Lines Matching refs:cipher

113  * ECC cipher suite support in OpenSSL originally developed by
158 const SSL_CIPHER *cipher;
365 /* cipher suite aliases */
403 const SSL_CIPHER *cipher;
410 if ((cipher = s->s3->hs.cipher) == NULL)
417 if (cipher->algorithm_mac & SSL_AEAD)
420 switch (cipher->algorithm_enc) {
444 switch (cipher->algorithm_mac) {
478 * for s->cipher. It returns 1 on success and 0 on error.
483 const SSL_CIPHER *cipher;
487 if ((cipher = s->s3->hs.cipher) == NULL)
489 if ((cipher->algorithm_mac & SSL_AEAD) == 0)
492 switch (cipher->algorithm_enc) {
511 const SSL_CIPHER *cipher;
515 if ((cipher = s->s3->hs.cipher) == NULL)
518 switch (cipher->algorithm2 & SSL_HANDSHAKE_MAC_MASK) {
589 * cipher list - the list is ordered by cipher value and we currently
590 * hope that ciphers with higher cipher values are preferable...
606 co_list[co_list_num].cipher = c;
660 *ca_curr = ciph_curr->cipher;
669 * or represent a cipher strength value (will be added in any case because algorithms=0).
736 cp = curr->cipher;
763 /* add the cipher if it has not been added yet. */
771 /* Move the added cipher to this location */
823 (curr->cipher->strength_bits > max_strength_bits))
824 max_strength_bits = curr->cipher->strength_bits;
840 number_uses[curr->cipher->strength_bits]++;
943 * Now search for the cipher alias in the ca_list.
946 * cipher "ADH-MY-CIPHER" look like a match for
947 * buflen=3. So additionally check whether the cipher
1122 const SSL_CIPHER *cipher;
1173 * cipher, with CHACHA20 second.
1182 * preferred symmetric cipher, with AES second.
1220 * We also need cipher aliases for selecting based on the rule_str.
1223 * For 1) we need the available ciphers and for 2) the cipher
1269 /* Prefer TLSv1.3 cipher suites. */
1272 cipher = sk_SSL_CIPHER_value(cipher_list_tls13, i);
1273 if (!sk_SSL_CIPHER_push(cipherstack, cipher)) {
1282 * The cipher selection for the list is done. The ciphers are added
1286 * TLSv1.3 cipher suites have not been configured separately,
1287 * include inactive TLSv1.3 cipher suites. This avoids attempts to
1289 * TLSv1.3 cipher suites. If the rule string resulted in no active
1290 * cipher suites then we return an empty stack.
1295 (!tls13_seen && curr->cipher->algorithm_ssl == SSL_TLSV1_3)) {
1296 if (!sk_SSL_CIPHER_push(cipherstack, curr->cipher)) {
1321 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len)
1328 alg_mkey = cipher->algorithm_mkey;
1329 alg_auth = cipher->algorithm_auth;
1330 alg_enc = cipher->algorithm_enc;
1331 alg_mac = cipher->algorithm_mac;
1332 alg_ssl = cipher->algorithm_ssl;
1436 cipher->name, ver, kx, au, enc, mac) == -1)
1452 SSL_CIPHER_get_version(const SSL_CIPHER *cipher)
1454 if (cipher == NULL)
1461 /* return the actual cipher being used */
1463 SSL_CIPHER_get_name(const SSL_CIPHER *cipher)
1465 if (cipher == NULL)
1468 return cipher->name;
1472 /* number of bits for symmetric cipher */
1488 SSL_CIPHER_get_id(const SSL_CIPHER *cipher)
1490 return SSL3_CK_ID | cipher->value;
1495 SSL_CIPHER_get_value(const SSL_CIPHER *cipher)
1497 return cipher->value;