Searched refs:cipher (Results 76 - 100 of 197) sorted by relevance

12345678

/freebsd-11-stable/contrib/netbsd-tests/crypto/opencrypto/
H A Dh_camellia.c64 cs.cipher = CRYPTO_CAMELLIA_CBC;
H A Dh_gcm.c68 cs.cipher = CRYPTO_AES_GCM_16;
/freebsd-11-stable/crypto/openssl/crypto/krb5/
H A Dkrb5_asn.h80 * cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
H A Dkrb5_asn.c67 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
/freebsd-11-stable/crypto/openssl/crypto/pem/
H A Dpem_info.c236 EVP_CIPHER_INFO cipher; local
238 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher))
240 if (!PEM_do_header(&cipher, data, &len, cb, u))
348 objstr = OBJ_nid2sn(EVP_CIPHER_nid(xi->enc_cipher.cipher));
H A Dpem.h148 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st
160 int cipher; member in struct:pem_recip_st
175 int cipher; member in struct:pem_ctx_st::__anon4611
194 EVP_CIPHER *dec; /* date encryption cipher */
395 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher);
396 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *len,
/freebsd-11-stable/crypto/openssh/regress/
H A Drekey.sh43 for i in `${SSH} -Q cipher`; do
56 if ${SSH} -Q cipher-auth | grep '^.*$' >/dev/null 2>&1 ; then
57 for c in `${SSH} -Q cipher-auth`; do
/freebsd-11-stable/crypto/openssl/engines/ccgost/
H A Dgost94_keyx.c110 /* Do not use vizir cipher parameters with cryptopro */
178 ASN1_OBJECT_free(gkt->key_agreement_info->cipher);
179 gkt->key_agreement_info->cipher = OBJ_nid2obj(param->nid);
256 param = get_encryption_params(gkt->key_agreement_info->cipher);
H A Dgost2001_keyx.c192 ASN1_OBJECT_free(gkt->key_agreement_info->cipher);
193 gkt->key_agreement_info->cipher = OBJ_nid2obj(param->nid);
266 param = get_encryption_params(gkt->key_agreement_info->cipher);
H A Dgost89.c349 void gost_enc(gost_ctx * c, const byte * clear, byte * cipher, int blocks) argument
353 gostcrypt(c, clear, cipher);
355 cipher += 8;
360 void gost_dec(gost_ctx * c, const byte * cipher, byte * clear, int blocks) argument
364 gostdecrypt(c, cipher, clear);
366 cipher += 8;
372 byte * cipher, int blocks)
380 for (i = 0, in = clear, out = cipher; i < blocks; i++, in += 8, out += 8) {
389 void gost_dec_cfb(gost_ctx * ctx, const byte * iv, const byte * cipher, argument
398 for (i = 0, in = cipher, ou
371 gost_enc_cfb(gost_ctx * ctx, const byte * iv, const byte * clear, byte * cipher, int blocks) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_common.c22 * Add support for commonly used cipher suites; don't bother with exportable
103 * tls_get_cipher_suite - Get TLS cipher suite
105 * Returns: Pointer to the cipher data or %NULL if not found
117 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) argument
121 if (tls_ciphers[i].cipher == cipher)
127 int tls_server_key_exchange_allowed(tls_cipher cipher) argument
132 suite = tls_get_cipher_suite(cipher);
/freebsd-11-stable/crypto/openssl/crypto/evp/
H A Devp.h336 /* Values for cipher flags */
351 /* Set if variable length cipher */
353 /* Set if the iv handling should be done by the cipher itself */
355 /* Set if the cipher's init() function should be called if key is NULL */
357 /* Call ctrl() to init cipher parameters */
363 /* cipher handles random key generation */
365 /* cipher has its own additional copying logic */
373 /* Allow non FIPS cipher in FIPS mode */
411 * AEAD cipher deduces payload length and returns number of bytes required to
445 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
450 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
[all...]
/freebsd-11-stable/tests/sys/geom/class/eli/
H A Dinit_test.sh8 cipher=$1
10 ealgo=${cipher%%:*}
11 keylen=${cipher##*:}
231 cipher=$1
234 ealgo=${cipher%%:*}
235 keylen=${cipher##*:}
300 atf_set "descr" "geli init accepts cipher aliases"
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Drd_cred.c101 enc_krb_cred_part_data.length = cred.enc_part.cipher.length;
102 enc_krb_cred_part_data.data = cred.enc_part.cipher.data;
155 if (enc_krb_cred_part_data.data != cred.enc_part.cipher.data)
H A Dmk_rep.c111 &ap.enc_part.cipher);
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dap_config.c1315 int cipher = WPA_CIPHER_NONE; local
1319 cipher = bss->default_wep_key_len >= 13 ?
1323 cipher = WPA_CIPHER_WEP104;
1325 cipher = WPA_CIPHER_WEP40;
1327 bss->wpa_group = cipher;
1328 bss->wpa_pairwise = cipher;
1329 bss->rsn_pairwise = cipher;
1333 int cipher = WPA_CIPHER_WEP40; local
1335 cipher = WPA_CIPHER_WEP104;
1337 bss->wpa_group = cipher;
[all...]
/freebsd-11-stable/tools/regression/net80211/wep/
H A Dtest_wep.c131 #define TEST(n,name,cipher,keyix,iv0,iv1,iv2,iv3) { \
132 name, IEEE80211_CIPHER_##cipher,keyix, { iv2,iv1,iv0,iv3 }, \
140 int cipher; member in struct:ciphertest
204 if (!ieee80211_crypto_newkey(vap, t->cipher,
/freebsd-11-stable/crypto/openssh/
H A Dreadconf.h73 int cipher; /* Cipher to use. */ member in struct:__anon4508
/freebsd-11-stable/crypto/openssl/crypto/cms/
H A Dcms_kari.c387 const EVP_CIPHER *cipher)
391 int keylen = EVP_CIPHER_key_length(cipher);
401 * Pick a cipher based on content encryption cipher. If it is DES3 use
405 if (EVP_CIPHER_type(cipher) == NID_des_ede3_cbc)
437 if (!cms_wrap_init(kari, ec->cipher))
386 cms_wrap_init(CMS_KeyAgreeRecipientInfo *kari, const EVP_CIPHER *cipher) argument
H A Dcms_smime.c239 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, argument
244 if (!cipher) {
251 if (!CMS_EncryptedData_set1_key(cms, cipher, key, keylen))
539 const EVP_CIPHER *cipher, unsigned int flags)
544 cms = CMS_EnvelopedData_create(cipher);
/freebsd-11-stable/sys/opencrypto/
H A Dcryptodev.c78 u_int32_t cipher; member in struct:session_op32
88 u_int32_t cipher; member in struct:session2_op32
155 CP(*from, *to, cipher);
177 CP(*from, *to, cipher);
275 u_int32_t cipher; member in struct:csession
413 switch (sop->cipher) {
454 CRYPTDEB("invalid cipher");
515 CRYPTDEB("invalid cipher parameters");
583 cria.cri_key, cria.cri_klen, sop->cipher, sop->mac, txform,
755 switch (cse->cipher) {
1378 csecreate(struct fcrypt *fcr, u_int64_t sid, caddr_t key, u_int64_t keylen, caddr_t mackey, u_int64_t mackeylen, u_int32_t cipher, u_int32_t mac, struct enc_xform *txform, struct auth_hash *thash) argument
[all...]
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dcrypto.c2127 const struct hx509cipher *cipher; member in struct:hx509_crypto_data
2381 const struct hx509cipher *cipher; local
2383 cipher = find_cipher_by_name(name);
2384 if (cipher == NULL)
2386 return cipher->oid;
2395 const struct hx509cipher *cipher; local
2399 cipher = find_cipher_by_oid(enctype);
2400 if (cipher == NULL) {
2413 (*crypto)->cipher = cipher;
3092 const struct hx509cipher *cipher; local
[all...]
/freebsd-11-stable/contrib/ntp/util/
H A Dntp-keygen.c183 const EVP_CIPHER * cipher = NULL; variable
570 cipher = EVP_get_cipherbyname(ciphername);
571 if (cipher == NULL) {
572 fprintf(stderr, "Unknown cipher %s\n", ciphername);
691 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0,
757 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0,
813 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0,
1030 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NULL, 0, NULL,
1082 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NULL, 0, NULL,
1250 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NUL
[all...]
/freebsd-11-stable/contrib/wpa/src/rsn_supp/
H A Dtdls.c108 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer
213 switch (peer->cipher) {
223 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
712 peer->cipher = 0;
1104 * Regardless of the cipher used on the AP connection, select CCMP
1462 * RSN IE is filled only with CCMP cipher suite.
1465 * Regardless of the cipher used on the AP connection, select CCMP
1791 int cipher; local
1975 cipher
2187 int cipher; local
[all...]
/freebsd-11-stable/tools/tools/net80211/stumbler/
H A Dstumbler.c605 int cipher, auth; local
613 cipher = ((unsigned char*) wpa->wpa_mcipher)[3];
627 if (cipher == WPA_CSE_TKIP) {
634 if (cipher == WPA_CSE_CCMP) {
650 int cipher = 0; local
657 cipher = 1;
669 if (cipher)

Completed in 410 milliseconds

12345678