/freebsd-11-stable/crypto/openssl/crypto/engine/ |
H A D | tb_cipher.c | 78 if (e->ciphers) { 80 int num_nids = e->ciphers(e, NULL, &nids, 0); 99 if (e->ciphers) { 101 int num_nids = e->ciphers(e, NULL, &nids, 0); 135 return e->ciphers; 141 e->ciphers = f;
|
H A D | eng_cryptodev.c | 145 } ciphers[] = { variable in typeref:struct:__anon4566 282 * Find out what ciphers /dev/crypto will let us have a session for. 300 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) { 301 if (ciphers[i].nid == NID_undef) 303 sess.cipher = ciphers[i].id; 304 sess.keylen = ciphers[i].keylen; 308 nids[count++] = ciphers[i].nid; 359 * Find the useable ciphers|digests from dev/crypto - this is the first 361 * can use for ciphers from this engine. We want to return 469 for (i = 0; ciphers[ [all...] |
H A D | eng_int.h | 187 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
|
H A D | eng_list.c | 313 dest->ciphers = src->ciphers;
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | try-ciphers.sh | 1 # $OpenBSD: try-ciphers.sh,v 1.25 2015/03/24 20:22:17 markus Exp $ 4 tid="try ciphers" 20 # No point trying all MACs for AEAD ciphers since they 30 ciphers="3des blowfish" 32 ciphers="" 34 for c in $ciphers; do
|
H A D | cipher-speed.sh | 27 # No point trying all MACs for AEAD ciphers since they are ignored. 35 ciphers="3des blowfish" 37 ciphers="" 39 for c in $ciphers; do
|
H A D | ssh-com.sh | 90 ciphers="3des-cbc blowfish-cbc arcfour" 94 ciphers="$ciphers cast128-cbc" 98 ciphers="$ciphers aes128-cbc cast128-cbc" 102 #ciphers="3des-cbc" 104 for c in $ciphers; do
|
H A D | Makefile | 32 try-ciphers \ 87 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | ciphers.c | 1 /* apps/ciphers.c */ 73 "usage: ciphers args\n", 74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n", 96 char *ciphers = NULL; local 145 ciphers = *argv; 162 if (ciphers != NULL) { 163 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
|
H A D | progs.pl | 34 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
|
/freebsd-11-stable/sys/net80211/ |
H A D | ieee80211_crypto.c | 56 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable in typeref:struct:ieee80211_cipher 144 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none; 200 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { 205 ciphers[cip->ic_cipher] = cip; 219 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { 226 ciphers[cip->ic_cipher] = NULL; 232 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL; 284 cip = ciphers[ciphe [all...] |
/freebsd-11-stable/secure/usr.bin/openssl/ |
H A D | Makefile.man | 6 MAN+= ciphers.1 50 MLINKS+= ciphers.1 openssl-ciphers.1
|
H A D | Makefile | 14 SRCS+= app_rand.c apps.c asn1pars.c ca.c ciphers.c cms.c crl.c crl2p7.c \
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_server.h | 38 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
H A D | tlsv1_client.h | 42 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | wpa_common.c | 2334 int rsn_cipher_put_suites(u8 *start, int ciphers) argument 2338 if (ciphers & WPA_CIPHER_CCMP_256) { 2342 if (ciphers & WPA_CIPHER_GCMP_256) { 2346 if (ciphers & WPA_CIPHER_CCMP) { 2350 if (ciphers & WPA_CIPHER_GCMP) { 2354 if (ciphers & WPA_CIPHER_TKIP) { 2358 if (ciphers & WPA_CIPHER_NONE) { 2367 int wpa_cipher_put_suites(u8 *start, int ciphers) argument 2371 if (ciphers & WPA_CIPHER_CCMP) { 2375 if (ciphers 2388 wpa_pick_pairwise_cipher(int ciphers, int none_allowed) argument 2406 wpa_pick_group_cipher(int ciphers) argument 2485 wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim) argument [all...] |
H A D | wpa_common.h | 481 int rsn_cipher_put_suites(u8 *pos, int ciphers); 482 int wpa_cipher_put_suites(u8 *pos, int ciphers); 483 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed); 484 int wpa_pick_group_cipher(int ciphers); 486 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
|
/freebsd-11-stable/crypto/openssh/ |
H A D | readconf.h | 74 char *ciphers; /* SSH2 ciphers in order of preference. */ member in struct:__anon4508
|
H A D | cipher.c | 89 static const struct sshcipher ciphers[] = { variable in typeref:struct:sshcipher 141 /* Returns a comma-separated list of supported ciphers. */ 149 for (c = ciphers; c->name != NULL; c++) { 245 for (c = ciphers; c->name != NULL; c++) 255 for (c = ciphers; c->name != NULL; c++) 296 for (c = ciphers; c->name != NULL; c++)
|
H A D | servconf.h | 91 char *ciphers; /* Supported SSH2 ciphers. */ member in struct:__anon4516
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | tls_none.c | 152 u8 *ciphers) 151 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 252 dest->ciphers = NULL; 295 if(src->ciphers != NULL) { 296 dest->ciphers = sk_SSL_CIPHER_dup(src->ciphers); 297 if (dest->ciphers == NULL) 880 if (ss->ciphers != NULL) 881 sk_SSL_CIPHER_free(ss->ciphers);
|
H A D | s3_srvr.c | 923 STACK_OF(SSL_CIPHER) *ciphers = NULL; 1164 if (ssl_bytes_to_cipher_list(s, p, i, &(ciphers)) == NULL) { 1175 fprintf(stderr, "client sent %d ciphers\n", 1176 sk_SSL_CIPHER_num(ciphers)); 1178 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { 1179 c = sk_SSL_CIPHER_value(ciphers, i); 1182 i, sk_SSL_CIPHER_num(ciphers), SSL_CIPHER_get_name(c)); 1195 && (sk_SSL_CIPHER_num(ciphers) == 1)) { 1203 c = sk_SSL_CIPHER_value(ciphers, 0); 1273 &s->session->master_key_length, ciphers, [all...] |
H A D | s23_clnt.c | 267 STACK_OF(SSL_CIPHER) *ciphers; 269 ciphers = SSL_get_ciphers(s); 270 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { 271 cipher = sk_SSL_CIPHER_value(ciphers, i); 442 /* no ciphers */ 517 * workaround chop number of supported ciphers to keep it well
|
H A D | s2_srvr.c | 405 if (cp == NULL || sk_SSL_CIPHER_find(s->session->ciphers, cp) < 0) { 677 &s->session->ciphers); 693 /* Generate list of SSLv2 ciphers shared between client and server */ 703 sk_SSL_CIPHER_free(s->session->ciphers); 704 s->session->ciphers = prio; 708 if (sk_SSL_CIPHER_num(s->session->ciphers) == 0) { 714 * s->session->ciphers should now have a list of ciphers that are on 716 * client sent the ciphers or in the order of the server's preference 800 s2n(0, p); /* ciphers le [all...] |