/freebsd/contrib/wpa/src/tls/ |
H A D | tlsv1_record.c | 31 u16 cipher_suite) in tlsv1_record_set_cipher_suite() argument 37 cipher_suite); in tlsv1_record_set_cipher_suite() 38 rl->cipher_suite = cipher_suite; in tlsv1_record_set_cipher_suite() 40 suite = tls_get_cipher_suite(cipher_suite); in tlsv1_record_set_cipher_suite() 78 "0x%04x", rl->cipher_suite); in tlsv1_record_change_write_cipher() 79 rl->write_cipher_suite = rl->cipher_suite; in tlsv1_record_change_write_cipher() 112 "0x%04x", rl->cipher_suite); in tlsv1_record_change_read_cipher() 113 rl->read_cipher_suite = rl->cipher_suite; in tlsv1_record_change_read_cipher()
|
H A D | tlsv1_record.h | 51 u16 cipher_suite; member 61 u16 cipher_suite);
|
H A D | tlsv1_server_read.c | 126 u16 cipher_suite; in tls_process_client_hello() local 251 cipher_suite = 0; in tls_process_client_hello() 252 for (i = 0; !cipher_suite && i < conn->num_cipher_suites; i++) { in tls_process_client_hello() 259 if (!cipher_suite && tmp == conn->cipher_suites[i]) { in tls_process_client_hello() 260 cipher_suite = tmp; in tls_process_client_hello() 266 if (!cipher_suite) { in tls_process_client_hello() 273 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_client_hello() 281 conn->cipher_suite = cipher_suite; in tls_process_client_hello() 862 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_client_key_exchange()
|
H A D | tlsv1_client_read.c | 83 u16 cipher_suite; in tls_process_server_hello() local 172 cipher_suite = WPA_GET_BE16(pos); in tls_process_server_hello() 175 if (cipher_suite == conn->cipher_suites[i]) in tls_process_server_hello() 180 "cipher suite 0x%04x", cipher_suite); in tls_process_server_hello() 186 if (conn->session_resumed && cipher_suite != conn->prev_cipher_suite) { in tls_process_server_hello() 189 "0x%04x)", cipher_suite, conn->prev_cipher_suite); in tls_process_server_hello() 195 if (tlsv1_record_set_cipher_suite(&conn->rl, cipher_suite) < 0) { in tls_process_server_hello() 203 conn->prev_cipher_suite = cipher_suite; in tls_process_server_hello() 1086 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { in tls_process_server_key_exchange() 1095 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_process_server_key_exchange()
|
H A D | tlsv1_server_i.h | 43 u16 cipher_suite; member
|
H A D | tlsv1_server_write.c | 98 WPA_PUT_BE16(pos, conn->cipher_suite); in tls_write_server_hello() 197 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_certificate() 380 suite = tls_get_cipher_suite(conn->rl.cipher_suite); in tls_write_server_key_exchange() 386 if (!tls_server_key_exchange_allowed(conn->rl.cipher_suite)) { in tls_write_server_key_exchange()
|
H A D | tlsv1_server.c | 533 switch (conn->rl.cipher_suite) { in tlsv1_server_get_cipher()
|
H A D | tlsv1_client.c | 609 switch (conn->rl.cipher_suite) { in tlsv1_client_get_cipher()
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_scert_single_ec.c | 54 choices->cipher_suite = st[u][0]; in se_choose() 62 choices->cipher_suite = st[u][0]; in se_choose() 70 choices->cipher_suite = st[u][0]; in se_choose()
|
H A D | ssl_scert_single_rsa.c | 57 choices->cipher_suite = st[u][0]; in sr_choose() 63 choices->cipher_suite = st[u][0]; in sr_choose()
|
H A D | ssl_keyexport.c | 74 if (suites_sha384[u] == cc->session.cipher_suite) { in br_ssl_key_export()
|
H A D | ssl_lru.c | 424 br_enc16be(cc->store + x + CIPHER_SUITE_OFF, params->cipher_suite); in lru_save() 456 params->cipher_suite = br_dec16be( in lru_load()
|
H A D | ssl_hs_server.t0 | 587 ENG->session.cipher_suite = choices.cipher_suite; 664 dup addr-cipher_suite get16 = if 956 addr-cipher_suite get16 write16 1004 addr-cipher_suite get16 use-ecdhe? ifnot ret then 1052 addr-cipher_suite get16 use-rsa-ecdhe? 1 << 3 + write8 1084 addr-cipher_suite get16 use-ecdh? if 1260 addr-cipher_suite get16 use-rsa-keyx? if 1266 enc-rsa-len addr-cipher_suite get16 prf-id do-rsa-decrypt 1268 addr-cipher_suite get16 dup use-ecdhe? swap use-ecdh? { ecdhe ecdh } 1273 ec-point-len addr-cipher_suite get16 prf-id [all …]
|
H A D | ssl_hs_client.t0 | 695 addr-cipher_suite resume check-resume 828 addr-cipher_suite get16 expected-key-type 873 addr-cipher_suite get16 use-rsa-ecdhe? { use-rsa } 994 addr-cipher_suite get16 use-ecdh? ifnot 1114 addr-cipher_suite get16 1169 addr-cipher_suite get16 expected-key-type 1210 addr-cipher_suite get16 prf-id do-static-ecdh
|
H A D | ssl_hs_server.c | 490 …INT2(offsetof(br_ssl_engine_context, session) + offsetof(br_ssl_session_parameters, cipher_suite)), 1224 ENG->session.cipher_suite = choices.cipher_suite; in br_ssl_hs_server_run()
|
/freebsd/contrib/bearssl/tools/ |
H A D | brssl.h | 244 } cipher_suite; typedef 249 extern const cipher_suite cipher_suites[]; 277 cipher_suite *parse_suites(const char *arg, size_t *num);
|
H A D | server.c | 387 choices->cipher_suite = st[u][0]; in sp_choose() 393 choices->cipher_suite = st[u][0]; in sp_choose() 418 choices->cipher_suite = st[u][0]; in sp_choose() 447 choices->cipher_suite = st[u][0]; in sp_choose() 455 choices->cipher_suite = st[u][0]; in sp_choose() 469 get_suite_name_ext(choices->cipher_suite, csn, sizeof csn); in sp_choose() 636 cipher_suite *suites; in do_server()
|
H A D | names.c | 48 const cipher_suite cipher_suites[] = { 947 cipher_suite * 950 VECTOR(cipher_suite) suites = VEC_INIT; in parse_suites() 951 cipher_suite *r; in parse_suites()
|
H A D | sslio.c | 460 cc->session.cipher_suite, csn, sizeof csn); in run_ssl_engine() 462 if (uses_ecdhe(cc->session.cipher_suite)) { in run_ssl_engine()
|
/freebsd/contrib/wpa/src/pae/ |
H A D | ieee802_1x_cp.c | 46 u64 cipher_suite; member 99 sm->current_cipher_suite != sm->cipher_suite; in changed_cipher() 217 sm->current_cipher_suite = sm->cipher_suite; in SM_STATE() 482 sm->cipher_suite = cs_id[kay->macsec_csindex]; in ieee802_1x_cp_sm_init() 618 sm->cipher_suite = cs; in ieee802_1x_cp_set_ciphersuite()
|
/freebsd/sys/net80211/ |
H A D | ieee80211_var.h | 774 uint32_t cipher_suite); 776 uint32_t cipher_suite);
|
H A D | ieee80211.c | 429 uint32_t cipher_suite) in ieee80211_set_software_ciphers() argument 431 ieee80211_crypto_set_supported_software_ciphers(ic, cipher_suite); in ieee80211_set_software_ciphers() 440 uint32_t cipher_suite) in ieee80211_set_hardware_ciphers() argument 442 ieee80211_crypto_set_supported_hardware_ciphers(ic, cipher_suite); in ieee80211_set_hardware_ciphers()
|
/freebsd/contrib/wpa/src/drivers/ |
H A D | driver_macsec_linux.c | 90 u64 cipher_suite; member 519 drv->cipher_suite = cs; in macsec_drv_set_current_cipher_suite() 1187 cs = drv->cipher_suite; in macsec_drv_create_transmit_sc()
|
/freebsd/contrib/bearssl/inc/ |
H A D | bearssl_ssl.h | 818 uint16_t cipher_suite; member 3023 uint16_t cipher_suite; member
|
/freebsd/crypto/openssl/test/recipes/75-test_quicapi_data/ |
H A D | ssltraceref-zlib.txt | 212 cipher_suite {0x13, 0x01} TLS_AES_128_GCM_SHA256
|