Searched refs:ciphers (Results 26 - 50 of 52) sorted by relevance

123

/freebsd-11.0-release/contrib/wpa/src/ap/
H A Dwpa_auth_ie.c480 int ciphers, key_mgmt, res, version; local
618 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
620 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
621 if (!ciphers) {
637 if (ciphers & WPA_CIPHER_TKIP) {
674 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
/freebsd-11.0-release/crypto/openssl/ssl/
H A Ds2_srvr.c405 if (cp == NULL || sk_SSL_CIPHER_find(s->session->ciphers, cp) < 0) {
677 &s->session->ciphers);
693 /* Generate list of SSLv2 ciphers shared between client and server */
703 sk_SSL_CIPHER_free(s->session->ciphers);
704 s->session->ciphers = prio;
708 if (sk_SSL_CIPHER_num(s->session->ciphers) == 0) {
714 * s->session->ciphers should now have a list of ciphers that are on
716 * client sent the ciphers or in the order of the server's preference
800 s2n(0, p); /* ciphers le
[all...]
H A Ds2_clnt.c454 * We have just received a list of ciphers back from the server. We
459 /* load the ciphers */
461 &s->session->ciphers);
471 /* get the array of ciphers we will accept */
488 * In theory we could have ciphers sent back that we don't want to
H A Dssl_lib.c1321 /** return a STACK of the ciphers available for the SSL and in order of
1335 /** return a STACK of the ciphers available for the SSL and in order of
1366 /** specify the ciphers to be used by default by the SSL_CTX */
1389 /** specify the ciphers to be used by the SSL */
1414 if ((s->session == NULL) || (s->session->ciphers == NULL) || (len < 2))
1418 sk = s->session->ciphers;
1464 /* Skip disabled ciphers */
1480 * If p == q, no ciphers; caller indicates an error. Otherwise, add
2467 /* ECDH key length in export ciphers must be <= 163 bits */
/freebsd-11.0-release/crypto/heimdal/lib/hx509/
H A Dcrypto.c2278 static const struct hx509cipher ciphers[] = { variable in typeref:struct:hx509cipher
2358 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++)
2359 if (der_heim_oid_cmp(oid, ciphers[i].oid) == 0)
2360 return &ciphers[i];
2370 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++)
2371 if (strcasecmp(name, ciphers[i].name) == 0)
2372 return &ciphers[i];
3168 for (i = 0; i < sizeof(ciphers)/sizeo
[all...]
/freebsd-11.0-release/crypto/openssl/apps/
H A DMakefile41 s_time version pkcs7 cms crl2pkcs7 sess_id ciphers nseq pkcs12 \
58 ciphers.o nseq.o pkcs12.o pkcs8.o pkey.o pkeyparam.o pkeyutl.o \
66 ciphers.c nseq.c pkcs12.c pkcs8.c pkey.c pkeyparam.c pkeyutl.c \
239 ciphers.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
240 ciphers.o: ../include/openssl/buffer.h ../include/openssl/comp.h
241 ciphers.o: ../include/openssl/conf.h ../include/openssl/crypto.h
242 ciphers.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
243 ciphers.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
244 ciphers.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
245 ciphers
[all...]
/freebsd-11.0-release/sys/dev/ath/
H A Dif_ath_keycache.c88 static const char *ciphers[] = { local
98 printf("%s: [%02u] %-7s ", tag, ix, ciphers[hk->kv_type]);
/freebsd-11.0-release/contrib/wpa/src/crypto/
H A Dtls.h465 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
471 u8 *ciphers);
H A Dtls_openssl.c777 const char *ciphers; local
904 ciphers = conf->openssl_ciphers;
906 ciphers = "DEFAULT:!EXP:!LOW";
907 if (SSL_CTX_set_cipher_list(ssl, ciphers) != 1) {
910 ciphers);
3352 u8 *ciphers)
3358 if (conn == NULL || conn->ssl == NULL || ciphers == NULL)
3365 c = ciphers;
3351 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_gnutls.c1423 u8 *ciphers)
1422 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/freebsd-11.0-release/crypto/openssl/crypto/engine/
H A Deng_lib.c95 e->ciphers = NULL;
/freebsd-11.0-release/contrib/wpa/src/eap_peer/
H A Deap_fast.c1446 u8 ciphers[5]; local
1452 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA;
1458 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA;
1459 ciphers[count++] = TLS_CIPHER_AES128_SHA;
1460 ciphers[count++] = TLS_CIPHER_RC4_SHA;
1463 ciphers[count++] = TLS_CIPHER_NONE;
1466 ciphers)) {
/freebsd-11.0-release/contrib/wpa/src/tls/
H A Dtlsv1_client.c759 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
763 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument
769 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
H A Dtlsv1_server.c655 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
659 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
665 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/freebsd-11.0-release/sys/dev/ipw/
H A Dif_ipwreg.h240 uint32_t ciphers; member in struct:ipw_security
/freebsd-11.0-release/crypto/openssh/
H A Dssh.c814 free(options.ciphers);
815 options.ciphers = xstrdup(optarg);
827 options.ciphers = xstrdup("3des-cbc");
829 options.ciphers = xstrdup("blowfish-cbc");
831 options.ciphers = xstrdup(KEX_CLIENT_ENCRYPT);
H A Dreadconf.c217 { "ciphers", oCiphers },
1162 if (*activep && options->ciphers == NULL)
1163 options->ciphers = xstrdup(arg);
1710 options->ciphers = NULL;
1953 if (kex_assemble_names(KEX_CLIENT_ENCRYPT, &options->ciphers) != 0 ||
2405 dump_cfg_string(oCiphers, o->ciphers ? o->ciphers : KEX_CLIENT_ENCRYPT);
H A Dservconf.c141 options->ciphers = NULL;
187 if (kex_assemble_names(KEX_SERVER_ENCRYPT, &o->ciphers) != 0 ||
541 { "ciphers", sCiphers, SSHCFG_GLOBAL },
1465 if (options->ciphers == NULL)
1466 options->ciphers = xstrdup(arg);
2311 dump_cfg_string(sCiphers, o->ciphers ? o->ciphers : KEX_SERVER_ENCRYPT);
H A Dsshconnect2.c171 compat_cipher_proposal(options.ciphers);
173 compat_cipher_proposal(options.ciphers);
H A Dsshd.c2461 /* Declare which ciphers we support. */
2621 options.ciphers);
2623 options.ciphers);
/freebsd-11.0-release/contrib/wpa/src/drivers/
H A Ddriver_nl80211_capa.c259 u32 *ciphers; local
265 ciphers = nla_data(tb);
267 u32 c = ciphers[i];
/freebsd-11.0-release/contrib/wpa/src/eap_server/
H A Deap_server_fast.c410 u8 ciphers[5] = { local
438 ciphers) < 0) {
/freebsd-11.0-release/crypto/openssl/
H A DMakefile16 OPTIONS= no-ec_nistp_64_gcc_128 no-gmp no-jpake no-krb5 no-libunbound no-md2 no-rc5 no-rfc3779 no-sctp no-shared no-ssl-trace no-ssl2 no-store no-unit-test no-weak-ssl-ciphers no-zlib no-zlib-dynamic static-engine
46 # NULL encryption ciphers.
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/
H A Dctrl_iface.c3403 static const struct cipher_info ciphers[] = { variable in typeref:struct:cipher_info
3443 for (i = 0; i < ARRAY_SIZE(ciphers); i++) {
3444 if (!ciphers[i].group_only && capa->enc & ciphers[i].capa) {
3447 ciphers[i].name);
3479 for (i = 0; i < ARRAY_SIZE(ciphers); i++) {
3480 if (capa->enc & ciphers[i].capa) {
3483 ciphers[i].name);
/freebsd-11.0-release/sys/dev/mwl/
H A Dif_mwl.c1488 static const char *ciphers[] = { local
1495 printf("%s: [%u] %-7s", tag, hk->keyIndex, ciphers[hk->keyTypeId]);

Completed in 197 milliseconds

123