/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | s3_enc.c | 474 if (s->session->cipher != NULL) { 475 if (s->session->cipher->algorithm_enc == SSL_eNULL) 479 if (s->session->cipher->algorithm_enc == SSL_RC4) 541 bs = EVP_CIPHER_block_size(ds->cipher);
|
H A D | s23_clnt.c | 266 SSL_CIPHER *cipher; local 271 cipher = sk_SSL_CIPHER_value(ciphers, i); 272 if (cipher->algorithm_ssl == SSL_SSLV2)
|
H A D | d1_srvr.c | 791 s->session->cipher = s->s3->tmp.new_cipher;
|
H A D | d1_clnt.c | 580 s->session->cipher = s->s3->tmp.new_cipher;
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | e_des3.c | 281 int mode = ctx->cipher->flags & EVP_CIPH_MODE; 331 int mode = ctx->cipher->flags & EVP_CIPH_MODE;
|
/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | x_pkey.c | 82 ret->cipher.cipher = 85 if (ret->cipher.cipher == NULL) { 97 memcpy(ret->cipher.iv, 100 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH); 121 ret->cipher.cipher = NULL; 122 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
|
H A D | p5_pbev2.c | 90 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, 100 alg_nid = EVP_CIPHER_type(cipher); 118 if (EVP_CIPHER_iv_length(cipher)) { 120 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher)); 121 else if (RAND_bytes(iv, EVP_CIPHER_iv_length(cipher)) <= 0) 128 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0)) 136 * If prf NID unspecified see if cipher has a preference. An error is OK 149 keylen = EVP_CIPHER_key_length(cipher); 194 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 197 return PKCS5_pbe2_set_iv(cipher, ite [all...] |
/freebsd-11-stable/secure/lib/libssh/ |
H A D | Makefile | 11 canohost.c channels.c cipher.c cipher-aes.c cipher-aesctr.c \ 12 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \ 20 poly1305.c chacha.c cipher-chachapoly.c \
|
/freebsd-11-stable/crypto/openssh/ |
H A D | sshkey.c | 55 #include "cipher.h" 3049 const struct sshcipher *cipher; local 3064 if ((cipher = cipher_by_name(ciphername)) == NULL) { 3075 blocksize = cipher_blocksize(cipher); 3076 keylen = cipher_keylen(cipher); 3077 ivlen = cipher_ivlen(cipher); 3078 authlen = cipher_authlen(cipher); 3098 if ((r = cipher_init(&ciphercontext, cipher, key, keylen, 3193 const struct sshcipher *cipher = NULL; local 3272 if ((cipher 3422 const struct sshcipher *cipher; local 3517 const EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; local 3519 const EVP_CIPHER *cipher = (len > 0) ? EVP_aes_128_cbc() : NULL; local 3669 const struct sshcipher *cipher; local [all...] |
H A D | sshconnect1.c | 40 #include "cipher.h" 439 if (options.cipher == SSH_CIPHER_NONE) 474 if (options.cipher == SSH_CIPHER_NONE) 632 if (options.cipher == SSH_CIPHER_NOT_SET) { 634 options.cipher = ssh_cipher_default; 635 } else if (options.cipher == SSH_CIPHER_INVALID || 636 !(cipher_mask_ssh1(1) & (1 << options.cipher))) { 637 logit("No valid SSH1 cipher, using %.100s instead.", 639 options.cipher = ssh_cipher_default; 641 /* Check that the selected cipher i [all...] |
H A D | ssh-keygen.c | 436 char *type, *cipher; local 456 (r = sshbuf_get_cstring(b, &cipher, NULL)) != 0 || 462 if (strcmp(cipher, "none") != 0) { 463 error("unsupported cipher %s", cipher); 464 free(cipher); 469 free(cipher);
|
H A D | readconf.h | 73 int cipher; /* Cipher to use. */ member in struct:__anon4508
|
H A D | readconf.c | 58 #include "cipher.h" 251 { "cipher", oCipher }, 1192 intptr = &options->cipher; 1198 fatal("%.200s line %d: Bad cipher '%s'.", 1209 fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.", 1846 options->cipher = -1; 2004 if (options->cipher == -1) 2005 options->cipher = SSH_CIPHER_NOT_SET; 2671 if (o->cipher != SSH_CIPHER_NOT_SET) 2672 printf("Cipher %s\n", cipher_name(o->cipher)); [all...] |
H A D | packet.c | 76 #include "cipher.h" 299 error("%s: cannot load cipher 'none'", __func__); 410 if (enc == NULL || !cipher_is_cbc(enc->cipher) || (mac && mac->etm)) { 820 const struct sshcipher *cipher = cipher_by_number(number); 824 if (cipher == NULL) 825 fatal("%s: unknown cipher number %d", __func__, number); 832 if ((r = cipher_init(&state->send_context, cipher, key, keylen, 834 (r = cipher_init(&state->receive_context, cipher, key, keylen, 998 if (cipher_authlen(enc->cipher) == 0) { 1004 if ((r = cipher_init(ccp, enc->cipher, en [all...] |
H A D | kex.h | 109 const struct sshcipher *cipher; member in struct:sshenc
|
H A D | kex.c | 43 #include "cipher.h" 657 if ((enc->cipher = cipher_by_name(name)) == NULL) { 664 enc->iv_len = cipher_ivlen(enc->cipher); 666 enc->key_len = cipher_keylen(enc->cipher); 667 enc->block_size = cipher_blocksize(enc->cipher); 835 authlen = cipher_authlen(newkeys->enc.cipher); 850 debug("kex: %s cipher: %s MAC: %s compression: %s", 863 dh_need = MAXIMUM(dh_need, cipher_seclen(newkeys->enc.cipher));
|
H A D | cipher.c | 1 /* $OpenBSD: cipher.c,v 1.102 2016/08/03 05:41:57 djm Exp $ */ 46 #include "cipher.h" 66 const struct sshcipher *cipher; member in struct:sshcipher_ctx 198 * Default is cipher block size, except for chacha20+poly1305 that 226 return cc->cipher->number; 286 * Parses the name of the cipher. Returns the number of the corresponding 287 * cipher, or -1 on error. 312 if (cc == NULL || cc->cipher == NULL) 314 if (cc->cipher->number == SSH_CIPHER_DES) 321 cipher_init(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, argument 543 cipher_set_key_string(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, const char *passphrase, int do_encrypt) argument [all...] |
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | integrity.sh | 13 macs="$macs `${SSH} -Q cipher-auth`" 40 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
|
/freebsd-11-stable/contrib/ntp/util/ |
H A D | ntp-keygen.c | 183 const EVP_CIPHER * cipher = NULL; variable 570 cipher = EVP_get_cipherbyname(ciphername); 571 if (cipher == NULL) { 572 fprintf(stderr, "Unknown cipher %s\n", ciphername); 691 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0, 757 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0, 813 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0, 1030 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NULL, 0, NULL, 1082 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NULL, 0, NULL, 1250 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NUL [all...] |
/freebsd-11-stable/crypto/openssl/crypto/cms/ |
H A D | cms_kari.c | 387 const EVP_CIPHER *cipher) 391 int keylen = EVP_CIPHER_key_length(cipher); 401 * Pick a cipher based on content encryption cipher. If it is DES3 use 405 if (EVP_CIPHER_type(cipher) == NID_des_ede3_cbc) 437 if (!cms_wrap_init(kari, ec->cipher)) 386 cms_wrap_init(CMS_KeyAgreeRecipientInfo *kari, const EVP_CIPHER *cipher) argument
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | smime.c | 99 const EVP_CIPHER *cipher = NULL; local 149 cipher = EVP_des_ede3_cbc(); 151 cipher = EVP_des_cbc(); 155 cipher = EVP_seed_cbc(); 159 cipher = EVP_rc2_40_cbc(); 161 cipher = EVP_rc2_cbc(); 163 cipher = EVP_rc2_64_cbc(); 167 cipher = EVP_aes_128_cbc(); 169 cipher = EVP_aes_192_cbc(); 171 cipher [all...] |
H A D | pkey.c | 76 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_get_cipherbyname(*args + 1); 153 if (!cipher) { 154 BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1); 214 PEM_write_bio_PrivateKey(out, pkey, cipher,
|
H A D | genpkey.c | 83 const EVP_CIPHER *cipher = NULL; local 161 cipher = EVP_get_cipherbyname(*args + 1); 162 if (!cipher) { 163 BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1); 185 "-<cipher> use cipher <cipher> to encrypt the key\n"); 243 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0, NULL, pass);
|
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost2001_keyx.c | 192 ASN1_OBJECT_free(gkt->key_agreement_info->cipher); 193 gkt->key_agreement_info->cipher = OBJ_nid2obj(param->nid); 266 param = get_encryption_params(gkt->key_agreement_info->cipher);
|
H A D | gost94_keyx.c | 110 /* Do not use vizir cipher parameters with cryptopro */ 178 ASN1_OBJECT_free(gkt->key_agreement_info->cipher); 179 gkt->key_agreement_info->cipher = OBJ_nid2obj(param->nid); 256 param = get_encryption_params(gkt->key_agreement_info->cipher);
|