Searched refs:cipher (Results 101 - 125 of 197) sorted by relevance

12345678

/freebsd-11-stable/crypto/openssl/ssl/
H A Dt1_enc.c720 if (s->session->cipher != NULL) {
721 if (s->session->cipher->algorithm_enc == SSL_eNULL)
725 if (s->session->cipher->algorithm_enc == SSL_RC4)
812 bs = EVP_CIPHER_block_size(ds->cipher);
814 if (EVP_CIPHER_flags(ds->cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) {
871 ds->buf_len, ds->cipher->key_len, DES_KEY_SZ,
872 DES_SCHEDULE_SZ, ds->cipher->iv_len);
874 for (i = 0; i < ds->cipher->iv_len; i++)
890 if ((EVP_CIPHER_flags(ds->cipher) & EVP_CIPH_FLAG_CUSTOM_CIPHER)
H A Ds2_enc.c141 /* check for NULL cipher */
145 bs = ds->cipher->block_size;
H A Dssl_sess.c689 if (ret->cipher == NULL) {
697 ret->cipher = ssl_get_cipher_by_char(s, &(buf[2]));
699 ret->cipher = ssl_get_cipher_by_char(s, &(buf[1]));
700 if (ret->cipher == NULL)
1042 **cipher,
1035 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb) (SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/
H A Dpkcs7.h134 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st
322 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher);
350 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
H A Dpk7_lib.c574 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument
592 /* Check cipher OID exists and has data in it */
593 i = EVP_CIPHER_type(cipher);
600 ec->cipher = cipher;
/freebsd-11-stable/crypto/openssl/crypto/evp/
H A De_camellia.c124 mode = ctx->cipher->flags & EVP_CIPH_MODE;
268 mode = ctx->cipher->flags & EVP_CIPH_MODE;
301 size_t bl = ctx->cipher->block_size;
/freebsd-11-stable/crypto/openssh/
H A Dsshkey.c55 #include "cipher.h"
3049 const struct sshcipher *cipher; local
3064 if ((cipher = cipher_by_name(ciphername)) == NULL) {
3075 blocksize = cipher_blocksize(cipher);
3076 keylen = cipher_keylen(cipher);
3077 ivlen = cipher_ivlen(cipher);
3078 authlen = cipher_authlen(cipher);
3098 if ((r = cipher_init(&ciphercontext, cipher, key, keylen,
3193 const struct sshcipher *cipher = NULL; local
3272 if ((cipher
3422 const struct sshcipher *cipher; local
3517 const EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; local
3519 const EVP_CIPHER *cipher = (len > 0) ? EVP_aes_128_cbc() : NULL; local
3669 const struct sshcipher *cipher; local
[all...]
H A Dpacket.c76 #include "cipher.h"
299 error("%s: cannot load cipher 'none'", __func__);
410 if (enc == NULL || !cipher_is_cbc(enc->cipher) || (mac && mac->etm)) {
820 const struct sshcipher *cipher = cipher_by_number(number);
824 if (cipher == NULL)
825 fatal("%s: unknown cipher number %d", __func__, number);
832 if ((r = cipher_init(&state->send_context, cipher, key, keylen,
834 (r = cipher_init(&state->receive_context, cipher, key, keylen,
998 if (cipher_authlen(enc->cipher) == 0) {
1004 if ((r = cipher_init(ccp, enc->cipher, en
[all...]
H A Dkex.h109 const struct sshcipher *cipher; member in struct:sshenc
H A Dkex.c43 #include "cipher.h"
657 if ((enc->cipher = cipher_by_name(name)) == NULL) {
664 enc->iv_len = cipher_ivlen(enc->cipher);
666 enc->key_len = cipher_keylen(enc->cipher);
667 enc->block_size = cipher_blocksize(enc->cipher);
835 authlen = cipher_authlen(newkeys->enc.cipher);
850 debug("kex: %s cipher: %s MAC: %s compression: %s",
863 dh_need = MAXIMUM(dh_need, cipher_seclen(newkeys->enc.cipher));
/freebsd-11-stable/crypto/openssl/engines/ccgost/
H A Dgost_lcl.h70 ASN1_OBJECT *cipher; member in struct:__anon6459
120 /*============== Message digest and cipher related structures ==========*/
164 /* Implementation of GOST 28147-89 cipher in CFB and CNT modes */
/freebsd-11-stable/tools/regression/net80211/tkip/
H A Dtest_tkip.c113 #define TEST(n,name,cipher,keyix,pn) { \
114 name, IEEE80211_CIPHER_##cipher,keyix, pn##LL, \
124 int cipher; member in struct:ciphertest
199 if (!ieee80211_crypto_newkey(vap, t->cipher,
/freebsd-11-stable/tools/tools/net80211/wesside/wesside/
H A Dwesside.c97 unsigned char* cipher; member in struct:decrypt_state
826 void set_prga(unsigned char* iv, unsigned char* cipher, argument
845 prgainfo.prga[i] = ( cipher ? (clear[i] ^ cipher[i]) :
853 if (!cipher)
1181 decryptstate.cipher = (unsigned char*) malloc(decryptstate.clen);
1182 if (!decryptstate.cipher) {
1193 memcpy(decryptstate.cipher, &body[4], decryptstate.clen);
1198 decryptstate.prgainfo.prga[i] = decryptstate.cipher[i] ^
1467 !decryptstate.cipher
[all...]
/freebsd-11-stable/sys/contrib/dev/ath/ath_hal/ar9300/
H A Dar9300_freebsd.h58 u_int keyIx, HAL_CIPHER cipher, uint8_t numDelims,
/freebsd-11-stable/tests/sys/opencrypto/
H A Dcryptodev.py53 __hdr__ = ( ('cipher', 'I', 0),
64 __hdr__ = ( ('cipher', 'I', 0),
158 def __init__(self, cipher=0, key=None, mac=0, mackey=None,
162 ses.cipher = cipher
180 if not cipher and not mac:
181 raise ValueError('one of cipher or mac MUST be specified.')
/freebsd-11-stable/contrib/tcpdump/
H A Dprint-esp.c150 * Initialize the cipher by calling EVP_CipherInit_ex(), because
151 * calling EVP_CipherInit() will reset the cipher context, clearing
152 * the cipher, so calling it twice, with the second call having a
153 * null cipher, will clear the already-set cipher. EVP_CipherInit_ex(),
154 * however, won't reset the cipher context, so you can use it to specify
156 * to set the cipher and the key.
161 set_cipher_parameters(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
165 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc);
169 * Initialize the cipher b
173 set_cipher_parameters(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv, int enc) argument
[all...]
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/
H A Dpkcs12.h184 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
232 ASN1_TYPE *param, const EVP_CIPHER *cipher,
/freebsd-11-stable/crypto/openssl/crypto/cms/
H A Dcms_lcl.h170 const EVP_CIPHER *cipher; member in struct:CMS_EncryptedContentInfo_st
449 const EVP_CIPHER *cipher,
H A Dcms.h166 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher,
183 const EVP_CIPHER *cipher, unsigned int flags); variable
198 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
/freebsd-11-stable/usr.sbin/wpa/
H A DMakefile.crypto34 crypto_internal-cipher.c \
/freebsd-11-stable/sys/opencrypto/
H A Dcryptodev.h182 #define CRYPTO_AES_NIST_GMAC 24 /* cipher side */
210 u_int32_t cipher; /* ie. CRYPTO_DES_CBC */ member in struct:session_op
213 u_int32_t keylen; /* cipher key */
222 u_int32_t cipher; /* ie. CRYPTO_DES_CBC */ member in struct:session2_op
225 u_int32_t keylen; /* cipher key */
/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/
H A Dcfx.c1171 krb5_data cipher; local
1287 &cipher);
1293 assert(sizeof(*token) + cipher.length == wrapped_len);
1302 ret = rrc_rotate(cipher.data, cipher.length, rrc+padlength, FALSE);
1304 ret = rrc_rotate(cipher.data, cipher.length, rrc, FALSE);
1311 memcpy(p, cipher.data, cipher.length);
1312 krb5_data_free(&cipher);
[all...]
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dap.c467 int cipher = WPA_CIPHER_NONE; local
471 cipher = bss->default_wep_key_len >= 13 ?
473 bss->wpa_group = cipher;
474 bss->wpa_pairwise = cipher;
475 bss->rsn_pairwise = cipher;
477 int cipher = WPA_CIPHER_WEP40; local
479 cipher = WPA_CIPHER_WEP104;
481 bss->wpa_group = cipher;
482 bss->wpa_pairwise = cipher;
483 bss->rsn_pairwise = cipher;
[all...]
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dcrypto_openssl.c431 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument
440 res = AES_wrap_key(&actx, NULL, cipher, plain, n * 8);
446 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
456 res = AES_unwrap_key(&actx, NULL, plain, cipher, (n + 1) * 8);
639 const EVP_CIPHER *cipher; local
649 cipher = EVP_rc4();
657 cipher = EVP_aes_128_cbc();
661 cipher = EVP_aes_192_cbc();
665 cipher = EVP_aes_256_cbc();
675 cipher
[all...]
/freebsd-11-stable/tools/tools/crypto/
H A Dcryptotest.c67 * This will run a series of tests using the available crypto/cipher
165 getalgbycode(int cipher) argument
170 if (cipher == algorithms[i].code)
269 sop.cipher = alg->code;
285 printf("cipher %s", alg->name);
295 printf("cipher %s keylen %u mackeylen %u\n",
339 printf("cipher text unchanged:");

Completed in 1281 milliseconds

12345678