HomeSort by: relevance | last modified time | path
    Searched defs:ciphers (Results 1 - 25 of 35) sorted by relevancy

1 2

  /src/crypto/external/bsd/openssl.old/dist/test/
gosttest.c 23 } ciphers[] = { variable in typeref:struct:__anon2244
46 ciphers[idx].certnum == 0 ? cert1
48 ciphers[idx].certnum == 0 ? privkey1
52 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, ciphers[idx].cipher))
53 || !TEST_true(SSL_CTX_set_cipher_list(sctx, ciphers[idx].cipher))
58 if (ciphers[idx].expected_prot == 0) {
66 ciphers[idx].expected_prot))
89 ADD_ALL_TESTS(test_tls13, OSSL_NELEM(ciphers));
ciphername_test.c 385 const char *ciphers = "ALL:eNULL", *p, *q, *r; local
414 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
  /src/crypto/external/apache2/openssl/dist/test/
ciphername_test.c 387 const char *ciphers = "ALL:eNULL", *p, *q, *r; local
416 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
  /src/crypto/external/bsd/openssl/dist/test/
ciphername_test.c 385 const char *ciphers = "ALL:eNULL", *p, *q, *r; local
414 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
  /src/sys/net80211/
ieee80211_crypto.c 72 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable in typeref:struct:ieee80211_cipher
174 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none;
209 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) {
214 ciphers[cip->ic_cipher] = cip;
228 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) {
235 ciphers[cip->ic_cipher] = NULL;
241 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL;
285 cip = ciphers[cipher]
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/engine/
eng_local.h 120 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
  /src/crypto/external/bsd/openssl.old/dist/crypto/engine/
eng_local.h 139 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
  /src/external/mpl/bind/dist/lib/ns/include/ns/
listenlist.h 74 const char *ciphers; member in struct:ns_listen_tls_params
  /src/libexec/httpd/
ssl-bozo.c 76 char *ciphers; member in struct:sslinfo_t
273 sslinfo->ciphers ? sslinfo->ciphers : BOZO_SSL_CIPHERS))
275 "Error setting cipher list '%s'", sslinfo->ciphers);
375 bozo_ssl_set_ciphers(bozohttpd_t *httpd, const char *ciphers)
379 sslinfo->ciphers = bozostrdup(httpd, NULL, ciphers);
380 debug((httpd, DEBUG_NORMAL, "using ciphers: %s", sslinfo->ciphers));
  /src/crypto/external/apache2/openssl/dist/apps/
ciphers.c 44 { "v", OPT_V, '-', "Verbose listing of the SSL/TLS ciphers" },
50 { "s", OPT_S, '-', "Only supported ciphers" },
52 { "ssl3", OPT_SSL3, '-', "Ciphers compatible with SSL3" },
55 { "tls1", OPT_TLS1, '-', "Ciphers compatible with TLS1" },
58 { "tls1_1", OPT_TLS1_1, '-', "Ciphers compatible with TLS1.1" },
61 { "tls1_2", OPT_TLS1_2, '-', "Ciphers compatible with TLS1.2" },
64 { "tls1_3", OPT_TLS1_3, '-', "Ciphers compatible with TLS1.3" },
106 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local
181 ciphers = argv[0];
214 if (ciphers != NULL)
    [all...]
list.c 114 STACK_OF(EVP_CIPHER) *ciphers = sk_EVP_CIPHER_new(cipher_cmp);
117 if (ciphers == NULL) {
129 EVP_CIPHER_do_all_provided(app_get0_libctx(), collect_ciphers, ciphers); local
130 sk_EVP_CIPHER_sort(ciphers);
131 for (i = 0; i < sk_EVP_CIPHER_num(ciphers); i++) {
132 const EVP_CIPHER *c = sk_EVP_CIPHER_value(ciphers, i);
161 sk_EVP_CIPHER_pop_free(ciphers, EVP_CIPHER_free);
1190 /* Look through providers' ciphers */
1936 BIO_printf(bio_out, "\nSymmetric Ciphers:\n");
  /src/crypto/external/apache2/openssl/dist/crypto/engine/
eng_local.h 120 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
  /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/
Proxy.pm 185 ciphers => "AES128-SHA",
230 $self->{ciphers} = "AES128-SHA";
339 if ($self->ciphers ne "") {
340 $execcmd .= " -cipher ".$self->ciphers;
751 sub ciphers subroutine
755 $self->{ciphers} = shift;
757 return $self->{ciphers};
  /src/crypto/external/bsd/openssh/dist/
cipher.c 119 static const struct sshcipher ciphers[] = { variable in typeref:struct:sshcipher
146 /* Returns a comma-separated list of supported ciphers. */
154 for (c = ciphers; c->name != NULL; c++) {
228 for (c = ciphers; c->name != NULL; c++)
readconf.h 82 char *ciphers; /* SSH2 ciphers in order of preference. */ member in struct:__anon1125
  /src/crypto/external/bsd/openssl/dist/apps/
ciphers.c 41 {"v", OPT_V, '-', "Verbose listing of the SSL/TLS ciphers"},
47 {"s", OPT_S, '-', "Only supported ciphers"},
49 {"ssl3", OPT_SSL3, '-', "Ciphers compatible with SSL3"},
52 {"tls1", OPT_TLS1, '-', "Ciphers compatible with TLS1"},
55 {"tls1_1", OPT_TLS1_1, '-', "Ciphers compatible with TLS1.1"},
58 {"tls1_2", OPT_TLS1_2, '-', "Ciphers compatible with TLS1.2"},
61 {"tls1_3", OPT_TLS1_3, '-', "Ciphers compatible with TLS1.3"},
103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local
179 ciphers = argv[0];
212 if (ciphers != NULL)
    [all...]
  /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/
Proxy.pm 103 ciphers => "AES128-SHA",
171 $self->{ciphers} = "AES128-SHA";
234 if ($self->ciphers ne "") {
235 $execcmd .= " -cipher ".$self->ciphers;
624 sub ciphers subroutine
628 $self->{ciphers} = shift;
630 return $self->{ciphers};
  /src/crypto/external/bsd/openssl.old/dist/apps/
ciphers.c 35 {"v", OPT_V, '-', "Verbose listing of the SSL/TLS ciphers"},
37 {"s", OPT_S, '-', "Only supported ciphers"},
97 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local
168 ciphers = *argv;
201 if (ciphers != NULL) {
202 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
  /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/
Proxy.pm 102 ciphers => "AES128-SHA",
170 $self->{ciphers} = "AES128-SHA";
233 if ($self->ciphers ne "") {
234 $execcmd .= " -cipher ".$self->ciphers;
623 sub ciphers subroutine
627 $self->{ciphers} = shift;
629 return $self->{ciphers};
  /src/external/bsd/wpa/dist/src/ap/
wpa_auth_ie.c 623 int ciphers, key_mgmt, res, version; local
846 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
848 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
849 if (!ciphers) {
913 if (sm->mgmt_frame_prot && (ciphers & WPA_CIPHER_TKIP)) {
957 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
  /src/external/mpl/bind/dist/lib/dns/
transport.c 61 char *ciphers; member in struct:dns_transport::__anon24108
268 dns_transport_set_ciphers(dns_transport_t *transport, const char *ciphers) {
273 if (transport->tls.ciphers != NULL) {
274 isc_mem_free(transport->mctx, transport->tls.ciphers);
277 if (ciphers != NULL) {
278 transport->tls.ciphers = isc_mem_strdup(transport->mctx,
279 ciphers);
303 return transport->tls.ciphers;
396 const char *ciphers = NULL; local
449 ciphers = dns_transport_get_ciphers(transport)
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_fast.c 1456 u8 ciphers[7]; local
1462 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA;
1468 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES256_SHA;
1469 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA;
1470 ciphers[count++] = TLS_CIPHER_AES256_SHA;
1471 ciphers[count++] = TLS_CIPHER_AES128_SHA;
1472 ciphers[count++] = TLS_CIPHER_RC4_SHA;
1475 ciphers[count++] = TLS_CIPHER_NONE;
1478 ciphers)) {
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_fast.c 403 u8 ciphers[7] = { local
433 ciphers) < 0) {
  /src/sys/dev/pci/
if_ipwreg.h 229 u_int32_t ciphers; member in struct:ipw_security
  /src/crypto/external/bsd/heimdal/dist/lib/hx509/
crypto.c 1810 static const struct hx509cipher ciphers[] = { variable in typeref:struct:hx509cipher
1890 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++)
1891 if (der_heim_oid_cmp(oid, ciphers[i].oid) == 0)
1892 return &ciphers[i];
1902 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++)
1903 if (strcasecmp(name, ciphers[i].name) == 0)
1904 return &ciphers[i];
2795 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++)
    [all...]

Completed in 152 milliseconds

1 2