Searched refs:cipher (Results 176 - 197 of 197) sorted by relevance

12345678

/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_sake.c23 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon3735
/freebsd-11-stable/crypto/openssl/ssl/
H A Ds3_lib.c120 * ECC cipher suite support in OpenSSL originally written by
3483 const SSL_CIPHER *cipher; local
3486 cipher = s->s3->tmp.new_cipher;
3487 if (!cipher)
3493 if (cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP))
4102 fprintf(stderr, "Unknown cipher ID %x\n", (p[0] << 8) | p[1]);
4230 * if we are considering an ECC cipher suite that uses an ephemeral
4362 * ECDSA certs can be used with RSA cipher suites as well so we don't
H A Dssl_lib.c115 * ECC cipher suite support in OpenSSL originally developed by
214 * the old cipher. It is sort of a SSL_clear_lite :-)
1375 * find a cipher matching the given rule string (for example if the rule
1376 * string specifies a cipher which has been disabled). This is not an
1939 /* ret->cipher=NULL;*/
2254 void ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) argument
2275 kl = SSL_C_EXPORT_PKEYLENGTH(cipher);
2390 * An ECC certificate may be usable for ECDH and/or ECDSA cipher suites
2581 EVP_PKEY *ssl_get_sign_pkey(SSL *s, const SSL_CIPHER *cipher, argument
2588 alg_a = cipher
[all...]
H A Ds3_srvr.c120 * ECC cipher suite support in OpenSSL originally written by
472 * the cipher suite is either ECDH-anon or ECDHE. In other cases,
784 s->session->cipher = s->s3->tmp.new_cipher;
1157 /* i bytes of cipher data + 1 byte for compression length later */
1169 /* If it is a hit, check that the cipher is in the list */
1172 id = s->session->cipher->id;
1198 * cipher may not be in the current list, the client instead
1199 * might be trying to continue using a cipher that before wasn't
1201 * connection if the cipher is not enabled, though.
1205 s->session->cipher
[all...]
H A Dssl.h113 * ECC cipher suite support in OpenSSL originally developed by
328 * to the default cipher setup will also be included here.
338 * The following cipher list is used by default. It also is substituted when
339 * an application-defined cipher list string starts with 'DEFAULT'.
396 SSL_CIPHER **cipher, void *arg);
460 int (*put_cipher_by_char) (const SSL_CIPHER *cipher, unsigned char *ptr);
477 * Cipher OCTET STRING, -- the 3 byte cipher ID
548 const SSL_CIPHER *cipher; member in struct:ssl_session_st
550 * to load the 'cipher' structure */
633 * Set on servers to choose the cipher accordin
[all...]
H A Ds3_clnt.c120 * ECC cipher suite support in OpenSSL originally written by
447 * cipher suites with ECDH (rather than ECDSA) certificates. We
490 s->session->cipher = s->s3->tmp.new_cipher;
1013 s->session->cipher = pref_cipher ?
1053 /* unknown cipher */
1064 * If it is a disabled cipher we didn't send it in client hello, so
1078 /* we did not say we would use this cipher */
1085 * Depending on the session caching (internal/external), the cipher
1089 if (s->session->cipher)
1090 s->session->cipher_id = s->session->cipher
[all...]
H A Dssl_locl.h113 * ECC cipher suite support in OpenSSL originally developed by
284 * Use the according functions for cipher management instead.
371 /* Not a real MAC, just an indication it is part of cipher */
412 * Export and cipher strength information. For each cipher we have to decide
416 * Independent of the export flag the cipher strength is sorted into classes.
418 * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change
446 * Macros to check the export status and cipher strength for export ciphers.
450 * *_EXPORT40/56 macros are used to check whether a certain cipher strength
498 * as with TLS1.2 cipher w
[all...]
H A Dd1_both.c293 blocksize = 2 * EVP_CIPHER_block_size(s->enc_write_ctx->cipher);
H A Dd1_pkt.c834 * Change cipher spec protocol
1145 (s->session != NULL) && (s->session->cipher != NULL)) {
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/
H A Dpk7_doit.c298 evp_cipher = p7->d.signed_and_enveloped->enc_data->cipher;
307 evp_cipher = p7->d.enveloped->enc_data->cipher;
/freebsd-11-stable/sys/dev/if_ndis/
H A Dif_ndis.c2210 ndis_set_cipher(struct ndis_softc *sc, int cipher) argument
2218 if (cipher == WPA_CSE_WEP40 || cipher == WPA_CSE_WEP104) {
2224 if (cipher == WPA_CSE_TKIP) {
2230 if (cipher == WPA_CSE_CCMP) {
2236 DPRINTF(("Setting cipher to %d\n", arg));
2243 /* Check that the cipher was set correctly. */
2290 /* Skip over the ucast cipher OIDs. */
2321 /* First, set up the multicast group cipher. */
3132 * cipher ye
[all...]
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Dcrypto.c1793 return krb5_encrypt(context, crypto, usage, data, len, &result->cipher);
1835 e->cipher.data, e->cipher.length, result);
/freebsd-11-stable/crypto/openssl/apps/
H A Ds_server.c113 * ECC cipher suite support in OpenSSL originally developed by
574 " -cipher arg - play with 'openssl ciphers' to see what goes here\n");
575 BIO_printf(bio_err, " -serverpref - Use server's cipher preferences\n");
1810 if (cipher == NULL)
1811 cipher = getenv("SSL_CIPHER");
/freebsd-11-stable/sys/dev/ath/ath_hal/ar5416/
H A Dar5416_xmit.c521 * NB: cipher is no longer used, it's calculated.
531 HAL_CIPHER cipher,
524 ar5416ChainTxDesc(struct ath_hal *ah, struct ath_desc *ds, HAL_DMA_ADDR *bufAddrList, uint32_t *segLenList, u_int pktLen, u_int hdrLen, HAL_PKT_TYPE type, u_int keyIx, HAL_CIPHER cipher, uint8_t delims, HAL_BOOL firstSeg, HAL_BOOL lastSeg, HAL_BOOL lastAggr) argument
/freebsd-11-stable/crypto/openssl/crypto/aes/asm/
H A Daesp8-ppc.pl440 v${n}cipher v0,v0,v2
444 v${n}cipher v0,v0,v1
450 v${n}cipher v0,v0,v2
/freebsd-11-stable/sys/dev/usb/wlan/
H A Dif_run.c2229 u_int cipher = k->wk_cipher->ic_cipher; local
2242 /* map net80211 cipher to RT2860 security mode */
2243 switch (cipher) {
2276 if (cipher == IEEE80211_CIPHER_TKIP) {
2292 if (cipher == IEEE80211_CIPHER_WEP) {
2296 if (cipher == IEEE80211_CIPHER_TKIP) {
H A Dif_zydreg.h1064 uint8_t cipher; member in struct:zyd_rx_stat
/freebsd-11-stable/sys/dev/otus/
H A Dif_otusreg.h325 uint16_t cipher; member in struct:ar_cmd_ekey
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dconfig.c1087 wpa_printf(MSG_ERROR, "Line %d: invalid cipher '%s'.",
1092 wpa_printf(MSG_ERROR, "Line %d: no cipher values configured.",
1102 static char * wpa_config_write_cipher(int cipher) argument
1111 if (wpa_write_ciphers(buf, buf + 50, cipher, " ") < 0) {
1131 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher "
1169 wpa_printf(MSG_ERROR, "Line %d: not allowed group cipher "
1203 "Line %d: not allowed group management cipher (0x%x).",
H A DAndroid.mk1126 OBJS += src/crypto/crypto_internal-cipher.c
H A Dctrl_iface.c2570 static char * wpa_supplicant_cipher_txt(char *pos, char *end, int cipher) argument
2577 ret = wpa_write_ciphers(pos, end, cipher, "+");
/freebsd-11-stable/sys/dev/iwm/
H A Dif_iwmreg.h815 * struct iwm_fw_cipher_scheme - a cipher scheme supported by FW.
816 * @cipher: a cipher suite selector
817 * @flags: cipher scheme flags (currently reserved for a future use)
825 * @hw_cipher: a HW cipher index used in host commands
828 uint32_t cipher; member in struct:iwm_fw_cipher_scheme
841 * struct iwm_fw_cscheme_list - a cipher scheme list
843 * @cs: cipher scheme entries
5515 * @IWM_STA_KEY_FLG_EXT: extended cipher algorithm (depends on the FW support)

Completed in 427 milliseconds

12345678