Searched refs:cipher (Results 1 - 25 of 174) sorted by relevance

1234567

/freebsd-9.3-release/crypto/openssl/demos/ssltest-ecc/
H A Dssltest.sh2 # Tests ECC cipher suites using ssltest. Requires one argument which could
60 # Anonymous cipher suites do not require key or certificate files
66 for cipher in $AECDH_CIPHER_LIST
68 echo "Testing $cipher"
69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher
76 -named_curve $curve -cipher AECDH-NULL-SHA
83 -named_curve $curve -cipher AECDH-RC4-SHA
88 # Both ECDH-ECDSA and ECDHE-ECDSA cipher suites require
95 for cipher i
[all...]
/freebsd-9.3-release/lib/libutil/
H A Dlogin_crypt.c39 const char *cipher; local
41 cipher = login_getcapstr(lc, "passwd_format", def, NULL);
44 "passwd_format = %s\n", cipher);
45 if (cipher == NULL)
47 if (!crypt_set_format(cipher))
49 return (cipher);
/freebsd-9.3-release/crypto/openssl/test/
H A Dtestenc10 $cmd enc < $test > $test.cipher
11 $cmd enc < $test.cipher >$test.clear
17 /bin/rm $test.cipher $test.clear
20 $cmd enc -a -e < $test > $test.cipher
21 $cmd enc -a -d < $test.cipher >$test.clear
27 /bin/rm $test.cipher $test.clear
30 for i in `$cmd list-cipher-commands`
33 $cmd $i -bufsize 113 -e -k test < $test > $test.$i.cipher
34 $cmd $i -bufsize 157 -d -k test < $test.$i.cipher >$test.$i.clear
40 /bin/rm $test.$i.cipher
[all...]
/freebsd-9.3-release/sys/opencrypto/
H A Dskipjack.h17 extern void skipjack_forwards(u_int8_t *plain, u_int8_t *cipher, u_int8_t **key);
18 extern void skipjack_backwards(u_int8_t *cipher, u_int8_t *plain, u_int8_t **key);
/freebsd-9.3-release/crypto/openssl/crypto/evp/
H A Denc_min.c75 /* ctx->cipher=NULL; */
196 /* We'll use the ENGINE's private cipher definition */
199 * Store the ENGINE functional reference so we know 'cipher' came
212 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
226 ctx->cipher = &bad_cipher;
237 if (ctx->engine && ctx->cipher && (!cipher ||
238 (cipher
239 && (cipher->nid ==
240 ctx->cipher
407 EVP_CIPHER_nid(const EVP_CIPHER *cipher) argument
[all...]
H A Devp_lib.c68 if (c->cipher->set_asn1_parameters != NULL)
69 ret = c->cipher->set_asn1_parameters(c, type);
70 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1)
81 if (c->cipher->get_asn1_parameters != NULL)
82 ret = c->cipher->get_asn1_parameters(c, type);
83 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1)
120 /* Convert the various cipher NIDs and dummies to a proper OID NID */
187 return ctx->cipher->block_size;
192 return ctx->cipher;
195 unsigned long EVP_CIPHER_flags(const EVP_CIPHER *cipher) argument
210 EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) argument
215 EVP_CIPHER_key_length(const EVP_CIPHER *cipher) argument
[all...]
H A Devp_test.c141 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c),
228 static int test_cipher(const char *cipher, const unsigned char *key, int kn, argument
235 c = EVP_get_cipherbyname(cipher);
339 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use
348 char *cipher; local
358 cipher = sstrsep(&p, ":");
376 (cipher, key, kn, iv, in, plaintext, pn, ciphertext, cn, encdec)
377 && !test_digest(cipher, plaintext, pn, ciphertext, cn)) {
379 if (strstr(cipher, "AES") == cipher) {
[all...]
H A Dp5_crpt.c106 ASN1_TYPE *param, const EVP_CIPHER *cipher,
155 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp));
156 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher));
157 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16);
158 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)),
159 EVP_CIPHER_iv_length(cipher));
160 EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de);
105 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
H A Devp_pbe.c69 /* Setup a cipher context from a PBE algorithm */
73 const EVP_CIPHER *cipher; member in struct:__anon65
105 i = (*pbetmp->keygen) (ctx, pass, passlen, param, pbetmp->cipher,
123 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument
141 if (pbe_tmp->cipher == cipher
159 pbe_tmp->cipher = cipher;
H A Devp_enc.c74 ctx->cipher->do_cipher(ctx,out,in,inl)
87 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
90 if (cipher)
92 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc);
120 int EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
123 return EVP_CipherInit(ctx, cipher, key, iv, 1);
126 int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
130 return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 1);
133 int EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
136 return EVP_CipherInit(ctx, cipher, ke
139 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
[all...]
H A Dbio_enc.c86 EVP_CIPHER_CTX cipher; member in struct:enc_struct
95 BIO_TYPE_CIPHER, "cipher",
118 EVP_CIPHER_CTX_init(&ctx->cipher);
139 EVP_CIPHER_CTX_cleanup(&(b->cipher));
194 i = EVP_CipherFinal_ex(&(ctx->cipher),
204 EVP_CipherUpdate(&(ctx->cipher),
263 EVP_CipherUpdate(&(ctx->cipher),
301 EVP_CipherInit_ex(&(ctx->cipher), NULL, NULL, NULL, NULL,
302 ctx->cipher.encrypt);
333 ret = EVP_CipherFinal_ex(&(ctx->cipher),
[all...]
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Daes-wrap.c28 * @cipher: Wrapped key, (n + 1) * 64 bits
31 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument
37 a = cipher;
38 r = cipher + 8;
56 r = cipher + 8;
71 * These are already in @cipher due to the location of temporary
H A Daes-unwrap.c27 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
31 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument
38 os_memcpy(a, cipher, 8);
40 os_memcpy(r, cipher + 8, 8 * n);
/freebsd-9.3-release/crypto/openssh/regress/
H A Ddhgex.sh14 cipher="$1"; shift
18 opts="-oKexAlgorithms=$kex -oCiphers=$cipher"
20 verbose "$tid bits $bits $kex $cipher"
50 check 3072 `${SSH} -Q cipher | grep 128`
52 check 7680 `${SSH} -Q cipher | grep 192`
53 check 8192 `${SSH} -Q cipher | grep 256`
H A Dtry-ciphers.sh6 for c in `${SSH} -Q cipher`; do
9 trace "proto 2 cipher $c mac $m"
10 verbose "test $tid: proto 2 cipher $c mac $m"
13 fail "ssh -2 failed with mac $m cipher $c"
17 if ssh -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
26 trace "proto 1 cipher $c"
27 verbose "test $tid: proto 1 cipher $c"
30 fail "ssh -1 failed with cipher $c"
/freebsd-9.3-release/crypto/openssl/crypto/asn1/
H A Dx_pkey.c82 ret->cipher.cipher =
85 if (ret->cipher.cipher == NULL) {
97 memcpy(ret->cipher.iv,
100 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
117 ret->cipher.cipher = NULL;
118 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
/freebsd-9.3-release/crypto/openssh/
H A Dcipher.c1 /* $OpenBSD: cipher.c,v 1.97 2014/02/07 06:55:54 djm Exp $ */
51 #include "cipher.h"
164 * Default is cipher block size, except for chacha20+poly1305 that
235 debug("bad cipher %s [%s]", p, names);
246 * Parses the name of the cipher. Returns the number of the corresponding
247 * cipher, or -1 on error.
270 cipher_init(CipherContext *cc, const Cipher *cipher, argument
283 if (cipher->number == SSH_CIPHER_DES) {
292 cc->plaintext = (cipher->number == SSH_CIPHER_NONE);
295 if (keylen < cipher
441 cipher_set_key_string(CipherContext *cc, const Cipher *cipher, const char *passphrase, int do_encrypt) argument
[all...]
/freebsd-9.3-release/sys/dev/random/
H A Dhash.h37 cipherInstance cipher; /* Rijndael internal */ member in struct:yarrowkey
H A Dhash.c69 rijndael_cipherInit(&context->cipher, MODE_CBC, NULL);
79 rijndael_blockEncrypt(&context->cipher, &context->key, d_in,
/freebsd-9.3-release/sys/crypto/rijndael/
H A Drijndael-api-fst.c71 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument
73 cipher->mode = mode;
78 memcpy(cipher->IV, IV, RIJNDAEL_MAX_IV_SIZE);
80 memset(cipher->IV, 0, RIJNDAEL_MAX_IV_SIZE);
85 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument
90 if (cipher == NULL ||
101 switch (cipher->mode) {
112 memcpy(block, cipher->IV, 16);
119 ((u_int32_t*)block)[0] = ((u_int32_t*)cipher->IV)[0] ^ ((u_int32_t*)input)[0];
120 ((u_int32_t*)block)[1] = ((u_int32_t*)cipher
200 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument
263 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument
362 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/
H A Dp12_p8e.c64 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument
78 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
H A Dp12_crpt.c89 ASN1_TYPE *param, const EVP_CIPHER *cipher,
118 iter, EVP_CIPHER_key_length(cipher), key, md)) {
124 iter, EVP_CIPHER_iv_length(cipher), iv, md)) {
130 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de);
88 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
/freebsd-9.3-release/crypto/openssl/apps/
H A Denc.c115 const EVP_CIPHER *cipher = NULL, *c; local
142 cipher = EVP_get_cipherbyname(pname);
143 if (!base64 && (cipher == NULL) && (strcmp(pname, "enc") != 0)) {
144 BIO_printf(bio_err, "%s is an unknown cipher\n", pname);
252 cipher = c;
254 cipher = NULL;
383 if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) {
388 OBJ_nid2ln(EVP_CIPHER_nid(cipher)),
442 if (cipher != NULL) {
490 EVP_BytesToKey(cipher, dgs
[all...]
/freebsd-9.3-release/secure/lib/libssh/
H A DMakefile9 canohost.c channels.c cipher.c cipher-aes.c \
10 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \
19 kexc25519.c kexc25519c.c poly1305.c chacha.c cipher-chachapoly.c \
/freebsd-9.3-release/crypto/openssl/ssl/
H A Dd1_enc.c163 else if (EVP_CIPHER_block_size(ds->cipher) > 1) {
164 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher))
191 bs = EVP_CIPHER_block_size(ds->cipher);
216 ds->buf_len, ds->cipher->key_len, (unsigned long)DES_KEY_SZ,
217 (unsigned long)DES_SCHEDULE_SZ, ds->cipher->iv_len);
219 for (i = 0; i < ds->cipher->iv_len; i++)

Completed in 233 milliseconds

1234567