Searched refs:ciphers (Results 1 - 25 of 54) sorted by relevance

123

/freebsd-11-stable/crypto/openssl/crypto/engine/
H A Dtb_cipher.c78 if (e->ciphers) {
80 int num_nids = e->ciphers(e, NULL, &nids, 0);
99 if (e->ciphers) {
101 int num_nids = e->ciphers(e, NULL, &nids, 0);
135 return e->ciphers;
141 e->ciphers = f;
H A Deng_cryptodev.c145 } ciphers[] = { variable in typeref:struct:__anon4566
282 * Find out what ciphers /dev/crypto will let us have a session for.
300 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) {
301 if (ciphers[i].nid == NID_undef)
303 sess.cipher = ciphers[i].id;
304 sess.keylen = ciphers[i].keylen;
308 nids[count++] = ciphers[i].nid;
359 * Find the useable ciphers|digests from dev/crypto - this is the first
361 * can use for ciphers from this engine. We want to return
469 for (i = 0; ciphers[
[all...]
H A Deng_int.h187 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
H A Deng_list.c313 dest->ciphers = src->ciphers;
/freebsd-11-stable/crypto/openssh/regress/
H A Dtry-ciphers.sh1 # $OpenBSD: try-ciphers.sh,v 1.25 2015/03/24 20:22:17 markus Exp $
4 tid="try ciphers"
20 # No point trying all MACs for AEAD ciphers since they
30 ciphers="3des blowfish"
32 ciphers=""
34 for c in $ciphers; do
H A Dcipher-speed.sh27 # No point trying all MACs for AEAD ciphers since they are ignored.
35 ciphers="3des blowfish"
37 ciphers=""
39 for c in $ciphers; do
H A Dssh-com.sh90 ciphers="3des-cbc blowfish-cbc arcfour"
94 ciphers="$ciphers cast128-cbc"
98 ciphers="$ciphers aes128-cbc cast128-cbc"
102 #ciphers="3des-cbc"
104 for c in $ciphers; do
H A DMakefile32 try-ciphers \
87 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
/freebsd-11-stable/crypto/openssl/apps/
H A Dciphers.c1 /* apps/ciphers.c */
73 "usage: ciphers args\n",
74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
96 char *ciphers = NULL; local
145 ciphers = *argv;
162 if (ciphers != NULL) {
163 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
H A Dprogs.pl34 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
/freebsd-11-stable/sys/net80211/
H A Dieee80211_crypto.c56 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable in typeref:struct:ieee80211_cipher
144 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none;
200 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) {
205 ciphers[cip->ic_cipher] = cip;
219 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) {
226 ciphers[cip->ic_cipher] = NULL;
232 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL;
284 cip = ciphers[ciphe
[all...]
/freebsd-11-stable/secure/usr.bin/openssl/
H A DMakefile.man6 MAN+= ciphers.1
50 MLINKS+= ciphers.1 openssl-ciphers.1
H A DMakefile14 SRCS+= app_rand.c apps.c asn1pars.c ca.c ciphers.c cms.c crl.c crl2p7.c \
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_server.h38 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
H A Dtlsv1_client.h42 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
/freebsd-11-stable/contrib/wpa/src/common/
H A Dwpa_common.c2334 int rsn_cipher_put_suites(u8 *start, int ciphers) argument
2338 if (ciphers & WPA_CIPHER_CCMP_256) {
2342 if (ciphers & WPA_CIPHER_GCMP_256) {
2346 if (ciphers & WPA_CIPHER_CCMP) {
2350 if (ciphers & WPA_CIPHER_GCMP) {
2354 if (ciphers & WPA_CIPHER_TKIP) {
2358 if (ciphers & WPA_CIPHER_NONE) {
2367 int wpa_cipher_put_suites(u8 *start, int ciphers) argument
2371 if (ciphers & WPA_CIPHER_CCMP) {
2375 if (ciphers
2388 wpa_pick_pairwise_cipher(int ciphers, int none_allowed) argument
2406 wpa_pick_group_cipher(int ciphers) argument
2485 wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim) argument
[all...]
H A Dwpa_common.h481 int rsn_cipher_put_suites(u8 *pos, int ciphers);
482 int wpa_cipher_put_suites(u8 *pos, int ciphers);
483 int wpa_pick_pairwise_cipher(int ciphers, int none_allowed);
484 int wpa_pick_group_cipher(int ciphers);
486 int wpa_write_ciphers(char *start, char *end, int ciphers, const char *delim);
/freebsd-11-stable/crypto/openssh/
H A Dreadconf.h74 char *ciphers; /* SSH2 ciphers in order of preference. */ member in struct:__anon4508
H A Dcipher.c89 static const struct sshcipher ciphers[] = { variable in typeref:struct:sshcipher
141 /* Returns a comma-separated list of supported ciphers. */
149 for (c = ciphers; c->name != NULL; c++) {
245 for (c = ciphers; c->name != NULL; c++)
255 for (c = ciphers; c->name != NULL; c++)
296 for (c = ciphers; c->name != NULL; c++)
H A Dservconf.h91 char *ciphers; /* Supported SSH2 ciphers. */ member in struct:__anon4516
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dtls_none.c152 u8 *ciphers)
151 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
/freebsd-11-stable/crypto/openssl/ssl/
H A Dssl_sess.c252 dest->ciphers = NULL;
295 if(src->ciphers != NULL) {
296 dest->ciphers = sk_SSL_CIPHER_dup(src->ciphers);
297 if (dest->ciphers == NULL)
880 if (ss->ciphers != NULL)
881 sk_SSL_CIPHER_free(ss->ciphers);
H A Ds3_srvr.c923 STACK_OF(SSL_CIPHER) *ciphers = NULL;
1164 if (ssl_bytes_to_cipher_list(s, p, i, &(ciphers)) == NULL) {
1175 fprintf(stderr, "client sent %d ciphers\n",
1176 sk_SSL_CIPHER_num(ciphers));
1178 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) {
1179 c = sk_SSL_CIPHER_value(ciphers, i);
1182 i, sk_SSL_CIPHER_num(ciphers), SSL_CIPHER_get_name(c));
1195 && (sk_SSL_CIPHER_num(ciphers) == 1)) {
1203 c = sk_SSL_CIPHER_value(ciphers, 0);
1273 &s->session->master_key_length, ciphers,
[all...]
H A Ds23_clnt.c267 STACK_OF(SSL_CIPHER) *ciphers;
269 ciphers = SSL_get_ciphers(s);
270 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) {
271 cipher = sk_SSL_CIPHER_value(ciphers, i);
442 /* no ciphers */
517 * workaround chop number of supported ciphers to keep it well
H A Ds2_srvr.c405 if (cp == NULL || sk_SSL_CIPHER_find(s->session->ciphers, cp) < 0) {
677 &s->session->ciphers);
693 /* Generate list of SSLv2 ciphers shared between client and server */
703 sk_SSL_CIPHER_free(s->session->ciphers);
704 s->session->ciphers = prio;
708 if (sk_SSL_CIPHER_num(s->session->ciphers) == 0) {
714 * s->session->ciphers should now have a list of ciphers that are on
716 * client sent the ciphers or in the order of the server's preference
800 s2n(0, p); /* ciphers le
[all...]

Completed in 136 milliseconds

123