 0) && (ssl_bytes_to_cipher_list(s,p,i,&(ciphers))
982 printf("client sent %d ciphers\n",sk_num(ciphers));
984 for (i=0; i<sk_SSL_CIPHER_num(ciphers); i++)
986 c=sk_SSL_CIPHER_value(ciphers,i);
989 i,sk_num(ciphers),SSL_CIPHER_get_name(c));
1001 if (j == 0 && (s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && (sk_SSL_CIPHER_num(ciphers) == 1))
1008 c = sk_SSL_CIPHER_value(ciphers, 0);
1089 ciphers,
[all...]
H A Ds23_clnt.c258 STACK_OF(SSL_CIPHER) *ciphers;
260 ciphers = SSL_get_ciphers(s);
261 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++)
263 cipher = sk_SSL_CIPHER_value(ciphers, i);
373 /* no ciphers */
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/ssl/
H A Ds3_srvr.c915 STACK_OF(SSL_CIPHER) *ciphers = NULL;
1150 if (ssl_bytes_to_cipher_list(s, p, i, &(ciphers)) == NULL) {
1161 fprintf(stderr, "client sent %d ciphers\n",
1162 sk_SSL_CIPHER_num(ciphers));
1164 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) {
1165 c = sk_SSL_CIPHER_value(ciphers, i);
1168 i, sk_SSL_CIPHER_num(ciphers), SSL_CIPHER_get_name(c));
1181 && (sk_SSL_CIPHER_num(ciphers) == 1)) {
1189 c = sk_SSL_CIPHER_value(ciphers, 0);
1259 &s->session->master_key_length, ciphers,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/ssl/
H A Ds3_srvr.c915 STACK_OF(SSL_CIPHER) *ciphers = NULL;
1150 if (ssl_bytes_to_cipher_list(s, p, i, &(ciphers)) == NULL) {
1161 fprintf(stderr, "client sent %d ciphers\n",
1162 sk_SSL_CIPHER_num(ciphers));
1164 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) {
1165 c = sk_SSL_CIPHER_value(ciphers, i);
1168 i, sk_SSL_CIPHER_num(ciphers), SSL_CIPHER_get_name(c));
1181 && (sk_SSL_CIPHER_num(ciphers) == 1)) {
1189 c = sk_SSL_CIPHER_value(ciphers, 0);
1259 &s->session->master_key_length, ciphers,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/ssl/
H A Ds3_srvr.c806 STACK_OF(SSL_CIPHER) *ciphers=NULL;
968 if ((i > 0) && (ssl_bytes_to_cipher_list(s,p,i,&(ciphers))
982 printf("client sent %d ciphers\n",sk_num(ciphers));
984 for (i=0; i<sk_SSL_CIPHER_num(ciphers); i++)
986 c=sk_SSL_CIPHER_value(ciphers,i);
989 i,sk_num(ciphers),SSL_CIPHER_get_name(c));
1001 if (j == 0 && (s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && (sk_SSL_CIPHER_num(ciphers) == 1))
1008 c = sk_SSL_CIPHER_value(ciphers, 0);
1089 ciphers,
[all...]
H A Ds23_clnt.c258 STACK_OF(SSL_CIPHER) *ciphers;
260 ciphers = SSL_get_ciphers(s);
261 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++)
263 cipher = sk_SSL_CIPHER_value(ciphers, i);
373 /* no ciphers */
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/crypto/engine/
H A Deng_cryptodev.c143 } ciphers[] = { variable in typeref:struct:__anon5447
235 * Find out what ciphers /dev/crypto will let us have a session for.
254 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) {
255 if (ciphers[i].nid == NID_undef)
257 sess.cipher = ciphers[i].id;
258 sess.keylen = ciphers[i].keylen;
262 nids[count++] = ciphers[i].nid;
314 * Find the useable ciphers|digests from dev/crypto - this is the first
316 * can use for ciphers from this engine. We want to return
425 for (i = 0; ciphers[
[all...]
H A Deng_int.h167 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wpa_supplicant/src/crypto/
H A Dtls_internal.c435 u8 *ciphers)
439 return tlsv1_client_set_cipher_list(conn->client, ciphers);
443 return tlsv1_server_set_cipher_list(conn->server, ciphers);
434 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_none.c151 u8 *ciphers)
150 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wpa_supplicant/src/crypto/
H A Dtls_internal.c435 u8 *ciphers)
439 return tlsv1_client_set_cipher_list(conn->client, ciphers);
443 return tlsv1_server_set_cipher_list(conn->server, ciphers);
434 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_none.c151 u8 *ciphers)
150 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/engine/
H A Deng_cryptodev.c144 } ciphers[] = { variable in typeref:struct:__anon5090
281 * Find out what ciphers /dev/crypto will let us have a session for.
299 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) {
300 if (ciphers[i].nid == NID_undef)
302 sess.cipher = ciphers[i].id;
303 sess.keylen = ciphers[i].keylen;
307 nids[count++] = ciphers[i].nid;
358 * Find the useable ciphers|digests from dev/crypto - this is the first
360 * can use for ciphers from this engine. We want to return
468 for (i = 0; ciphers[
[all...]
H A Deng_int.h187 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/engine/
H A Deng_cryptodev.c143 } ciphers[] = { variable in typeref:struct:__anon6352
235 * Find out what ciphers /dev/crypto will let us have a session for.
254 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) {
255 if (ciphers[i].nid == NID_undef)
257 sess.cipher = ciphers[i].id;
258 sess.keylen = ciphers[i].keylen;
262 nids[count++] = ciphers[i].nid;
314 * Find the useable ciphers|digests from dev/crypto - this is the first
316 * can use for ciphers from this engine. We want to return
425 for (i = 0; ciphers[
[all...]
H A Deng_int.h167 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/engine/
H A Deng_cryptodev.c144 } ciphers[] = { variable in typeref:struct:__anon5995
281 * Find out what ciphers /dev/crypto will let us have a session for.
299 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) {
300 if (ciphers[i].nid == NID_undef)
302 sess.cipher = ciphers[i].id;
303 sess.keylen = ciphers[i].keylen;
307 nids[count++] = ciphers[i].nid;
358 * Find the useable ciphers|digests from dev/crypto - this is the first
360 * can use for ciphers from this engine. We want to return
468 for (i = 0; ciphers[
[all...]
H A Deng_int.h187 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/engine/
H A Deng_cryptodev.c143 } ciphers[] = { variable in typeref:struct:__anon40377
235 * Find out what ciphers /dev/crypto will let us have a session for.
254 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) {
255 if (ciphers[i].nid == NID_undef)
257 sess.cipher = ciphers[i].id;
258 sess.keylen = ciphers[i].keylen;
262 nids[count++] = ciphers[i].nid;
314 * Find the useable ciphers|digests from dev/crypto - this is the first
316 * can use for ciphers from this engine. We want to return
425 for (i = 0; ciphers[
[all...]
H A Deng_int.h167 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/engine/
H A Deng_cryptodev.c144 } ciphers[] = { variable in typeref:struct:__anon40020
281 * Find out what ciphers /dev/crypto will let us have a session for.
299 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) {
300 if (ciphers[i].nid == NID_undef)
302 sess.cipher = ciphers[i].id;
303 sess.keylen = ciphers[i].keylen;
307 nids[count++] = ciphers[i].nid;
358 * Find the useable ciphers|digests from dev/crypto - this is the first
360 * can use for ciphers from this engine. We want to return
468 for (i = 0; ciphers[
[all...]
H A Deng_int.h187 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/crypto/
H A Dtls_internal.c435 u8 *ciphers)
439 return tlsv1_client_set_cipher_list(conn->client, ciphers);
443 return tlsv1_server_set_cipher_list(conn->server, ciphers);
434 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_none.c151 u8 *ciphers)
150 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/ssl/
H A Ds23_clnt.c258 STACK_OF(SSL_CIPHER) *ciphers;
260 ciphers = SSL_get_ciphers(s);
261 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++)
263 cipher = sk_SSL_CIPHER_value(ciphers, i);
373 /* no ciphers */

Completed in 300 milliseconds

123456789