/freebsd-11.0-release/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 1793 return krb5_encrypt(context, crypto, usage, data, len, &result->cipher); 1835 e->cipher.data, e->cipher.length, result);
|
/freebsd-11.0-release/crypto/openssl/ssl/ |
H A D | ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 328 * to the default cipher setup will also be included here. 338 * The following cipher list is used by default. It also is substituted when 339 * an application-defined cipher list string starts with 'DEFAULT'. 396 SSL_CIPHER **cipher, void *arg); 460 int (*put_cipher_by_char) (const SSL_CIPHER *cipher, unsigned char *ptr); 477 * Cipher OCTET STRING, -- the 3 byte cipher ID 548 const SSL_CIPHER *cipher; member in struct:ssl_session_st 550 * to load the 'cipher' structure */ 633 * Set on servers to choose the cipher accordin [all...] |
H A D | s3_clnt.c | 120 * ECC cipher suite support in OpenSSL originally written by 442 * cipher suites with ECDH (rather than ECDSA) certificates. We 485 s->session->cipher = s->s3->tmp.new_cipher; 1008 s->session->cipher = pref_cipher ? 1048 /* unknown cipher */ 1059 * If it is a disabled cipher we didn't send it in client hello, so 1073 /* we did not say we would use this cipher */ 1080 * Depending on the session caching (internal/external), the cipher 1084 if (s->session->cipher) 1085 s->session->cipher_id = s->session->cipher [all...] |
H A D | d1_both.c | 293 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
|
H A D | d1_pkt.c | 833 * Change cipher spec protocol 1144 (s->session != NULL) && (s->session->cipher != NULL)) {
|
H A D | ssl_locl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 282 * Use the according functions for cipher management instead. 369 /* Not a real MAC, just an indication it is part of cipher */ 410 * Export and cipher strength information. For each cipher we have to decide 414 * Independent of the export flag the cipher strength is sorted into classes. 416 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change 444 * Macros to check the export status and cipher strength for export ciphers. 448 * *_EXPORT40/56 macros are used to check whether a certain cipher strength 496 * as with TLS1.2 cipher w [all...] |
/freebsd-11.0-release/crypto/openssl/apps/ |
H A D | s_server.c | 113 * ECC cipher suite support in OpenSSL originally developed by 574 " -cipher arg - play with 'openssl ciphers' to see what goes here\n"); 575 BIO_printf(bio_err, " -serverpref - Use server's cipher preferences\n"); 1799 if (cipher == NULL) 1800 cipher = getenv("SSL_CIPHER");
|
/freebsd-11.0-release/sys/dev/ath/ath_hal/ar5416/ |
H A D | ar5416_xmit.c | 521 * NB: cipher is no longer used, it's calculated. 531 HAL_CIPHER cipher, 524 ar5416ChainTxDesc(struct ath_hal *ah, struct ath_desc *ds, HAL_DMA_ADDR *bufAddrList, uint32_t *segLenList, u_int pktLen, u_int hdrLen, HAL_PKT_TYPE type, u_int keyIx, HAL_CIPHER cipher, uint8_t delims, HAL_BOOL firstSeg, HAL_BOOL lastSeg, HAL_BOOL lastAggr) argument
|
/freebsd-11.0-release/crypto/openssl/crypto/aes/asm/ |
H A D | aesp8-ppc.pl | 440 v${n}cipher v0,v0,v2 444 v${n}cipher v0,v0,v1 450 v${n}cipher v0,v0,v2
|
/freebsd-11.0-release/sys/dev/usb/wlan/ |
H A D | if_run.c | 2236 u_int cipher = k->wk_cipher->ic_cipher; local 2249 /* map net80211 cipher to RT2860 security mode */ 2250 switch (cipher) { 2283 if (cipher == IEEE80211_CIPHER_TKIP) { 2299 if (cipher == IEEE80211_CIPHER_WEP) { 2303 if (cipher == IEEE80211_CIPHER_TKIP) {
|
H A D | if_zydreg.h | 1068 uint8_t cipher; member in struct:zyd_rx_stat
|
/freebsd-11.0-release/sys/dev/otus/ |
H A D | if_otusreg.h | 325 uint16_t cipher; member in struct:ar_cmd_ekey
|
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/ |
H A D | config.c | 904 wpa_printf(MSG_ERROR, "Line %d: invalid cipher '%s'.", 909 wpa_printf(MSG_ERROR, "Line %d: no cipher values configured.", 918 static char * wpa_config_write_cipher(int cipher) argument 924 if (wpa_write_ciphers(buf, buf + 50, cipher, " ") < 0) { 943 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher " 979 wpa_printf(MSG_ERROR, "Line %d: not allowed group cipher "
|
H A D | ctrl_iface.c | 2253 static char * wpa_supplicant_cipher_txt(char *pos, char *end, int cipher) argument 2260 ret = wpa_write_ciphers(pos, end, cipher, "+");
|
/freebsd-11.0-release/sys/dev/iwm/ |
H A D | if_iwmreg.h | 856 * struct iwm_fw_cipher_scheme - a cipher scheme supported by FW. 857 * @cipher: a cipher suite selector 858 * @flags: cipher scheme flags (currently reserved for a future use) 866 * @hw_cipher: a HW cipher index used in host commands 869 uint32_t cipher; member in struct:iwm_fw_cipher_scheme 882 * struct iwm_fw_cscheme_list - a cipher scheme list 884 * @cs: cipher scheme entries 5845 * @IWM_STA_KEY_FLG_EXT: extended cipher algorithm (depends on the FW support)
|