Searched refs:ciphers (Results 26 - 49 of 49) sorted by relevance

12

/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Dcrypto.c1853 static const struct hx509cipher ciphers[] = { variable in typeref:struct:hx509cipher
1925 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++)
1926 if (der_heim_oid_cmp(oid, (*ciphers[i].oid_func)()) == 0)
1927 return &ciphers[i];
1937 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++)
1938 if (strcasecmp(name, ciphers[i].name) == 0)
1939 return &ciphers[i];
2669 for (i = 0; i < sizeof(ciphers)/sizeo
[all...]
/freebsd-9.3-release/crypto/openssl/apps/
H A DMakefile41 s_time version pkcs7 cms crl2pkcs7 sess_id ciphers nseq pkcs12 \
58 ciphers.o nseq.o pkcs12.o pkcs8.o spkac.o smime.o rand.o engine.o \
66 ciphers.c nseq.c pkcs12.c pkcs8.c spkac.c smime.c rand.c engine.c \
241 ciphers.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
242 ciphers.o: ../include/openssl/bn.h ../include/openssl/buffer.h
243 ciphers.o: ../include/openssl/comp.h ../include/openssl/conf.h
244 ciphers.o: ../include/openssl/crypto.h ../include/openssl/dtls1.h
245 ciphers.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
246 ciphers.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
247 ciphers
[all...]
/freebsd-9.3-release/contrib/wpa/src/tls/
H A Dtlsv1_client.c602 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
606 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers) argument
612 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
H A Dtlsv1_server.c543 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
547 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers) argument
553 if (ciphers[0] == TLS_CIPHER_ANON_DH_AES128_SHA) {
/freebsd-9.3-release/sys/dev/ath/
H A Dif_ath_keycache.c86 static const char *ciphers[] = { local
96 printf("%s: [%02u] %-7s ", tag, ix, ciphers[hk->kv_type]);
/freebsd-9.3-release/crypto/openssl/crypto/engine/
H A Deng_lib.c95 e->ciphers = NULL;
/freebsd-9.3-release/contrib/wpa/src/eap_peer/
H A Deap_fast.c1409 u8 ciphers[5]; local
1415 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA;
1421 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA;
1422 ciphers[count++] = TLS_CIPHER_AES128_SHA;
1423 ciphers[count++] = TLS_CIPHER_RC4_SHA;
1426 ciphers[count++] = TLS_CIPHER_NONE;
1429 ciphers)) {
/freebsd-9.3-release/crypto/openssl/test/
H A Dtestssl125 for cipher in `../util/shlib_wrap.sh ../apps/openssl ciphers "RSA+$protocol" | tr ':' ' '`; do
/freebsd-9.3-release/crypto/openssh/
H A Dssh.c699 options.ciphers = xstrdup(optarg);
711 options.ciphers = "3des-cbc";
713 options.ciphers = "blowfish-cbc";
715 options.ciphers = (char *)-1;
H A Dservconf.c130 options->ciphers = NULL;
488 { "ciphers", sCiphers, SSHCFG_GLOBAL },
1340 if (options->ciphers == NULL)
1341 options->ciphers = xstrdup(arg);
2093 dump_cfg_string(sCiphers, o->ciphers ? o->ciphers :
H A Dsshconnect2.c176 if (options.ciphers == (char *)-1) {
177 logit("No valid ciphers for protocol version 2 given, using defaults.");
178 options.ciphers = NULL;
180 if (options.ciphers != NULL) {
182 myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers;
H A Dreadconf.c210 { "ciphers", oCiphers },
1068 if (*activep && options->ciphers == NULL)
1069 options->ciphers = xstrdup(arg);
1605 options->ciphers = NULL;
1748 /* options->ciphers, default set in myproposals.h */
H A Dsshd.c2345 /* Declare which ciphers we support. */
2502 if (options.ciphers != NULL) {
2504 myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers;
/freebsd-9.3-release/sys/dev/ipw/
H A Dif_ipwreg.h240 uint32_t ciphers; member in struct:ipw_security
H A Dif_ipw.c2243 security.ciphers = htole32(IPW_CIPHER_NONE);
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dtls_nss.c592 u8 *ciphers)
591 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_schannel.c638 u8 *ciphers)
637 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_openssl.c2471 u8 *ciphers)
2477 if (conn == NULL || conn->ssl == NULL || ciphers == NULL)
2484 c = ciphers;
2470 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_gnutls.c1255 u8 *ciphers)
1254 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/freebsd-9.3-release/contrib/wpa/src/eap_server/
H A Deap_server_fast.c415 u8 ciphers[5] = { local
443 ciphers) < 0) {
/freebsd-9.3-release/crypto/openssl/ssl/
H A Ds2_clnt.c452 * We have just received a list of ciphers back from the server. We
457 /* load the ciphers */
459 &s->session->ciphers);
469 /* get the array of ciphers we will accept */
486 * In theory we could have ciphers sent back that we don't want to
H A Dssl_lib.c1154 /** return a STACK of the ciphers available for the SSL and in order of
1168 /** return a STACK of the ciphers available for the SSL and in order of
1199 /** specify the ciphers to be used by default by the SSL_CTX */
1222 /** specify the ciphers to be used by the SSL */
1247 if ((s->session == NULL) || (s->session->ciphers == NULL) || (len < 2))
1251 sk = s->session->ciphers;
1305 * If p == q, no ciphers; caller indicates an error. Otherwise, add
1931 /* ECDH key length in export ciphers must be <= 163 bits */
H A Dssl.h207 /* text strings for the ciphers */
253 /* These are used to specify which ciphers to use and not to use */
307 * ciphers normally not being used.
308 * Example: "RC4" will activate all ciphers using RC4 including ciphers
353 /* used to hold info on the particular ciphers used */
358 unsigned long algorithms; /* what ciphers are used */
468 STACK_OF(SSL_CIPHER) *ciphers; /* shared ciphers? */ member in struct:ssl_session_st
/freebsd-9.3-release/sys/dev/mwl/
H A Dif_mwl.c1546 static const char *ciphers[] = { local
1553 printf("%s: [%u] %-7s", tag, hk->keyIndex, ciphers[hk->keyTypeId]);

Completed in 389 milliseconds

12