Lines Matching defs:cipher
331 * the cipher suite is either ECDH-anon or ECDHE. In other cases,
750 if (s->session->cipher == NULL) {
751 s->session->cipher = s->s3.tmp.new_cipher;
752 } else if (s->session->cipher != s->s3.tmp.new_cipher) {
1120 * 2 + # length of cipher suites
1121 * 2^16-2 + # maximum length of cipher suites array
1708 /* Check what signalling cipher-suite values were received. */
1738 const SSL_CIPHER *cipher =
1741 if (cipher == NULL) {
1747 || s->s3.tmp.new_cipher->id != cipher->id)) {
1755 s->s3.tmp.new_cipher = cipher;
1813 * If it is a hit, check that the cipher is in the list. In TLSv1.3 we check
1818 id = s->session->cipher->id;
1836 * we need to have the cipher in the cipher list if we are asked
1908 /* check if some cipher was preferred by call back */
1917 s->session->cipher = pref_cipher;
2015 * Given s->peer_ciphers and SSL_get_ciphers, we must pick a cipher
2067 * and must be called after the cipher has been chosen because this may
2186 const SSL_CIPHER *cipher;
2216 cipher =
2219 if (cipher == NULL) {
2224 s->s3.tmp.new_cipher = cipher;
2243 s->s3.tmp.new_cipher = s->session->cipher;
2255 * s->s3.tmp.new_cipher - the new cipher to use.
2268 * cipher negotiation (HTTP/2 restricts permitted ciphers). In TLSv1.3
2269 * we already did this because cipher negotiation happens earlier, and
3738 * Initialize HMAC and cipher contexts. If callback present it does
3791 EVP_CIPHER *cipher = EVP_CIPHER_fetch(s->ctx->libctx, "AES-256-CBC",
3794 if (cipher == NULL) {
3800 iv_len = EVP_CIPHER_get_iv_length(cipher);
3803 || !EVP_EncryptInit_ex(ctx, cipher, NULL,
3808 EVP_CIPHER_free(cipher);
3812 EVP_CIPHER_free(cipher);