/freebsd-11-stable/crypto/openssh/ |
H A D | sshconnect1.c | 40 #include "cipher.h" 439 if (options.cipher == SSH_CIPHER_NONE) 474 if (options.cipher == SSH_CIPHER_NONE) 632 if (options.cipher == SSH_CIPHER_NOT_SET) { 634 options.cipher = ssh_cipher_default; 635 } else if (options.cipher == SSH_CIPHER_INVALID || 636 !(cipher_mask_ssh1(1) & (1 << options.cipher))) { 637 logit("No valid SSH1 cipher, using %.100s instead.", 639 options.cipher = ssh_cipher_default; 641 /* Check that the selected cipher i [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 178 struct crypto_cipher *cipher; local 193 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 194 if (cipher == NULL) { 195 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 199 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 201 crypto_cipher_deinit(cipher); 204 crypto_cipher_deinit(cipher); 213 struct crypto_cipher *cipher; local 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 229 if (cipher [all...] |
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost_asn1.c | 29 ASN1_SIMPLE(GOST_KEY_AGREEMENT_INFO, cipher, ASN1_OBJECT),
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 222 const SSL_CIPHER *cipher; member in struct:cipher_order_st 518 c = s->cipher; 855 co_list[co_list_num].cipher = c; 918 *ca_curr = ciph_curr->cipher; 927 * or represent a cipher strength value (will be added in any case because algorithms=0). 1011 cp = curr->cipher; 1057 /* add the cipher if it has not been added yet. */ 1065 /* Move the added cipher to this location */ 1118 if (curr->active && (curr->cipher 1676 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument [all...] |
H A D | ssl_asn1.c | 95 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st 145 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) 164 a.cipher.type = V_ASN1_OCTET_STRING; 165 a.cipher.data = buf; 167 if (in->cipher == NULL) 170 l = in->cipher->id; 172 a.cipher.length = 3; 177 a.cipher.length = 2; 276 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); 329 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRIN [all...] |
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | wpa_common.h | 350 struct wpa_ptk *ptk, int akmp, int cipher, 360 u8 *ick, size_t *ick_len, int akmp, int cipher, 390 struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher); 436 const char * wpa_cipher_txt(int cipher); 474 int wpa_cipher_key_len(int cipher); 475 int wpa_cipher_rsc_len(int cipher); 476 enum wpa_alg wpa_cipher_to_alg(int cipher); 477 int wpa_cipher_valid_group(int cipher); 478 int wpa_cipher_valid_pairwise(int cipher); 479 int wpa_cipher_valid_mgmt_group(int cipher); [all...] |
H A D | wpa_common.c | 157 * to use AES Keywrap based on the negotiated pairwise cipher. This function 337 * @cipher: Negotiated pairwise cipher 352 struct wpa_ptk *ptk, int akmp, int cipher, 394 ptk->tk_len = wpa_cipher_key_len(cipher); 397 "WPA: Unsupported cipher (0x%x) used in PTK derivation", 398 cipher); 554 u8 *ick, size_t *ick_len, int akmp, int cipher, 593 ptk->tk_len = wpa_cipher_key_len(cipher); 1166 int wpa_cipher_valid_group(int cipher) argument 349 wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, const u8 *addr1, const u8 *addr2, const u8 *nonce1, const u8 *nonce2, struct wpa_ptk *ptk, int akmp, int cipher, const u8 *z, size_t z_len) argument 551 fils_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const u8 *spa, const u8 *aa, const u8 *snonce, const u8 *anonce, const u8 *dhss, size_t dhss_len, struct wpa_ptk *ptk, u8 *ick, size_t *ick_len, int akmp, int cipher, u8 *fils_ft, size_t *fils_ft_len) argument 1174 wpa_cipher_valid_mgmt_group(int cipher) argument 1696 wpa_pmk_r1_to_ptk(const u8 *pmk_r1, size_t pmk_r1_len, const u8 *snonce, const u8 *anonce, const u8 *sta_addr, const u8 *bssid, const u8 *pmk_r1_name, struct wpa_ptk *ptk, u8 *ptk_name, int akmp, int cipher) argument 1940 wpa_cipher_txt(int cipher) argument 2231 wpa_cipher_key_len(int cipher) argument 2252 wpa_cipher_rsc_len(int cipher) argument 2267 wpa_cipher_to_alg(int cipher) argument 2293 wpa_cipher_valid_pairwise(int cipher) argument 2303 wpa_cipher_to_suite(int proto, int cipher) argument [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | aes-test.c | 289 krb5_data *cipher, 300 cipher->data, 301 cipher->length, 363 errx(1, "cipher len wrong"); 428 krb5_data *cipher, 436 p = cipher->data; 437 len = cipher->length; 524 krb5_data *cipher, 535 e.ciphertext = *cipher; 553 if (len != cipher 286 krb_enc(krb5_context context, krb5_crypto crypto, unsigned usage, krb5_data *cipher, krb5_data *clear) argument 425 krb_enc_iov(krb5_context context, krb5_crypto crypto, unsigned usage, krb5_data *cipher, krb5_data *clear) argument 520 krb_enc_mit(krb5_context context, krb5_enctype enctype, krb5_keyblock *key, unsigned usage, krb5_data *cipher, krb5_data *clear) argument 595 krb5_data cipher, plain; local [all...] |
H A D | build_ap_req.c | 65 ap.authenticator.cipher = authenticator;
|
/freebsd-11-stable/contrib/netbsd-tests/crypto/opencrypto/ |
H A D | h_arc4.c | 58 cs.cipher = CRYPTO_ARC4;
|
H A D | h_cbcdes.c | 59 cs.cipher = CRYPTO_DES_CBC;
|
H A D | h_null.c | 54 cs.cipher = CRYPTO_NULL_CBC;
|
H A D | h_aesctr2.c | 62 cs.cipher = CRYPTO_AES_CTR;
|
/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | x_info.c | 75 ret->enc_cipher.cipher = NULL;
|
/freebsd-11-stable/crypto/openssl/engines/ |
H A D | e_padlock.c | 156 static int padlock_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 727 padlock_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, argument 730 /* No specific cipher => return a list of supported nids ... */ 731 if (!cipher) { 736 /* ... or the requested "cipher" otherwise */ 739 *cipher = &padlock_aes_128_ecb; 742 *cipher = &padlock_aes_128_cbc; 745 *cipher = &padlock_aes_128_cfb; 748 *cipher = &padlock_aes_128_ofb; 752 *cipher [all...] |
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | genpkey.c | 83 const EVP_CIPHER *cipher = NULL; local 161 cipher = EVP_get_cipherbyname(*args + 1); 162 if (!cipher) { 163 BIO_printf(bio_err, "Unknown cipher %s\n", *args + 1); 185 "-<cipher> use cipher <cipher> to encrypt the key\n"); 243 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0, NULL, pass);
|
H A D | cms.c | 125 const EVP_CIPHER *cipher = NULL, *wrap_cipher = NULL; local 211 cipher = EVP_des_ede3_cbc(); 213 cipher = EVP_des_cbc(); 219 cipher = EVP_seed_cbc(); 223 cipher = EVP_rc2_40_cbc(); 225 cipher = EVP_rc2_cbc(); 227 cipher = EVP_rc2_64_cbc(); 231 cipher = EVP_aes_128_cbc(); 233 cipher = EVP_aes_192_cbc(); 235 cipher [all...] |
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_common.h | 218 tls_cipher cipher; member in struct:tls_cipher_suite 228 tls_cipher cipher; member in struct:tls_cipher_data 251 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 252 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | p5_crpt2.c | 197 const EVP_CIPHER *cipher; local 226 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); 228 if (!cipher) { 233 /* Fixup cipher based on AlgorithmIdentifier */ 234 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
|
H A D | evp_locl.h | 60 /* Macros to code block cipher wrappers */ 62 /* Wrapper functions for each cipher mode */ 66 bl = ctx->cipher->block_size;\ 257 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \ 258 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \ 259 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \ 260 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \ 261 0, cipher##_init_key, NULL, \ 337 const EVP_CIPHER *evp_get_fips_cipher(const EVP_CIPHER *cipher);
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | mesh.c | 75 int cipher; local 102 cipher = wpa_pick_pairwise_cipher(ssid->pairwise_cipher, 0); 103 if (cipher < 0 || cipher == WPA_CIPHER_TKIP) { 104 wpa_msg(wpa_s, MSG_INFO, "mesh: Invalid pairwise cipher"); 108 conf->pairwise_cipher = cipher; 110 cipher = wpa_pick_group_cipher(ssid->group_cipher); 111 if (cipher < 0 || cipher == WPA_CIPHER_TKIP || 112 cipher [all...] |
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | ks_file.c | 75 const void *cipher, 113 EVP_Cipher(&ctx, clear.data, cipher, len); 177 const EVP_CIPHER *cipher; local 231 cipher = EVP_get_cipherbyname(type); 232 if (cipher == NULL) { 236 "unsupported cipher: %s", 249 if (ssize < 0 || ssize < PKCS5_SALT_LEN || ssize < EVP_CIPHER_iv_length(cipher)) { 266 ret = try_decrypt(context, c, ai, cipher, ivdata, 287 ret = try_decrypt(context, c, ai, cipher, ivdata, password, 68 try_decrypt(hx509_context context, struct hx509_collector *collector, const AlgorithmIdentifier *alg, const EVP_CIPHER *c, const void *ivdata, const void *password, size_t passwordlen, const void *cipher, size_t len) argument
|
/freebsd-11-stable/sys/net80211/ |
H A D | ieee80211_crypto.h | 46 uint8_t rsn_mcastcipher; /* mcast/group cipher */ 48 uint8_t rsn_ucastcipher; /* selected unicast cipher */ 59 * separately through loadable cipher modules that register with 61 * of the cipher; any per-key state is hung off wk_private by the 62 * cipher when it is attached. Ciphers are automatically called 65 * The generic crypto support handles encap/decap of cipher-related 68 * the cipher is expected to honor this and do the necessary work. 87 #define IEEE80211_KEY_CIPHER0 0x1000 /* cipher-specific action 0 */ 88 #define IEEE80211_KEY_CIPHER1 0x2000 /* cipher-specific action 1 */ 98 void *wk_private; /* private cipher stat [all...] |
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | integrity.sh | 13 macs="$macs `${SSH} -Q cipher-auth`" 40 if ${SSH} -Q cipher-auth | grep "^${m}\$" >/dev/null 2>&1 ; then
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | aes_wrap.h | 22 u8 *cipher); 24 const u8 *cipher, u8 *plain);
|