Searched refs:ciphers (Results 1 – 15 of 15) sorted by relevance
71 } ciphers[] = { variable129 for (c = ciphers; c->name != NULL; c++) in cipher_by_name()139 for (c = ciphers; c->name != NULL; c++) in cipher_by_number()150 char *ciphers, *cp; in ciphers_valid() local155 ciphers = cp = xstrdup(names); in ciphers_valid()161 xfree(ciphers); in ciphers_valid()168 xfree(ciphers); in ciphers_valid()
695 if (*activep && options->ciphers == NULL) in process_config_line()696 options->ciphers = xstrdup(arg); in process_config_line()966 options->ciphers = NULL; in initialize_options()
110 char *ciphers; /* SSH2 ciphers in order of preference. */ member
72 char *ciphers; /* Supported SSH2 ciphers. */ member
425 options.ciphers = xstrdup(optarg);438 options.ciphers = "3des-cbc";440 options.ciphers = "blowfish-cbc";442 options.ciphers = (char *)-1;
114 if (options.ciphers == (char *)-1) { in ssh_kex2()116 options.ciphers = NULL; in ssh_kex2()118 if (options.ciphers != NULL) { in ssh_kex2()120 myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers; in ssh_kex2()
1144 if (options.ciphers != NULL && in main()1145 strcmp(options.ciphers, OLD_DEFAULT_CIPHERS_LIST) == 0) { in main()1940 if (options.ciphers != NULL) { in prepare_for_ssh2_kex()1942 myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers; in prepare_for_ssh2_kex()
131 options->ciphers = NULL; in initialize_server_options()1171 if (options->ciphers == NULL) in process_server_config_line()1172 options->ciphers = xstrdup(arg); in process_server_config_line()
812 static const char *ciphers[] = { in ath_keyprint() local824 tag, ix, ciphers[hk->kv_type]); in ath_keyprint()
455 uint32_t ciphers; member
930 sec.ciphers = LE_32(IPW2100_CIPHER_NONE); in ipw2100_config()
85 # ciphers.
451 # home network; allow all valid ciphers459 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
4222 int ciphers = 0; local4352 ciphers |= cipher->flag;4522 (ciphers & cipher->flag) &&
190 in, thus increasing the attack complexity when using ciphers with longer1131 - complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)1483 support ssh2 ciphers