Searched refs:cipher (Results 26 - 50 of 169) sorted by relevance

1234567

/freebsd-10.0-release/crypto/openssl/crypto/evp/
H A Dopenbsd_hw.c130 static int dev_crypto_init_key(EVP_CIPHER_CTX *ctx,int cipher,
138 assert(ctx->cipher->iv_len <= MAX_HW_IV);
142 CDATA(ctx)->cipher=cipher;
170 assert((inl&(ctx->cipher->block_size-1)) == 0);
174 if(ctx->cipher->iv_len)
178 memcpy(lb,&in[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len);
231 memcpy(ctx->iv,&out[cryp.len-ctx->cipher->iv_len],ctx->cipher
[all...]
H A Devp_pbe.c71 /* Setup a cipher context from a PBE algorithm */
158 const EVP_CIPHER *cipher; local
180 cipher = NULL;
183 cipher = EVP_get_cipherbynid(cipher_nid);
184 if (!cipher)
203 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de))
257 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument
261 if (cipher)
262 cipher_nid = EVP_CIPHER_nid(cipher);
/freebsd-10.0-release/crypto/openssl/crypto/cms/
H A Dcms_enc.c83 enc = ec->cipher ? 1 : 0;
97 ciph = ec->cipher;
98 /* If not keeping key set cipher to NULL so subsequent calls
102 ec->cipher = NULL;
240 const EVP_CIPHER *cipher,
243 ec->cipher = cipher;
252 if (cipher)
291 if (enc->encryptedContentInfo->cipher && enc->unprotectedAttrs)
239 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument
/freebsd-10.0-release/crypto/openssl/crypto/pem/
H A Dpem_seal.c102 EVP_CIPHER_CTX_init(&ctx->cipher);
103 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk);
137 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i);
167 if (!EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i))
181 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
/freebsd-10.0-release/secure/lib/libssh/
H A DMakefile9 canohost.c channels.c cipher.c cipher-aes.c \
10 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \
/freebsd-10.0-release/sys/opencrypto/
H A Dskipjack.c129 skipjack_forwards(u_int8_t *plain, u_int8_t *cipher, u_int8_t **key_tables) argument
188 cipher [0] = wh1; cipher [1] = wl1;
189 cipher [2] = wh2; cipher [3] = wl2;
190 cipher [4] = wh3; cipher [5] = wl3;
191 cipher [6] = wh4; cipher [7] = wl4;
196 skipjack_backwards (u_int8_t *cipher, u_int8_ argument
[all...]
/freebsd-10.0-release/crypto/openssh/
H A Dsshconnect1.c38 #include "cipher.h"
418 if (options.cipher == SSH_CIPHER_NONE)
453 if (options.cipher == SSH_CIPHER_NONE)
616 if (options.cipher == SSH_CIPHER_NOT_SET) {
618 options.cipher = ssh_cipher_default;
619 } else if (options.cipher == SSH_CIPHER_INVALID ||
620 !(cipher_mask_ssh1(1) & (1 << options.cipher))) {
621 logit("No valid SSH1 cipher, using %.100s instead.",
623 options.cipher = ssh_cipher_default;
625 /* Check that the selected cipher i
[all...]
/freebsd-10.0-release/crypto/openssl/apps/
H A Dsmime.c98 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_des_ede3_cbc();
154 cipher = EVP_des_cbc();
158 cipher = EVP_seed_cbc();
162 cipher = EVP_rc2_40_cbc();
164 cipher = EVP_rc2_cbc();
166 cipher = EVP_rc2_64_cbc();
170 cipher = EVP_aes_128_cbc();
172 cipher = EVP_aes_192_cbc();
174 cipher
[all...]
H A Dpkey.c75 const EVP_CIPHER *cipher = NULL; local
172 cipher = EVP_get_cipherbyname(*args + 1);
173 if (!cipher)
175 BIO_printf(bio_err, "Unknown cipher %s\n",
246 PEM_write_bio_PrivateKey(out, pkey, cipher,
H A Dpkcs8.c78 const EVP_CIPHER *cipher = NULL; local
111 cipher=EVP_get_cipherbyname(*args);
112 if (!cipher)
115 "Unknown cipher %s\n", *args);
224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
242 if ((pbe_nid == -1) && !cipher)
311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
/freebsd-10.0-release/contrib/wpa/src/tls/
H A Dtlsv1_common.h216 tls_cipher cipher; member in struct:tls_cipher_suite
226 tls_cipher cipher; member in struct:tls_cipher_data
249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
250 int tls_server_key_exchange_allowed(tls_cipher cipher);
H A Dtlsv1_server.c453 * tlsv1_server_get_cipher - Get current cipher name
455 * @buf: Buffer for the cipher name
459 * Get the name of the currently used cipher.
464 char *cipher; local
468 cipher = "RC4-MD5";
471 cipher = "RC4-SHA";
474 cipher = "DES-CBC-SHA";
477 cipher = "DES-CBC3-SHA";
480 cipher = "ADH-AES-128-SHA";
483 cipher
[all...]
H A Dtlsv1_common.c21 * Add support for commonly used cipher suites; don't bother with exportable
91 * tls_get_cipher_suite - Get TLS cipher suite
93 * Returns: Pointer to the cipher data or %NULL if not found
105 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) argument
109 if (tls_ciphers[i].cipher == cipher)
115 int tls_server_key_exchange_allowed(tls_cipher cipher) argument
120 suite = tls_get_cipher_suite(cipher);
H A Dtlsv1_client.c542 * tlsv1_client_get_cipher - Get current cipher name
544 * @buf: Buffer for the cipher name
548 * Get the name of the currently used cipher.
553 char *cipher; local
557 cipher = "RC4-MD5";
560 cipher = "RC4-SHA";
563 cipher = "DES-CBC-SHA";
566 cipher = "DES-CBC3-SHA";
569 cipher = "ADH-AES-128-SHA256";
572 cipher
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dmk_priv.c96 krb5_data_zero (&s.enc_part.cipher);
119 &s.enc_part.cipher);
134 krb5_data_free (&s.enc_part.cipher);
151 krb5_data_free (&s.enc_part.cipher);
/freebsd-10.0-release/crypto/openssl/crypto/engine/
H A Deng_openssl.c113 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
215 * we're asked for a cipher we don't support (should not happen).
218 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler.
277 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument
280 if(!cipher)
286 /* We are being asked for a specific cipher */
288 *cipher = &test_r4_cipher;
290 *cipher = &test_r4_40_cipher;
297 *cipher = NULL;
H A Deng_cryptodev.c101 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
257 sess.cipher = ciphers[i].id;
298 sess.cipher = 0;
377 if ((inl % ctx->cipher->block_size) != 0)
391 if (ctx->cipher->iv_len) {
394 iiv = in + inl - ctx->cipher->iv_len;
395 memcpy(save_iv, iiv, ctx->cipher->iv_len);
407 if (ctx->cipher->iv_len) {
409 iiv = out + inl - ctx->cipher->iv_len;
412 memcpy(ctx->iv, iiv, ctx->cipher
423 int cipher = -1, i; local
609 cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) argument
[all...]
/freebsd-10.0-release/tools/regression/geom_eli/
H A Dinit-a.t12 for cipher in aes:0 aes:128 aes:256 \
25 ealgo=${cipher%%:*}
26 keylen=${cipher##*:}
H A Dinit.t12 for cipher in aes:0 aes:128 aes:256 \
25 ealgo=${cipher%%:*}
26 keylen=${cipher##*:}
H A Donetime-a.t11 for cipher in aes:0 aes:128 aes:256 \
24 ealgo=${cipher%%:*}
25 keylen=${cipher##*:}
H A Donetime.t11 for cipher in aes:0 aes:128 aes:256 \
24 ealgo=${cipher%%:*}
25 keylen=${cipher##*:}
/freebsd-10.0-release/contrib/wpa/src/rsn_supp/
H A Dpeerkey.c181 int cipher; local
220 cipher = ie.pairwise_cipher & sm->allowed_pairwise_cipher;
221 if (cipher & WPA_CIPHER_CCMP) {
223 cipher = WPA_CIPHER_CCMP;
224 } else if (cipher & WPA_CIPHER_GCMP) {
226 cipher = WPA_CIPHER_GCMP;
227 } else if (cipher & WPA_CIPHER_TKIP) {
229 cipher = WPA_CIPHER_TKIP;
231 wpa_printf(MSG_INFO, "RSN: No acceptable cipher in SMK M2");
248 peerkey->cipher
470 int cipher; local
[all...]
/freebsd-10.0-release/crypto/openssl/crypto/cmac/
H A Dcmac.c153 const EVP_CIPHER *cipher, ENGINE *impl)
171 return FIPS_cmac_init(ctx, key, keylen, cipher, NULL);
175 if (!key && !cipher && !impl && keylen == 0)
187 if (cipher && !EVP_EncryptInit_ex(&ctx->cctx, cipher, impl, NULL, NULL))
152 CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen, const EVP_CIPHER *cipher, ENGINE *impl) argument
/freebsd-10.0-release/crypto/openssl/ssl/
H A Dssl_task.c66 * SSL_CIPHER Defines a list of cipher specifications the server
140 static char *cipher=NULL; variable
223 * get the preferred cipher list and other initialization
225 if (cipher == NULL) cipher=getenv("SSL_CIPHER");
226 printf("cipher list: %s\n", cipher ? cipher : "{undefined}" );
/freebsd-10.0-release/contrib/wpa/src/common/
H A Dwpa_common.c449 "cipher", __func__);
479 "pairwise cipher", __func__);
539 "group cipher 0x%x", __func__,
900 * wpa_cipher_txt - Convert cipher suite to a text string
901 * @cipher: Cipher suite (WPA_CIPHER_* enum)
902 * Returns: Pointer to a text string of the cipher suite name
904 const char * wpa_cipher_txt(int cipher) argument
906 switch (cipher) {
1084 int wpa_cipher_key_len(int cipher) argument
1086 switch (cipher) {
1102 wpa_cipher_rsc_len(int cipher) argument
1118 wpa_cipher_to_alg(int cipher) argument
1135 wpa_cipher_valid_pairwise(int cipher) argument
1143 wpa_cipher_to_suite(int proto, int cipher) argument
[all...]

Completed in 129 milliseconds

1234567