/freebsd-9.3-release/crypto/openssl/demos/ssltest-ecc/ |
H A D | ssltest.sh | 2 # Tests ECC cipher suites using ssltest. Requires one argument which could 60 # Anonymous cipher suites do not require key or certificate files 66 for cipher in $AECDH_CIPHER_LIST 68 echo "Testing $cipher" 69 $SSLTEST $SSL_VERSION -cert $SERVER_PEM -cipher $cipher 76 -named_curve $curve -cipher AECDH-NULL-SHA 83 -named_curve $curve -cipher AECDH-RC4-SHA 88 # Both ECDH-ECDSA and ECDHE-ECDSA cipher suites require 95 for cipher i [all...] |
/freebsd-9.3-release/lib/libutil/ |
H A D | login_crypt.c | 39 const char *cipher; local 41 cipher = login_getcapstr(lc, "passwd_format", def, NULL); 44 "passwd_format = %s\n", cipher); 45 if (cipher == NULL) 47 if (!crypt_set_format(cipher)) 49 return (cipher);
|
/freebsd-9.3-release/crypto/openssl/test/ |
H A D | testenc | 10 $cmd enc < $test > $test.cipher 11 $cmd enc < $test.cipher >$test.clear 17 /bin/rm $test.cipher $test.clear 20 $cmd enc -a -e < $test > $test.cipher 21 $cmd enc -a -d < $test.cipher >$test.clear 27 /bin/rm $test.cipher $test.clear 30 for i in `$cmd list-cipher-commands` 33 $cmd $i -bufsize 113 -e -k test < $test > $test.$i.cipher 34 $cmd $i -bufsize 157 -d -k test < $test.$i.cipher >$test.$i.clear 40 /bin/rm $test.$i.cipher [all...] |
/freebsd-9.3-release/sys/opencrypto/ |
H A D | skipjack.h | 17 extern void skipjack_forwards(u_int8_t *plain, u_int8_t *cipher, u_int8_t **key); 18 extern void skipjack_backwards(u_int8_t *cipher, u_int8_t *plain, u_int8_t **key);
|
/freebsd-9.3-release/crypto/openssl/crypto/evp/ |
H A D | enc_min.c | 75 /* ctx->cipher=NULL; */ 196 /* We'll use the ENGINE's private cipher definition */ 199 * Store the ENGINE functional reference so we know 'cipher' came 212 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 226 ctx->cipher = &bad_cipher; 237 if (ctx->engine && ctx->cipher && (!cipher || 238 (cipher 239 && (cipher->nid == 240 ctx->cipher 407 EVP_CIPHER_nid(const EVP_CIPHER *cipher) argument [all...] |
H A D | evp_lib.c | 68 if (c->cipher->set_asn1_parameters != NULL) 69 ret = c->cipher->set_asn1_parameters(c, type); 70 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) 81 if (c->cipher->get_asn1_parameters != NULL) 82 ret = c->cipher->get_asn1_parameters(c, type); 83 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) 120 /* Convert the various cipher NIDs and dummies to a proper OID NID */ 187 return ctx->cipher->block_size; 192 return ctx->cipher; 195 unsigned long EVP_CIPHER_flags(const EVP_CIPHER *cipher) argument 210 EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) argument 215 EVP_CIPHER_key_length(const EVP_CIPHER *cipher) argument [all...] |
H A D | evp_test.c | 141 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c), 228 static int test_cipher(const char *cipher, const unsigned char *key, int kn, argument 235 c = EVP_get_cipherbyname(cipher); 339 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use 348 char *cipher; local 358 cipher = sstrsep(&p, ":"); 376 (cipher, key, kn, iv, in, plaintext, pn, ciphertext, cn, encdec) 377 && !test_digest(cipher, plaintext, pn, ciphertext, cn)) { 379 if (strstr(cipher, "AES") == cipher) { [all...] |
H A D | p5_crpt.c | 106 ASN1_TYPE *param, const EVP_CIPHER *cipher, 155 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); 156 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 157 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); 158 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), 159 EVP_CIPHER_iv_length(cipher)); 160 EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de); 105 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | evp_pbe.c | 69 /* Setup a cipher context from a PBE algorithm */ 73 const EVP_CIPHER *cipher; member in struct:__anon65 105 i = (*pbetmp->keygen) (ctx, pass, passlen, param, pbetmp->cipher, 123 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument 141 if (pbe_tmp->cipher == cipher 159 pbe_tmp->cipher = cipher;
|
H A D | evp_enc.c | 74 ctx->cipher->do_cipher(ctx,out,in,inl) 87 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 90 if (cipher) 92 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc); 120 int EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 123 return EVP_CipherInit(ctx, cipher, key, iv, 1); 126 int EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 130 return EVP_CipherInit_ex(ctx, cipher, impl, key, iv, 1); 133 int EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 136 return EVP_CipherInit(ctx, cipher, ke 139 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument [all...] |
H A D | bio_enc.c | 86 EVP_CIPHER_CTX cipher; member in struct:enc_struct 95 BIO_TYPE_CIPHER, "cipher", 118 EVP_CIPHER_CTX_init(&ctx->cipher); 139 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 194 i = EVP_CipherFinal_ex(&(ctx->cipher), 204 EVP_CipherUpdate(&(ctx->cipher), 263 EVP_CipherUpdate(&(ctx->cipher), 301 EVP_CipherInit_ex(&(ctx->cipher), NULL, NULL, NULL, NULL, 302 ctx->cipher.encrypt); 333 ret = EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | aes-wrap.c | 28 * @cipher: Wrapped key, (n + 1) * 64 bits 31 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument 37 a = cipher; 38 r = cipher + 8; 56 r = cipher + 8; 71 * These are already in @cipher due to the location of temporary
|
H A D | aes-unwrap.c | 27 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 31 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 38 os_memcpy(a, cipher, 8); 40 os_memcpy(r, cipher + 8, 8 * n);
|
/freebsd-9.3-release/crypto/openssh/regress/ |
H A D | dhgex.sh | 14 cipher="$1"; shift 18 opts="-oKexAlgorithms=$kex -oCiphers=$cipher" 20 verbose "$tid bits $bits $kex $cipher" 50 check 3072 `${SSH} -Q cipher | grep 128` 52 check 7680 `${SSH} -Q cipher | grep 192` 53 check 8192 `${SSH} -Q cipher | grep 256`
|
H A D | try-ciphers.sh | 6 for c in `${SSH} -Q cipher`; do 9 trace "proto 2 cipher $c mac $m" 10 verbose "test $tid: proto 2 cipher $c mac $m" 13 fail "ssh -2 failed with mac $m cipher $c" 17 if ssh -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then 26 trace "proto 1 cipher $c" 27 verbose "test $tid: proto 1 cipher $c" 30 fail "ssh -1 failed with cipher $c"
|
/freebsd-9.3-release/crypto/openssl/crypto/asn1/ |
H A D | x_pkey.c | 82 ret->cipher.cipher = 85 if (ret->cipher.cipher == NULL) { 97 memcpy(ret->cipher.iv, 100 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH); 117 ret->cipher.cipher = NULL; 118 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | cipher.c | 1 /* $OpenBSD: cipher.c,v 1.97 2014/02/07 06:55:54 djm Exp $ */ 51 #include "cipher.h" 164 * Default is cipher block size, except for chacha20+poly1305 that 235 debug("bad cipher %s [%s]", p, names); 246 * Parses the name of the cipher. Returns the number of the corresponding 247 * cipher, or -1 on error. 270 cipher_init(CipherContext *cc, const Cipher *cipher, argument 283 if (cipher->number == SSH_CIPHER_DES) { 292 cc->plaintext = (cipher->number == SSH_CIPHER_NONE); 295 if (keylen < cipher 441 cipher_set_key_string(CipherContext *cc, const Cipher *cipher, const char *passphrase, int do_encrypt) argument [all...] |
/freebsd-9.3-release/sys/dev/random/ |
H A D | hash.h | 37 cipherInstance cipher; /* Rijndael internal */ member in struct:yarrowkey
|
H A D | hash.c | 69 rijndael_cipherInit(&context->cipher, MODE_CBC, NULL); 79 rijndael_blockEncrypt(&context->cipher, &context->key, d_in,
|
/freebsd-9.3-release/sys/crypto/rijndael/ |
H A D | rijndael-api-fst.c | 71 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument 73 cipher->mode = mode; 78 memcpy(cipher->IV, IV, RIJNDAEL_MAX_IV_SIZE); 80 memset(cipher->IV, 0, RIJNDAEL_MAX_IV_SIZE); 85 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument 90 if (cipher == NULL || 101 switch (cipher->mode) { 112 memcpy(block, cipher->IV, 16); 119 ((u_int32_t*)block)[0] = ((u_int32_t*)cipher->IV)[0] ^ ((u_int32_t*)input)[0]; 120 ((u_int32_t*)block)[1] = ((u_int32_t*)cipher 200 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument 263 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument 362 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_p8e.c | 64 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument 78 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
|
H A D | p12_crpt.c | 89 ASN1_TYPE *param, const EVP_CIPHER *cipher, 118 iter, EVP_CIPHER_key_length(cipher), key, md)) { 124 iter, EVP_CIPHER_iv_length(cipher), iv, md)) { 130 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de); 88 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | enc.c | 115 const EVP_CIPHER *cipher = NULL, *c; local 142 cipher = EVP_get_cipherbyname(pname); 143 if (!base64 && (cipher == NULL) && (strcmp(pname, "enc") != 0)) { 144 BIO_printf(bio_err, "%s is an unknown cipher\n", pname); 252 cipher = c; 254 cipher = NULL; 383 if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) { 388 OBJ_nid2ln(EVP_CIPHER_nid(cipher)), 442 if (cipher != NULL) { 490 EVP_BytesToKey(cipher, dgs [all...] |
/freebsd-9.3-release/secure/lib/libssh/ |
H A D | Makefile | 9 canohost.c channels.c cipher.c cipher-aes.c \ 10 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \ 19 kexc25519.c kexc25519c.c poly1305.c chacha.c cipher-chachapoly.c \
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | d1_enc.c | 163 else if (EVP_CIPHER_block_size(ds->cipher) > 1) { 164 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) 191 bs = EVP_CIPHER_block_size(ds->cipher); 216 ds->buf_len, ds->cipher->key_len, (unsigned long)DES_KEY_SZ, 217 (unsigned long)DES_SCHEDULE_SZ, ds->cipher->iv_len); 219 for (i = 0; i < ds->cipher->iv_len; i++)
|