Searched refs:cipher (Results 1 - 3 of 3) sorted by relevance

/httpd/modules/session/
H A Dmod_session_crypto.c47 const char *cipher; member in struct:__anon311
66 const apr_crypto_t *f, apr_crypto_block_key_type_e **cipher,
80 *cipher = apr_hash_get(ciphers, dconf->cipher, APR_HASH_KEY_STRING);
81 if (!(*cipher)) {
108 "cipher '%s' not recognised by crypto driver. "
109 "session encryption not possible, options: %s", dconf->cipher, options);
136 apr_crypto_block_key_type_e *cipher; local
149 res = crypt_init(r, f, &cipher, dconf);
159 *cipher, APR_MODE_CB
65 crypt_init(request_rec *r, const apr_crypto_t *f, apr_crypto_block_key_type_e **cipher, session_crypto_dir_conf * dconf) argument
236 apr_crypto_block_key_type_e *cipher; local
601 set_crypto_cipher(cmd_parms * cmd, void *config, const char *cipher) argument
[all...]
/httpd/modules/ssl/
H A Dssl_engine_kernel.c315 const SSL_CIPHER *cipher = NULL; local
405 * the cipher suite changed in _any_ way (which is straight-forward but
410 * only if the currently active cipher is no longer contained in the
411 * reconfigured/new cipher suite. Any other changes are not important
412 * because it's the servers choice to select a cipher from the ones the
413 * client supports. So as long as the current cipher is still in the new
414 * cipher suite we're happy. Because we can assume we would have
416 * new cipher suite. This approach is fine because the user explicitly
424 cipher = SSL_get_current_cipher(ssl);
456 if ((!cipher
[all...]
H A Dssl_engine_vars.c888 MODSSL_SSL_CIPHER_CONST SSL_CIPHER *cipher = SSL_get_current_cipher(ssl); local
889 result = (cipher != NULL ? (char *)SSL_CIPHER_get_name(cipher) : NULL);
909 MODSSL_SSL_CIPHER_CONST SSL_CIPHER *cipher; local
914 if ((cipher = SSL_get_current_cipher(ssl)) != NULL)
915 *usekeysize = SSL_CIPHER_get_bits(cipher, algkeysize);
1233 else if (strEQ(a, "cipher"))

Completed in 350 milliseconds