/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_sake.c | 23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon3735
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | s3_lib.c | 120 * ECC cipher suite support in OpenSSL originally written by 3483 const SSL_CIPHER *cipher; local 3486 cipher = s->s3->tmp.new_cipher; 3487 if (!cipher) 3493 if (cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP)) 4102 fprintf(stderr, "Unknown cipher ID %x\n", (p[0] << 8) | p[1]); 4230 * if we are considering an ECC cipher suite that uses an ephemeral 4362 * ECDSA certs can be used with RSA cipher suites as well so we don't
|
H A D | ssl_lib.c | 115 * ECC cipher suite support in OpenSSL originally developed by 214 * the old cipher. It is sort of a SSL_clear_lite :-) 1375 * find a cipher matching the given rule string (for example if the rule 1376 * string specifies a cipher which has been disabled). This is not an 1939 /* ret->cipher=NULL;*/ 2254 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) argument 2275 kl = SSL_C_EXPORT_PKEYLENGTH(cipher); 2390 * An ECC certificate may be usable for ECDH and/or ECDSA cipher suites 2581 EVP_PKEY *ssl_get_sign_pkey(SSL *s, const SSL_CIPHER *cipher, argument 2588 alg_a = cipher [all...] |
H A D | s3_srvr.c | 120 * ECC cipher suite support in OpenSSL originally written by 472 * the cipher suite is either ECDH-anon or ECDHE. In other cases, 784 s->session->cipher = s->s3->tmp.new_cipher; 1157 /* i bytes of cipher data + 1 byte for compression length later */ 1169 /* If it is a hit, check that the cipher is in the list */ 1172 id = s->session->cipher->id; 1198 * cipher may not be in the current list, the client instead 1199 * might be trying to continue using a cipher that before wasn't 1201 * connection if the cipher is not enabled, though. 1205 s->session->cipher [all...] |
H A D | ssl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 328 * to the default cipher setup will also be included here. 338 * The following cipher list is used by default. It also is substituted when 339 * an application-defined cipher list string starts with 'DEFAULT'. 396 SSL_CIPHER **cipher, void *arg); 460 int (*put_cipher_by_char) (const SSL_CIPHER *cipher, unsigned char *ptr); 477 * Cipher OCTET STRING, -- the 3 byte cipher ID 548 const SSL_CIPHER *cipher; member in struct:ssl_session_st 550 * to load the 'cipher' structure */ 633 * Set on servers to choose the cipher accordin [all...] |
H A D | s3_clnt.c | 120 * ECC cipher suite support in OpenSSL originally written by 447 * cipher suites with ECDH (rather than ECDSA) certificates. We 490 s->session->cipher = s->s3->tmp.new_cipher; 1013 s->session->cipher = pref_cipher ? 1053 /* unknown cipher */ 1064 * If it is a disabled cipher we didn't send it in client hello, so 1078 /* we did not say we would use this cipher */ 1085 * Depending on the session caching (internal/external), the cipher 1089 if (s->session->cipher) 1090 s->session->cipher_id = s->session->cipher [all...] |
H A D | ssl_locl.h | 113 * ECC cipher suite support in OpenSSL originally developed by 284 * Use the according functions for cipher management instead. 371 /* Not a real MAC, just an indication it is part of cipher */ 412 * Export and cipher strength information. For each cipher we have to decide 416 * Independent of the export flag the cipher strength is sorted into classes. 418 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change 446 * Macros to check the export status and cipher strength for export ciphers. 450 * *_EXPORT40/56 macros are used to check whether a certain cipher strength 498 * as with TLS1.2 cipher w [all...] |
H A D | d1_both.c | 293 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
|
H A D | d1_pkt.c | 834 * Change cipher spec protocol 1145 (s->session != NULL) && (s->session->cipher != NULL)) {
|
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 298 evp_cipher = p7->d.signed_and_enveloped->enc_data->cipher; 307 evp_cipher = p7->d.enveloped->enc_data->cipher;
|
/freebsd-11-stable/sys/dev/if_ndis/ |
H A D | if_ndis.c | 2210 ndis_set_cipher(struct ndis_softc *sc, int cipher) argument 2218 if (cipher == WPA_CSE_WEP40 || cipher == WPA_CSE_WEP104) { 2224 if (cipher == WPA_CSE_TKIP) { 2230 if (cipher == WPA_CSE_CCMP) { 2236 DPRINTF(("Setting cipher to %d\n", arg)); 2243 /* Check that the cipher was set correctly. */ 2290 /* Skip over the ucast cipher OIDs. */ 2321 /* First, set up the multicast group cipher. */ 3132 * cipher ye [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | crypto.c | 1793 return krb5_encrypt(context, crypto, usage, data, len, &result->cipher); 1835 e->cipher.data, e->cipher.length, result);
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | s_server.c | 113 * ECC cipher suite support in OpenSSL originally developed by 574 " -cipher arg - play with 'openssl ciphers' to see what goes here\n"); 575 BIO_printf(bio_err, " -serverpref - Use server's cipher preferences\n"); 1810 if (cipher == NULL) 1811 cipher = getenv("SSL_CIPHER");
|
/freebsd-11-stable/sys/dev/ath/ath_hal/ar5416/ |
H A D | ar5416_xmit.c | 521 * NB: cipher is no longer used, it's calculated. 531 HAL_CIPHER cipher, 524 ar5416ChainTxDesc(struct ath_hal *ah, struct ath_desc *ds, HAL_DMA_ADDR *bufAddrList, uint32_t *segLenList, u_int pktLen, u_int hdrLen, HAL_PKT_TYPE type, u_int keyIx, HAL_CIPHER cipher, uint8_t delims, HAL_BOOL firstSeg, HAL_BOOL lastSeg, HAL_BOOL lastAggr) argument
|
/freebsd-11-stable/crypto/openssl/crypto/aes/asm/ |
H A D | aesp8-ppc.pl | 440 v${n}cipher v0,v0,v2 444 v${n}cipher v0,v0,v1 450 v${n}cipher v0,v0,v2
|
/freebsd-11-stable/sys/dev/usb/wlan/ |
H A D | if_run.c | 2229 u_int cipher = k->wk_cipher->ic_cipher; local 2242 /* map net80211 cipher to RT2860 security mode */ 2243 switch (cipher) { 2276 if (cipher == IEEE80211_CIPHER_TKIP) { 2292 if (cipher == IEEE80211_CIPHER_WEP) { 2296 if (cipher == IEEE80211_CIPHER_TKIP) {
|
H A D | if_zydreg.h | 1064 uint8_t cipher; member in struct:zyd_rx_stat
|
/freebsd-11-stable/sys/dev/otus/ |
H A D | if_otusreg.h | 325 uint16_t cipher; member in struct:ar_cmd_ekey
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | config.c | 1087 wpa_printf(MSG_ERROR, "Line %d: invalid cipher '%s'.", 1092 wpa_printf(MSG_ERROR, "Line %d: no cipher values configured.", 1102 static char * wpa_config_write_cipher(int cipher) argument 1111 if (wpa_write_ciphers(buf, buf + 50, cipher, " ") < 0) { 1131 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher " 1169 wpa_printf(MSG_ERROR, "Line %d: not allowed group cipher " 1203 "Line %d: not allowed group management cipher (0x%x).",
|
H A D | Android.mk | 1126 OBJS += src/crypto/crypto_internal-cipher.c
|
H A D | ctrl_iface.c | 2570 static char * wpa_supplicant_cipher_txt(char *pos, char *end, int cipher) argument 2577 ret = wpa_write_ciphers(pos, end, cipher, "+");
|
/freebsd-11-stable/sys/dev/iwm/ |
H A D | if_iwmreg.h | 815 * struct iwm_fw_cipher_scheme - a cipher scheme supported by FW. 816 * @cipher: a cipher suite selector 817 * @flags: cipher scheme flags (currently reserved for a future use) 825 * @hw_cipher: a HW cipher index used in host commands 828 uint32_t cipher; member in struct:iwm_fw_cipher_scheme 841 * struct iwm_fw_cscheme_list - a cipher scheme list 843 * @cs: cipher scheme entries 5515 * @IWM_STA_KEY_FLG_EXT: extended cipher algorithm (depends on the FW support)
|