Searched refs:cipher (Results 51 - 75 of 197) sorted by relevance

12345678

/freebsd-11-stable/crypto/openssh/
H A Dsshconnect1.c40 #include "cipher.h"
439 if (options.cipher == SSH_CIPHER_NONE)
474 if (options.cipher == SSH_CIPHER_NONE)
632 if (options.cipher == SSH_CIPHER_NOT_SET) {
634 options.cipher = ssh_cipher_default;
635 } else if (options.cipher == SSH_CIPHER_INVALID ||
636 !(cipher_mask_ssh1(1) & (1 << options.cipher))) {
637 logit("No valid SSH1 cipher, using %.100s instead.",
639 options.cipher = ssh_cipher_default;
641 /* Check that the selected cipher i
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Dikev2_common.c178 struct crypto_cipher *cipher; local
193 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
194 if (cipher == NULL) {
195 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
199 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
201 crypto_cipher_deinit(cipher);
204 crypto_cipher_deinit(cipher);
213 struct crypto_cipher *cipher; local
228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
229 if (cipher
[all...]
/freebsd-11-stable/crypto/openssl/engines/ccgost/
H A Dgost_asn1.c29 ASN1_SIMPLE(GOST_KEY_AGREEMENT_INFO, cipher, ASN1_OBJECT),
/freebsd-11-stable/crypto/openssl/ssl/
H A Dssl_ciph.c113 * ECC cipher suite support in OpenSSL originally developed by
222 const SSL_CIPHER *cipher; member in struct:cipher_order_st
518 c = s->cipher;
855 co_list[co_list_num].cipher = c;
918 *ca_curr = ciph_curr->cipher;
927 * or represent a cipher strength value (will be added in any case because algorithms=0).
1011 cp = curr->cipher;
1057 /* add the cipher if it has not been added yet. */
1065 /* Move the added cipher to this location */
1118 if (curr->active && (curr->cipher
1676 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument
[all...]
H A Dssl_asn1.c95 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st
145 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0)))
164 a.cipher.type = V_ASN1_OCTET_STRING;
165 a.cipher.data = buf;
167 if (in->cipher == NULL)
170 l = in->cipher->id;
172 a.cipher.length = 3;
177 a.cipher.length = 2;
276 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING);
329 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRIN
[all...]
/freebsd-11-stable/contrib/wpa/src/common/
H A Dwpa_common.h350 struct wpa_ptk *ptk, int akmp, int cipher,
360 u8 *ick, size_t *ick_len, int akmp, int cipher,
390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher);
436 const char * wpa_cipher_txt(int cipher);
474 int wpa_cipher_key_len(int cipher);
475 int wpa_cipher_rsc_len(int cipher);
476 enum wpa_alg wpa_cipher_to_alg(int cipher);
477 int wpa_cipher_valid_group(int cipher);
478 int wpa_cipher_valid_pairwise(int cipher);
479 int wpa_cipher_valid_mgmt_group(int cipher);
[all...]
H A Dwpa_common.c157 * to use AES Keywrap based on the negotiated pairwise cipher. This function
337 * @cipher: Negotiated pairwise cipher
352 struct wpa_ptk *ptk, int akmp, int cipher,
394 ptk->tk_len = wpa_cipher_key_len(cipher);
397 "WPA: Unsupported cipher (0x%x) used in PTK derivation",
398 cipher);
554 u8 *ick, size_t *ick_len, int akmp, int cipher,
593 ptk->tk_len = wpa_cipher_key_len(cipher);
1166 int wpa_cipher_valid_group(int cipher) argument
349 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher, const u8 *z, size_t z_len) argument
551 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher, u8 *fils_ft, size_t *fils_ft_len) argument
1174 wpa_cipher_valid_mgmt_group(int cipher) argument
1696 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, size_t pmk_r1_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument
1940 wpa_cipher_txt(int cipher) argument
2231 wpa_cipher_key_len(int cipher) argument
2252 wpa_cipher_rsc_len(int cipher) argument
2267 wpa_cipher_to_alg(int cipher) argument
2293 wpa_cipher_valid_pairwise(int cipher) argument
2303 wpa_cipher_to_suite(int proto, int cipher) argument
[all...]
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Daes-test.c289 krb5_data *cipher,
300 cipher->data,
301 cipher->length,
363 errx(1, "cipher len wrong");
428 krb5_data *cipher,
436 p = cipher->data;
437 len = cipher->length;
524 krb5_data *cipher,
535 e.ciphertext = *cipher;
553 if (len != cipher
286 krb_enc(krb5_context context, krb5_crypto crypto, unsigned usage, krb5_data *cipher, krb5_data *clear) argument
425 krb_enc_iov(krb5_context context, krb5_crypto crypto, unsigned usage, krb5_data *cipher, krb5_data *clear) argument
520 krb_enc_mit(krb5_context context, krb5_enctype enctype, krb5_keyblock *key, unsigned usage, krb5_data *cipher, krb5_data *clear) argument
595 krb5_data cipher, plain; local
[all...]
H A Dbuild_ap_req.c65 ap.authenticator.cipher = authenticator;
/freebsd-11-stable/contrib/netbsd-tests/crypto/opencrypto/
H A Dh_arc4.c58 cs.cipher = CRYPTO_ARC4;
H A Dh_cbcdes.c59 cs.cipher = CRYPTO_DES_CBC;
H A Dh_null.c54 cs.cipher = CRYPTO_NULL_CBC;
H A Dh_aesctr2.c62 cs.cipher = CRYPTO_AES_CTR;
/freebsd-11-stable/crypto/openssl/crypto/asn1/
H A Dx_info.c75 ret->enc_cipher.cipher = NULL;
/freebsd-11-stable/crypto/openssl/engines/
H A De_padlock.c156 static int padlock_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
727 padlock_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, argument
730 /* No specific cipher => return a list of supported nids ... */
731 if (!cipher) {
736 /* ... or the requested "cipher" otherwise */
739 *cipher = &padlock_aes_128_ecb;
742 *cipher = &padlock_aes_128_cbc;
745 *cipher = &padlock_aes_128_cfb;
748 *cipher = &padlock_aes_128_ofb;
752 *cipher
[all...]
/freebsd-11-stable/crypto/openssl/apps/
H A Dgenpkey.c83 const EVP_CIPHER *cipher = NULL; local
161 cipher = EVP_get_cipherbyname(*args + 1);
162 if (!cipher) {
163 BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1);
185 "-<cipher> use cipher <cipher> to encrypt the key\n");
243 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0, NULL, pass);
H A Dcms.c125 const EVP_CIPHER *cipher = NULL, *wrap_cipher = NULL; local
211 cipher = EVP_des_ede3_cbc();
213 cipher = EVP_des_cbc();
219 cipher = EVP_seed_cbc();
223 cipher = EVP_rc2_40_cbc();
225 cipher = EVP_rc2_cbc();
227 cipher = EVP_rc2_64_cbc();
231 cipher = EVP_aes_128_cbc();
233 cipher = EVP_aes_192_cbc();
235 cipher
[all...]
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_common.h218 tls_cipher cipher; member in struct:tls_cipher_suite
228 tls_cipher cipher; member in struct:tls_cipher_data
251 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
252 int tls_server_key_exchange_allowed(tls_cipher cipher);
/freebsd-11-stable/crypto/openssl/crypto/evp/
H A Dp5_crpt2.c197 const EVP_CIPHER *cipher; local
226 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm);
228 if (!cipher) {
233 /* Fixup cipher based on AlgorithmIdentifier */
234 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
H A Devp_locl.h60 /* Macros to code block cipher wrappers */
62 /* Wrapper functions for each cipher mode */
66 bl = ctx->cipher->block_size;\
257 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \
258 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \
259 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \
260 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
261 0, cipher##_init_key, NULL, \
337 const EVP_CIPHER *evp_get_fips_cipher(const EVP_CIPHER *cipher);
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dmesh.c75 int cipher; local
102 cipher = wpa_pick_pairwise_cipher(ssid->pairwise_cipher, 0);
103 if (cipher < 0 || cipher == WPA_CIPHER_TKIP) {
104 wpa_msg(wpa_s, MSG_INFO, "mesh: Invalid pairwise cipher");
108 conf->pairwise_cipher = cipher;
110 cipher = wpa_pick_group_cipher(ssid->group_cipher);
111 if (cipher < 0 || cipher == WPA_CIPHER_TKIP ||
112 cipher
[all...]
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dks_file.c75 const void *cipher,
113 EVP_Cipher(&ctx, clear.data, cipher, len);
177 const EVP_CIPHER *cipher; local
231 cipher = EVP_get_cipherbyname(type);
232 if (cipher == NULL) {
236 "unsupported cipher: %s",
249 if (ssize < 0 || ssize < PKCS5_SALT_LEN || ssize < EVP_CIPHER_iv_length(cipher)) {
266 ret = try_decrypt(context, c, ai, cipher, ivdata,
287 ret = try_decrypt(context, c, ai, cipher, ivdata, password,
68 try_decrypt(hx509_context context, struct hx509_collector *collector, const AlgorithmIdentifier *alg, const EVP_CIPHER *c, const void *ivdata, const void *password, size_t passwordlen, const void *cipher, size_t len) argument
/freebsd-11-stable/sys/net80211/
H A Dieee80211_crypto.h46 uint8_t rsn_mcastcipher; /* mcast/group cipher */
48 uint8_t rsn_ucastcipher; /* selected unicast cipher */
59 * separately through loadable cipher modules that register with
61 * of the cipher; any per-key state is hung off wk_private by the
62 * cipher when it is attached. Ciphers are automatically called
65 * The generic crypto support handles encap/decap of cipher-related
68 * the cipher is expected to honor this and do the necessary work.
87 #define IEEE80211_KEY_CIPHER0 0x1000 /* cipher-specific action 0 */
88 #define IEEE80211_KEY_CIPHER1 0x2000 /* cipher-specific action 1 */
98 void *wk_private; /* private cipher stat
[all...]
/freebsd-11-stable/crypto/openssh/regress/
H A Dintegrity.sh13 macs="$macs `${SSH} -Q cipher-auth`"
40 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Daes_wrap.h22 u8 *cipher);
24 const u8 *cipher, u8 *plain);

Completed in 255 milliseconds

12345678