Searched refs:cipher (Results 126 - 150 of 169) sorted by relevance

1234567

/freebsd-10.0-release/crypto/openssl/apps/
H A Dreq.c181 const EVP_CIPHER *cipher=NULL; local
199 cipher=EVP_des_ede3_cbc();
746 cipher=NULL;
747 if (nodes) cipher=NULL;
751 if (!PEM_write_bio_PrivateKey(out,pkey,cipher,
H A Ds_client.c346 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
347 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n");
583 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local
904 else if (strcmp(*argv,"-cipher") == 0)
907 cipher= *(++argv);
1006 if (cipher)
1008 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
1011 cipher = "PSK";
1172 if (cipher !
[all...]
/freebsd-10.0-release/crypto/openssl/crypto/evp/
H A De_aes.c235 mode = ctx->cipher->flags & EVP_CIPH_MODE;
276 size_t bl = ctx->cipher->block_size;
502 mode = ctx->cipher->flags & EVP_CIPH_MODE;
592 size_t bl = ctx->cipher->block_size;
708 gctx->ivlen = c->cipher->iv_len;
/freebsd-10.0-release/crypto/openssl/ssl/
H A Dkssl.c1279 asn1ticket->encdata->cipher->length;
1281 calloc(1, asn1ticket->encdata->cipher->length)) == NULL)
1285 "Error allocating cipher in krb5ticket.\n");
1292 asn1ticket->encdata->cipher->data,
1293 asn1ticket->encdata->cipher->length);
2085 outl = dec_authent->cipher->length;
2086 if (!EVP_Cipher(&ciph_ctx,unenc_authent,dec_authent->cipher->data,outl))
H A Dssltest.c113 * ECC cipher suite support in OpenSSL originally developed by
298 static char *cipher=NULL; variable
360 fprintf(stderr," -cipher arg - The cipher list\n");
371 fprintf(stderr," -test_cipherlist - Verifies the order of the ssl cipher lists.\n"
382 BIO_printf(bio_stdout,"%s%s, cipher %s %s",
558 cipher = 0;
729 else if (strcmp(*argv,"-cipher") == 0)
732 cipher= *(++argv);
808 /* ensure that the cipher lis
[all...]
H A Ds2_srvr.c409 s->session->cipher= cp;
461 is_export=SSL_C_IS_EXPORT(s->session->cipher);
470 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
501 /* incorrect number of key bytes for non export cipher */
597 /* get session-id before cipher stuff so we can get out session
686 /* done cipher selection */
791 s2n(n,p); /* add cipher length */
H A Ds3_pkt.c711 clear=s->enc_write_ctx?0:1; /* must be AEAD cipher */
755 /* extra fragment would be couple of cipher blocks,
967 * Change cipher spec protocol
1166 (s->session != NULL) && (s->session->cipher != NULL))
1229 (s->session != NULL) && (s->session->cipher != NULL) &&
1329 /* Check we have a cipher to change to */
1487 s->session->cipher=s->s3->tmp.new_cipher;
H A Ds3_srvr.c120 * ECC cipher suite support in OpenSSL originally written by
463 * message only if the cipher suite is either
770 s->session->cipher=s->s3->tmp.new_cipher;
1124 /* we need a cipher if we are not resuming a session */
1143 /* If it is a hit, check that the cipher is in the list */
1147 id=s->session->cipher->id;
1172 /* Special case as client bug workaround: the previously used cipher may
1174 * continue using a cipher that before wasn't chosen due to server
1175 * preferences. We'll have to reject the connection if the cipher is not
1180 s->session->cipher
[all...]
H A Dssl_lib.c115 * ECC cipher suite support in OpenSSL originally developed by
207 * the old cipher. It is sort of a SSL_clear_lite :-) */
1285 * was unable to find a cipher matching the given rule string
1286 * (for example if the rule string specifies a cipher which
1752 /* ret->cipher=NULL;*/
2036 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) argument
2053 kl=SSL_C_EXPORT_PKEYLENGTH(cipher);
2163 * ECDSA cipher suites depending on the key usage extension.
2390 EVP_PKEY *ssl_get_sign_pkey(SSL *s,const SSL_CIPHER *cipher, const EVP_MD **pmd) argument
2396 alg_a = cipher
[all...]
H A Dd1_pkt.c745 * Change cipher spec protocol
1049 (s->session != NULL) && (s->session->cipher != NULL))
1581 (EVP_CIPHER_mode( s->enc_write_ctx->cipher ) & EVP_CIPH_CBC_MODE))
1582 bs = EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
H A Ds3_cbc.c74 * block_size: the block size of the cipher used to encrypt the record.
108 * block_size: the block size of the cipher used to encrypt the record.
158 if (EVP_CIPHER_flags(s->enc_read_ctx->cipher)&EVP_CIPH_FLAG_AEAD_CIPHER)
/freebsd-10.0-release/contrib/sendmail/cf/m4/
H A Dcfhead.m4275 define(`_REC_TLS_', `(version=${tls_version} cipher=${cipher} bits=${cipher_bits} verify=${verify})$.$?u')
305 define(`confMILTER_MACROS_HELO', ``{tls_version}, {cipher}, {cipher_bits}, {cert_subject}, {cert_issuer}'')
/freebsd-10.0-release/crypto/openssl/engines/ccgost/
H A Dgost_crypt.c6 * OpenSSL interface to GOST 28147-89 cipher functions *
34 /* set/get cipher parameters */
162 /* Sets cipher param from paramset NID. */
295 /*block cipher current iv */
305 /* Next iv is next block of cipher text*/
354 /*block cipher current iv */
389 /* Control function for gost cipher */
418 /* Set cipher parameters from ASN1 structure */
432 if (!ASN1_OCTET_STRING_set(gcp->iv, ctx->iv, ctx->cipher->iv_len))
485 if (len != ctx->cipher
[all...]
/freebsd-10.0-release/contrib/sendmail/cf/cf/
H A Dsubmit.cf567 (version=${tls_version} cipher=${cipher} bits=${cipher_bits} verify=${verify})$.$?u
/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Deap_server_fast.c439 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher "
546 char cipher[64]; local
550 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher))
552 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher "
557 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
/freebsd-10.0-release/contrib/wpa/src/tls/
H A Dtlsv1_record.c20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
22 * @cipher_suite: New cipher suite
25 * This function is used to prepare TLS record layer for cipher suite change.
36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
55 data = tls_get_cipher_data(suite->cipher);
68 * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher
70 * Returns: 0 on success (cipher changed), -1 on failure
72 * This function changes TLS record layer to use the new cipher suite
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
92 "cipher");
[all...]
/freebsd-10.0-release/crypto/openssh/
H A Dreadconf.c43 #include "cipher.h"
198 { "cipher", oCipher },
738 intptr = &options->cipher;
744 fatal("%.200s line %d: Bad cipher '%s'.",
755 fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.",
1275 options->cipher = -1;
1398 if (options->cipher == -1)
1399 options->cipher = SSH_CIPHER_NOT_SET;
H A Dssh-keygen.c394 char *type, *cipher; local
411 cipher = buffer_get_string(&b, NULL);
416 if (strcmp(cipher, "none") != 0) {
417 error("unsupported cipher %s", cipher);
418 free(cipher);
423 free(cipher);
/freebsd-10.0-release/crypto/openssl/crypto/cms/
H A Dcms_pwri.c109 kekciph = env->encryptedContentInfo->cipher;
123 /* Setup algorithm identifier for cipher */
378 /* Fixup cipher based on AlgorithmIdentifier to set IV etc */
/freebsd-10.0-release/crypto/openssl/crypto/threads/
H A Dmttest.c137 static char *cipher=NULL; variable
272 if (cipher == NULL && OPENSSL_issetugid() == 0)
273 cipher=getenv("SSL_CIPHER");
/freebsd-10.0-release/contrib/wpa/src/eap_peer/
H A Deap_fast.c1413 "provisioning TLS cipher suites");
1419 "provisioning TLS cipher suites");
1430 "cipher suites for provisioning");
1538 char cipher[80]; local
1545 cipher, sizeof(cipher)) < 0 ||
1546 os_strstr(cipher, "ADH-") ||
1547 os_strstr(cipher, "anon"))) {
H A Deap_sake.c24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon4552
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/
H A Dconfig.c663 wpa_printf(MSG_ERROR, "Line %d: invalid cipher '%s'.",
676 wpa_printf(MSG_ERROR, "Line %d: no cipher values configured.",
685 static char * wpa_config_write_cipher(int cipher) argument
695 if (cipher & WPA_CIPHER_CCMP) {
705 if (cipher & WPA_CIPHER_GCMP) {
715 if (cipher & WPA_CIPHER_TKIP) {
725 if (cipher & WPA_CIPHER_WEP104) {
735 if (cipher & WPA_CIPHER_WEP40) {
745 if (cipher & WPA_CIPHER_NONE) {
770 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher "
[all...]
H A Dwpa_supplicant_i.h751 enum wpa_cipher cipher_suite2driver(int cipher);
/freebsd-10.0-release/crypto/openssl/crypto/x509/
H A Dx509.h505 EVP_CIPHER_INFO cipher; member in struct:private_key_st
1167 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
1169 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,

Completed in 203 milliseconds

1234567