Searched refs:ciphers (Results 1 - 25 of 68) sorted by relevance

123

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/engine/
H A Dtb_cipher.c76 if(e->ciphers)
79 int num_nids = e->ciphers(e, NULL, &nids, 0);
98 if(e->ciphers)
101 int num_nids = e->ciphers(e, NULL, &nids, 0);
135 return e->ciphers;
141 e->ciphers = f;
H A Deng_cryptodev.c132 } ciphers[] = { variable in typeref:struct:__anon7117
214 for (i = 0; ciphers[i].id; i++)
215 if (ciphers[i].id == cipher)
216 return (ciphers[i].ivmax);
231 for (i = 0; ciphers[i].id; i++)
232 if (ciphers[i].id == cipher)
233 return (ciphers[i].keylen == len);
243 for (i = 0; ciphers[i].id; i++)
244 if (ciphers[i].nid == nid)
245 return (ciphers[
[all...]
H A Deng_int.h160 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/engine/
H A Dtb_cipher.c78 if (e->ciphers) {
80 int num_nids = e->ciphers(e, NULL, &nids, 0);
99 if (e->ciphers) {
101 int num_nids = e->ciphers(e, NULL, &nids, 0);
135 return e->ciphers;
141 e->ciphers = f;
H A Deng_cryptodev.c144 } ciphers[] = { variable in typeref:struct:__anon4475
281 * Find out what ciphers /dev/crypto will let us have a session for.
299 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) {
300 if (ciphers[i].nid == NID_undef)
302 sess.cipher = ciphers[i].id;
303 sess.keylen = ciphers[i].keylen;
307 nids[count++] = ciphers[i].nid;
358 * Find the useable ciphers|digests from dev/crypto - this is the first
360 * can use for ciphers from this engine. We want to return
468 for (i = 0; ciphers[
[all...]
H A Deng_int.h187 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/engine/
H A Dtb_cipher.c78 if (e->ciphers) {
80 int num_nids = e->ciphers(e, NULL, &nids, 0);
99 if (e->ciphers) {
101 int num_nids = e->ciphers(e, NULL, &nids, 0);
135 return e->ciphers;
141 e->ciphers = f;
H A Deng_cryptodev.c144 } ciphers[] = { variable in typeref:struct:__anon4824
281 * Find out what ciphers /dev/crypto will let us have a session for.
299 for (i = 0; ciphers[i].id && count < CRYPTO_ALGORITHM_MAX; i++) {
300 if (ciphers[i].nid == NID_undef)
302 sess.cipher = ciphers[i].id;
303 sess.keylen = ciphers[i].keylen;
307 nids[count++] = ciphers[i].nid;
358 * Find the useable ciphers|digests from dev/crypto - this is the first
360 * can use for ciphers from this engine. We want to return
468 for (i = 0; ciphers[
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dciphers.c1 /* apps/ciphers.c */
73 "usage: ciphers args\n",
74 " -v - verbose mode, a textual listing of the ciphers in SSLeay\n",
92 char *ciphers=NULL; local
144 ciphers= *argv;
161 if (ciphers != NULL) {
162 if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
H A Dprogs.pl30 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dciphers.c1 /* apps/ciphers.c */
73 "usage: ciphers args\n",
74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
96 char *ciphers = NULL; local
145 ciphers = *argv;
162 if (ciphers != NULL) {
163 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
H A Dprogs.pl34 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dciphers.c1 /* apps/ciphers.c */
73 "usage: ciphers args\n",
74 " -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
96 char *ciphers = NULL; local
145 ciphers = *argv;
162 if (ciphers != NULL) {
163 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
H A Dprogs.pl34 if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/
H A Dgskit.c100 /* Supported ciphers. */
305 } ciphers[CURL_GSKPROTO_LAST]; local
320 memset((char *) ciphers, 0, sizeof ciphers);
322 ciphers[i].buf = malloc(l);
323 if(!ciphers[i].buf) {
325 free(ciphers[i].buf);
328 ciphers[i].ptr = ciphers[i].buf;
329 *ciphers[
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/
H A DMakefile.am23 --enable-ciphers=arcfour:blowfish:cast5:des:aes:twofish:serpent:rfc2268:seed:camellia
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/
H A DMakefile.am23 --enable-ciphers=arcfour:blowfish:cast5:des:aes:twofish:serpent:rfc2268:seed:camellia
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/
H A Dssl_polarssl.c167 tls_ctx_restrict_ciphers(struct tls_root_ctx *ctx, const char *ciphers) argument
171 int ciphers_len = strlen (ciphers);
176 /* Get number of ciphers */
178 if (ciphers[i] == ':')
184 /* Parse allowed ciphers, getting IDs */
186 tmp_ciphers_orig = tmp_ciphers = strdup(ciphers);
844 const int *ciphers = ssl_list_ciphersuites(); local
851 while (*ciphers != 0)
853 printf ("%s\n", ssl_get_ciphersuite_name(*ciphers));
854 ciphers
863 const int *ciphers = ssl_list_ciphersuites(); local
[all...]
H A Dcrypto_polarssl.c147 const int *ciphers = cipher_list(); local
150 printf ("The following ciphers and cipher modes are available\n"
158 while (*ciphers != 0)
160 const cipher_info_t *info = cipher_info_from_type(*ciphers);
166 ciphers++;
H A Dssl_backend.h134 * Restrict the list of ciphers that can be used within the TLS context.
137 * @param ciphers String containing : delimited cipher names.
139 void tls_ctx_restrict_ciphers(struct tls_root_ctx *ctx, const char *ciphers);
433 * Show the TLS ciphers that are available for us to use in the OpenSSL
439 * The OpenSSL library has a notion of preference in TLS ciphers. Higher
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/
H A Dtestfipsssl14 ciphers="DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:AES256-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:DES-CBC3-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:AES128-SHA:EXP1024-DHE-DSS-DES-CBC-SHA:EXP1024-DES-CBC-SHA:EDH-RSA-DES-CBC-SHA:EDH-DSS-DES-CBC-SHA:DES-CBC-SHA:EXP-EDH-RSA-DES-CBC-SHA:EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA"
16 ssltest="../util/shlib_wrap.sh ./ssltest -F -key $key -cert $cert -c_key $key -c_cert $cert -cipher $ciphers"
41 if ../util/shlib_wrap.sh ../apps/openssl ciphers SSLv2 >/dev/null 2>&1; then
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/
H A Dtestfipsssl14 ciphers="DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:AES256-SHA:EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:DES-CBC3-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA:AES128-SHA:EXP1024-DHE-DSS-DES-CBC-SHA:EXP1024-DES-CBC-SHA:EDH-RSA-DES-CBC-SHA:EDH-DSS-DES-CBC-SHA:DES-CBC-SHA:EXP-EDH-RSA-DES-CBC-SHA:EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA"
16 ssltest="../util/shlib_wrap.sh ./ssltest -F -key $key -cert $cert -c_key $key -c_cert $cert -cipher $ciphers"
41 if ../util/shlib_wrap.sh ../apps/openssl ciphers SSLv2 >/dev/null 2>&1; then
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Ds3_srvr.c673 STACK_OF(SSL_CIPHER) *ciphers=NULL;
829 if ((i > 0) && (ssl_bytes_to_cipher_list(s,p,i,&(ciphers))
843 printf("client sent %d ciphers\n",sk_num(ciphers));
845 for (i=0; i<sk_SSL_CIPHER_num(ciphers); i++)
847 c=sk_SSL_CIPHER_value(ciphers,i);
850 i,sk_num(ciphers),SSL_CIPHER_get_name(c));
860 if ((s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && (sk_SSL_CIPHER_num(ciphers) == 1))
863 s->session->cipher=sk_SSL_CIPHER_value(ciphers, 0);
948 /* Given s->session->ciphers an
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Ds3_srvr.c914 STACK_OF(SSL_CIPHER) *ciphers = NULL;
1154 if (ssl_bytes_to_cipher_list(s, p, i, &(ciphers)) == NULL) {
1165 fprintf(stderr, "client sent %d ciphers\n",
1166 sk_SSL_CIPHER_num(ciphers));
1168 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) {
1169 c = sk_SSL_CIPHER_value(ciphers, i);
1172 i, sk_SSL_CIPHER_num(ciphers), SSL_CIPHER_get_name(c));
1185 && (sk_SSL_CIPHER_num(ciphers) == 1)) {
1193 c = sk_SSL_CIPHER_value(ciphers, 0);
1263 &s->session->master_key_length, ciphers,
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Ds3_srvr.c914 STACK_OF(SSL_CIPHER) *ciphers = NULL;
1154 if (ssl_bytes_to_cipher_list(s, p, i, &(ciphers)) == NULL) {
1165 fprintf(stderr, "client sent %d ciphers\n",
1166 sk_SSL_CIPHER_num(ciphers));
1168 for (i = 0; i < sk_SSL_CIPHER_num(ciphers); i++) {
1169 c = sk_SSL_CIPHER_value(ciphers, i);
1172 i, sk_SSL_CIPHER_num(ciphers), SSL_CIPHER_get_name(c));
1185 && (sk_SSL_CIPHER_num(ciphers) == 1)) {
1193 c = sk_SSL_CIPHER_value(ciphers, 0);
1263 &s->session->master_key_length, ciphers,
[all...]

Completed in 166 milliseconds

123