Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 15 of 15) sorted by relevance

/titanic_41/usr/src/cmd/ssh/libssh/common/
H A Dcipher.c71 } ciphers[] = { variable
129 for (c = ciphers; c->name != NULL; c++) in cipher_by_name()
139 for (c = ciphers; c->name != NULL; c++) in cipher_by_number()
150 char *ciphers, *cp; in ciphers_valid() local
155 ciphers = cp = xstrdup(names); in ciphers_valid()
161 xfree(ciphers); in ciphers_valid()
168 xfree(ciphers); in ciphers_valid()
H A Dreadconf.c695 if (*activep && options->ciphers == NULL) in process_config_line()
696 options->ciphers = xstrdup(arg); in process_config_line()
966 options->ciphers = NULL; in initialize_options()
/titanic_41/usr/src/cmd/ssh/include/
H A Dreadconf.h110 char *ciphers; /* SSH2 ciphers in order of preference. */ member
H A Dservconf.h72 char *ciphers; /* Supported SSH2 ciphers. */ member
/titanic_41/usr/src/cmd/ssh/ssh/
H A Dssh.c425 options.ciphers = xstrdup(optarg);
438 options.ciphers = "3des-cbc";
440 options.ciphers = "blowfish-cbc";
442 options.ciphers = (char *)-1;
H A Dsshconnect2.c114 if (options.ciphers == (char *)-1) { in ssh_kex2()
116 options.ciphers = NULL; in ssh_kex2()
118 if (options.ciphers != NULL) { in ssh_kex2()
120 myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers; in ssh_kex2()
/titanic_41/usr/src/cmd/ssh/sshd/
H A Dsshd.c1144 if (options.ciphers != NULL && in main()
1145 strcmp(options.ciphers, OLD_DEFAULT_CIPHERS_LIST) == 0) { in main()
1940 if (options.ciphers != NULL) { in prepare_for_ssh2_kex()
1942 myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers; in prepare_for_ssh2_kex()
H A Dservconf.c131 options->ciphers = NULL; in initialize_server_options()
1171 if (options->ciphers == NULL) in process_server_config_line()
1172 options->ciphers = xstrdup(arg); in process_server_config_line()
/titanic_41/usr/src/uts/common/io/ath/
H A Dath_aux.c812 static const char *ciphers[] = { in ath_keyprint() local
824 tag, ix, ciphers[hk->kv_type]); in ath_keyprint()
/titanic_41/usr/src/uts/common/io/ipw/
H A Dipw2100_impl.h455 uint32_t ciphers; member
H A Dipw2100.c930 sec.ciphers = LE_32(IPW2100_CIPHER_NONE); in ipw2100_config()
/titanic_41/usr/src/tools/findunref/
H A Dexception_list.open85 # ciphers.
/titanic_41/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A DREADME451 # home network; allow all valid ciphers
459 # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers
/titanic_41/usr/src/lib/sasl_plugins/digestmd5/
H A Ddigestmd5.c4222 int ciphers = 0; local
4352 ciphers |= cipher->flag;
4522 (ciphers & cipher->flag) &&
/titanic_41/usr/src/cmd/ssh/doc/
H A DChangeLog190 in, thus increasing the attack complexity when using ciphers with longer
1131 - complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)
1483 support ssh2 ciphers