/freebsd-10.0-release/crypto/openssl/crypto/evp/ |
H A D | openbsd_hw.c | 130 static int dev_crypto_init_key(EVP_CIPHER_CTX *ctx,int cipher, 138 assert(ctx->cipher->iv_len <= MAX_HW_IV); 142 CDATA(ctx)->cipher=cipher; 170 assert((inl&(ctx->cipher->block_size-1)) == 0); 174 if(ctx->cipher->iv_len) 178 memcpy(lb,&in[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len); 231 memcpy(ctx->iv,&out[cryp.len-ctx->cipher->iv_len],ctx->cipher [all...] |
H A D | evp_pbe.c | 71 /* Setup a cipher context from a PBE algorithm */ 158 const EVP_CIPHER *cipher; local 180 cipher = NULL; 183 cipher = EVP_get_cipherbynid(cipher_nid); 184 if (!cipher) 203 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) 257 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument 261 if (cipher) 262 cipher_nid = EVP_CIPHER_nid(cipher);
|
/freebsd-10.0-release/crypto/openssl/crypto/cms/ |
H A D | cms_enc.c | 83 enc = ec->cipher ? 1 : 0; 97 ciph = ec->cipher; 98 /* If not keeping key set cipher to NULL so subsequent calls 102 ec->cipher = NULL; 240 const EVP_CIPHER *cipher, 243 ec->cipher = cipher; 252 if (cipher) 291 if (enc->encryptedContentInfo->cipher && enc->unprotectedAttrs) 239 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument
|
/freebsd-10.0-release/crypto/openssl/crypto/pem/ |
H A D | pem_seal.c | 102 EVP_CIPHER_CTX_init(&ctx->cipher); 103 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 137 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i); 167 if (!EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i)) 181 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
|
/freebsd-10.0-release/secure/lib/libssh/ |
H A D | Makefile | 9 canohost.c channels.c cipher.c cipher-aes.c \ 10 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \
|
/freebsd-10.0-release/sys/opencrypto/ |
H A D | skipjack.c | 129 skipjack_forwards(u_int8_t *plain, u_int8_t *cipher, u_int8_t **key_tables) argument 188 cipher [0] = wh1; cipher [1] = wl1; 189 cipher [2] = wh2; cipher [3] = wl2; 190 cipher [4] = wh3; cipher [5] = wl3; 191 cipher [6] = wh4; cipher [7] = wl4; 196 skipjack_backwards (u_int8_t *cipher, u_int8_ argument [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | sshconnect1.c | 38 #include "cipher.h" 418 if (options.cipher == SSH_CIPHER_NONE) 453 if (options.cipher == SSH_CIPHER_NONE) 616 if (options.cipher == SSH_CIPHER_NOT_SET) { 618 options.cipher = ssh_cipher_default; 619 } else if (options.cipher == SSH_CIPHER_INVALID || 620 !(cipher_mask_ssh1(1) & (1 << options.cipher))) { 621 logit("No valid SSH1 cipher, using %.100s instead.", 623 options.cipher = ssh_cipher_default; 625 /* Check that the selected cipher i [all...] |
/freebsd-10.0-release/crypto/openssl/apps/ |
H A D | smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher [all...] |
H A D | pkey.c | 75 const EVP_CIPHER *cipher = NULL; local 172 cipher = EVP_get_cipherbyname(*args + 1); 173 if (!cipher) 175 BIO_printf(bio_err, "Unknown cipher %s\n", 246 PEM_write_bio_PrivateKey(out, pkey, cipher,
|
H A D | pkcs8.c | 78 const EVP_CIPHER *cipher = NULL; local 111 cipher=EVP_get_cipherbyname(*args); 112 if (!cipher) 115 "Unknown cipher %s\n", *args); 224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 242 if ((pbe_nid == -1) && !cipher) 311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
/freebsd-10.0-release/contrib/wpa/src/tls/ |
H A D | tlsv1_common.h | 216 tls_cipher cipher; member in struct:tls_cipher_suite 226 tls_cipher cipher; member in struct:tls_cipher_data 249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 250 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
H A D | tlsv1_server.c | 453 * tlsv1_server_get_cipher - Get current cipher name 455 * @buf: Buffer for the cipher name 459 * Get the name of the currently used cipher. 464 char *cipher; local 468 cipher = "RC4-MD5"; 471 cipher = "RC4-SHA"; 474 cipher = "DES-CBC-SHA"; 477 cipher = "DES-CBC3-SHA"; 480 cipher = "ADH-AES-128-SHA"; 483 cipher [all...] |
H A D | tlsv1_common.c | 21 * Add support for commonly used cipher suites; don't bother with exportable 91 * tls_get_cipher_suite - Get TLS cipher suite 93 * Returns: Pointer to the cipher data or %NULL if not found 105 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) argument 109 if (tls_ciphers[i].cipher == cipher) 115 int tls_server_key_exchange_allowed(tls_cipher cipher) argument 120 suite = tls_get_cipher_suite(cipher);
|
H A D | tlsv1_client.c | 542 * tlsv1_client_get_cipher - Get current cipher name 544 * @buf: Buffer for the cipher name 548 * Get the name of the currently used cipher. 553 char *cipher; local 557 cipher = "RC4-MD5"; 560 cipher = "RC4-SHA"; 563 cipher = "DES-CBC-SHA"; 566 cipher = "DES-CBC3-SHA"; 569 cipher = "ADH-AES-128-SHA256"; 572 cipher [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | mk_priv.c | 96 krb5_data_zero (&s.enc_part.cipher); 119 &s.enc_part.cipher); 134 krb5_data_free (&s.enc_part.cipher); 151 krb5_data_free (&s.enc_part.cipher);
|
/freebsd-10.0-release/crypto/openssl/crypto/engine/ |
H A D | eng_openssl.c | 113 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 215 * we're asked for a cipher we don't support (should not happen). 218 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler. 277 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 280 if(!cipher) 286 /* We are being asked for a specific cipher */ 288 *cipher = &test_r4_cipher; 290 *cipher = &test_r4_40_cipher; 297 *cipher = NULL;
|
H A D | eng_cryptodev.c | 101 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 257 sess.cipher = ciphers[i].id; 298 sess.cipher = 0; 377 if ((inl % ctx->cipher->block_size) != 0) 391 if (ctx->cipher->iv_len) { 394 iiv = in + inl - ctx->cipher->iv_len; 395 memcpy(save_iv, iiv, ctx->cipher->iv_len); 407 if (ctx->cipher->iv_len) { 409 iiv = out + inl - ctx->cipher->iv_len; 412 memcpy(ctx->iv, iiv, ctx->cipher 423 int cipher = -1, i; local 609 cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) argument [all...] |
/freebsd-10.0-release/tools/regression/geom_eli/ |
H A D | init-a.t | 12 for cipher in aes:0 aes:128 aes:256 \ 25 ealgo=${cipher%%:*} 26 keylen=${cipher##*:}
|
H A D | init.t | 12 for cipher in aes:0 aes:128 aes:256 \ 25 ealgo=${cipher%%:*} 26 keylen=${cipher##*:}
|
H A D | onetime-a.t | 11 for cipher in aes:0 aes:128 aes:256 \ 24 ealgo=${cipher%%:*} 25 keylen=${cipher##*:}
|
H A D | onetime.t | 11 for cipher in aes:0 aes:128 aes:256 \ 24 ealgo=${cipher%%:*} 25 keylen=${cipher##*:}
|
/freebsd-10.0-release/contrib/wpa/src/rsn_supp/ |
H A D | peerkey.c | 181 int cipher; local 220 cipher = ie.pairwise_cipher & sm->allowed_pairwise_cipher; 221 if (cipher & WPA_CIPHER_CCMP) { 223 cipher = WPA_CIPHER_CCMP; 224 } else if (cipher & WPA_CIPHER_GCMP) { 226 cipher = WPA_CIPHER_GCMP; 227 } else if (cipher & WPA_CIPHER_TKIP) { 229 cipher = WPA_CIPHER_TKIP; 231 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2"); 248 peerkey->cipher 470 int cipher; local [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/cmac/ |
H A D | cmac.c | 153 const EVP_CIPHER *cipher, ENGINE *impl) 171 return FIPS_cmac_init(ctx, key, keylen, cipher, NULL); 175 if (!key && !cipher && !impl && keylen == 0) 187 if (cipher && !EVP_EncryptInit_ex(&ctx->cctx, cipher, impl, NULL, NULL)) 152 CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen, const EVP_CIPHER *cipher, ENGINE *impl) argument
|
/freebsd-10.0-release/crypto/openssl/ssl/ |
H A D | ssl_task.c | 66 * SSL_CIPHER Defines a list of cipher specifications the server 140 static char *cipher=NULL; variable 223 * get the preferred cipher list and other initialization 225 if (cipher == NULL) cipher=getenv("SSL_CIPHER"); 226 printf("cipher list: %s\n", cipher ? cipher : "{undefined}" );
|
/freebsd-10.0-release/contrib/wpa/src/common/ |
H A D | wpa_common.c | 449 "cipher", __func__); 479 "pairwise cipher", __func__); 539 "group cipher 0x%x", __func__, 900 * wpa_cipher_txt - Convert cipher suite to a text string 901 * @cipher: Cipher suite (WPA_CIPHER_* enum) 902 * Returns: Pointer to a text string of the cipher suite name 904 const char * wpa_cipher_txt(int cipher) argument 906 switch (cipher) { 1084 int wpa_cipher_key_len(int cipher) argument 1086 switch (cipher) { 1102 wpa_cipher_rsc_len(int cipher) argument 1118 wpa_cipher_to_alg(int cipher) argument 1135 wpa_cipher_valid_pairwise(int cipher) argument 1143 wpa_cipher_to_suite(int proto, int cipher) argument [all...] |