Searched refs:cipher (Results 1 - 3 of 3) sorted by relevance
/httpd/modules/session/ |
H A D | mod_session_crypto.c | 47 const char *cipher; member in struct:__anon311 66 const apr_crypto_t *f, apr_crypto_block_key_type_e **cipher, 80 *cipher = apr_hash_get(ciphers, dconf->cipher, APR_HASH_KEY_STRING); 81 if (!(*cipher)) { 108 "cipher '%s' not recognised by crypto driver. " 109 "session encryption not possible, options: %s", dconf->cipher, options); 136 apr_crypto_block_key_type_e *cipher; local 149 res = crypt_init(r, f, &cipher, dconf); 159 *cipher, APR_MODE_CB 65 crypt_init(request_rec *r, const apr_crypto_t *f, apr_crypto_block_key_type_e **cipher, session_crypto_dir_conf * dconf) argument 236 apr_crypto_block_key_type_e *cipher; local 601 set_crypto_cipher(cmd_parms * cmd, void *config, const char *cipher) argument [all...] |
/httpd/modules/ssl/ |
H A D | ssl_engine_kernel.c | 315 const SSL_CIPHER *cipher = NULL; local 405 * the cipher suite changed in _any_ way (which is straight-forward but 410 * only if the currently active cipher is no longer contained in the 411 * reconfigured/new cipher suite. Any other changes are not important 412 * because it's the servers choice to select a cipher from the ones the 413 * client supports. So as long as the current cipher is still in the new 414 * cipher suite we're happy. Because we can assume we would have 416 * new cipher suite. This approach is fine because the user explicitly 424 cipher = SSL_get_current_cipher(ssl); 456 if ((!cipher [all...] |
H A D | ssl_engine_vars.c | 888 MODSSL_SSL_CIPHER_CONST SSL_CIPHER *cipher = SSL_get_current_cipher(ssl); local 889 result = (cipher != NULL ? (char *)SSL_CIPHER_get_name(cipher) : NULL); 909 MODSSL_SSL_CIPHER_CONST SSL_CIPHER *cipher; local 914 if ((cipher = SSL_get_current_cipher(ssl)) != NULL) 915 *usekeysize = SSL_CIPHER_get_bits(cipher, algkeysize); 1233 else if (strEQ(a, "cipher"))
|
Completed in 350 milliseconds