Searched refs:ciphers (Results 1 - 25 of 50) sorted by relevance

12

/freebsd-10.0-release/crypto/openssh/regress/
H A Dtry-ciphers.sh1 # $OpenBSD: try-ciphers.sh,v 1.20 2013/05/17 10:16:26 dtucker Exp $
4 tid="try ciphers"
6 ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc
11 ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com"
22 for c in $ciphers; do
39 ciphers="3des blowfish"
40 for c in $ciphers; do
H A Dcipher-speed.sh14 ciphers="aes128-cbc 3des-cbc blowfish-cbc cast128-cbc
19 ciphers="$ciphers aes128-gcm@openssh.com aes256-gcm@openssh.com"
25 for c in $ciphers; do n=0; for m in $macs; do
45 ciphers="3des blowfish"
46 for c in $ciphers; do
H A Dssh-com.sh90 ciphers="3des-cbc blowfish-cbc arcfour"
94 ciphers="$ciphers cast128-cbc"
98 ciphers="$ciphers aes128-cbc cast128-cbc"
102 #ciphers="3des-cbc"
104 for c in $ciphers; do
H A DMakefile29 try-ciphers \
68 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
/freebsd-10.0-release/crypto/openssl/crypto/engine/
H A Dtb_cipher.c76 if(e->ciphers)
79 int num_nids = e->ciphers(e, NULL, &nids, 0);
98 if(e->ciphers)
101 int num_nids = e->ciphers(e, NULL, &nids, 0);
135 return e->ciphers;
141 e->ciphers = f;
H A Deng_cryptodev.c143 } ciphers[] = { variable in typeref:struct:__anon5117
235 * Find out what ciphers /dev/crypto will let us have a session for.
254 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) {
255 if (ciphers[i].nid == NID_undef)
257 sess.cipher = ciphers[i].id;
258 sess.keylen = ciphers[i].keylen;
262 nids[count++] = ciphers[i].nid;
314 * Find the useable ciphers|digests from dev/crypto - this is the first
316 * can use for ciphers from this engine. We want to return
425 for (i = 0; ciphers[
[all...]
H A Deng_int.h167 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
H A Deng_list.c337 dest->ciphers = src->ciphers;
/freebsd-10.0-release/crypto/openssl/apps/
H A Dciphers.c1 /* apps/ciphers.c */
73 "usage: ciphers args\n",
74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
93 char *ciphers=NULL; local
143 ciphers= *argv;
160 if (ciphers != NULL) {
161 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
H A Dprogs.pl34 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
/freebsd-10.0-release/sys/net80211/
H A Dieee80211_crypto.c56 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable in typeref:struct:ieee80211_cipher
145 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none;
201 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) {
206 ciphers[cip->ic_cipher] = cip;
220 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) {
227 ciphers[cip->ic_cipher] = NULL;
233 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL;
285 cip = ciphers[ciphe
[all...]
/freebsd-10.0-release/contrib/wpa/src/tls/
H A Dtlsv1_client.h41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
H A Dtlsv1_server.h37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dtls_none.c137 u8 *ciphers)
136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_internal.c520 u8 *ciphers)
524 return tlsv1_client_set_cipher_list(conn->client, ciphers);
528 return tlsv1_server_set_cipher_list(conn->server, ciphers);
519 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls.h429 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
435 u8 *ciphers);
/freebsd-10.0-release/crypto/openssh/
H A Dreadconf.h78 char *ciphers; /* SSH2 ciphers in order of preference. */ member in struct:__anon4957
H A Dcipher.c71 static const struct Cipher ciphers[] = { variable in typeref:struct:Cipher
104 /* Returns a comma-separated list of supported ciphers. */
112 for (c = ciphers; c->name != NULL; c++) {
177 for (c = ciphers; c->name != NULL; c++)
187 for (c = ciphers; c->name != NULL; c++)
220 debug3("ciphers ok: [%s]", names);
236 for (c = ciphers; c->name != NULL; c++)
H A Dservconf.h90 char *ciphers; /* Supported SSH2 ciphers. */ member in struct:__anon4965
/freebsd-10.0-release/secure/usr.bin/openssl/
H A DMakefile15 SRCS+= app_rand.c apps.c asn1pars.c ca.c ciphers.c cms.c crl.c crl2p7.c \
/freebsd-10.0-release/contrib/wpa/src/ap/
H A Dwpa_auth_ie.c382 int ciphers, key_mgmt, res, version; local
512 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
514 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
515 if (!ciphers) {
531 if (ciphers & WPA_CIPHER_TKIP) {
567 if (ciphers & WPA_CIPHER_CCMP)
569 else if (ciphers & WPA_CIPHER_GCMP)
/freebsd-10.0-release/crypto/openssl/ssl/
H A Ds3_srvr.c960 STACK_OF(SSL_CIPHER) *ciphers=NULL;
1136 if ((i > 0) && (ssl_bytes_to_cipher_list(s,p,i,&(ciphers))
1150 fprintf(stderr,"client sent %d ciphers\n",sk_SSL_CIPHER_num(ciphers));
1152 for (i=0; i<sk_SSL_CIPHER_num(ciphers); i++)
1154 c=sk_SSL_CIPHER_value(ciphers,i);
1157 i,sk_SSL_CIPHER_num(ciphers),
1170 if (j == 0 && (s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && (sk_SSL_CIPHER_num(ciphers) == 1))
1177 c = sk_SSL_CIPHER_value(ciphers, 0);
1255 ciphers,
[all...]
H A Ds23_clnt.c262 STACK_OF(SSL_CIPHER) *ciphers;
264 ciphers = SSL_get_ciphers(s);
265 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++)
267 cipher = sk_SSL_CIPHER_value(ciphers, i);
443 /* no ciphers */
514 * as hack workaround chop number of supported ciphers
/freebsd-10.0-release/contrib/wpa/src/common/
H A Dwpa_common.c1166 int rsn_cipher_put_suites(u8 *pos, int ciphers) argument
1170 if (ciphers & WPA_CIPHER_CCMP) {
1175 if (ciphers & WPA_CIPHER_GCMP) {
1180 if (ciphers & WPA_CIPHER_TKIP) {
1185 if (ciphers & WPA_CIPHER_NONE) {
1195 int wpa_cipher_put_suites(u8 *pos, int ciphers) argument
1199 if (ciphers & WPA_CIPHER_CCMP) {
1204 if (ciphers & WPA_CIPHER_TKIP) {
1209 if (ciphers & WPA_CIPHER_NONE) {
/freebsd-10.0-release/crypto/heimdal/lib/hx509/
H A Dcrypto.c2278 static const struct hx509cipher ciphers[] = { variable in typeref:struct:hx509cipher
2358 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++)
2359 if (der_heim_oid_cmp(oid, ciphers[i].oid) == 0)
2360 return &ciphers[i];
2370 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++)
2371 if (strcasecmp(name, ciphers[i].name) == 0)
2372 return &ciphers[i];
3168 for (i = 0; i < sizeof(ciphers)/sizeo
[all...]

Completed in 152 milliseconds

12