Searched refs:ciphers (Results 1 - 25 of 49) sorted by relevance

12

/freebsd-9.3-release/crypto/openssl/crypto/engine/
H A Dtb_cipher.c78 if (e->ciphers) {
80 int num_nids = e->ciphers(e, NULL, &nids, 0);
99 if (e->ciphers) {
101 int num_nids = e->ciphers(e, NULL, &nids, 0);
135 return e->ciphers;
141 e->ciphers = f;
H A Deng_cryptodev.c140 } ciphers[] = { variable in typeref:struct:__anon47
248 for (i = 0; ciphers[i].id; i++)
249 if (ciphers[i].id == cipher)
250 return (ciphers[i].ivmax);
264 for (i = 0; ciphers[i].id; i++)
265 if (ciphers[i].id == cipher)
266 return (ciphers[i].keylen == len);
275 for (i = 0; ciphers[i].id; i++)
276 if (ciphers[i].nid == nid)
277 return (ciphers[
[all...]
H A Deng_int.h178 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
H A Deng_list.c311 dest->ciphers = src->ciphers;
/freebsd-9.3-release/crypto/openssh/regress/
H A Dtry-ciphers.sh1 # $OpenBSD: try-ciphers.sh,v 1.22 2013/11/21 03:18:51 djm Exp $
4 tid="try ciphers"
15 # No point trying all MACs for AEAD ciphers since they
24 ciphers="3des blowfish"
25 for c in $ciphers; do
H A Dssh-com.sh90 ciphers="3des-cbc blowfish-cbc arcfour"
94 ciphers="$ciphers cast128-cbc"
98 ciphers="$ciphers aes128-cbc cast128-cbc"
102 #ciphers="3des-cbc"
104 for c in $ciphers; do
H A Dcipher-speed.sh27 # No point trying all MACs for AEAD ciphers since they are ignored.
34 ciphers="3des blowfish"
35 for c in $ciphers; do
H A DMakefile29 try-ciphers \
70 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
/freebsd-9.3-release/crypto/openssl/apps/
H A Dciphers.c1 /* apps/ciphers.c */
73 "usage: ciphers args\n",
74 " -v - verbose mode, a textual listing of the ciphers in SSLeay\n",
92 char *ciphers = NULL; local
139 ciphers = *argv;
156 if (ciphers != NULL) {
157 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
H A Dprogs.pl30 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
/freebsd-9.3-release/sys/net80211/
H A Dieee80211_crypto.c56 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable in typeref:struct:ieee80211_cipher
145 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none;
201 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) {
206 ciphers[cip->ic_cipher] = cip;
220 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) {
227 ciphers[cip->ic_cipher] = NULL;
233 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL;
285 cip = ciphers[ciphe
[all...]
/freebsd-9.3-release/contrib/wpa/src/tls/
H A Dtlsv1_client.h47 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
H A Dtlsv1_server.h43 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
/freebsd-9.3-release/secure/usr.bin/openssl/
H A DMakefile15 SRCS+= app_rand.c apps.c asn1pars.c ca.c ciphers.c cms.c crl.c crl2p7.c \
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dtls_none.c150 u8 *ciphers)
149 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls_internal.c519 u8 *ciphers)
523 return tlsv1_client_set_cipher_list(conn->client, ciphers);
527 return tlsv1_server_set_cipher_list(conn->server, ciphers);
518 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
H A Dtls.h432 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers
438 u8 *ciphers);
/freebsd-9.3-release/crypto/openssl/test/
H A Dtestfipsssl14 ciphers="DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:AES256-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:DES-CBC3-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:AES128-SHA:EXP1024-DHE-DSS-DES-CBC-SHA:EXP1024-DES-CBC-SHA:EDH-RSA-DES-CBC-SHA:EDH-DSS-DES-CBC-SHA:DES-CBC-SHA:EXP-EDH-RSA-DES-CBC-SHA:EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA"
16 ssltest="../util/shlib_wrap.sh ./ssltest -F -key $key -cert $cert -c_key $key -c_cert $cert -cipher $ciphers"
/freebsd-9.3-release/crypto/openssh/
H A Dcipher.c76 static const struct Cipher ciphers[] = { variable in typeref:struct:Cipher
111 /* Returns a list of supported ciphers separated by the specified char. */
119 for (c = ciphers; c->name != NULL; c++) {
199 for (c = ciphers; c->name != NULL; c++)
209 for (c = ciphers; c->name != NULL; c++)
240 debug3("ciphers ok: [%s]", names);
256 for (c = ciphers; c->name != NULL; c++)
H A Dreadconf.h83 char *ciphers; /* SSH2 ciphers in order of preference. */ member in struct:__anon4718
H A Dservconf.h91 char *ciphers; /* Supported SSH2 ciphers. */ member in struct:__anon4728
/freebsd-9.3-release/crypto/openssl/ssl/
H A Ds3_srvr.c758 STACK_OF(SSL_CIPHER) *ciphers = NULL;
950 if ((i > 0) && (ssl_bytes_to_cipher_list(s, p, i, &(ciphers))
962 printf("client sent %d ciphers\n", sk_num(ciphers));
964 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) {
965 c = sk_SSL_CIPHER_value(ciphers, i);
968 i, sk_num(ciphers), SSL_CIPHER_get_name(c));
981 && (sk_SSL_CIPHER_num(ciphers) == 1)) {
989 c = sk_SSL_CIPHER_value(ciphers, 0);
1094 * Given s->session->ciphers an
[all...]
H A Dssl_sess.c156 dest->ciphers = NULL;
175 if(src->ciphers != NULL) {
176 dest->ciphers = sk_SSL_CIPHER_dup(src->ciphers);
177 if (dest->ciphers == NULL)
682 if (ss->ciphers != NULL)
683 sk_SSL_CIPHER_free(ss->ciphers);
H A Ds2_srvr.c399 if (cp == NULL || sk_SSL_CIPHER_find(s->session->ciphers, cp) < 0) {
675 &s->session->ciphers);
691 /* Generate list of SSLv2 ciphers shared between client and server */
701 sk_SSL_CIPHER_free(s->session->ciphers);
702 s->session->ciphers = prio;
706 if (sk_SSL_CIPHER_num(s->session->ciphers) == 0) {
712 * s->session->ciphers should now have a list of ciphers that are on
714 * client sent the ciphers or in the order of the server's preference
798 s2n(0, p); /* ciphers le
[all...]
/freebsd-9.3-release/contrib/wpa/src/ap/
H A Dwpa_auth_ie.c458 int ciphers, key_mgmt, res, version; local
604 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
606 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
607 if (!ciphers) {
623 if (ciphers & WPA_CIPHER_TKIP) {
659 if (ciphers & WPA_CIPHER_CCMP)

Completed in 131 milliseconds

12