/freebsd-11-stable/crypto/openssh/ |
H A D | ssh.c | 89 #include "cipher.h" 679 if (strcmp(optarg, "cipher") == 0) 681 else if (strcmp(optarg, "cipher-auth") == 0) 827 options.cipher = SSH_CIPHER_INVALID; 831 options.cipher = cipher_number(optarg); 832 if (options.cipher == -1) { 833 fprintf(stderr, "Unknown cipher type '%s'\n", 837 if (options.cipher == SSH_CIPHER_3DES) 839 else if (options.cipher == SSH_CIPHER_BLOWFISH)
|
H A D | ssh-keygen.c | 436 char *type, *cipher; local 456 (r = sshbuf_get_cstring(b, &cipher, NULL)) != 0 || 462 if (strcmp(cipher, "none") != 0) { 463 error("unsupported cipher %s", cipher); 464 free(cipher); 469 free(cipher);
|
H A D | readconf.c | 58 #include "cipher.h" 251 { "cipher", oCipher }, 1192 intptr = &options->cipher; 1198 fatal("%.200s line %d: Bad cipher '%s'.", 1209 fatal("%.200s line %d: Bad SSH2 cipher spec '%s'.", 1846 options->cipher = -1; 2004 if (options->cipher == -1) 2005 options->cipher = SSH_CIPHER_NOT_SET; 2671 if (o->cipher != SSH_CIPHER_NOT_SET) 2672 printf("Cipher %s\n", cipher_name(o->cipher)); [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_teap.c | 1823 char cipher[80]; local 1830 "EAP-TEAP: TLS cipher suite 0x%04x", 1837 cipher, sizeof(cipher)) < 0 || 1838 os_strstr(cipher, "ADH-") || 1839 os_strstr(cipher, "anon"))) {
|
H A D | eap_fast.c | 1451 "provisioning TLS cipher suites"); 1457 "provisioning TLS cipher suites"); 1470 "cipher suites for provisioning"); 1622 char cipher[80]; local 1629 cipher, sizeof(cipher)) < 0 || 1630 os_strstr(cipher, "ADH-") || 1631 os_strstr(cipher, "anon"))) {
|
H A D | eap_sake.c | 24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon3709
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssltest.c | 113 * ECC cipher suite support in OpenSSL originally developed by 794 static char *cipher = NULL; variable 871 fprintf(stderr, " -cipher arg - The cipher list\n"); 885 " -test_cipherlist - Verifies the order of the ssl cipher lists.\n" 922 BIO_printf(bio_stdout, "%s%s, cipher %s %s", 1088 cipher = 0; 1255 } else if (strcmp(*argv, "-cipher") == 0) { 1258 cipher = *(++argv); 1408 * ensure that the cipher lis [all...] |
H A D | s3_pkt.c | 703 EVP_CIPHER_flags(s->enc_write_ctx->cipher) & 903 clear = s->enc_write_ctx ? 0 : 1; /* must be AEAD cipher */ 949 * extra fragment would be couple of cipher blocks, which would be 1155 * Change cipher spec protocol 1369 (s->session != NULL) && (s->session->cipher != NULL)) { 1533 /* Check we have a cipher to change to */ 1682 s->session->cipher = s->s3->tmp.new_cipher;
|
H A D | s3_cbc.c | 79 * block_size: the block size of the cipher used to encrypt the record. 115 * block_size: the block size of the cipher used to encrypt the record. 161 if (EVP_CIPHER_flags(s->enc_read_ctx->cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) {
|
H A D | d1_srvr.c | 791 s->session->cipher = s->s3->tmp.new_cipher;
|
H A D | d1_clnt.c | 580 s->session->cipher = s->s3->tmp.new_cipher;
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | crypto_module_tests.c | 103 "AES-SIV mode encryption returned invalid cipher text"); 134 "AES-SIV mode encryption returned invalid cipher text"); 308 u8 cipher[] = { 0x19, 0xDD, 0x5C, 0x4C, 0x93, 0x31, 0x04, 0x9D, local 319 if (os_memcmp(data, cipher, sizeof(data)) != 0) { 321 "AES-128 EAX mode encryption returned invalid cipher text"); 324 if (os_memcmp(tag, cipher + sizeof(data), AES_BLOCK_SIZE) != 0) { 354 u8 cipher[32]; member in struct:cbc_test_vector 398 os_memcmp(buf, tv->cipher, tv->len) != 0) { 403 os_memcpy(buf, tv->cipher, tv->len); 475 u8 key[16], plain[16], cipher[1 local [all...] |
H A D | tls_gnutls.c | 1677 gnutls_cipher_algorithm_t cipher; local 1683 cipher = gnutls_cipher_get(conn->session); 1684 cipher_str = gnutls_cipher_get_name(cipher);
|
H A D | crypto_wolfssl.c | 412 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 419 ret = wc_AesKeyWrap(kek, kek_len, plain, n * 8, cipher, (n + 1) * 8, 425 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 433 ret = wc_AesKeyUnWrap(kek, kek_len, cipher, (n + 1) * 8, plain, n * 8,
|
H A D | tls_wolfssl.c | 248 "wolfSSL: Failed to set cipher string '%s'", 1294 "wolfSSL: Failed to set cipher string '%s'", 1539 "wolfSSL: Failed to set cipher string '%s'", 1846 "TLS: Unsupported cipher selection: %d", *c); 1857 wpa_printf(MSG_DEBUG, "wolfSSL: cipher suites: %s", buf + 1); 1871 WOLFSSL_CIPHER *cipher; local 1877 cipher = wolfSSL_get_current_cipher(conn->ssl); 1878 if (!cipher) 1881 name = wolfSSL_CIPHER_get_name(cipher);
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | e_aes.c | 275 mode = ctx->cipher->flags & EVP_CIPH_MODE; 312 size_t bl = ctx->cipher->block_size; 555 mode = ctx->cipher->flags & EVP_CIPH_MODE; 929 mode = ctx->cipher->flags & EVP_CIPH_MODE; 1034 size_t bl = ctx->cipher->block_size; 1156 gctx->ivlen = c->cipher->iv_len;
|
/freebsd-11-stable/sys/dev/urtwn/ |
H A D | if_urtwn.c | 1055 uint8_t rate, cipher; local 1064 cipher = MS(rxdw0, R92C_RXDW0_CIPHER); 1115 cipher != R92C_CAM_ALGO_NONE) { 2293 /* Map net80211 cipher to HW crypto algorithm. */ 2308 device_printf(sc->sc_dev, "%s: undefined cipher %d\n", 3093 uint8_t cipher; local 3098 cipher = R92C_TXDW1_CIPHER_RC4; 3101 cipher = R92C_TXDW1_CIPHER_AES; 3104 device_printf(sc->sc_dev, "%s: unknown cipher %d\n", 3109 txd->txdw1 |= htole32(SM(R92C_TXDW1_CIPHER, cipher)); 3137 uint8_t cipher, ridx, type; local [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_teap.c | 366 /* TODO: Add anon-DH TLS cipher suites (and if one is negotiated, 491 char cipher[64]; local 496 wpa_printf(MSG_DEBUG, "EAP-TEAP: TLS cipher suite 0x%04x", 499 if (tls_get_cipher(sm->ssl_ctx, data->ssl.conn, cipher, sizeof(cipher)) 502 "EAP-TEAP: Failed to get cipher information"); 506 data->anon_provisioning = os_strstr(cipher, "ADH") != NULL;
|
/freebsd-11-stable/crypto/openssl/util/ |
H A D | mk1mf.pl | 112 no-rc2 no-rc4 no-rc5 no-idea no-des - Skip this symetric cipher 114 no-rsa no-dsa no-dh - Skip this public key cipher
|
/freebsd-11-stable/sys/dev/usb/wlan/ |
H A D | if_rsu.c | 1291 /* Map net80211 cipher to HW crypto algorithm. */ 2199 cipher = R92S_TXDW1_CIPHER_WEP; 2202 cipher = R92S_TXDW1_CIPHER_TKIP; 2205 cipher = R92S_TXDW1_CIPHER_AES; 2208 cipher = R92S_TXDW1_CIPHER_NONE; 2211 SM(R92S_TXDW1_CIPHER, cipher) |
|
H A D | if_rum.c | 1283 * Map net80211 cipher to RT2573 security mode. 1286 rum_crypto_mode(struct rum_softc *sc, u_int cipher, int keylen) argument 1288 switch (cipher) { 1296 device_printf(sc->sc_dev, "unknown cipher %d\n", cipher); 1417 u_int cipher; local 1422 cipher = k->wk_cipher->ic_cipher; 1424 mode = rum_crypto_mode(sc, cipher, k->wk_keylen); 1439 if (cipher == IEEE80211_CIPHER_TKIP) 2862 /* Set cipher mod [all...] |
/freebsd-11-stable/sys/dev/otus/ |
H A D | if_otus.c | 2887 uint16_t cipher; local 2900 /* Map net80211 cipher to hardware. */ 2903 cipher = AR_CIPHER_WEP64; 2906 cipher = AR_CIPHER_WEP128; 2909 cipher = AR_CIPHER_TKIP; 2912 cipher = AR_CIPHER_AES; 2917 key.cipher = htole16(cipher);
|
/freebsd-11-stable/crypto/openssl/crypto/x509/ |
H A D | x509.h | 491 EVP_CIPHER_INFO cipher; member in struct:private_key_st 1189 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 1191 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
|
/freebsd-11-stable/sys/dev/ath/ath_hal/ar5416/ |
H A D | ar5416.h | 402 HAL_CIPHER cipher, uint8_t delims,
|
/freebsd-11-stable/sys/contrib/dev/ath/ath_hal/ar9300/ |
H A D | ar9300_freebsd.c | 621 HAL_CIPHER cipher, uint8_t numDelims, 618 ar9300_freebsd_chain_tx_desc(struct ath_hal *ah, struct ath_desc *ds, HAL_DMA_ADDR *bufLenList, uint32_t *segLenList, u_int pktLen, u_int hdrLen, HAL_PKT_TYPE type, u_int keyIx, HAL_CIPHER cipher, uint8_t numDelims, HAL_BOOL firstSeg, HAL_BOOL lastSeg, HAL_BOOL lastAggr) argument
|