/freebsd-11-stable/crypto/openssl/crypto/cmac/ |
H A D | cmac.h | 74 const EVP_CIPHER *cipher, ENGINE *impl);
|
H A D | cmac.c | 152 const EVP_CIPHER *cipher, ENGINE *impl) 164 /* Switch to FIPS cipher implementation if possible */ 165 if (cipher != NULL) { 167 fcipher = FIPS_get_cipherbynid(EVP_CIPHER_nid(cipher)); 169 cipher = fcipher; 176 return FIPS_cmac_init(ctx, key, keylen, cipher, NULL); 180 if (!key && !cipher && !impl && keylen == 0) { 191 if (cipher && !EVP_EncryptInit_ex(&ctx->cctx, cipher, impl, NULL, NULL)) 151 CMAC_Init(CMAC_CTX *ctx, const void *key, size_t keylen, const EVP_CIPHER *cipher, ENGINE *impl) argument
|
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_enc.c | 71 PKCS7_cipher(PKCS7 *p7, EVP_CIPHER *cipher);
|
/freebsd-11-stable/sys/net80211/ |
H A D | ieee80211_crypto.c | 54 * Table of registered cipher modules. 171 * This is useful especially for the cipher test modules. 190 * Register a crypto cipher module. 196 printf("%s: cipher %s has an invalid cipher index %u\n", 201 printf("%s: cipher %s registered with a different template\n", 209 * Unregister a crypto cipher module. 215 printf("%s: cipher %s has an invalid cipher index %u\n", 220 printf("%s: cipher 230 ieee80211_crypto_available(u_int cipher) argument 262 ieee80211_crypto_newkey(struct ieee80211vap *vap, int cipher, int flags, struct ieee80211_key *key) argument [all...] |
/freebsd-11-stable/stand/libsa/geli/ |
H A D | geliboot_crypto.c | 42 cipherInstance cipher; local 56 err = rijndael_cipherInit(&cipher, MODE_CBC, iv); 64 blks = rijndael_blockDecrypt(&cipher, &aeskey, data, 68 blks = rijndael_blockEncrypt(&cipher, &aeskey, data,
|
/freebsd-11-stable/tests/sys/geom/class/eli/ |
H A D | integrity_test.sh | 6 cipher=$1 9 ealgo=${cipher%%:*} 10 keylen=${cipher##*:} 72 cipher=$1 75 ealgo=${cipher%%:*} 76 keylen=${cipher##*:} 116 cipher=$1 119 ealgo=${cipher%%:*} 120 keylen=${cipher##*:}
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_client.c | 572 * tlsv1_client_get_cipher - Get current cipher name 574 * @buf: Buffer for the cipher name 578 * Get the name of the currently used cipher. 583 char *cipher; local 587 cipher = "RC4-MD5"; 590 cipher = "RC4-SHA"; 593 cipher = "DES-CBC-SHA"; 596 cipher = "DES-CBC3-SHA"; 599 cipher = "DHE-RSA-DES-CBC-SHA"; 602 cipher [all...] |
H A D | tlsv1_server.c | 520 * tlsv1_server_get_cipher - Get current cipher name 522 * @buf: Buffer for the cipher name 526 * Get the name of the currently used cipher. 531 char *cipher; local 535 cipher = "RC4-MD5"; 538 cipher = "RC4-SHA"; 541 cipher = "DES-CBC-SHA"; 544 cipher = "DES-CBC3-SHA"; 547 cipher = "DHE-RSA-DES-CBC-SHA"; 550 cipher [all...] |
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | openbsd_hw.c | 129 static int dev_crypto_init_key(EVP_CIPHER_CTX *ctx, int cipher, 141 assert(ctx->cipher->iv_len <= MAX_HW_IV); 145 CDATA(ctx)->cipher = cipher; 172 assert((inl & (ctx->cipher->block_size - 1)) == 0); 176 if (ctx->cipher->iv_len) 180 memcpy(lb, &in[cryp.len - ctx->cipher->iv_len], ctx->cipher->iv_len); 230 memcpy(ctx->iv, &out[cryp.len - ctx->cipher->iv_len], 231 ctx->cipher [all...] |
H A D | evp_pbe.c | 72 /* Setup a cipher context from a PBE algorithm */ 154 const EVP_CIPHER *cipher; local 177 cipher = NULL; 179 cipher = EVP_get_cipherbynid(cipher_nid); 180 if (!cipher) { 196 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) { 255 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument 259 if (cipher) 260 cipher_nid = EVP_CIPHER_nid(cipher);
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | cipher-speed.sh | 1 # $OpenBSD: cipher-speed.sh,v 1.13 2015/03/24 20:22:17 markus Exp $ 4 tid="cipher speed" 14 for c in `${SSH} -Q cipher`; do n=0; for m in `${SSH} -Q mac`; do 15 trace "proto 2 cipher $c mac $m" 24 fail "ssh -2 failed with mac $m cipher $c" 28 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then 40 trace "proto 1 cipher $c" 48 fail "ssh -1 failed with cipher $c"
|
/freebsd-11-stable/sys/dev/random/ |
H A D | hash.c | 87 rijndael_cipherInit(&context->cipher, MODE_ECB, NULL); 99 rijndael_blockEncrypt(&context->cipher, &context->key, d_in, length*8, d_out);
|
/freebsd-11-stable/crypto/openssl/crypto/cms/ |
H A D | cms_enc.c | 84 enc = ec->cipher ? 1 : 0; 95 ciph = ec->cipher; 97 * If not keeping key set cipher to NULL so subsequent calls decrypt. 100 ec->cipher = NULL; 218 const EVP_CIPHER *cipher, 221 ec->cipher = cipher; 229 if (cipher) 261 if (enc->encryptedContentInfo->cipher && enc->unprotectedAttrs) 217 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument
|
/freebsd-11-stable/crypto/openssl/crypto/pem/ |
H A D | pem_seal.c | 100 EVP_CIPHER_CTX_init(&ctx->cipher); 101 ret = EVP_SealInit(&ctx->cipher, type, ek, ekl, iv, pubk, npubk); 136 EVP_EncryptUpdate(&ctx->cipher, buffer, &j, in, i); 165 if (!EVP_EncryptFinal_ex(&ctx->cipher, s, (int *)&i)) 180 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
|
H A D | pem_lib.c | 272 EVP_CIPHER_INFO cipher; local 290 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher)) 292 if (!PEM_do_header(&cipher, data, &len, cb, u)) 357 /* actually it needs the cipher block size extra... */ 433 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument 444 if (cipher->cipher == NULL) 459 if (!EVP_BytesToKey(cipher->cipher, EVP_md5(), &(cipher 483 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument [all...] |
/freebsd-11-stable/sys/opencrypto/ |
H A D | skipjack.c | 129 skipjack_forwards(u_int8_t *plain, u_int8_t *cipher, u_int8_t **key_tables) argument 188 cipher [0] = wh1; cipher [1] = wl1; 189 cipher [2] = wh2; cipher [3] = wl2; 190 cipher [4] = wh3; cipher [5] = wl3; 191 cipher [6] = wh4; cipher [7] = wl4; 196 skipjack_backwards (u_int8_t *cipher, u_int8_ argument [all...] |
/freebsd-11-stable/contrib/apr-util/crypto/ |
H A D | apr_crypto_openssl.c | 68 const EVP_CIPHER * cipher; member in struct:apr_crypto_key_t 378 /* determine the cipher to be used */ 385 key->cipher = EVP_des_ede3_cbc(); 388 key->cipher = EVP_des_ede3_ecb(); 395 key->cipher = EVP_aes_128_cbc(); 398 key->cipher = EVP_aes_128_ecb(); 405 key->cipher = EVP_aes_192_cbc(); 408 key->cipher = EVP_aes_192_ecb(); 415 key->cipher = EVP_aes_256_cbc(); 418 key->cipher [all...] |
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | smime.c | 99 const EVP_CIPHER *cipher = NULL; local 149 cipher = EVP_des_ede3_cbc(); 151 cipher = EVP_des_cbc(); 155 cipher = EVP_seed_cbc(); 159 cipher = EVP_rc2_40_cbc(); 161 cipher = EVP_rc2_cbc(); 163 cipher = EVP_rc2_64_cbc(); 167 cipher = EVP_aes_128_cbc(); 169 cipher = EVP_aes_192_cbc(); 171 cipher [all...] |
H A D | pkey.c | 76 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_get_cipherbyname(*args + 1); 153 if (!cipher) { 154 BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1); 214 PEM_write_bio_PrivateKey(out, pkey, cipher,
|
H A D | pkcs8.c | 79 const EVP_CIPHER *cipher = NULL; local 108 cipher = EVP_get_cipherbyname(*args); 109 if (!cipher) { 110 BIO_printf(bio_err, "Unknown cipher %s\n", *args); 215 "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 217 "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 231 if ((pbe_nid == -1) && !cipher) 284 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | mk_priv.c | 96 krb5_data_zero (&s.enc_part.cipher); 119 &s.enc_part.cipher); 134 krb5_data_free (&s.enc_part.cipher); 151 krb5_data_free (&s.enc_part.cipher);
|
/freebsd-11-stable/crypto/openssl/crypto/engine/ |
H A D | eng_openssl.c | 115 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 228 * we're asked for a cipher we don't support (should not happen). 231 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler. 293 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 296 if (!cipher) { 301 /* We are being asked for a specific cipher */ 303 *cipher = &test_r4_cipher; 305 *cipher = &test_r4_40_cipher; 311 *cipher = NULL;
|
H A D | eng_cryptodev.c | 99 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 303 sess.cipher = ciphers[i].id; 343 sess.cipher = 0; 420 if ((inl % ctx->cipher->block_size) != 0) 434 if (ctx->cipher->iv_len) { 437 iiv = in + inl - ctx->cipher->iv_len; 438 memcpy(save_iv, iiv, ctx->cipher->iv_len); 451 if (ctx->cipher->iv_len) { 453 iiv = out + inl - ctx->cipher->iv_len; 456 memcpy(ctx->iv, iiv, ctx->cipher 467 int cipher = -1, i; local 691 cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) argument [all...] |
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssl_task.c | 66 * SSL_CIPHER Defines a list of cipher specifications the server 140 static char *cipher = NULL; variable 235 * get the preferred cipher list and other initialization 237 if (cipher == NULL) 238 cipher = getenv("SSL_CIPHER"); 239 printf("cipher list: %s\n", cipher ? cipher : "{undefined}");
|
H A D | ssl_txt.c | 136 if (x->cipher == NULL) { 149 ((x->cipher == NULL) ? "unknown" : x->cipher->name)) <= 0)
|