Searched refs:cipher (Results 176 - 200 of 237) sorted by relevance

12345678910

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/
H A Dkssl.c1256 asn1ticket->encdata->cipher->length;
1258 calloc(1, asn1ticket->encdata->cipher->length)) == NULL)
1262 "Error allocating cipher in krb5ticket.\n");
1269 asn1ticket->encdata->cipher->data,
1270 asn1ticket->encdata->cipher->length);
2058 outl = dec_authent->cipher->length;
2059 if (!EVP_Cipher(&ciph_ctx,unenc_authent,dec_authent->cipher->data,outl))
H A Dssl_lib.c160 * the old cipher. It is sort of a SSL_clear_lite :-) */
1336 /* ret->cipher=NULL;*/
1499 void ssl_set_cert_masks(CERT *c, SSL_CIPHER *cipher) argument
1509 kl=SSL_C_EXPORT_PKEYLENGTH(cipher);
1643 EVP_PKEY *ssl_get_sign_pkey(SSL *s,SSL_CIPHER *cipher) argument
1648 alg=cipher->algorithms;
1848 /* clear the current cipher */
1858 /* clear the current cipher */
2062 if ((s->session != NULL) && (s->session->cipher != NULL))
2063 return(s->session->cipher);
[all...]
H A Ds2_srvr.c419 s->session->cipher= cp;
470 is_export=SSL_C_IS_EXPORT(s->session->cipher);
479 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
510 /* incorrect number of key bytes for non export cipher */
606 /* get session-id before cipher stuff so we can get out session
695 /* done cipher selection */
802 s2n(n,p); /* add cipher length */
H A Ds3_srvr.c490 s->session->cipher=s->s3->tmp.new_cipher;
736 /* we need a cipher if we are not resuming a session */
755 /* If it is a hit, check that the cipher is in the list */
759 id=s->session->cipher->id;
782 s->session->cipher=sk_SSL_CIPHER_value(ciphers,
787 /* we need to have the cipher in the cipher
867 * pick a cipher */
917 s->s3->tmp.new_cipher=s->session->cipher;
921 s->s3->tmp.new_cipher=s->session->cipher;
[all...]
H A Ds3_pkt.c778 * Change cipher spec protocol
962 (s->session != NULL) && (s->session->cipher != NULL))
1088 /* Check we have a cipher to change to */
1227 s->session->cipher=s->s3->tmp.new_cipher;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dkssl.c1283 asn1ticket->encdata->cipher->length;
1285 calloc(1, asn1ticket->encdata->cipher->length)) == NULL)
1289 "Error allocating cipher in krb5ticket.\n");
1296 asn1ticket->encdata->cipher->data,
1297 asn1ticket->encdata->cipher->length);
2086 outl = dec_authent->cipher->length;
2087 if (!EVP_Cipher(&ciph_ctx,unenc_authent,dec_authent->cipher->data,outl))
H A Dssltest.c113 * ECC cipher suite support in OpenSSL originally developed by
213 static char *cipher=NULL; variable
265 fprintf(stderr," -cipher arg - The cipher list\n");
276 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n");
285 BIO_printf(bio_stdout,"%s%s, cipher %s %s",
431 cipher = 0;
550 else if (strcmp(*argv,"-cipher") == 0)
553 cipher= *(++argv);
625 /* ensure that the cipher lis
[all...]
H A Ds2_srvr.c401 s->session->cipher= cp;
452 is_export=SSL_C_IS_EXPORT(s->session->cipher);
461 if (s->session->cipher->algorithm2 & SSL2_CF_8_BYTE_ENC)
492 /* incorrect number of key bytes for non export cipher */
588 /* get session-id before cipher stuff so we can get out session
677 /* done cipher selection */
784 s2n(n,p); /* add cipher length */
H A Ds3_srvr.c120 * ECC cipher suite support in OpenSSL originally written by
340 * message only if the cipher suite is either
505 s->session->cipher=s->s3->tmp.new_cipher;
817 /* we need a cipher if we are not resuming a session */
836 /* If it is a hit, check that the cipher is in the list */
840 id=s->session->cipher->id;
863 s->session->cipher=sk_SSL_CIPHER_value(ciphers, 0);
867 /* we need to have the cipher in the cipher
949 * pick a cipher */
[all...]
H A Dssl_lib.c115 * ECC cipher suite support in OpenSSL originally developed by
173 * the old cipher. It is sort of a SSL_clear_lite :-) */
1166 * was unable to find a cipher matching the given rule string
1167 * (for example if the rule string specifies a cipher which
1382 /* ret->cipher=NULL;*/
1556 void ssl_set_cert_masks(CERT *c, SSL_CIPHER *cipher) argument
1573 kl=SSL_C_EXPORT_PKEYLENGTH(cipher);
1666 * ECDSA cipher suites depending on the key usage extension.
1847 EVP_PKEY *ssl_get_sign_pkey(SSL *s,SSL_CIPHER *cipher) argument
1852 alg=cipher
[all...]
H A Dd1_pkt.c644 * Change cipher spec protocol
834 (s->session != NULL) && (s->session->cipher != NULL))
1357 (EVP_CIPHER_mode( s->enc_write_ctx->cipher ) & EVP_CIPH_CBC_MODE))
1358 bs = EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
H A Ds3_pkt.c779 * Change cipher spec protocol
963 (s->session != NULL) && (s->session->cipher != NULL))
1089 /* Check we have a cipher to change to */
1228 s->session->cipher=s->s3->tmp.new_cipher;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/test/
H A Dssltest.c113 * ECC cipher suite support in OpenSSL originally developed by
213 static char *cipher=NULL; variable
265 fprintf(stderr," -cipher arg - The cipher list\n");
276 fprintf(stderr," -test_cipherlist - verifies the order of the ssl cipher lists\n");
285 BIO_printf(bio_stdout,"%s%s, cipher %s %s",
431 cipher = 0;
550 else if (strcmp(*argv,"-cipher") == 0)
553 cipher= *(++argv);
625 /* ensure that the cipher lis
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/x86_64/crypto/
H A Daes.c310 .cipher = {
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/threads/
H A Dmttest.c111 static char *cipher=NULL; variable
246 if (cipher == NULL && OPENSSL_issetugid() == 0)
247 cipher=getenv("SSL_CIPHER");
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/threads/
H A Dmttest.c135 static char *cipher=NULL; variable
270 if (cipher == NULL && OPENSSL_issetugid() == 0)
271 cipher=getenv("SSL_CIPHER");
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/
H A Deap.c651 u_char clear[8], cipher[8], dig[SHA_DIGESTSIZE], *optr, *cp; local
780 if (!DesEncrypt(clear, cipher)) {
786 outp += b64enc(&b64, cipher, 8, outp);
788 (void) DesEncrypt(cp, cipher);
789 outp += b64enc(&b64, cipher, 8, outp);
800 (void) DesEncrypt(clear, cipher);
801 outp += b64enc(&b64, cipher, 8, outp);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/networking/
H A Dhttpd.c1483 char *cipher; local
1495 cipher = pw_encrypt(u+1, pp);
1496 if (strcmp(cipher, pp) == 0)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/crypto/
H A Dgeode-aes.c208 .cipher = {
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ecryptfs/
H A Decryptfs_kernel.h245 unsigned char cipher[ECRYPTFS_MAX_CIPHER_NAME_SIZE]; member in struct:ecryptfs_crypt_stat
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/src/
H A DMakefile342 cipher.h cipher-proto.h \
368 ../cipher/libcipher.la \
375 ../cipher/libcipher.la \
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs7/
H A Dpk7_doit.c129 evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher;
140 evp_cipher=p7->d.enveloped->enc_data->cipher;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/util/
H A Dmk1mf.pl59 no-rc2 no-rc4 no-rc5 no-idea no-des - Skip this symetric cipher
61 no-rsa no-dsa no-dh - Skip this public key cipher
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/
H A Dpk7_doit.c167 evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher;
178 evp_cipher=p7->d.enveloped->enc_data->cipher;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/util/
H A Dmk1mf.pl65 no-rc2 no-rc4 no-rc5 no-idea no-des - Skip this symetric cipher
67 no-rsa no-dsa no-dh - Skip this public key cipher

Completed in 313 milliseconds

12345678910