Searched refs:cipher (Results 26 - 50 of 197) sorted by relevance

12345678

/freebsd-11-stable/crypto/openssl/crypto/cmac/
H A Dcmac.h74 const EVP_CIPHER *cipher, ENGINE *impl);
H A Dcmac.c152 const EVP_CIPHER *cipher, ENGINE *impl)
164 /* Switch to FIPS cipher implementation if possible */
165 if (cipher != NULL) {
167 fcipher = FIPS_get_cipherbynid(EVP_CIPHER_nid(cipher));
169 cipher = fcipher;
176 return FIPS_cmac_init(ctx, key, keylen, cipher, NULL);
180 if (!key && !cipher && !impl && keylen == 0) {
191 if (cipher && !EVP_EncryptInit_ex(&ctx->cctx, cipher, impl, NULL, NULL))
151 CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen, const EVP_CIPHER *cipher, ENGINE *impl) argument
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/
H A Dpk7_enc.c71 PKCS7_cipher(PKCS7 *p7, EVP_CIPHER *cipher);
/freebsd-11-stable/sys/net80211/
H A Dieee80211_crypto.c54 * Table of registered cipher modules.
171 * This is useful especially for the cipher test modules.
190 * Register a crypto cipher module.
196 printf("%s: cipher %s has an invalid cipher index %u\n",
201 printf("%s: cipher %s registered with a different template\n",
209 * Unregister a crypto cipher module.
215 printf("%s: cipher %s has an invalid cipher index %u\n",
220 printf("%s: cipher
230 ieee80211_crypto_available(u_int cipher) argument
262 ieee80211_crypto_newkey(struct ieee80211vap *vap, int cipher, int flags, struct ieee80211_key *key) argument
[all...]
/freebsd-11-stable/stand/libsa/geli/
H A Dgeliboot_crypto.c42 cipherInstance cipher; local
56 err = rijndael_cipherInit(&cipher, MODE_CBC, iv);
64 blks = rijndael_blockDecrypt(&cipher, &aeskey, data,
68 blks = rijndael_blockEncrypt(&cipher, &aeskey, data,
/freebsd-11-stable/tests/sys/geom/class/eli/
H A Dintegrity_test.sh6 cipher=$1
9 ealgo=${cipher%%:*}
10 keylen=${cipher##*:}
72 cipher=$1
75 ealgo=${cipher%%:*}
76 keylen=${cipher##*:}
116 cipher=$1
119 ealgo=${cipher%%:*}
120 keylen=${cipher##*:}
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_client.c572 * tlsv1_client_get_cipher - Get current cipher name
574 * @buf: Buffer for the cipher name
578 * Get the name of the currently used cipher.
583 char *cipher; local
587 cipher = "RC4-MD5";
590 cipher = "RC4-SHA";
593 cipher = "DES-CBC-SHA";
596 cipher = "DES-CBC3-SHA";
599 cipher = "DHE-RSA-DES-CBC-SHA";
602 cipher
[all...]
H A Dtlsv1_server.c520 * tlsv1_server_get_cipher - Get current cipher name
522 * @buf: Buffer for the cipher name
526 * Get the name of the currently used cipher.
531 char *cipher; local
535 cipher = "RC4-MD5";
538 cipher = "RC4-SHA";
541 cipher = "DES-CBC-SHA";
544 cipher = "DES-CBC3-SHA";
547 cipher = "DHE-RSA-DES-CBC-SHA";
550 cipher
[all...]
/freebsd-11-stable/crypto/openssl/crypto/evp/
H A Dopenbsd_hw.c129 static int dev_crypto_init_key(EVP_CIPHER_CTX *ctx, int cipher,
141 assert(ctx->cipher->iv_len <= MAX_HW_IV);
145 CDATA(ctx)->cipher = cipher;
172 assert((inl & (ctx->cipher->block_size - 1)) == 0);
176 if (ctx->cipher->iv_len)
180 memcpy(lb, &in[cryp.len - ctx->cipher->iv_len], ctx->cipher->iv_len);
230 memcpy(ctx->iv, &out[cryp.len - ctx->cipher->iv_len],
231 ctx->cipher
[all...]
H A Devp_pbe.c72 /* Setup a cipher context from a PBE algorithm */
154 const EVP_CIPHER *cipher; local
177 cipher = NULL;
179 cipher = EVP_get_cipherbynid(cipher_nid);
180 if (!cipher) {
196 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) {
255 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument
259 if (cipher)
260 cipher_nid = EVP_CIPHER_nid(cipher);
/freebsd-11-stable/crypto/openssh/regress/
H A Dcipher-speed.sh1 # $OpenBSD: cipher-speed.sh,v 1.13 2015/03/24 20:22:17 markus Exp $
4 tid="cipher speed"
14 for c in `${SSH} -Q cipher`; do n=0; for m in `${SSH} -Q mac`; do
15 trace "proto 2 cipher $c mac $m"
24 fail "ssh -2 failed with mac $m cipher $c"
28 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
40 trace "proto 1 cipher $c"
48 fail "ssh -1 failed with cipher $c"
/freebsd-11-stable/sys/dev/random/
H A Dhash.c87 rijndael_cipherInit(&context->cipher, MODE_ECB, NULL);
99 rijndael_blockEncrypt(&context->cipher, &context->key, d_in, length*8, d_out);
/freebsd-11-stable/crypto/openssl/crypto/cms/
H A Dcms_enc.c84 enc = ec->cipher ? 1 : 0;
95 ciph = ec->cipher;
97 * If not keeping key set cipher to NULL so subsequent calls decrypt.
100 ec->cipher = NULL;
218 const EVP_CIPHER *cipher,
221 ec->cipher = cipher;
229 if (cipher)
261 if (enc->encryptedContentInfo->cipher && enc->unprotectedAttrs)
217 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument
/freebsd-11-stable/crypto/openssl/crypto/pem/
H A Dpem_seal.c100 EVP_CIPHER_CTX_init(&ctx->cipher);
101 ret = EVP_SealInit(&ctx->cipher, type, ek, ekl, iv, pubk, npubk);
136 EVP_EncryptUpdate(&ctx->cipher, buffer, &j, in, i);
165 if (!EVP_EncryptFinal_ex(&ctx->cipher, s, (int *)&i))
180 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
H A Dpem_lib.c272 EVP_CIPHER_INFO cipher; local
290 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher))
292 if (!PEM_do_header(&cipher, data, &len, cb, u))
357 /* actually it needs the cipher block size extra... */
433 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument
444 if (cipher->cipher == NULL)
459 if (!EVP_BytesToKey(cipher->cipher, EVP_md5(), &(cipher
483 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument
[all...]
/freebsd-11-stable/sys/opencrypto/
H A Dskipjack.c129 skipjack_forwards(u_int8_t *plain, u_int8_t *cipher, u_int8_t **key_tables) argument
188 cipher [0] = wh1; cipher [1] = wl1;
189 cipher [2] = wh2; cipher [3] = wl2;
190 cipher [4] = wh3; cipher [5] = wl3;
191 cipher [6] = wh4; cipher [7] = wl4;
196 skipjack_backwards (u_int8_t *cipher, u_int8_ argument
[all...]
/freebsd-11-stable/contrib/apr-util/crypto/
H A Dapr_crypto_openssl.c68 const EVP_CIPHER * cipher; member in struct:apr_crypto_key_t
378 /* determine the cipher to be used */
385 key->cipher = EVP_des_ede3_cbc();
388 key->cipher = EVP_des_ede3_ecb();
395 key->cipher = EVP_aes_128_cbc();
398 key->cipher = EVP_aes_128_ecb();
405 key->cipher = EVP_aes_192_cbc();
408 key->cipher = EVP_aes_192_ecb();
415 key->cipher = EVP_aes_256_cbc();
418 key->cipher
[all...]
/freebsd-11-stable/crypto/openssl/apps/
H A Dsmime.c99 const EVP_CIPHER *cipher = NULL; local
149 cipher = EVP_des_ede3_cbc();
151 cipher = EVP_des_cbc();
155 cipher = EVP_seed_cbc();
159 cipher = EVP_rc2_40_cbc();
161 cipher = EVP_rc2_cbc();
163 cipher = EVP_rc2_64_cbc();
167 cipher = EVP_aes_128_cbc();
169 cipher = EVP_aes_192_cbc();
171 cipher
[all...]
H A Dpkey.c76 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_get_cipherbyname(*args + 1);
153 if (!cipher) {
154 BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1);
214 PEM_write_bio_PrivateKey(out, pkey, cipher,
H A Dpkcs8.c79 const EVP_CIPHER *cipher = NULL; local
108 cipher = EVP_get_cipherbyname(*args);
109 if (!cipher) {
110 BIO_printf(bio_err, "Unknown cipher %s\n", *args);
215 "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
217 "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
231 if ((pbe_nid == -1) && !cipher)
284 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Dmk_priv.c96 krb5_data_zero (&s.enc_part.cipher);
119 &s.enc_part.cipher);
134 krb5_data_free (&s.enc_part.cipher);
151 krb5_data_free (&s.enc_part.cipher);
/freebsd-11-stable/crypto/openssl/crypto/engine/
H A Deng_openssl.c115 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
228 * we're asked for a cipher we don't support (should not happen).
231 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler.
293 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument
296 if (!cipher) {
301 /* We are being asked for a specific cipher */
303 *cipher = &test_r4_cipher;
305 *cipher = &test_r4_40_cipher;
311 *cipher = NULL;
H A Deng_cryptodev.c99 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
303 sess.cipher = ciphers[i].id;
343 sess.cipher = 0;
420 if ((inl % ctx->cipher->block_size) != 0)
434 if (ctx->cipher->iv_len) {
437 iiv = in + inl - ctx->cipher->iv_len;
438 memcpy(save_iv, iiv, ctx->cipher->iv_len);
451 if (ctx->cipher->iv_len) {
453 iiv = out + inl - ctx->cipher->iv_len;
456 memcpy(ctx->iv, iiv, ctx->cipher
467 int cipher = -1, i; local
691 cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) argument
[all...]
/freebsd-11-stable/crypto/openssl/ssl/
H A Dssl_task.c66 * SSL_CIPHER Defines a list of cipher specifications the server
140 static char *cipher = NULL; variable
235 * get the preferred cipher list and other initialization
237 if (cipher == NULL)
238 cipher = getenv("SSL_CIPHER");
239 printf("cipher list: %s\n", cipher ? cipher : "{undefined}");
H A Dssl_txt.c136 if (x->cipher == NULL) {
149 ((x->cipher == NULL) ? "unknown" : x->cipher->name)) <= 0)

Completed in 161 milliseconds

12345678