/freebsd-9.3-release/crypto/openssl/crypto/engine/ |
H A D | tb_cipher.c | 78 if (e->ciphers) { 80 int num_nids = e->ciphers(e, NULL, &nids, 0); 99 if (e->ciphers) { 101 int num_nids = e->ciphers(e, NULL, &nids, 0); 135 return e->ciphers; 141 e->ciphers = f;
|
H A D | eng_cryptodev.c | 140 } ciphers[] = { variable in typeref:struct:__anon47 248 for (i = 0; ciphers[i].id; i++) 249 if (ciphers[i].id == cipher) 250 return (ciphers[i].ivmax); 264 for (i = 0; ciphers[i].id; i++) 265 if (ciphers[i].id == cipher) 266 return (ciphers[i].keylen == len); 275 for (i = 0; ciphers[i].id; i++) 276 if (ciphers[i].nid == nid) 277 return (ciphers[ [all...] |
H A D | eng_int.h | 178 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
|
H A D | eng_list.c | 311 dest->ciphers = src->ciphers;
|
/freebsd-9.3-release/crypto/openssh/regress/ |
H A D | try-ciphers.sh | 1 # $OpenBSD: try-ciphers.sh,v 1.22 2013/11/21 03:18:51 djm Exp $ 4 tid="try ciphers" 15 # No point trying all MACs for AEAD ciphers since they 24 ciphers="3des blowfish" 25 for c in $ciphers; do
|
H A D | ssh-com.sh | 90 ciphers="3des-cbc blowfish-cbc arcfour" 94 ciphers="$ciphers cast128-cbc" 98 ciphers="$ciphers aes128-cbc cast128-cbc" 102 #ciphers="3des-cbc" 104 for c in $ciphers; do
|
H A D | cipher-speed.sh | 27 # No point trying all MACs for AEAD ciphers since they are ignored. 34 ciphers="3des blowfish" 35 for c in $ciphers; do
|
H A D | Makefile | 29 try-ciphers \ 70 INTEROP_TESTS= putty-transfer putty-ciphers putty-kex conch-ciphers
|
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | ciphers.c | 1 /* apps/ciphers.c */ 73 "usage: ciphers args\n", 74 " -v - verbose mode, a textual listing of the ciphers in SSLeay\n", 92 char *ciphers = NULL; local 139 ciphers = *argv; 156 if (ciphers != NULL) { 157 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
|
H A D | progs.pl | 30 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
|
/freebsd-9.3-release/sys/net80211/ |
H A D | ieee80211_crypto.c | 56 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable in typeref:struct:ieee80211_cipher 145 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none; 201 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { 206 ciphers[cip->ic_cipher] = cip; 220 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { 227 ciphers[cip->ic_cipher] = NULL; 233 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL; 285 cip = ciphers[ciphe [all...] |
/freebsd-9.3-release/contrib/wpa/src/tls/ |
H A D | tlsv1_client.h | 47 int tlsv1_client_set_cipher_list(struct tlsv1_client *conn, u8 *ciphers);
|
H A D | tlsv1_server.h | 43 int tlsv1_server_set_cipher_list(struct tlsv1_server *conn, u8 *ciphers);
|
/freebsd-9.3-release/secure/usr.bin/openssl/ |
H A D | Makefile | 15 SRCS+= app_rand.c apps.c asn1pars.c ca.c ciphers.c cms.c crl.c crl2p7.c \
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | tls_none.c | 150 u8 *ciphers) 149 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
H A D | tls_internal.c | 519 u8 *ciphers) 523 return tlsv1_client_set_cipher_list(conn->client, ciphers); 527 return tlsv1_server_set_cipher_list(conn->server, ciphers); 518 tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn, u8 *ciphers) argument
|
H A D | tls.h | 432 * @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers 438 u8 *ciphers);
|
/freebsd-9.3-release/crypto/openssl/test/ |
H A D | testfipsssl | 14 ciphers="DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:AES256-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:DES-CBC3-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:AES128-SHA:EXP1024-DHE-DSS-DES-CBC-SHA:EXP1024-DES-CBC-SHA:EDH-RSA-DES-CBC-SHA:EDH-DSS-DES-CBC-SHA:DES-CBC-SHA:EXP-EDH-RSA-DES-CBC-SHA:EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA" 16 ssltest="../util/shlib_wrap.sh ./ssltest -F -key $key -cert $cert -c_key $key -c_cert $cert -cipher $ciphers"
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | cipher.c | 76 static const struct Cipher ciphers[] = { variable in typeref:struct:Cipher 111 /* Returns a list of supported ciphers separated by the specified char. */ 119 for (c = ciphers; c->name != NULL; c++) { 199 for (c = ciphers; c->name != NULL; c++) 209 for (c = ciphers; c->name != NULL; c++) 240 debug3("ciphers ok: [%s]", names); 256 for (c = ciphers; c->name != NULL; c++)
|
H A D | readconf.h | 83 char *ciphers; /* SSH2 ciphers in order of preference. */ member in struct:__anon4718
|
H A D | servconf.h | 91 char *ciphers; /* Supported SSH2 ciphers. */ member in struct:__anon4728
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | s3_srvr.c | 758 STACK_OF(SSL_CIPHER) *ciphers = NULL; 950 if ((i > 0) && (ssl_bytes_to_cipher_list(s, p, i, &(ciphers)) 962 printf("client sent %d ciphers\n", sk_num(ciphers)); 964 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) { 965 c = sk_SSL_CIPHER_value(ciphers, i); 968 i, sk_num(ciphers), SSL_CIPHER_get_name(c)); 981 && (sk_SSL_CIPHER_num(ciphers) == 1)) { 989 c = sk_SSL_CIPHER_value(ciphers, 0); 1094 * Given s->session->ciphers an [all...] |
H A D | ssl_sess.c | 156 dest->ciphers = NULL; 175 if(src->ciphers != NULL) { 176 dest->ciphers = sk_SSL_CIPHER_dup(src->ciphers); 177 if (dest->ciphers == NULL) 682 if (ss->ciphers != NULL) 683 sk_SSL_CIPHER_free(ss->ciphers);
|
H A D | s2_srvr.c | 399 if (cp == NULL || sk_SSL_CIPHER_find(s->session->ciphers, cp) < 0) { 675 &s->session->ciphers); 691 /* Generate list of SSLv2 ciphers shared between client and server */ 701 sk_SSL_CIPHER_free(s->session->ciphers); 702 s->session->ciphers = prio; 706 if (sk_SSL_CIPHER_num(s->session->ciphers) == 0) { 712 * s->session->ciphers should now have a list of ciphers that are on 714 * client sent the ciphers or in the order of the server's preference 798 s2n(0, p); /* ciphers le [all...] |
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | wpa_auth_ie.c | 458 int ciphers, key_mgmt, res, version; local 604 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 606 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 607 if (!ciphers) { 623 if (ciphers & WPA_CIPHER_TKIP) { 659 if (ciphers & WPA_CIPHER_CCMP)
|