/freebsd-11-stable/lib/libutil/ |
H A D | login_crypt.c | 39 const char *cipher; local 41 cipher = login_getcapstr(lc, "passwd_format", def, NULL); 44 "passwd_format = %s\n", cipher); 45 if (cipher == NULL) 47 if (!crypt_set_format(cipher)) 49 return (cipher);
|
/freebsd-11-stable/sys/opencrypto/ |
H A D | skipjack.h | 20 extern void skipjack_forwards(u_int8_t *plain, u_int8_t *cipher, u_int8_t **key); 21 extern void skipjack_backwards(u_int8_t *cipher, u_int8_t *plain, u_int8_t **key);
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | dhgex.sh | 15 cipher="$1"; shift 20 echo "Ciphers=$cipher" >> $OBJ/sshd_proxy 22 opts="-oKexAlgorithms=$kex -oCiphers=$cipher" 26 verbose "$tid bits $bits $kex $cipher" 56 check 3072 `${SSH} -Q cipher | grep 128` 58 check 7680 `${SSH} -Q cipher | grep 192` 59 check 8192 `${SSH} -Q cipher | grep 256`
|
H A D | try-ciphers.sh | 8 for c in `${SSH} -Q cipher`; do 11 trace "proto 2 cipher $c mac $m" 12 verbose "test $tid: proto 2 cipher $c mac $m" 18 fail "ssh -2 failed with mac $m cipher $c" 22 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then 35 trace "proto 1 cipher $c" 36 verbose "test $tid: proto 1 cipher $c" 39 fail "ssh -1 failed with cipher $c"
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | evp_enc.c | 76 # define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl) 84 /* ctx->cipher=NULL; */ 95 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 98 if (cipher) 100 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc); 103 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 121 if (ctx->engine && ctx->cipher && (!cipher || 122 (cipher 123 && (cipher 295 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 301 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument 308 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 314 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument [all...] |
H A D | evp_lib.c | 72 if (c->cipher->set_asn1_parameters != NULL) 73 ret = c->cipher->set_asn1_parameters(c, type); 74 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) { 100 if (c->cipher->get_asn1_parameters != NULL) 101 ret = c->cipher->get_asn1_parameters(c, type); 102 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) { 154 /* Convert the various cipher NIDs and dummies to a proper OID NID */ 221 return ctx->cipher->block_size; 227 return ctx->cipher->do_cipher(ctx, out, in, inl); 232 return ctx->cipher; 235 EVP_CIPHER_flags(const EVP_CIPHER *cipher) argument 265 EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) argument 275 EVP_CIPHER_key_length(const EVP_CIPHER *cipher) argument 285 EVP_CIPHER_nid(const EVP_CIPHER *cipher) argument 334 evp_get_fips_cipher(const EVP_CIPHER *cipher) argument [all...] |
H A D | p5_crpt.c | 75 ASN1_TYPE *param, const EVP_CIPHER *cipher, 135 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); 136 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 137 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); 138 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), 139 EVP_CIPHER_iv_length(cipher)); 140 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de)) 74 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | evp_test.c | 145 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c), 379 static int test_cipher(const char *cipher, const unsigned char *key, int kn, argument 388 c = EVP_get_cipherbyname(cipher); 493 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use 502 char *cipher; local 514 cipher = sstrsep(&p, ":"); 549 (cipher, key, kn, iv, in, plaintext, pn, ciphertext, cn, aad, an, 551 && !test_digest(cipher, plaintext, pn, ciphertext, cn)) { 553 if (strstr(cipher, "AES") == cipher) { [all...] |
H A D | bio_enc.c | 86 EVP_CIPHER_CTX cipher; member in struct:enc_struct 95 BIO_TYPE_CIPHER, "cipher", 118 EVP_CIPHER_CTX_init(&ctx->cipher); 139 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 194 i = EVP_CipherFinal_ex(&(ctx->cipher), 204 if (!EVP_CipherUpdate(&ctx->cipher, 268 if (!EVP_CipherUpdate(&ctx->cipher, 310 EVP_CipherInit_ex(&(ctx->cipher), NULL, NULL, NULL, NULL, 311 ctx->cipher.encrypt); 342 ret = EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | aes-wrap.c | 23 * @cipher: Wrapped key, (n + 1) * 64 bits 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 33 a = cipher; 34 r = cipher + 8; 52 r = cipher + 8; 71 * These are already in @cipher due to the location of temporary
|
H A D | aes-unwrap.c | 22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 35 os_memcpy(a, cipher, 8); 37 os_memcpy(r, cipher + 8, 8 * n);
|
/freebsd-11-stable/tests/sys/geom/class/eli/ |
H A D | conf.sh | 17 # Execute `func` for each combination of cipher, sectorsize, and hmac algo 19 # func <cipher> <aalgo> <secsize> 38 for cipher in aes-xts:128 aes-xts:256 \ 41 ealgo=${cipher%%:*} 42 keylen=${cipher##*:} 46 ${func} $cipher $aalgo $secsize 53 # Execute `func` for each combination of cipher, and sectorsize, with no hmac 55 # func <cipher> <secsize> 62 for cipher in aes-xts:128 aes-xts:256 \ 65 ealgo=${cipher [all...] |
H A D | onetime_test.sh | 7 cipher=$1 9 ealgo=${cipher%%:*} 10 keylen=${cipher##*:} 54 cipher=$1 57 ealgo=${cipher%%:*} 58 keylen=${cipher##*:}
|
/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | x_pkey.c | 82 ret->cipher.cipher = 85 if (ret->cipher.cipher == NULL) { 97 memcpy(ret->cipher.iv, 100 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH); 121 ret->cipher.cipher = NULL; 122 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
|
H A D | p5_pbev2.c | 90 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, 100 alg_nid = EVP_CIPHER_type(cipher); 118 if (EVP_CIPHER_iv_length(cipher)) { 120 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher)); 121 else if (RAND_bytes(iv, EVP_CIPHER_iv_length(cipher)) <= 0) 128 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0)) 136 * If prf NID unspecified see if cipher has a preference. An error is OK 149 keylen = EVP_CIPHER_key_length(cipher); 194 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 197 return PKCS5_pbe2_set_iv(cipher, ite [all...] |
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_crpt.c | 71 ASN1_TYPE *param, const EVP_CIPHER *cipher, 80 if (cipher == NULL) 103 iter, EVP_CIPHER_key_length(cipher), key, md)) { 109 iter, EVP_CIPHER_iv_length(cipher), iv, md)) { 115 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de); 70 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | p12_p8e.c | 64 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument 78 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); 80 pbe = PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, pbe_nid);
|
/freebsd-11-stable/crypto/openssh/ |
H A D | cipher.c | 1 /* $OpenBSD: cipher.c,v 1.102 2016/08/03 05:41:57 djm Exp $ */ 46 #include "cipher.h" 66 const struct sshcipher *cipher; member in struct:sshcipher_ctx 198 * Default is cipher block size, except for chacha20+poly1305 that 226 return cc->cipher->number; 286 * Parses the name of the cipher. Returns the number of the corresponding 287 * cipher, or -1 on error. 312 if (cc == NULL || cc->cipher == NULL) 314 if (cc->cipher->number == SSH_CIPHER_DES) 321 cipher_init(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, argument 543 cipher_set_key_string(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, const char *passphrase, int do_encrypt) argument [all...] |
/freebsd-11-stable/sys/crypto/rijndael/ |
H A D | rijndael-api-fst.c | 72 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument 74 cipher->mode = mode; 79 memcpy(cipher->IV, IV, RIJNDAEL_MAX_IV_SIZE); 81 memset(cipher->IV, 0, RIJNDAEL_MAX_IV_SIZE); 86 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument 91 if (cipher == NULL || 102 switch (cipher->mode) { 113 memcpy(block, cipher->IV, 16); 120 ((u_int32_t*)block)[0] = ((u_int32_t*)cipher->IV)[0] ^ ((u_int32_t*)input)[0]; 121 ((u_int32_t*)block)[1] = ((u_int32_t*)cipher 201 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, const BYTE *input, int inputOctets, BYTE *outBuffer) argument 264 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, const BYTE *input, int inputLen, BYTE *outBuffer) argument 363 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, const BYTE *input, int inputOctets, BYTE *outBuffer) argument [all...] |
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost89.h | 46 void gost_enc(gost_ctx * ctx, const byte * clear, byte * cipher, int blocks); 48 void gost_dec(gost_ctx * ctx, const byte * cipher, byte * clear, int blocks); 51 byte * cipher, int blocks); 53 void gost_dec_cfb(gost_ctx * ctx, const byte * iv, const byte * cipher,
|
H A D | gost_eng.c | 22 /* Symmetric cipher and digest function registrar */ 24 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 182 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 186 if (!cipher) { 192 *cipher = &cipher_gost; 194 *cipher = &cipher_gost_cpacnt; 197 *cipher = NULL;
|
/freebsd-11-stable/sys/dev/random/ |
H A D | hash.h | 32 /* Keys are formed from cipher blocks */ 48 cipherInstance cipher; /* Rijndael internal */ member in struct:randomdev_key
|
/freebsd-11-stable/tools/tools/crypto/ |
H A D | cryptocheck.c | 77 * blkcipher Run all block cipher tests 99 * <block cipher>+<hmac> 129 int cipher; member in struct:alg 143 { .name = "aes-cbc", .cipher = CRYPTO_AES_CBC, .type = T_BLKCIPHER, 145 { .name = "aes-cbc192", .cipher = CRYPTO_AES_CBC, .type = T_BLKCIPHER, 147 { .name = "aes-cbc256", .cipher = CRYPTO_AES_CBC, .type = T_BLKCIPHER, 149 { .name = "aes-ctr", .cipher = CRYPTO_AES_ICM, .type = T_BLKCIPHER, 151 { .name = "aes-ctr192", .cipher = CRYPTO_AES_ICM, .type = T_BLKCIPHER, 153 { .name = "aes-ctr256", .cipher = CRYPTO_AES_ICM, .type = T_BLKCIPHER, 155 { .name = "aes-xts", .cipher 194 build_authenc(struct alg *cipher, struct alg *hmac) argument 215 struct alg *cipher, *hmac; local 440 openssl_cipher(struct alg *alg, const EVP_CIPHER *cipher, const char *key, const char *iv, const char *input, char *output, size_t size, int enc) argument 519 const EVP_CIPHER *cipher; local 675 const EVP_CIPHER *cipher; local 793 openssl_gcm_encrypt(struct alg *alg, const EVP_CIPHER *cipher, const char *key, const char *iv, const char *aad, size_t aad_len, const char *input, char *output, size_t size, char *tag) argument 889 openssl_gcm_decrypt(struct alg *alg, const EVP_CIPHER *cipher, const char *key, const char *iv, const char *aad, size_t aad_len, const char *input, char *output, size_t size, char *tag) argument 935 const EVP_CIPHER *cipher; local 1070 struct alg *authenc, *cipher, *hmac; local [all...] |
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | enc.c | 92 const EVP_CIPHER *cipher; local 98 cipher = EVP_get_cipherbyname(name->name); 99 if (cipher == NULL || 100 (EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) != 0 || 101 EVP_CIPHER_mode(cipher) == EVP_CIPH_XTS_MODE) 134 const EVP_CIPHER *cipher = NULL, *c; local 165 cipher = EVP_get_cipherbyname(pname); 167 if (!do_zlib && !base64 && (cipher == NULL) 170 if (!base64 && (cipher == NULL) && (strcmp(pname, "enc") != 0)) 173 BIO_printf(bio_err, "%s is an unknown cipher\ [all...] |
/freebsd-11-stable/secure/lib/libssh/ |
H A D | Makefile | 11 canohost.c channels.c cipher.c cipher-aes.c cipher-aesctr.c \ 12 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \ 20 poly1305.c chacha.c cipher-chachapoly.c \
|