/freebsd-11-stable/contrib/netbsd-tests/crypto/opencrypto/ |
H A D | h_camellia.c | 64 cs.cipher = CRYPTO_CAMELLIA_CBC;
|
H A D | h_gcm.c | 68 cs.cipher = CRYPTO_AES_GCM_16;
|
/freebsd-11-stable/crypto/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 80 * cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
H A D | krb5_asn.c | 67 ASN1_EXP(KRB5_ENCDATA, cipher, ASN1_OCTET_STRING,2)
|
/freebsd-11-stable/crypto/openssl/crypto/pem/ |
H A D | pem_info.c | 236 EVP_CIPHER_INFO cipher; local 238 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher)) 240 if (!PEM_do_header(&cipher, data, &len, cb, u)) 348 objstr = OBJ_nid2sn(EVP_CIPHER_nid(xi->enc_cipher.cipher));
|
H A D | pem.h | 148 EVP_CIPHER_CTX cipher; member in struct:PEM_Encode_Seal_st 160 int cipher; member in struct:pem_recip_st 175 int cipher; member in struct:pem_ctx_st::__anon4611 194 EVP_CIPHER *dec; /* date encryption cipher */ 395 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher); 396 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *len,
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | rekey.sh | 43 for i in `${SSH} -Q cipher`; do 56 if ${SSH} -Q cipher-auth | grep '^.*$' >/dev/null 2>&1 ; then 57 for c in `${SSH} -Q cipher-auth`; do
|
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost94_keyx.c | 110 /* Do not use vizir cipher parameters with cryptopro */ 178 ASN1_OBJECT_free(gkt->key_agreement_info->cipher); 179 gkt->key_agreement_info->cipher = OBJ_nid2obj(param->nid); 256 param = get_encryption_params(gkt->key_agreement_info->cipher);
|
H A D | gost2001_keyx.c | 192 ASN1_OBJECT_free(gkt->key_agreement_info->cipher); 193 gkt->key_agreement_info->cipher = OBJ_nid2obj(param->nid); 266 param = get_encryption_params(gkt->key_agreement_info->cipher);
|
H A D | gost89.c | 349 void gost_enc(gost_ctx * c, const byte * clear, byte * cipher, int blocks) argument 353 gostcrypt(c, clear, cipher); 355 cipher += 8; 360 void gost_dec(gost_ctx * c, const byte * cipher, byte * clear, int blocks) argument 364 gostdecrypt(c, cipher, clear); 366 cipher += 8; 372 byte * cipher, int blocks) 380 for (i = 0, in = clear, out = cipher; i < blocks; i++, in += 8, out += 8) { 389 void gost_dec_cfb(gost_ctx * ctx, const byte * iv, const byte * cipher, argument 398 for (i = 0, in = cipher, ou 371 gost_enc_cfb(gost_ctx * ctx, const byte * iv, const byte * clear, byte * cipher, int blocks) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_common.c | 22 * Add support for commonly used cipher suites; don't bother with exportable 103 * tls_get_cipher_suite - Get TLS cipher suite 105 * Returns: Pointer to the cipher data or %NULL if not found 117 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher) argument 121 if (tls_ciphers[i].cipher == cipher) 127 int tls_server_key_exchange_allowed(tls_cipher cipher) argument 132 suite = tls_get_cipher_suite(cipher);
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | evp.h | 336 /* Values for cipher flags */ 351 /* Set if variable length cipher */ 353 /* Set if the iv handling should be done by the cipher itself */ 355 /* Set if the cipher's init() function should be called if key is NULL */ 357 /* Call ctrl() to init cipher parameters */ 363 /* cipher handles random key generation */ 365 /* cipher has its own additional copying logic */ 373 /* Allow non FIPS cipher in FIPS mode */ 411 * AEAD cipher deduces payload length and returns number of bytes required to 445 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 450 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
/freebsd-11-stable/tests/sys/geom/class/eli/ |
H A D | init_test.sh | 8 cipher=$1 10 ealgo=${cipher%%:*} 11 keylen=${cipher##*:} 231 cipher=$1 234 ealgo=${cipher%%:*} 235 keylen=${cipher##*:} 300 atf_set "descr" "geli init accepts cipher aliases"
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | rd_cred.c | 101 enc_krb_cred_part_data.length = cred.enc_part.cipher.length; 102 enc_krb_cred_part_data.data = cred.enc_part.cipher.data; 155 if (enc_krb_cred_part_data.data != cred.enc_part.cipher.data)
|
H A D | mk_rep.c | 111 &ap.enc_part.cipher);
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | ap_config.c | 1315 int cipher = WPA_CIPHER_NONE; local 1319 cipher = bss->default_wep_key_len >= 13 ? 1323 cipher = WPA_CIPHER_WEP104; 1325 cipher = WPA_CIPHER_WEP40; 1327 bss->wpa_group = cipher; 1328 bss->wpa_pairwise = cipher; 1329 bss->rsn_pairwise = cipher; 1333 int cipher = WPA_CIPHER_WEP40; local 1335 cipher = WPA_CIPHER_WEP104; 1337 bss->wpa_group = cipher; [all...] |
/freebsd-11-stable/tools/regression/net80211/wep/ |
H A D | test_wep.c | 131 #define TEST(n,name,cipher,keyix,iv0,iv1,iv2,iv3) { \ 132 name, IEEE80211_CIPHER_##cipher,keyix, { iv2,iv1,iv0,iv3 }, \ 140 int cipher; member in struct:ciphertest 204 if (!ieee80211_crypto_newkey(vap, t->cipher,
|
/freebsd-11-stable/crypto/openssh/ |
H A D | readconf.h | 73 int cipher; /* Cipher to use. */ member in struct:__anon4508
|
/freebsd-11-stable/crypto/openssl/crypto/cms/ |
H A D | cms_kari.c | 387 const EVP_CIPHER *cipher) 391 int keylen = EVP_CIPHER_key_length(cipher); 401 * Pick a cipher based on content encryption cipher. If it is DES3 use 405 if (EVP_CIPHER_type(cipher) == NID_des_ede3_cbc) 437 if (!cms_wrap_init(kari, ec->cipher)) 386 cms_wrap_init(CMS_KeyAgreeRecipientInfo *kari, const EVP_CIPHER *cipher) argument
|
H A D | cms_smime.c | 239 CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher, argument 244 if (!cipher) { 251 if (!CMS_EncryptedData_set1_key(cms, cipher, key, keylen)) 539 const EVP_CIPHER *cipher, unsigned int flags) 544 cms = CMS_EnvelopedData_create(cipher);
|
/freebsd-11-stable/sys/opencrypto/ |
H A D | cryptodev.c | 78 u_int32_t cipher; member in struct:session_op32 88 u_int32_t cipher; member in struct:session2_op32 155 CP(*from, *to, cipher); 177 CP(*from, *to, cipher); 275 u_int32_t cipher; member in struct:csession 413 switch (sop->cipher) { 454 CRYPTDEB("invalid cipher"); 515 CRYPTDEB("invalid cipher parameters"); 583 cria.cri_key, cria.cri_klen, sop->cipher, sop->mac, txform, 755 switch (cse->cipher) { 1378 csecreate(struct fcrypt *fcr, u_int64_t sid, caddr_t key, u_int64_t keylen, caddr_t mackey, u_int64_t mackeylen, u_int32_t cipher, u_int32_t mac, struct enc_xform *txform, struct auth_hash *thash) argument [all...] |
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 2127 const struct hx509cipher *cipher; member in struct:hx509_crypto_data 2381 const struct hx509cipher *cipher; local 2383 cipher = find_cipher_by_name(name); 2384 if (cipher == NULL) 2386 return cipher->oid; 2395 const struct hx509cipher *cipher; local 2399 cipher = find_cipher_by_oid(enctype); 2400 if (cipher == NULL) { 2413 (*crypto)->cipher = cipher; 3092 const struct hx509cipher *cipher; local [all...] |
/freebsd-11-stable/contrib/ntp/util/ |
H A D | ntp-keygen.c | 183 const EVP_CIPHER * cipher = NULL; variable 570 cipher = EVP_get_cipherbyname(ciphername); 571 if (cipher == NULL) { 572 fprintf(stderr, "Unknown cipher %s\n", ciphername); 691 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0, 757 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0, 813 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0, 1030 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NULL, 0, NULL, 1082 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NULL, 0, NULL, 1250 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NUL [all...] |
/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | tdls.c | 108 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_tdls_peer 213 switch (peer->cipher) { 223 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d", 712 peer->cipher = 0; 1104 * Regardless of the cipher used on the AP connection, select CCMP 1462 * RSN IE is filled only with CCMP cipher suite. 1465 * Regardless of the cipher used on the AP connection, select CCMP 1791 int cipher; local 1975 cipher 2187 int cipher; local [all...] |
/freebsd-11-stable/tools/tools/net80211/stumbler/ |
H A D | stumbler.c | 605 int cipher, auth; local 613 cipher = ((unsigned char*) wpa->wpa_mcipher)[3]; 627 if (cipher == WPA_CSE_TKIP) { 634 if (cipher == WPA_CSE_CCMP) { 650 int cipher = 0; local 657 cipher = 1; 669 if (cipher)
|