Searched refs:ciphers (Results 1 - 25 of 50) sorted by relevance

12

/freebsd-10.1-release/crypto/openssl/crypto/engine/
H A Dtb_cipher.c78 if (e->ciphers) {
80 int num_nids = e->ciphers(e, NULL, &nids, 0);
99 if (e->ciphers) {
101 int num_nids = e->ciphers(e, NULL, &nids, 0);
135 return e->ciphers;
141 e->ciphers = f;
H A Deng_cryptodev.c144 } ciphers[] = { variable in typeref:struct:__anon136
270 * Find out what ciphers /dev/crypto will let us have a session for.
288 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) {
289 if (ciphers[i].nid == NID_undef)
291 sess.cipher = ciphers[i].id;
292 sess.keylen = ciphers[i].keylen;
296 nids[count++] = ciphers[i].nid;
347 * Find the useable ciphers|digests from dev/crypto - this is the first
349 * can use for ciphers from this engine. We want to return
457 for (i = 0; ciphers[
[all...]
H A Deng_int.h187 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
H A Deng_list.c311 dest->ciphers = src->ciphers;
/freebsd-10.1-release/crypto/openssh/regress/
H A Dtry-ciphers.sh1 # $OpenBSD: try-ciphers.sh,v 1.22 2013/11/21 03:18:51 djm Exp $
4 tid="try ciphers"
15 # No point trying all MACs for AEAD ciphers since they
24 ciphers="3des blowfish"
25 for c in $ciphers; do
H A Dssh-com.sh90 ciphers="3des-cbc blowfish-cbc arcfour"
94 ciphers="$ciphers cast128-cbc"
98 ciphers="$ciphers aes128-cbc cast128-cbc"
102 #ciphers="3des-cbc"
104 for c in $ciphers; do
H A Dcipher-speed.sh27 # No point trying all MACs for AEAD ciphers since they are ignored.
34 ciphers="3des blowfish"
35 for c in $ciphers; do
H A DMakefile29 try-ciphers \
70 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
/freebsd-10.1-release/crypto/openssl/apps/
H A Dciphers.c1 /* apps/ciphers.c */
73 "usage: ciphers args\n",
74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
93 char *ciphers = NULL; local
138 ciphers = *argv;
155 if (ciphers != NULL) {
156 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
H A Dprogs.pl34 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
/freebsd-10.1-release/sys/net80211/
H A Dieee80211_crypto.c56 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable in typeref:struct:ieee80211_cipher
145 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none;
201 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) {
206 ciphers[cip->ic_cipher] = cip;
220 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) {
227 ciphers[cip->ic_cipher] = NULL;
233 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL;
285 cip = ciphers[ciphe
[all...]
/freebsd-10.1-release/contrib/wpa/src/tls/
H A Dtlsv1_client.h41 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
H A Dtlsv1_server.h37 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
/freebsd-10.1-release/contrib/wpa/src/crypto/
H A Dtls_none.c137 u8 *ciphers)
136 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_internal.c520 u8 *ciphers)
524 return tlsv1_client_set_cipher_list(conn->client, ciphers);
528 return tlsv1_server_set_cipher_list(conn->server, ciphers);
519 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls.h429 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
435 u8 *ciphers);
/freebsd-10.1-release/secure/usr.bin/openssl/
H A DMakefile15 SRCS+= app_rand.c apps.c asn1pars.c ca.c ciphers.c cms.c crl.c crl2p7.c \
/freebsd-10.1-release/crypto/openssh/
H A Dcipher.c75 static const struct Cipher ciphers[] = { variable in typeref:struct:Cipher
110 /* Returns a list of supported ciphers separated by the specified char. */
118 for (c = ciphers; c->name != NULL; c++) {
198 for (c = ciphers; c->name != NULL; c++)
208 for (c = ciphers; c->name != NULL; c++)
239 debug3("ciphers ok: [%s]", names);
255 for (c = ciphers; c->name != NULL; c++)
H A Dreadconf.h83 char *ciphers; /* SSH2 ciphers in order of preference. */ member in struct:__anon5151
H A Dservconf.h91 char *ciphers; /* Supported SSH2 ciphers. */ member in struct:__anon5161
/freebsd-10.1-release/contrib/wpa/src/ap/
H A Dwpa_auth_ie.c382 int ciphers, key_mgmt, res, version; local
512 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
514 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
515 if (!ciphers) {
531 if (ciphers & WPA_CIPHER_TKIP) {
567 if (ciphers & WPA_CIPHER_CCMP)
569 else if (ciphers & WPA_CIPHER_GCMP)
/freebsd-10.1-release/crypto/openssl/ssl/
H A Ds3_srvr.c979 STACK_OF(SSL_CIPHER) *ciphers = NULL;
1185 if (ssl_bytes_to_cipher_list(s, p, i, &(ciphers)) == NULL) {
1196 fprintf(stderr, "client sent %d ciphers\n",
1197 sk_SSL_CIPHER_num(ciphers));
1199 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) {
1200 c = sk_SSL_CIPHER_value(ciphers, i);
1203 i, sk_SSL_CIPHER_num(ciphers), SSL_CIPHER_get_name(c));
1216 && (sk_SSL_CIPHER_num(ciphers) == 1)) {
1224 c = sk_SSL_CIPHER_value(ciphers, 0);
1298 &s->session->master_key_length, ciphers,
[all...]
H A Dssl_sess.c252 dest->ciphers = NULL;
293 if(src->ciphers != NULL) {
294 dest->ciphers = sk_SSL_CIPHER_dup(src->ciphers);
295 if (dest->ciphers == NULL)
901 if (ss->ciphers != NULL)
902 sk_SSL_CIPHER_free(ss->ciphers);
H A Ds23_clnt.c264 STACK_OF(SSL_CIPHER) *ciphers;
266 ciphers = SSL_get_ciphers(s);
267 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) {
268 cipher = sk_SSL_CIPHER_value(ciphers, i);
432 /* no ciphers */
510 * workaround chop number of supported ciphers to keep it well
/freebsd-10.1-release/contrib/wpa/src/common/
H A Dwpa_common.c1166 int rsn_cipher_put_suites(u8 *pos, int ciphers) argument
1170 if (ciphers & WPA_CIPHER_CCMP) {
1175 if (ciphers & WPA_CIPHER_GCMP) {
1180 if (ciphers & WPA_CIPHER_TKIP) {
1185 if (ciphers & WPA_CIPHER_NONE) {
1195 int wpa_cipher_put_suites(u8 *pos, int ciphers) argument
1199 if (ciphers & WPA_CIPHER_CCMP) {
1204 if (ciphers & WPA_CIPHER_TKIP) {
1209 if (ciphers & WPA_CIPHER_NONE) {

Completed in 298 milliseconds

12