| /src/crypto/external/bsd/openssl.old/dist/test/ |
| gosttest.c | 23 } ciphers[] = { variable in typeref:struct:__anon2244 46 ciphers[idx].certnum == 0 ? cert1 48 ciphers[idx].certnum == 0 ? privkey1 52 if (!TEST_true(SSL_CTX_set_cipher_list(cctx, ciphers[idx].cipher)) 53 || !TEST_true(SSL_CTX_set_cipher_list(sctx, ciphers[idx].cipher)) 58 if (ciphers[idx].expected_prot == 0) { 66 ciphers[idx].expected_prot)) 89 ADD_ALL_TESTS(test_tls13, OSSL_NELEM(ciphers));
|
| ciphername_test.c | 385 const char *ciphers = "ALL:eNULL", *p, *q, *r; local 414 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| ciphername_test.c | 387 const char *ciphers = "ALL:eNULL", *p, *q, *r; local 416 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| ciphername_test.c | 385 const char *ciphers = "ALL:eNULL", *p, *q, *r; local 414 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
|
| /src/sys/net80211/ |
| ieee80211_crypto.c | 72 static const struct ieee80211_cipher *ciphers[IEEE80211_CIPHER_MAX]; variable in typeref:struct:ieee80211_cipher 174 ciphers[IEEE80211_CIPHER_NONE] = &ieee80211_cipher_none; 209 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { 214 ciphers[cip->ic_cipher] = cip; 228 if (ciphers[cip->ic_cipher] != NULL && ciphers[cip->ic_cipher] != cip) { 235 ciphers[cip->ic_cipher] = NULL; 241 return cipher < IEEE80211_CIPHER_MAX && ciphers[cipher] != NULL; 285 cip = ciphers[cipher] [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/engine/ |
| eng_local.h | 120 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/engine/ |
| eng_local.h | 139 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
|
| /src/external/mpl/bind/dist/lib/ns/include/ns/ |
| listenlist.h | 74 const char *ciphers; member in struct:ns_listen_tls_params
|
| /src/libexec/httpd/ |
| ssl-bozo.c | 76 char *ciphers; member in struct:sslinfo_t 273 sslinfo->ciphers ? sslinfo->ciphers : BOZO_SSL_CIPHERS)) 275 "Error setting cipher list '%s'", sslinfo->ciphers); 375 bozo_ssl_set_ciphers(bozohttpd_t *httpd, const char *ciphers) 379 sslinfo->ciphers = bozostrdup(httpd, NULL, ciphers); 380 debug((httpd, DEBUG_NORMAL, "using ciphers: %s", sslinfo->ciphers));
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| ciphers.c | 44 { "v", OPT_V, '-', "Verbose listing of the SSL/TLS ciphers" }, 50 { "s", OPT_S, '-', "Only supported ciphers" }, 52 { "ssl3", OPT_SSL3, '-', "Ciphers compatible with SSL3" }, 55 { "tls1", OPT_TLS1, '-', "Ciphers compatible with TLS1" }, 58 { "tls1_1", OPT_TLS1_1, '-', "Ciphers compatible with TLS1.1" }, 61 { "tls1_2", OPT_TLS1_2, '-', "Ciphers compatible with TLS1.2" }, 64 { "tls1_3", OPT_TLS1_3, '-', "Ciphers compatible with TLS1.3" }, 106 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local 181 ciphers = argv[0]; 214 if (ciphers != NULL) [all...] |
| list.c | 114 STACK_OF(EVP_CIPHER) *ciphers = sk_EVP_CIPHER_new(cipher_cmp); 117 if (ciphers == NULL) { 129 EVP_CIPHER_do_all_provided(app_get0_libctx(), collect_ciphers, ciphers); local 130 sk_EVP_CIPHER_sort(ciphers); 131 for (i = 0; i < sk_EVP_CIPHER_num(ciphers); i++) { 132 const EVP_CIPHER *c = sk_EVP_CIPHER_value(ciphers, i); 161 sk_EVP_CIPHER_pop_free(ciphers, EVP_CIPHER_free); 1190 /* Look through providers' ciphers */ 1936 BIO_printf(bio_out, "\nSymmetric Ciphers:\n");
|
| /src/crypto/external/apache2/openssl/dist/crypto/engine/ |
| eng_local.h | 120 ENGINE_CIPHERS_PTR ciphers; member in struct:engine_st
|
| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| Proxy.pm | 185 ciphers => "AES128-SHA", 230 $self->{ciphers} = "AES128-SHA"; 339 if ($self->ciphers ne "") { 340 $execcmd .= " -cipher ".$self->ciphers; 751 sub ciphers subroutine 755 $self->{ciphers} = shift; 757 return $self->{ciphers};
|
| /src/crypto/external/bsd/openssh/dist/ |
| cipher.c | 119 static const struct sshcipher ciphers[] = { variable in typeref:struct:sshcipher 146 /* Returns a comma-separated list of supported ciphers. */ 154 for (c = ciphers; c->name != NULL; c++) { 228 for (c = ciphers; c->name != NULL; c++)
|
| readconf.h | 82 char *ciphers; /* SSH2 ciphers in order of preference. */ member in struct:__anon1125
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| ciphers.c | 41 {"v", OPT_V, '-', "Verbose listing of the SSL/TLS ciphers"}, 47 {"s", OPT_S, '-', "Only supported ciphers"}, 49 {"ssl3", OPT_SSL3, '-', "Ciphers compatible with SSL3"}, 52 {"tls1", OPT_TLS1, '-', "Ciphers compatible with TLS1"}, 55 {"tls1_1", OPT_TLS1_1, '-', "Ciphers compatible with TLS1.1"}, 58 {"tls1_2", OPT_TLS1_2, '-', "Ciphers compatible with TLS1.2"}, 61 {"tls1_3", OPT_TLS1_3, '-', "Ciphers compatible with TLS1.3"}, 103 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local 179 ciphers = argv[0]; 212 if (ciphers != NULL) [all...] |
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| Proxy.pm | 103 ciphers => "AES128-SHA", 171 $self->{ciphers} = "AES128-SHA"; 234 if ($self->ciphers ne "") { 235 $execcmd .= " -cipher ".$self->ciphers; 624 sub ciphers subroutine 628 $self->{ciphers} = shift; 630 return $self->{ciphers};
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| ciphers.c | 35 {"v", OPT_V, '-', "Verbose listing of the SSL/TLS ciphers"}, 37 {"s", OPT_S, '-', "Only supported ciphers"}, 97 char *ciphers = NULL, *prog, *convert = NULL, *ciphersuites = NULL; local 168 ciphers = *argv; 201 if (ciphers != NULL) { 202 if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| Proxy.pm | 102 ciphers => "AES128-SHA", 170 $self->{ciphers} = "AES128-SHA"; 233 if ($self->ciphers ne "") { 234 $execcmd .= " -cipher ".$self->ciphers; 623 sub ciphers subroutine 627 $self->{ciphers} = shift; 629 return $self->{ciphers};
|
| /src/external/bsd/wpa/dist/src/ap/ |
| wpa_auth_ie.c | 623 int ciphers, key_mgmt, res, version; local 846 ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise; 848 ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise; 849 if (!ciphers) { 913 if (sm->mgmt_frame_prot && (ciphers & WPA_CIPHER_TKIP)) { 957 sm->pairwise = wpa_pick_pairwise_cipher(ciphers, 0);
|
| /src/external/mpl/bind/dist/lib/dns/ |
| transport.c | 61 char *ciphers; member in struct:dns_transport::__anon24108 268 dns_transport_set_ciphers(dns_transport_t *transport, const char *ciphers) { 273 if (transport->tls.ciphers != NULL) { 274 isc_mem_free(transport->mctx, transport->tls.ciphers); 277 if (ciphers != NULL) { 278 transport->tls.ciphers = isc_mem_strdup(transport->mctx, 279 ciphers); 303 return transport->tls.ciphers; 396 const char *ciphers = NULL; local 449 ciphers = dns_transport_get_ciphers(transport) [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_fast.c | 1456 u8 ciphers[7]; local 1462 ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA; 1468 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES256_SHA; 1469 ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA; 1470 ciphers[count++] = TLS_CIPHER_AES256_SHA; 1471 ciphers[count++] = TLS_CIPHER_AES128_SHA; 1472 ciphers[count++] = TLS_CIPHER_RC4_SHA; 1475 ciphers[count++] = TLS_CIPHER_NONE; 1478 ciphers)) {
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_fast.c | 403 u8 ciphers[7] = { local 433 ciphers) < 0) {
|
| /src/sys/dev/pci/ |
| if_ipwreg.h | 229 u_int32_t ciphers; member in struct:ipw_security
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| crypto.c | 1810 static const struct hx509cipher ciphers[] = { variable in typeref:struct:hx509cipher 1890 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++) 1891 if (der_heim_oid_cmp(oid, ciphers[i].oid) == 0) 1892 return &ciphers[i]; 1902 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++) 1903 if (strcasecmp(name, ciphers[i].name) == 0) 1904 return &ciphers[i]; 2795 for (i = 0; i < sizeof(ciphers)/sizeof(ciphers[0]); i++) [all...] |