Searched refs:cipher (Results 101 - 125 of 197) sorted by last modified time

12345678

/freebsd-11-stable/crypto/openssl/ssl/
H A Ds3_enc.c474 if (s->session->cipher != NULL) {
475 if (s->session->cipher->algorithm_enc == SSL_eNULL)
479 if (s->session->cipher->algorithm_enc == SSL_RC4)
541 bs = EVP_CIPHER_block_size(ds->cipher);
H A Ds23_clnt.c266 SSL_CIPHER *cipher; local
271 cipher = sk_SSL_CIPHER_value(ciphers, i);
272 if (cipher->algorithm_ssl == SSL_SSLV2)
H A Dd1_srvr.c791 s->session->cipher = s->s3->tmp.new_cipher;
H A Dd1_clnt.c580 s->session->cipher = s->s3->tmp.new_cipher;
/freebsd-11-stable/crypto/openssl/crypto/evp/
H A De_des3.c281 int mode = ctx->cipher->flags & EVP_CIPH_MODE;
331 int mode = ctx->cipher->flags & EVP_CIPH_MODE;
/freebsd-11-stable/crypto/openssl/crypto/asn1/
H A Dx_pkey.c82 ret->cipher.cipher =
85 if (ret->cipher.cipher == NULL) {
97 memcpy(ret->cipher.iv,
100 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
121 ret->cipher.cipher = NULL;
122 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
H A Dp5_pbev2.c90 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
100 alg_nid = EVP_CIPHER_type(cipher);
118 if (EVP_CIPHER_iv_length(cipher)) {
120 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher));
121 else if (RAND_bytes(iv, EVP_CIPHER_iv_length(cipher)) <= 0)
128 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0))
136 * If prf NID unspecified see if cipher has a preference. An error is OK
149 keylen = EVP_CIPHER_key_length(cipher);
194 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
197 return PKCS5_pbe2_set_iv(cipher, ite
[all...]
/freebsd-11-stable/secure/lib/libssh/
H A DMakefile11 canohost.c channels.c cipher.c cipher-aes.c cipher-aesctr.c \
12 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \
20 poly1305.c chacha.c cipher-chachapoly.c \
/freebsd-11-stable/crypto/openssh/
H A Dsshkey.c55 #include "cipher.h"
3049 const struct sshcipher *cipher; local
3064 if ((cipher = cipher_by_name(ciphername)) == NULL) {
3075 blocksize = cipher_blocksize(cipher);
3076 keylen = cipher_keylen(cipher);
3077 ivlen = cipher_ivlen(cipher);
3078 authlen = cipher_authlen(cipher);
3098 if ((r = cipher_init(&ciphercontext, cipher, key, keylen,
3193 const struct sshcipher *cipher = NULL; local
3272 if ((cipher
3422 const struct sshcipher *cipher; local
3517 const EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; local
3519 const EVP_CIPHER *cipher = (len > 0) ? EVP_aes_128_cbc() : NULL; local
3669 const struct sshcipher *cipher; local
[all...]
H A Dsshconnect1.c40 #include "cipher.h"
439 if (options.cipher == SSH_CIPHER_NONE)
474 if (options.cipher == SSH_CIPHER_NONE)
632 if (options.cipher == SSH_CIPHER_NOT_SET) {
634 options.cipher = ssh_cipher_default;
635 } else if (options.cipher == SSH_CIPHER_INVALID ||
636 !(cipher_mask_ssh1(1) & (1 << options.cipher))) {
637 logit("No valid SSH1 cipher, using %.100s instead.",
639 options.cipher = ssh_cipher_default;
641 /* Check that the selected cipher i
[all...]
H A Dssh-keygen.c436 char *type, *cipher; local
456 (r = sshbuf_get_cstring(b, &cipher, NULL)) != 0 ||
462 if (strcmp(cipher, "none") != 0) {
463 error("unsupported cipher %s", cipher);
464 free(cipher);
469 free(cipher);
H A Dreadconf.h73 int cipher; /* Cipher to use. */ member in struct:__anon4508
H A Dreadconf.c58 #include "cipher.h"
251 { "cipher", oCipher },
1192 intptr = &options->cipher;
1198 fatal("%.200s line %d: Bad cipher '%s'.",
1209 fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.",
1846 options->cipher = -1;
2004 if (options->cipher == -1)
2005 options->cipher = SSH_CIPHER_NOT_SET;
2671 if (o->cipher != SSH_CIPHER_NOT_SET)
2672 printf("Cipher %s\n", cipher_name(o->cipher));
[all...]
H A Dpacket.c76 #include "cipher.h"
299 error("%s: cannot load cipher 'none'", __func__);
410 if (enc == NULL || !cipher_is_cbc(enc->cipher) || (mac && mac->etm)) {
820 const struct sshcipher *cipher = cipher_by_number(number);
824 if (cipher == NULL)
825 fatal("%s: unknown cipher number %d", __func__, number);
832 if ((r = cipher_init(&state->send_context, cipher, key, keylen,
834 (r = cipher_init(&state->receive_context, cipher, key, keylen,
998 if (cipher_authlen(enc->cipher) == 0) {
1004 if ((r = cipher_init(ccp, enc->cipher, en
[all...]
H A Dkex.h109 const struct sshcipher *cipher; member in struct:sshenc
H A Dkex.c43 #include "cipher.h"
657 if ((enc->cipher = cipher_by_name(name)) == NULL) {
664 enc->iv_len = cipher_ivlen(enc->cipher);
666 enc->key_len = cipher_keylen(enc->cipher);
667 enc->block_size = cipher_blocksize(enc->cipher);
835 authlen = cipher_authlen(newkeys->enc.cipher);
850 debug("kex: %s cipher: %s MAC: %s compression: %s",
863 dh_need = MAXIMUM(dh_need, cipher_seclen(newkeys->enc.cipher));
H A Dcipher.c1 /* $OpenBSD: cipher.c,v 1.102 2016/08/03 05:41:57 djm Exp $ */
46 #include "cipher.h"
66 const struct sshcipher *cipher; member in struct:sshcipher_ctx
198 * Default is cipher block size, except for chacha20+poly1305 that
226 return cc->cipher->number;
286 * Parses the name of the cipher. Returns the number of the corresponding
287 * cipher, or -1 on error.
312 if (cc == NULL || cc->cipher == NULL)
314 if (cc->cipher->number == SSH_CIPHER_DES)
321 cipher_init(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, argument
543 cipher_set_key_string(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, const char *passphrase, int do_encrypt) argument
[all...]
/freebsd-11-stable/crypto/openssh/regress/
H A Dintegrity.sh13 macs="$macs `${SSH} -Q cipher-auth`"
40 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
/freebsd-11-stable/contrib/ntp/util/
H A Dntp-keygen.c183 const EVP_CIPHER * cipher = NULL; variable
570 cipher = EVP_get_cipherbyname(ciphername);
571 if (cipher == NULL) {
572 fprintf(stderr, "Unknown cipher %s\n", ciphername);
691 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0,
757 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0,
813 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0,
1030 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NULL, 0, NULL,
1082 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NULL, 0, NULL,
1250 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NUL
[all...]
/freebsd-11-stable/crypto/openssl/crypto/cms/
H A Dcms_kari.c387 const EVP_CIPHER *cipher)
391 int keylen = EVP_CIPHER_key_length(cipher);
401 * Pick a cipher based on content encryption cipher. If it is DES3 use
405 if (EVP_CIPHER_type(cipher) == NID_des_ede3_cbc)
437 if (!cms_wrap_init(kari, ec->cipher))
386 cms_wrap_init(CMS_KeyAgreeRecipientInfo *kari, const EVP_CIPHER *cipher) argument
/freebsd-11-stable/crypto/openssl/apps/
H A Dsmime.c99 const EVP_CIPHER *cipher = NULL; local
149 cipher = EVP_des_ede3_cbc();
151 cipher = EVP_des_cbc();
155 cipher = EVP_seed_cbc();
159 cipher = EVP_rc2_40_cbc();
161 cipher = EVP_rc2_cbc();
163 cipher = EVP_rc2_64_cbc();
167 cipher = EVP_aes_128_cbc();
169 cipher = EVP_aes_192_cbc();
171 cipher
[all...]
H A Dpkey.c76 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_get_cipherbyname(*args + 1);
153 if (!cipher) {
154 BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1);
214 PEM_write_bio_PrivateKey(out, pkey, cipher,
H A Dgenpkey.c83 const EVP_CIPHER *cipher = NULL; local
161 cipher = EVP_get_cipherbyname(*args + 1);
162 if (!cipher) {
163 BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1);
185 "-<cipher> use cipher <cipher> to encrypt the key\n");
243 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0, NULL, pass);
/freebsd-11-stable/crypto/openssl/engines/ccgost/
H A Dgost2001_keyx.c192 ASN1_OBJECT_free(gkt->key_agreement_info->cipher);
193 gkt->key_agreement_info->cipher = OBJ_nid2obj(param->nid);
266 param = get_encryption_params(gkt->key_agreement_info->cipher);
H A Dgost94_keyx.c110 /* Do not use vizir cipher parameters with cryptopro */
178 ASN1_OBJECT_free(gkt->key_agreement_info->cipher);
179 gkt->key_agreement_info->cipher = OBJ_nid2obj(param->nid);
256 param = get_encryption_params(gkt->key_agreement_info->cipher);

Completed in 202 milliseconds

12345678