/freebsd-10.0-release/crypto/openssl/apps/ |
H A D | req.c | 181 const EVP_CIPHER *cipher=NULL; local 199 cipher=EVP_des_ede3_cbc(); 746 cipher=NULL; 747 if (nodes) cipher=NULL; 751 if (!PEM_write_bio_PrivateKey(out,pkey,cipher,
|
H A D | s_client.c | 346 BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n"); 347 BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n"); 583 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local 904 else if (strcmp(*argv,"-cipher") == 0) 907 cipher= *(++argv); 1006 if (cipher) 1008 BIO_printf(bio_err, "JPAKE sets cipher to PSK\n"); 1011 cipher = "PSK"; 1172 if (cipher ! [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/evp/ |
H A D | e_aes.c | 235 mode = ctx->cipher->flags & EVP_CIPH_MODE; 276 size_t bl = ctx->cipher->block_size; 502 mode = ctx->cipher->flags & EVP_CIPH_MODE; 592 size_t bl = ctx->cipher->block_size; 708 gctx->ivlen = c->cipher->iv_len;
|
/freebsd-10.0-release/crypto/openssl/ssl/ |
H A D | kssl.c | 1279 asn1ticket->encdata->cipher->length; 1281 calloc(1, asn1ticket->encdata->cipher->length)) == NULL) 1285 "Error allocating cipher in krb5ticket.\n"); 1292 asn1ticket->encdata->cipher->data, 1293 asn1ticket->encdata->cipher->length); 2085 outl = dec_authent->cipher->length; 2086 if (!EVP_Cipher(&ciph_ctx,unenc_authent,dec_authent->cipher->data,outl))
|
H A D | ssltest.c | 113 * ECC cipher suite support in OpenSSL originally developed by 298 static char *cipher=NULL; variable 360 fprintf(stderr," -cipher arg - The cipher list\n"); 371 fprintf(stderr," -test_cipherlist - Verifies the order of the ssl cipher lists.\n" 382 BIO_printf(bio_stdout,"%s%s, cipher %s %s", 558 cipher = 0; 729 else if (strcmp(*argv,"-cipher") == 0) 732 cipher= *(++argv); 808 /* ensure that the cipher lis [all...] |
H A D | s2_srvr.c | 409 s->session->cipher= cp; 461 is_export=SSL_C_IS_EXPORT(s->session->cipher); 470 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC) 501 /* incorrect number of key bytes for non export cipher */ 597 /* get session-id before cipher stuff so we can get out session 686 /* done cipher selection */ 791 s2n(n,p); /* add cipher length */
|
H A D | s3_pkt.c | 711 clear=s->enc_write_ctx?0:1; /* must be AEAD cipher */ 755 /* extra fragment would be couple of cipher blocks, 967 * Change cipher spec protocol 1166 (s->session != NULL) && (s->session->cipher != NULL)) 1229 (s->session != NULL) && (s->session->cipher != NULL) && 1329 /* Check we have a cipher to change to */ 1487 s->session->cipher=s->s3->tmp.new_cipher;
|
H A D | s3_srvr.c | 120 * ECC cipher suite support in OpenSSL originally written by 463 * message only if the cipher suite is either 770 s->session->cipher=s->s3->tmp.new_cipher; 1124 /* we need a cipher if we are not resuming a session */ 1143 /* If it is a hit, check that the cipher is in the list */ 1147 id=s->session->cipher->id; 1172 /* Special case as client bug workaround: the previously used cipher may 1174 * continue using a cipher that before wasn't chosen due to server 1175 * preferences. We'll have to reject the connection if the cipher is not 1180 s->session->cipher [all...] |
H A D | ssl_lib.c | 115 * ECC cipher suite support in OpenSSL originally developed by 207 * the old cipher. It is sort of a SSL_clear_lite :-) */ 1285 * was unable to find a cipher matching the given rule string 1286 * (for example if the rule string specifies a cipher which 1752 /* ret->cipher=NULL;*/ 2036 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) argument 2053 kl=SSL_C_EXPORT_PKEYLENGTH(cipher); 2163 * ECDSA cipher suites depending on the key usage extension. 2390 EVP_PKEY *ssl_get_sign_pkey(SSL *s,const SSL_CIPHER *cipher, const EVP_MD **pmd) argument 2396 alg_a = cipher [all...] |
H A D | d1_pkt.c | 745 * Change cipher spec protocol 1049 (s->session != NULL) && (s->session->cipher != NULL)) 1581 (EVP_CIPHER_mode( s->enc_write_ctx->cipher ) & EVP_CIPH_CBC_MODE)) 1582 bs = EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
|
H A D | s3_cbc.c | 74 * block_size: the block size of the cipher used to encrypt the record. 108 * block_size: the block size of the cipher used to encrypt the record. 158 if (EVP_CIPHER_flags(s->enc_read_ctx->cipher)&EVP_CIPH_FLAG_AEAD_CIPHER)
|
/freebsd-10.0-release/contrib/sendmail/cf/m4/ |
H A D | cfhead.m4 | 275 define(`_REC_TLS_', `(version=${tls_version} cipher=${cipher} bits=${cipher_bits} verify=${verify})$.$?u') 305 define(`confMILTER_MACROS_HELO', ``{tls_version}, {cipher}, {cipher_bits}, {cert_subject}, {cert_issuer}'')
|
/freebsd-10.0-release/crypto/openssl/engines/ccgost/ |
H A D | gost_crypt.c | 6 * OpenSSL interface to GOST 28147-89 cipher functions * 34 /* set/get cipher parameters */ 162 /* Sets cipher param from paramset NID. */ 295 /*block cipher current iv */ 305 /* Next iv is next block of cipher text*/ 354 /*block cipher current iv */ 389 /* Control function for gost cipher */ 418 /* Set cipher parameters from ASN1 structure */ 432 if (!ASN1_OCTET_STRING_set(gcp->iv, ctx->iv, ctx->cipher->iv_len)) 485 if (len != ctx->cipher [all...] |
/freebsd-10.0-release/contrib/sendmail/cf/cf/ |
H A D | submit.cf | 567 (version=${tls_version} cipher=${cipher} bits=${cipher_bits} verify=${verify})$.$?u
|
/freebsd-10.0-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_fast.c | 439 wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher " 546 char cipher[64]; local 550 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 552 wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to get cipher " 557 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
|
/freebsd-10.0-release/contrib/wpa/src/tls/ |
H A D | tlsv1_record.c | 20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite 22 * @cipher_suite: New cipher suite 25 * This function is used to prepare TLS record layer for cipher suite change. 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 55 data = tls_get_cipher_data(suite->cipher); 68 * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher 70 * Returns: 0 on success (cipher changed), -1 on failure 72 * This function changes TLS record layer to use the new cipher suite 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 92 "cipher"); [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | readconf.c | 43 #include "cipher.h" 198 { "cipher", oCipher }, 738 intptr = &options->cipher; 744 fatal("%.200s line %d: Bad cipher '%s'.", 755 fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.", 1275 options->cipher = -1; 1398 if (options->cipher == -1) 1399 options->cipher = SSH_CIPHER_NOT_SET;
|
H A D | ssh-keygen.c | 394 char *type, *cipher; local 411 cipher = buffer_get_string(&b, NULL); 416 if (strcmp(cipher, "none") != 0) { 417 error("unsupported cipher %s", cipher); 418 free(cipher); 423 free(cipher);
|
/freebsd-10.0-release/crypto/openssl/crypto/cms/ |
H A D | cms_pwri.c | 109 kekciph = env->encryptedContentInfo->cipher; 123 /* Setup algorithm identifier for cipher */ 378 /* Fixup cipher based on AlgorithmIdentifier to set IV etc */
|
/freebsd-10.0-release/crypto/openssl/crypto/threads/ |
H A D | mttest.c | 137 static char *cipher=NULL; variable 272 if (cipher == NULL && OPENSSL_issetugid() == 0) 273 cipher=getenv("SSL_CIPHER");
|
/freebsd-10.0-release/contrib/wpa/src/eap_peer/ |
H A D | eap_fast.c | 1413 "provisioning TLS cipher suites"); 1419 "provisioning TLS cipher suites"); 1430 "cipher suites for provisioning"); 1538 char cipher[80]; local 1545 cipher, sizeof(cipher)) < 0 || 1546 os_strstr(cipher, "ADH-") || 1547 os_strstr(cipher, "anon"))) {
|
H A D | eap_sake.c | 24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon4552
|
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/ |
H A D | config.c | 663 wpa_printf(MSG_ERROR, "Line %d: invalid cipher '%s'.", 676 wpa_printf(MSG_ERROR, "Line %d: no cipher values configured.", 685 static char * wpa_config_write_cipher(int cipher) argument 695 if (cipher & WPA_CIPHER_CCMP) { 705 if (cipher & WPA_CIPHER_GCMP) { 715 if (cipher & WPA_CIPHER_TKIP) { 725 if (cipher & WPA_CIPHER_WEP104) { 735 if (cipher & WPA_CIPHER_WEP40) { 745 if (cipher & WPA_CIPHER_NONE) { 770 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher " [all...] |
H A D | wpa_supplicant_i.h | 751 enum wpa_cipher cipher_suite2driver(int cipher);
|
/freebsd-10.0-release/crypto/openssl/crypto/x509/ |
H A D | x509.h | 505 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1167 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 1169 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
|