/freebsd-10.0-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 288 evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher; 299 evp_cipher=p7->d.enveloped->enc_data->cipher;
|
/freebsd-10.0-release/crypto/openssl/util/ |
H A D | mk1mf.pl | 104 no-rc2 no-rc4 no-rc5 no-idea no-des - Skip this symetric cipher 106 no-rsa no-dsa no-dh - Skip this public key cipher
|
/freebsd-10.0-release/sys/dev/usb/wlan/ |
H A D | if_rsu.c | 981 /* Map net80211 cipher to HW crypto algorithm. */ 1709 cipher = R92S_TXDW1_CIPHER_WEP; 1712 cipher = R92S_TXDW1_CIPHER_TKIP; 1715 cipher = R92S_TXDW1_CIPHER_AES; 1718 cipher = R92S_TXDW1_CIPHER_NONE; 1721 SM(R92S_TXDW1_CIPHER, cipher) |
|
H A D | if_zydreg.h | 1064 uint8_t cipher; member in struct:zyd_rx_stat
|
/freebsd-10.0-release/crypto/openssl/ssl/ |
H A D | ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 323 * to the default cipher setup will also be included here. 332 /* The following cipher list is used by default. 333 * It also is substituted when an application-defined cipher list string 383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); 433 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr); 449 * Cipher OCTET STRING, -- the 3 byte cipher ID 520 const SSL_CIPHER *cipher; member in struct:ssl_session_st 523 * the 'cipher' structure */ 601 /* Set on servers to choose the cipher accordin [all...] |
H A D | s3_clnt.c | 120 * ECC cipher suite support in OpenSSL originally written by 413 * authentication in ECDH cipher suites with 459 s->session->cipher=s->s3->tmp.new_cipher; 886 s->session->cipher = pref_cipher ? 926 /* unknown cipher */ 954 /* we did not say we would use this cipher */ 960 /* Depending on the session caching (internal/external), the cipher 963 if (s->session->cipher) 964 s->session->cipher_id = s->session->cipher->id; 1190 fprintf(stderr,"cipher, al [all...] |
H A D | d1_both.c | 281 (EVP_CIPHER_mode( s->enc_write_ctx->cipher) & EVP_CIPH_CBC_MODE)) 282 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
|
H A D | ssl_locl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 282 * Use the according functions for cipher management instead. 345 /* Not a real MAC, just an indication it is part of cipher */ 385 * Export and cipher strength information. For each cipher we have to decide 389 * Independent of the export flag the cipher strength is sorted into classes. 391 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change 418 * Macros to check the export status and cipher strength for export ciphers. 422 * *_EXPORT40/56 macros are used to check whether a certain cipher strength 859 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher); [all...] |
H A D | d1_clnt.c | 531 s->session->cipher=s->s3->tmp.new_cipher;
|
H A D | d1_srvr.c | 728 s->session->cipher=s->s3->tmp.new_cipher; 979 /* put the cipher */ 1677 /* Initialize HMAC and cipher contexts. If callback present
|
/freebsd-10.0-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_sake.c | 23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon4584
|
/freebsd-10.0-release/sys/contrib/dev/ath/ath_hal/ar9300/ |
H A D | ar9300_freebsd.c | 528 HAL_CIPHER cipher, uint8_t numDelims, 525 ar9300_freebsd_chain_tx_desc(struct ath_hal *ah, struct ath_desc *ds, HAL_DMA_ADDR *bufLenList, uint32_t *segLenList, u_int pktLen, u_int hdrLen, HAL_PKT_TYPE type, u_int keyIx, HAL_CIPHER cipher, uint8_t numDelims, HAL_BOOL firstSeg, HAL_BOOL lastSeg, HAL_BOOL lastAggr) argument
|
/freebsd-10.0-release/sys/dev/ath/ath_hal/ar5416/ |
H A D | ar5416.h | 400 HAL_CIPHER cipher, uint8_t delims,
|
H A D | ar5416_xmit.c | 515 * NB: cipher is no longer used, it's calculated. 525 HAL_CIPHER cipher, 518 ar5416ChainTxDesc(struct ath_hal *ah, struct ath_desc *ds, HAL_DMA_ADDR *bufAddrList, uint32_t *segLenList, u_int pktLen, u_int hdrLen, HAL_PKT_TYPE type, u_int keyIx, HAL_CIPHER cipher, uint8_t delims, HAL_BOOL firstSeg, HAL_BOOL lastSeg, HAL_BOOL lastAggr) argument
|
/freebsd-10.0-release/sys/dev/if_ndis/ |
H A D | if_ndis.c | 2098 ndis_set_cipher(sc, cipher) 2100 int cipher; 2110 if (cipher == WPA_CSE_WEP40 || cipher == WPA_CSE_WEP104) { 2116 if (cipher == WPA_CSE_TKIP) { 2122 if (cipher == WPA_CSE_CCMP) { 2128 DPRINTF(("Setting cipher to %d\n", arg)); 2135 /* Check that the cipher was set correctly. */ 2182 /* Skip over the ucast cipher OIDs. */ 2213 /* First, set up the multicast group cipher [all...] |
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/ |
H A D | ctrl_iface.c | 1708 static char * wpa_supplicant_cipher_txt(char *pos, char *end, int cipher) argument 1715 if (cipher & WPA_CIPHER_NONE) { 1722 if (cipher & WPA_CIPHER_WEP40) { 1729 if (cipher & WPA_CIPHER_WEP104) { 1737 if (cipher & WPA_CIPHER_TKIP) { 1744 if (cipher & WPA_CIPHER_CCMP) { 1751 if (cipher & WPA_CIPHER_GCMP) {
|
H A D | wpa_supplicant.c | 171 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for " 848 enum wpa_cipher cipher_suite2driver(int cipher) argument 850 switch (cipher) { 910 "cipher suites"); 913 "cipher 0x%x (mask 0x%x) - reject", 919 "cipher 0x%x (mask 0x%x) - reject", 1006 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Set cipher suites " 1012 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Selected cipher suites: group %d " 1017 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Selected mgmt group cipher %d", 1053 "cipher"); [all...] |
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | tls_openssl.c | 2614 "cipher selection: %d", *c); 2625 wpa_printf(MSG_DEBUG, "OpenSSL: cipher suites: %s", buf + 1); 2839 conn->ssl->enc_read_ctx->cipher == NULL || 2843 c = conn->ssl->enc_read_ctx->cipher; 2880 SSL_CIPHER **cipher, void *arg) 2878 tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg) argument
|
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 1793 return krb5_encrypt(context, crypto, usage, data, len, &result->cipher); 1835 e->cipher.data, e->cipher.length, result);
|