/freebsd-10.0-release/crypto/openssh/regress/ |
H A D | try-ciphers.sh | 1 # $OpenBSD: try-ciphers.sh,v 1.20 2013/05/17 10:16:26 dtucker Exp $ 4 tid="try ciphers" 6 ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc 11 ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com" 22 for c in $ciphers; do 39 ciphers="3des blowfish" 40 for c in $ciphers; do
|
H A D | cipher-speed.sh | 14 ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc 19 ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com" 25 for c in $ciphers; do n=0; for m in $macs; do 45 ciphers="3des blowfish" 46 for c in $ciphers; do
|
H A D | ssh-com.sh | 90 ciphers="3des-cbc blowfish-cbc arcfour" 94 ciphers="$ciphers cast128-cbc" 98 ciphers="$ciphers aes128-cbc cast128-cbc" 102 #ciphers="3des-cbc" 104 for c in $ciphers; do
|
H A D | Makefile | 29 try-ciphers \ 68 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
|
/freebsd-10.0-release/crypto/openssl/crypto/engine/ |
H A D | tb_cipher.c | 76 if(e->ciphers) 79 int num_nids = e->ciphers(e, NULL, &nids, 0); 98 if(e->ciphers) 101 int num_nids = e->ciphers(e, NULL, &nids, 0); 135 return e->ciphers; 141 e->ciphers = f;
|
H A D | eng_cryptodev.c | 143 } ciphers[] = { variable in typeref:struct:__anon5117 235 * Find out what ciphers /dev/crypto will let us have a session for. 254 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) { 255 if (ciphers[i].nid == NID_undef) 257 sess.cipher = ciphers[i].id; 258 sess.keylen = ciphers[i].keylen; 262 nids[count++] = ciphers[i].nid; 314 * Find the useable ciphers|digests from dev/crypto - this is the first 316 * can use for ciphers from this engine. We want to return 425 for (i = 0; ciphers[ [all...] |
H A D | eng_int.h | 167 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
|
H A D | eng_list.c | 337 dest->ciphers = src->ciphers;
|
/freebsd-10.0-release/crypto/openssl/apps/ |
H A D | ciphers.c | 1 /* apps/ciphers.c */ 73 "usage: ciphers args\n", 74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n", 93 char *ciphers=NULL; local 143 ciphers= *argv; 160 if (ciphers != NULL) { 161 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
|
H A D | progs.pl | 34 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
|
/freebsd-10.0-release/sys/net80211/ |
H A D | ieee80211_crypto.c | 56 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable in typeref:struct:ieee80211_cipher 145 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none; 201 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { 206 ciphers[cip->ic_cipher] = cip; 220 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { 227 ciphers[cip->ic_cipher] = NULL; 233 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL; 285 cip = ciphers[ciphe [all...] |
/freebsd-10.0-release/contrib/wpa/src/tls/ |
H A D | tlsv1_client.h | 41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
H A D | tlsv1_server.h | 37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | tls_none.c | 137 u8 *ciphers) 136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
H A D | tls_internal.c | 520 u8 *ciphers) 524 return tlsv1_client_set_cipher_list(conn->client, ciphers); 528 return tlsv1_server_set_cipher_list(conn->server, ciphers); 519 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
H A D | tls.h | 429 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 435 u8 *ciphers);
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | readconf.h | 78 char *ciphers; /* SSH2 ciphers in order of preference. */ member in struct:__anon4957
|
H A D | cipher.c | 71 static const struct Cipher ciphers[] = { variable in typeref:struct:Cipher 104 /* Returns a comma-separated list of supported ciphers. */ 112 for (c = ciphers; c->name != NULL; c++) { 177 for (c = ciphers; c->name != NULL; c++) 187 for (c = ciphers; c->name != NULL; c++) 220 debug3("ciphers ok: [%s]", names); 236 for (c = ciphers; c->name != NULL; c++)
|
H A D | servconf.h | 90 char *ciphers; /* Supported SSH2 ciphers. */ member in struct:__anon4965
|
/freebsd-10.0-release/secure/usr.bin/openssl/ |
H A D | Makefile | 15 SRCS+= app_rand.c apps.c asn1pars.c ca.c ciphers.c cms.c crl.c crl2p7.c \
|
/freebsd-10.0-release/contrib/wpa/src/ap/ |
H A D | wpa_auth_ie.c | 382 int ciphers, key_mgmt, res, version; local 512 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 514 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 515 if (!ciphers) { 531 if (ciphers & WPA_CIPHER_TKIP) { 567 if (ciphers & WPA_CIPHER_CCMP) 569 else if (ciphers & WPA_CIPHER_GCMP)
|
/freebsd-10.0-release/crypto/openssl/ssl/ |
H A D | s3_srvr.c | 960 STACK_OF(SSL_CIPHER) *ciphers=NULL; 1136 if ((i > 0) && (ssl_bytes_to_cipher_list(s,p,i,&(ciphers)) 1150 fprintf(stderr,"client sent %d ciphers\n",sk_SSL_CIPHER_num(ciphers)); 1152 for (i=0; i<sk_SSL_CIPHER_num(ciphers); i++) 1154 c=sk_SSL_CIPHER_value(ciphers,i); 1157 i,sk_SSL_CIPHER_num(ciphers), 1170 if (j == 0 && (s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && (sk_SSL_CIPHER_num(ciphers) == 1)) 1177 c = sk_SSL_CIPHER_value(ciphers, 0); 1255 ciphers, [all...] |
H A D | s23_clnt.c | 262 STACK_OF(SSL_CIPHER) *ciphers; 264 ciphers = SSL_get_ciphers(s); 265 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) 267 cipher = sk_SSL_CIPHER_value(ciphers, i); 443 /* no ciphers */ 514 * as hack workaround chop number of supported ciphers
|
/freebsd-10.0-release/contrib/wpa/src/common/ |
H A D | wpa_common.c | 1166 int rsn_cipher_put_suites(u8 *pos, int ciphers) argument 1170 if (ciphers & WPA_CIPHER_CCMP) { 1175 if (ciphers & WPA_CIPHER_GCMP) { 1180 if (ciphers & WPA_CIPHER_TKIP) { 1185 if (ciphers & WPA_CIPHER_NONE) { 1195 int wpa_cipher_put_suites(u8 *pos, int ciphers) argument 1199 if (ciphers & WPA_CIPHER_CCMP) { 1204 if (ciphers & WPA_CIPHER_TKIP) { 1209 if (ciphers & WPA_CIPHER_NONE) {
|
/freebsd-10.0-release/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 2278 static const struct hx509cipher ciphers[] = { variable in typeref:struct:hx509cipher 2358 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++) 2359 if (der_heim_oid_cmp(oid, ciphers[i].oid) == 0) 2360 return &ciphers[i]; 2370 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++) 2371 if (strcasecmp(name, ciphers[i].name) == 0) 2372 return &ciphers[i]; 3168 for (i = 0; i < sizeof(ciphers)/sizeo [all...] |