Searched refs:cipher (Results 176 - 190 of 190) sorted by relevance

12345678

/freebsd-11.0-release/crypto/heimdal/lib/krb5/
H A Dcrypto.c1793 return krb5_encrypt(context, crypto, usage, data, len, &result->cipher);
1835 e->cipher.data, e->cipher.length, result);
/freebsd-11.0-release/crypto/openssl/ssl/
H A Dssl.h113 * ECC cipher suite support in OpenSSL originally developed by
328 * to the default cipher setup will also be included here.
338 * The following cipher list is used by default. It also is substituted when
339 * an application-defined cipher list string starts with 'DEFAULT'.
396 SSL_CIPHER **cipher, void *arg);
460 int (*put_cipher_by_char) (const SSL_CIPHER *cipher, unsigned char *ptr);
477 * Cipher OCTET STRING, -- the 3 byte cipher ID
548 const SSL_CIPHER *cipher; member in struct:ssl_session_st
550 * to load the 'cipher' structure */
633 * Set on servers to choose the cipher accordin
[all...]
H A Ds3_clnt.c120 * ECC cipher suite support in OpenSSL originally written by
442 * cipher suites with ECDH (rather than ECDSA) certificates. We
485 s->session->cipher = s->s3->tmp.new_cipher;
1008 s->session->cipher = pref_cipher ?
1048 /* unknown cipher */
1059 * If it is a disabled cipher we didn't send it in client hello, so
1073 /* we did not say we would use this cipher */
1080 * Depending on the session caching (internal/external), the cipher
1084 if (s->session->cipher)
1085 s->session->cipher_id = s->session->cipher
[all...]
H A Dd1_both.c293 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
H A Dd1_pkt.c833 * Change cipher spec protocol
1144 (s->session != NULL) && (s->session->cipher != NULL)) {
H A Dssl_locl.h113 * ECC cipher suite support in OpenSSL originally developed by
282 * Use the according functions for cipher management instead.
369 /* Not a real MAC, just an indication it is part of cipher */
410 * Export and cipher strength information. For each cipher we have to decide
414 * Independent of the export flag the cipher strength is sorted into classes.
416 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change
444 * Macros to check the export status and cipher strength for export ciphers.
448 * *_EXPORT40/56 macros are used to check whether a certain cipher strength
496 * as with TLS1.2 cipher w
[all...]
/freebsd-11.0-release/crypto/openssl/apps/
H A Ds_server.c113 * ECC cipher suite support in OpenSSL originally developed by
574 " -cipher arg - play with 'openssl ciphers' to see what goes here\n");
575 BIO_printf(bio_err, " -serverpref - Use server's cipher preferences\n");
1799 if (cipher == NULL)
1800 cipher = getenv("SSL_CIPHER");
/freebsd-11.0-release/sys/dev/ath/ath_hal/ar5416/
H A Dar5416_xmit.c521 * NB: cipher is no longer used, it's calculated.
531 HAL_CIPHER cipher,
524 ar5416ChainTxDesc(struct ath_hal *ah, struct ath_desc *ds, HAL_DMA_ADDR *bufAddrList, uint32_t *segLenList, u_int pktLen, u_int hdrLen, HAL_PKT_TYPE type, u_int keyIx, HAL_CIPHER cipher, uint8_t delims, HAL_BOOL firstSeg, HAL_BOOL lastSeg, HAL_BOOL lastAggr) argument
/freebsd-11.0-release/crypto/openssl/crypto/aes/asm/
H A Daesp8-ppc.pl440 v${n}cipher v0,v0,v2
444 v${n}cipher v0,v0,v1
450 v${n}cipher v0,v0,v2
/freebsd-11.0-release/sys/dev/usb/wlan/
H A Dif_run.c2236 u_int cipher = k->wk_cipher->ic_cipher; local
2249 /* map net80211 cipher to RT2860 security mode */
2250 switch (cipher) {
2283 if (cipher == IEEE80211_CIPHER_TKIP) {
2299 if (cipher == IEEE80211_CIPHER_WEP) {
2303 if (cipher == IEEE80211_CIPHER_TKIP) {
H A Dif_zydreg.h1068 uint8_t cipher; member in struct:zyd_rx_stat
/freebsd-11.0-release/sys/dev/otus/
H A Dif_otusreg.h325 uint16_t cipher; member in struct:ar_cmd_ekey
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/
H A Dconfig.c904 wpa_printf(MSG_ERROR, "Line %d: invalid cipher '%s'.",
909 wpa_printf(MSG_ERROR, "Line %d: no cipher values configured.",
918 static char * wpa_config_write_cipher(int cipher) argument
924 if (wpa_write_ciphers(buf, buf + 50, cipher, " ") < 0) {
943 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher "
979 wpa_printf(MSG_ERROR, "Line %d: not allowed group cipher "
H A Dctrl_iface.c2253 static char * wpa_supplicant_cipher_txt(char *pos, char *end, int cipher) argument
2260 ret = wpa_write_ciphers(pos, end, cipher, "+");
/freebsd-11.0-release/sys/dev/iwm/
H A Dif_iwmreg.h856 * struct iwm_fw_cipher_scheme - a cipher scheme supported by FW.
857 * @cipher: a cipher suite selector
858 * @flags: cipher scheme flags (currently reserved for a future use)
866 * @hw_cipher: a HW cipher index used in host commands
869 uint32_t cipher; member in struct:iwm_fw_cipher_scheme
882 * struct iwm_fw_cscheme_list - a cipher scheme list
884 * @cs: cipher scheme entries
5845 * @IWM_STA_KEY_FLG_EXT: extended cipher algorithm (depends on the FW support)

Completed in 284 milliseconds

12345678