Searched refs:cipher (Results 151 - 175 of 197) sorted by relevance

12345678

/freebsd-11-stable/crypto/openssh/
H A Dssh.c89 #include "cipher.h"
679 if (strcmp(optarg, "cipher") == 0)
681 else if (strcmp(optarg, "cipher-auth") == 0)
827 options.cipher = SSH_CIPHER_INVALID;
831 options.cipher = cipher_number(optarg);
832 if (options.cipher == -1) {
833 fprintf(stderr, "Unknown cipher type '%s'\n",
837 if (options.cipher == SSH_CIPHER_3DES)
839 else if (options.cipher == SSH_CIPHER_BLOWFISH)
H A Dssh-keygen.c436 char *type, *cipher; local
456 (r = sshbuf_get_cstring(b, &cipher, NULL)) != 0 ||
462 if (strcmp(cipher, "none") != 0) {
463 error("unsupported cipher %s", cipher);
464 free(cipher);
469 free(cipher);
H A Dreadconf.c58 #include "cipher.h"
251 { "cipher", oCipher },
1192 intptr = &options->cipher;
1198 fatal("%.200s line %d: Bad cipher '%s'.",
1209 fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.",
1846 options->cipher = -1;
2004 if (options->cipher == -1)
2005 options->cipher = SSH_CIPHER_NOT_SET;
2671 if (o->cipher != SSH_CIPHER_NOT_SET)
2672 printf("Cipher %s\n", cipher_name(o->cipher));
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap_teap.c1823 char cipher[80]; local
1830 "EAP-TEAP: TLS cipher suite 0x%04x",
1837 cipher, sizeof(cipher)) < 0 ||
1838 os_strstr(cipher, "ADH-") ||
1839 os_strstr(cipher, "anon"))) {
H A Deap_fast.c1451 "provisioning TLS cipher suites");
1457 "provisioning TLS cipher suites");
1470 "cipher suites for provisioning");
1622 char cipher[80]; local
1629 cipher, sizeof(cipher)) < 0 ||
1630 os_strstr(cipher, "ADH-") ||
1631 os_strstr(cipher, "anon"))) {
H A Deap_sake.c24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon3709
/freebsd-11-stable/crypto/openssl/ssl/
H A Dssltest.c113 * ECC cipher suite support in OpenSSL originally developed by
794 static char *cipher = NULL; variable
871 fprintf(stderr, " -cipher arg - The cipher list\n");
885 " -test_cipherlist - Verifies the order of the ssl cipher lists.\n"
922 BIO_printf(bio_stdout, "%s%s, cipher %s %s",
1088 cipher = 0;
1255 } else if (strcmp(*argv, "-cipher") == 0) {
1258 cipher = *(++argv);
1408 * ensure that the cipher lis
[all...]
H A Ds3_pkt.c703 EVP_CIPHER_flags(s->enc_write_ctx->cipher) &
903 clear = s->enc_write_ctx ? 0 : 1; /* must be AEAD cipher */
949 * extra fragment would be couple of cipher blocks, which would be
1155 * Change cipher spec protocol
1369 (s->session != NULL) && (s->session->cipher != NULL)) {
1533 /* Check we have a cipher to change to */
1682 s->session->cipher = s->s3->tmp.new_cipher;
H A Ds3_cbc.c79 * block_size: the block size of the cipher used to encrypt the record.
115 * block_size: the block size of the cipher used to encrypt the record.
161 if (EVP_CIPHER_flags(s->enc_read_ctx->cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) {
H A Dd1_srvr.c791 s->session->cipher = s->s3->tmp.new_cipher;
H A Dd1_clnt.c580 s->session->cipher = s->s3->tmp.new_cipher;
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Dcrypto_module_tests.c103 "AES-SIV mode encryption returned invalid cipher text");
134 "AES-SIV mode encryption returned invalid cipher text");
308 u8 cipher[] = { 0x19, 0xDD, 0x5C, 0x4C, 0x93, 0x31, 0x04, 0x9D, local
319 if (os_memcmp(data, cipher, sizeof(data)) != 0) {
321 "AES-128 EAX mode encryption returned invalid cipher text");
324 if (os_memcmp(tag, cipher + sizeof(data), AES_BLOCK_SIZE) != 0) {
354 u8 cipher[32]; member in struct:cbc_test_vector
398 os_memcmp(buf, tv->cipher, tv->len) != 0) {
403 os_memcpy(buf, tv->cipher, tv->len);
475 u8 key[16], plain[16], cipher[1 local
[all...]
H A Dtls_gnutls.c1677 gnutls_cipher_algorithm_t cipher; local
1683 cipher = gnutls_cipher_get(conn->session);
1684 cipher_str = gnutls_cipher_get_name(cipher);
H A Dcrypto_wolfssl.c412 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument
419 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8,
425 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
433 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8,
H A Dtls_wolfssl.c248 "wolfSSL: Failed to set cipher string '%s'",
1294 "wolfSSL: Failed to set cipher string '%s'",
1539 "wolfSSL: Failed to set cipher string '%s'",
1846 "TLS: Unsupported cipher selection: %d", *c);
1857 wpa_printf(MSG_DEBUG, "wolfSSL: cipher suites: %s", buf + 1);
1871 WOLFSSL_CIPHER *cipher; local
1877 cipher = wolfSSL_get_current_cipher(conn->ssl);
1878 if (!cipher)
1881 name = wolfSSL_CIPHER_get_name(cipher);
/freebsd-11-stable/crypto/openssl/crypto/evp/
H A De_aes.c275 mode = ctx->cipher->flags & EVP_CIPH_MODE;
312 size_t bl = ctx->cipher->block_size;
555 mode = ctx->cipher->flags & EVP_CIPH_MODE;
929 mode = ctx->cipher->flags & EVP_CIPH_MODE;
1034 size_t bl = ctx->cipher->block_size;
1156 gctx->ivlen = c->cipher->iv_len;
/freebsd-11-stable/sys/dev/urtwn/
H A Dif_urtwn.c1055 uint8_t rate, cipher; local
1064 cipher = MS(rxdw0, R92C_RXDW0_CIPHER);
1115 cipher != R92C_CAM_ALGO_NONE) {
2293 /* Map net80211 cipher to HW crypto algorithm. */
2308 device_printf(sc->sc_dev, "%s: undefined cipher %d\n",
3093 uint8_t cipher; local
3098 cipher = R92C_TXDW1_CIPHER_RC4;
3101 cipher = R92C_TXDW1_CIPHER_AES;
3104 device_printf(sc->sc_dev, "%s: unknown cipher %d\n",
3109 txd->txdw1 |= htole32(SM(R92C_TXDW1_CIPHER, cipher));
3137 uint8_t cipher, ridx, type; local
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_teap.c366 /* TODO: Add anon-DH TLS cipher suites (and if one is negotiated,
491 char cipher[64]; local
496 wpa_printf(MSG_DEBUG, "EAP-TEAP: TLS cipher suite 0x%04x",
499 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher))
502 "EAP-TEAP: Failed to get cipher information");
506 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
/freebsd-11-stable/crypto/openssl/util/
H A Dmk1mf.pl112 no-rc2 no-rc4 no-rc5 no-idea no-des - Skip this symetric cipher
114 no-rsa no-dsa no-dh - Skip this public key cipher
/freebsd-11-stable/sys/dev/usb/wlan/
H A Dif_rsu.c1291 /* Map net80211 cipher to HW crypto algorithm. */
2199 cipher = R92S_TXDW1_CIPHER_WEP;
2202 cipher = R92S_TXDW1_CIPHER_TKIP;
2205 cipher = R92S_TXDW1_CIPHER_AES;
2208 cipher = R92S_TXDW1_CIPHER_NONE;
2211 SM(R92S_TXDW1_CIPHER, cipher) |
H A Dif_rum.c1283 * Map net80211 cipher to RT2573 security mode.
1286 rum_crypto_mode(struct rum_softc *sc, u_int cipher, int keylen) argument
1288 switch (cipher) {
1296 device_printf(sc->sc_dev, "unknown cipher %d\n", cipher);
1417 u_int cipher; local
1422 cipher = k->wk_cipher->ic_cipher;
1424 mode = rum_crypto_mode(sc, cipher, k->wk_keylen);
1439 if (cipher == IEEE80211_CIPHER_TKIP)
2862 /* Set cipher mod
[all...]
/freebsd-11-stable/sys/dev/otus/
H A Dif_otus.c2887 uint16_t cipher; local
2900 /* Map net80211 cipher to hardware. */
2903 cipher = AR_CIPHER_WEP64;
2906 cipher = AR_CIPHER_WEP128;
2909 cipher = AR_CIPHER_TKIP;
2912 cipher = AR_CIPHER_AES;
2917 key.cipher = htole16(cipher);
/freebsd-11-stable/crypto/openssl/crypto/x509/
H A Dx509.h491 EVP_CIPHER_INFO cipher; member in struct:private_key_st
1189 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
1191 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
/freebsd-11-stable/sys/dev/ath/ath_hal/ar5416/
H A Dar5416.h402 HAL_CIPHER cipher, uint8_t delims,
/freebsd-11-stable/sys/contrib/dev/ath/ath_hal/ar9300/
H A Dar9300_freebsd.c621 HAL_CIPHER cipher, uint8_t numDelims,
618 ar9300_freebsd_chain_tx_desc(struct ath_hal *ah, struct ath_desc *ds, HAL_DMA_ADDR *bufLenList, uint32_t *segLenList, u_int pktLen, u_int hdrLen, HAL_PKT_TYPE type, u_int keyIx, HAL_CIPHER cipher, uint8_t numDelims, HAL_BOOL firstSeg, HAL_BOOL lastSeg, HAL_BOOL lastAggr) argument

Completed in 366 milliseconds

12345678