Searched refs:cipher (Results 151 - 169 of 169) sorted by relevance

1234567

/freebsd-10.0-release/crypto/openssl/crypto/pkcs7/
H A Dpk7_doit.c288 evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher;
299 evp_cipher=p7->d.enveloped->enc_data->cipher;
/freebsd-10.0-release/crypto/openssl/util/
H A Dmk1mf.pl104 no-rc2 no-rc4 no-rc5 no-idea no-des - Skip this symetric cipher
106 no-rsa no-dsa no-dh - Skip this public key cipher
/freebsd-10.0-release/sys/dev/usb/wlan/
H A Dif_rsu.c981 /* Map net80211 cipher to HW crypto algorithm. */
1709 cipher = R92S_TXDW1_CIPHER_WEP;
1712 cipher = R92S_TXDW1_CIPHER_TKIP;
1715 cipher = R92S_TXDW1_CIPHER_AES;
1718 cipher = R92S_TXDW1_CIPHER_NONE;
1721 SM(R92S_TXDW1_CIPHER, cipher) |
H A Dif_zydreg.h1064 uint8_t cipher; member in struct:zyd_rx_stat
/freebsd-10.0-release/crypto/openssl/ssl/
H A Dssl.h113 * ECC cipher suite support in OpenSSL originally developed by
323 * to the default cipher setup will also be included here.
332 /* The following cipher list is used by default.
333 * It also is substituted when an application-defined cipher list string
383 typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg);
433 int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
449 * Cipher OCTET STRING, -- the 3 byte cipher ID
520 const SSL_CIPHER *cipher; member in struct:ssl_session_st
523 * the 'cipher' structure */
601 /* Set on servers to choose the cipher accordin
[all...]
H A Ds3_clnt.c120 * ECC cipher suite support in OpenSSL originally written by
413 * authentication in ECDH cipher suites with
459 s->session->cipher=s->s3->tmp.new_cipher;
886 s->session->cipher = pref_cipher ?
926 /* unknown cipher */
954 /* we did not say we would use this cipher */
960 /* Depending on the session caching (internal/external), the cipher
963 if (s->session->cipher)
964 s->session->cipher_id = s->session->cipher->id;
1190 fprintf(stderr,"cipher, al
[all...]
H A Dd1_both.c281 (EVP_CIPHER_mode( s->enc_write_ctx->cipher) & EVP_CIPH_CBC_MODE))
282 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
H A Dssl_locl.h113 * ECC cipher suite support in OpenSSL originally developed by
282 * Use the according functions for cipher management instead.
345 /* Not a real MAC, just an indication it is part of cipher */
385 * Export and cipher strength information. For each cipher we have to decide
389 * Independent of the export flag the cipher strength is sorted into classes.
391 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change
418 * Macros to check the export status and cipher strength for export ciphers.
422 * *_EXPORT40/56 macros are used to check whether a certain cipher strength
859 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher);
[all...]
H A Dd1_clnt.c531 s->session->cipher=s->s3->tmp.new_cipher;
H A Dd1_srvr.c728 s->session->cipher=s->s3->tmp.new_cipher;
979 /* put the cipher */
1677 /* Initialize HMAC and cipher contexts. If callback present
/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Deap_server_sake.c23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon4584
/freebsd-10.0-release/sys/contrib/dev/ath/ath_hal/ar9300/
H A Dar9300_freebsd.c528 HAL_CIPHER cipher, uint8_t numDelims,
525 ar9300_freebsd_chain_tx_desc(struct ath_hal *ah, struct ath_desc *ds, HAL_DMA_ADDR *bufLenList, uint32_t *segLenList, u_int pktLen, u_int hdrLen, HAL_PKT_TYPE type, u_int keyIx, HAL_CIPHER cipher, uint8_t numDelims, HAL_BOOL firstSeg, HAL_BOOL lastSeg, HAL_BOOL lastAggr) argument
/freebsd-10.0-release/sys/dev/ath/ath_hal/ar5416/
H A Dar5416.h400 HAL_CIPHER cipher, uint8_t delims,
H A Dar5416_xmit.c515 * NB: cipher is no longer used, it's calculated.
525 HAL_CIPHER cipher,
518 ar5416ChainTxDesc(struct ath_hal *ah, struct ath_desc *ds, HAL_DMA_ADDR *bufAddrList, uint32_t *segLenList, u_int pktLen, u_int hdrLen, HAL_PKT_TYPE type, u_int keyIx, HAL_CIPHER cipher, uint8_t delims, HAL_BOOL firstSeg, HAL_BOOL lastSeg, HAL_BOOL lastAggr) argument
/freebsd-10.0-release/sys/dev/if_ndis/
H A Dif_ndis.c2098 ndis_set_cipher(sc, cipher)
2100 int cipher;
2110 if (cipher == WPA_CSE_WEP40 || cipher == WPA_CSE_WEP104) {
2116 if (cipher == WPA_CSE_TKIP) {
2122 if (cipher == WPA_CSE_CCMP) {
2128 DPRINTF(("Setting cipher to %d\n", arg));
2135 /* Check that the cipher was set correctly. */
2182 /* Skip over the ucast cipher OIDs. */
2213 /* First, set up the multicast group cipher
[all...]
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/
H A Dctrl_iface.c1708 static char * wpa_supplicant_cipher_txt(char *pos, char *end, int cipher) argument
1715 if (cipher & WPA_CIPHER_NONE) {
1722 if (cipher & WPA_CIPHER_WEP40) {
1729 if (cipher & WPA_CIPHER_WEP104) {
1737 if (cipher & WPA_CIPHER_TKIP) {
1744 if (cipher & WPA_CIPHER_CCMP) {
1751 if (cipher & WPA_CIPHER_GCMP) {
H A Dwpa_supplicant.c171 wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for "
848 enum wpa_cipher cipher_suite2driver(int cipher) argument
850 switch (cipher) {
910 "cipher suites");
913 "cipher 0x%x (mask 0x%x) - reject",
919 "cipher 0x%x (mask 0x%x) - reject",
1006 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Set cipher suites "
1012 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Selected cipher suites: group %d "
1017 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Selected mgmt group cipher %d",
1053 "cipher");
[all...]
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dtls_openssl.c2614 "cipher selection: %d", *c);
2625 wpa_printf(MSG_DEBUG, "OpenSSL: cipher suites: %s", buf + 1);
2839 conn->ssl->enc_read_ctx->cipher == NULL ||
2843 c = conn->ssl->enc_read_ctx->cipher;
2880 SSL_CIPHER **cipher, void *arg)
2878 tls_sess_sec_cb(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg) argument
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dcrypto.c1793 return krb5_encrypt(context, crypto, usage, data, len, &result->cipher);
1835 e->cipher.data, e->cipher.length, result);

Completed in 319 milliseconds

1234567