/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | t1_enc.c | 720 if (s->session->cipher != NULL) { 721 if (s->session->cipher->algorithm_enc == SSL_eNULL) 725 if (s->session->cipher->algorithm_enc == SSL_RC4) 812 bs = EVP_CIPHER_block_size(ds->cipher); 814 if (EVP_CIPHER_flags(ds->cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) { 871 ds->buf_len, ds->cipher->key_len, DES_KEY_SZ, 872 DES_SCHEDULE_SZ, ds->cipher->iv_len); 874 for (i = 0; i < ds->cipher->iv_len; i++) 890 if ((EVP_CIPHER_flags(ds->cipher) & EVP_CIPH_FLAG_CUSTOM_CIPHER)
|
H A D | s2_enc.c | 141 /* check for NULL cipher */ 145 bs = ds->cipher->block_size;
|
H A D | ssl_sess.c | 689 if (ret->cipher == NULL) { 697 ret->cipher = ssl_get_cipher_by_char(s, &(buf[2])); 699 ret->cipher = ssl_get_cipher_by_char(s, &(buf[1])); 700 if (ret->cipher == NULL) 1042 **cipher, 1035 SSL_set_session_secret_cb(SSL *s, int (*tls_session_secret_cb) (SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg), void *arg) argument
|
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/ |
H A D | pkcs7.h | 134 const EVP_CIPHER *cipher; member in struct:pkcs7_enc_content_st 322 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher); 350 PKCS7 *PKCS7_encrypt(STACK_OF(X509) *certs, BIO *in, const EVP_CIPHER *cipher, variable
|
H A D | pk7_lib.c | 574 int PKCS7_set_cipher(PKCS7 *p7, const EVP_CIPHER *cipher) argument 592 /* Check cipher OID exists and has data in it */ 593 i = EVP_CIPHER_type(cipher); 600 ec->cipher = cipher;
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | e_camellia.c | 124 mode = ctx->cipher->flags & EVP_CIPH_MODE; 268 mode = ctx->cipher->flags & EVP_CIPH_MODE; 301 size_t bl = ctx->cipher->block_size;
|
/freebsd-11-stable/crypto/openssh/ |
H A D | sshkey.c | 55 #include "cipher.h" 3049 const struct sshcipher *cipher; local 3064 if ((cipher = cipher_by_name(ciphername)) == NULL) { 3075 blocksize = cipher_blocksize(cipher); 3076 keylen = cipher_keylen(cipher); 3077 ivlen = cipher_ivlen(cipher); 3078 authlen = cipher_authlen(cipher); 3098 if ((r = cipher_init(&ciphercontext, cipher, key, keylen, 3193 const struct sshcipher *cipher = NULL; local 3272 if ((cipher 3422 const struct sshcipher *cipher; local 3517 const EVP_CIPHER *cipher = (len > 0) ? EVP_des_ede3_cbc() : NULL; local 3519 const EVP_CIPHER *cipher = (len > 0) ? EVP_aes_128_cbc() : NULL; local 3669 const struct sshcipher *cipher; local [all...] |
H A D | packet.c | 76 #include "cipher.h" 299 error("%s: cannot load cipher 'none'", __func__); 410 if (enc == NULL || !cipher_is_cbc(enc->cipher) || (mac && mac->etm)) { 820 const struct sshcipher *cipher = cipher_by_number(number); 824 if (cipher == NULL) 825 fatal("%s: unknown cipher number %d", __func__, number); 832 if ((r = cipher_init(&state->send_context, cipher, key, keylen, 834 (r = cipher_init(&state->receive_context, cipher, key, keylen, 998 if (cipher_authlen(enc->cipher) == 0) { 1004 if ((r = cipher_init(ccp, enc->cipher, en [all...] |
H A D | kex.h | 109 const struct sshcipher *cipher; member in struct:sshenc
|
H A D | kex.c | 43 #include "cipher.h" 657 if ((enc->cipher = cipher_by_name(name)) == NULL) { 664 enc->iv_len = cipher_ivlen(enc->cipher); 666 enc->key_len = cipher_keylen(enc->cipher); 667 enc->block_size = cipher_blocksize(enc->cipher); 835 authlen = cipher_authlen(newkeys->enc.cipher); 850 debug("kex: %s cipher: %s MAC: %s compression: %s", 863 dh_need = MAXIMUM(dh_need, cipher_seclen(newkeys->enc.cipher));
|
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost_lcl.h | 70 ASN1_OBJECT *cipher; member in struct:__anon6459 120 /*============== Message digest and cipher related structures ==========*/ 164 /* Implementation of GOST 28147-89 cipher in CFB and CNT modes */
|
/freebsd-11-stable/tools/regression/net80211/tkip/ |
H A D | test_tkip.c | 113 #define TEST(n,name,cipher,keyix,pn) { \ 114 name, IEEE80211_CIPHER_##cipher,keyix, pn##LL, \ 124 int cipher; member in struct:ciphertest 199 if (!ieee80211_crypto_newkey(vap, t->cipher,
|
/freebsd-11-stable/tools/tools/net80211/wesside/wesside/ |
H A D | wesside.c | 97 unsigned char* cipher; member in struct:decrypt_state 826 void set_prga(unsigned char* iv, unsigned char* cipher, argument 845 prgainfo.prga[i] = ( cipher ? (clear[i] ^ cipher[i]) : 853 if (!cipher) 1181 decryptstate.cipher = (unsigned char*) malloc(decryptstate.clen); 1182 if (!decryptstate.cipher) { 1193 memcpy(decryptstate.cipher, &body[4], decryptstate.clen); 1198 decryptstate.prgainfo.prga[i] = decryptstate.cipher[i] ^ 1467 !decryptstate.cipher [all...] |
/freebsd-11-stable/sys/contrib/dev/ath/ath_hal/ar9300/ |
H A D | ar9300_freebsd.h | 58 u_int keyIx, HAL_CIPHER cipher, uint8_t numDelims,
|
/freebsd-11-stable/tests/sys/opencrypto/ |
H A D | cryptodev.py | 53 __hdr__ = ( ('cipher', 'I', 0), 64 __hdr__ = ( ('cipher', 'I', 0), 158 def __init__(self, cipher=0, key=None, mac=0, mackey=None, 162 ses.cipher = cipher 180 if not cipher and not mac: 181 raise ValueError('one of cipher or mac MUST be specified.')
|
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-esp.c | 150 * Initialize the cipher by calling EVP_CipherInit_ex(), because 151 * calling EVP_CipherInit() will reset the cipher context, clearing 152 * the cipher, so calling it twice, with the second call having a 153 * null cipher, will clear the already-set cipher. EVP_CipherInit_ex(), 154 * however, won't reset the cipher context, so you can use it to specify 156 * to set the cipher and the key. 161 set_cipher_parameters(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 165 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc); 169 * Initialize the cipher b 173 set_cipher_parameters(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv, int enc) argument [all...] |
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/ |
H A D | pkcs12.h | 184 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 232 ASN1_TYPE *param, const EVP_CIPHER *cipher,
|
/freebsd-11-stable/crypto/openssl/crypto/cms/ |
H A D | cms_lcl.h | 170 const EVP_CIPHER *cipher; member in struct:CMS_EncryptedContentInfo_st 449 const EVP_CIPHER *cipher,
|
H A D | cms.h | 166 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, 183 const EVP_CIPHER *cipher, unsigned int flags); variable 198 CMS_ContentInfo *CMS_EnvelopedData_create(const EVP_CIPHER *cipher);
|
/freebsd-11-stable/usr.sbin/wpa/ |
H A D | Makefile.crypto | 34 crypto_internal-cipher.c \
|
/freebsd-11-stable/sys/opencrypto/ |
H A D | cryptodev.h | 182 #define CRYPTO_AES_NIST_GMAC 24 /* cipher side */ 210 u_int32_t cipher; /* ie. CRYPTO_DES_CBC */ member in struct:session_op 213 u_int32_t keylen; /* cipher key */ 222 u_int32_t cipher; /* ie. CRYPTO_DES_CBC */ member in struct:session2_op 225 u_int32_t keylen; /* cipher key */
|
/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | cfx.c | 1171 krb5_data cipher; local 1287 &cipher); 1293 assert(sizeof(*token) + cipher.length == wrapped_len); 1302 ret = rrc_rotate(cipher.data, cipher.length, rrc+padlength, FALSE); 1304 ret = rrc_rotate(cipher.data, cipher.length, rrc, FALSE); 1311 memcpy(p, cipher.data, cipher.length); 1312 krb5_data_free(&cipher); [all...] |
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | ap.c | 467 int cipher = WPA_CIPHER_NONE; local 471 cipher = bss->default_wep_key_len >= 13 ? 473 bss->wpa_group = cipher; 474 bss->wpa_pairwise = cipher; 475 bss->rsn_pairwise = cipher; 477 int cipher = WPA_CIPHER_WEP40; local 479 cipher = WPA_CIPHER_WEP104; 481 bss->wpa_group = cipher; 482 bss->wpa_pairwise = cipher; 483 bss->rsn_pairwise = cipher; [all...] |
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | crypto_openssl.c | 431 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 440 res = AES_wrap_key(&actx, NULL, cipher, plain, n * 8); 446 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 456 res = AES_unwrap_key(&actx, NULL, plain, cipher, (n + 1) * 8); 639 const EVP_CIPHER *cipher; local 649 cipher = EVP_rc4(); 657 cipher = EVP_aes_128_cbc(); 661 cipher = EVP_aes_192_cbc(); 665 cipher = EVP_aes_256_cbc(); 675 cipher [all...] |
/freebsd-11-stable/tools/tools/crypto/ |
H A D | cryptotest.c | 67 * This will run a series of tests using the available crypto/cipher 165 getalgbycode(int cipher) argument 170 if (cipher == algorithms[i].code) 269 sop.cipher = alg->code; 285 printf("cipher %s", alg->name); 295 printf("cipher %s keylen %u mackeylen %u\n", 339 printf("cipher text unchanged:");
|