Searched refs:cipher (Results 1 - 25 of 197) sorted by relevance

12345678

/freebsd-11-stable/lib/libutil/
H A Dlogin_crypt.c39 const char *cipher; local
41 cipher = login_getcapstr(lc, "passwd_format", def, NULL);
44 "passwd_format = %s\n", cipher);
45 if (cipher == NULL)
47 if (!crypt_set_format(cipher))
49 return (cipher);
/freebsd-11-stable/sys/opencrypto/
H A Dskipjack.h20 extern void skipjack_forwards(u_int8_t *plain, u_int8_t *cipher, u_int8_t **key);
21 extern void skipjack_backwards(u_int8_t *cipher, u_int8_t *plain, u_int8_t **key);
/freebsd-11-stable/crypto/openssh/regress/
H A Ddhgex.sh15 cipher="$1"; shift
20 echo "Ciphers=$cipher" >> $OBJ/sshd_proxy
22 opts="-oKexAlgorithms=$kex -oCiphers=$cipher"
26 verbose "$tid bits $bits $kex $cipher"
56 check 3072 `${SSH} -Q cipher | grep 128`
58 check 7680 `${SSH} -Q cipher | grep 192`
59 check 8192 `${SSH} -Q cipher | grep 256`
H A Dtry-ciphers.sh8 for c in `${SSH} -Q cipher`; do
11 trace "proto 2 cipher $c mac $m"
12 verbose "test $tid: proto 2 cipher $c mac $m"
18 fail "ssh -2 failed with mac $m cipher $c"
22 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
35 trace "proto 1 cipher $c"
36 verbose "test $tid: proto 1 cipher $c"
39 fail "ssh -1 failed with cipher $c"
/freebsd-11-stable/crypto/openssl/crypto/evp/
H A Devp_enc.c76 # define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl)
84 /* ctx->cipher=NULL; */
95 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
98 if (cipher)
100 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc);
103 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
121 if (ctx->engine && ctx->cipher && (!cipher ||
122 (cipher
123 && (cipher
295 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument
301 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
308 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument
314 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
[all...]
H A Devp_lib.c72 if (c->cipher->set_asn1_parameters != NULL)
73 ret = c->cipher->set_asn1_parameters(c, type);
74 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) {
100 if (c->cipher->get_asn1_parameters != NULL)
101 ret = c->cipher->get_asn1_parameters(c, type);
102 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) {
154 /* Convert the various cipher NIDs and dummies to a proper OID NID */
221 return ctx->cipher->block_size;
227 return ctx->cipher->do_cipher(ctx, out, in, inl);
232 return ctx->cipher;
235 EVP_CIPHER_flags(const EVP_CIPHER *cipher) argument
265 EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) argument
275 EVP_CIPHER_key_length(const EVP_CIPHER *cipher) argument
285 EVP_CIPHER_nid(const EVP_CIPHER *cipher) argument
334 evp_get_fips_cipher(const EVP_CIPHER *cipher) argument
[all...]
H A Dp5_crpt.c75 ASN1_TYPE *param, const EVP_CIPHER *cipher,
135 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp));
136 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher));
137 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16);
138 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)),
139 EVP_CIPHER_iv_length(cipher));
140 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de))
74 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
H A Devp_test.c145 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c),
379 static int test_cipher(const char *cipher, const unsigned char *key, int kn, argument
388 c = EVP_get_cipherbyname(cipher);
493 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use
502 char *cipher; local
514 cipher = sstrsep(&p, ":");
549 (cipher, key, kn, iv, in, plaintext, pn, ciphertext, cn, aad, an,
551 && !test_digest(cipher, plaintext, pn, ciphertext, cn)) {
553 if (strstr(cipher, "AES") == cipher) {
[all...]
H A Dbio_enc.c86 EVP_CIPHER_CTX cipher; member in struct:enc_struct
95 BIO_TYPE_CIPHER, "cipher",
118 EVP_CIPHER_CTX_init(&ctx->cipher);
139 EVP_CIPHER_CTX_cleanup(&(b->cipher));
194 i = EVP_CipherFinal_ex(&(ctx->cipher),
204 if (!EVP_CipherUpdate(&ctx->cipher,
268 if (!EVP_CipherUpdate(&ctx->cipher,
310 EVP_CipherInit_ex(&(ctx->cipher), NULL, NULL, NULL, NULL,
311 ctx->cipher.encrypt);
342 ret = EVP_CipherFinal_ex(&(ctx->cipher),
[all...]
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Daes-wrap.c23 * @cipher: Wrapped key, (n + 1) * 64 bits
26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument
33 a = cipher;
34 r = cipher + 8;
52 r = cipher + 8;
71 * These are already in @cipher due to the location of temporary
H A Daes-unwrap.c22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
35 os_memcpy(a, cipher, 8);
37 os_memcpy(r, cipher + 8, 8 * n);
/freebsd-11-stable/tests/sys/geom/class/eli/
H A Dconf.sh17 # Execute `func` for each combination of cipher, sectorsize, and hmac algo
19 # func <cipher> <aalgo> <secsize>
38 for cipher in aes-xts:128 aes-xts:256 \
41 ealgo=${cipher%%:*}
42 keylen=${cipher##*:}
46 ${func} $cipher $aalgo $secsize
53 # Execute `func` for each combination of cipher, and sectorsize, with no hmac
55 # func <cipher> <secsize>
62 for cipher in aes-xts:128 aes-xts:256 \
65 ealgo=${cipher
[all...]
H A Donetime_test.sh7 cipher=$1
9 ealgo=${cipher%%:*}
10 keylen=${cipher##*:}
54 cipher=$1
57 ealgo=${cipher%%:*}
58 keylen=${cipher##*:}
/freebsd-11-stable/crypto/openssl/crypto/asn1/
H A Dx_pkey.c82 ret->cipher.cipher =
85 if (ret->cipher.cipher == NULL) {
97 memcpy(ret->cipher.iv,
100 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
121 ret->cipher.cipher = NULL;
122 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
H A Dp5_pbev2.c90 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
100 alg_nid = EVP_CIPHER_type(cipher);
118 if (EVP_CIPHER_iv_length(cipher)) {
120 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher));
121 else if (RAND_bytes(iv, EVP_CIPHER_iv_length(cipher)) <= 0)
128 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0))
136 * If prf NID unspecified see if cipher has a preference. An error is OK
149 keylen = EVP_CIPHER_key_length(cipher);
194 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
197 return PKCS5_pbe2_set_iv(cipher, ite
[all...]
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/
H A Dp12_crpt.c71 ASN1_TYPE *param, const EVP_CIPHER *cipher,
80 if (cipher == NULL)
103 iter, EVP_CIPHER_key_length(cipher), key, md)) {
109 iter, EVP_CIPHER_iv_length(cipher), iv, md)) {
115 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de);
70 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
H A Dp12_p8e.c64 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument
78 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
80 pbe = PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, pbe_nid);
/freebsd-11-stable/crypto/openssh/
H A Dcipher.c1 /* $OpenBSD: cipher.c,v 1.102 2016/08/03 05:41:57 djm Exp $ */
46 #include "cipher.h"
66 const struct sshcipher *cipher; member in struct:sshcipher_ctx
198 * Default is cipher block size, except for chacha20+poly1305 that
226 return cc->cipher->number;
286 * Parses the name of the cipher. Returns the number of the corresponding
287 * cipher, or -1 on error.
312 if (cc == NULL || cc->cipher == NULL)
314 if (cc->cipher->number == SSH_CIPHER_DES)
321 cipher_init(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, argument
543 cipher_set_key_string(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, const char *passphrase, int do_encrypt) argument
[all...]
/freebsd-11-stable/sys/crypto/rijndael/
H A Drijndael-api-fst.c72 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument
74 cipher->mode = mode;
79 memcpy(cipher->IV, IV, RIJNDAEL_MAX_IV_SIZE);
81 memset(cipher->IV, 0, RIJNDAEL_MAX_IV_SIZE);
86 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument
91 if (cipher == NULL ||
102 switch (cipher->mode) {
113 memcpy(block, cipher->IV, 16);
120 ((u_int32_t*)block)[0] = ((u_int32_t*)cipher->IV)[0] ^ ((u_int32_t*)input)[0];
121 ((u_int32_t*)block)[1] = ((u_int32_t*)cipher
201 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, const BYTE *input, int inputOctets, BYTE *outBuffer) argument
264 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, const BYTE *input, int inputLen, BYTE *outBuffer) argument
363 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, const BYTE *input, int inputOctets, BYTE *outBuffer) argument
[all...]
/freebsd-11-stable/crypto/openssl/engines/ccgost/
H A Dgost89.h46 void gost_enc(gost_ctx * ctx, const byte * clear, byte * cipher, int blocks);
48 void gost_dec(gost_ctx * ctx, const byte * cipher, byte * clear, int blocks);
51 byte * cipher, int blocks);
53 void gost_dec_cfb(gost_ctx * ctx, const byte * iv, const byte * cipher,
H A Dgost_eng.c22 /* Symmetric cipher and digest function registrar */
24 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
182 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument
186 if (!cipher) {
192 *cipher = &cipher_gost;
194 *cipher = &cipher_gost_cpacnt;
197 *cipher = NULL;
/freebsd-11-stable/sys/dev/random/
H A Dhash.h32 /* Keys are formed from cipher blocks */
48 cipherInstance cipher; /* Rijndael internal */ member in struct:randomdev_key
/freebsd-11-stable/tools/tools/crypto/
H A Dcryptocheck.c77 * blkcipher Run all block cipher tests
99 * <block cipher>+<hmac>
129 int cipher; member in struct:alg
143 { .name = "aes-cbc", .cipher = CRYPTO_AES_CBC, .type = T_BLKCIPHER,
145 { .name = "aes-cbc192", .cipher = CRYPTO_AES_CBC, .type = T_BLKCIPHER,
147 { .name = "aes-cbc256", .cipher = CRYPTO_AES_CBC, .type = T_BLKCIPHER,
149 { .name = "aes-ctr", .cipher = CRYPTO_AES_ICM, .type = T_BLKCIPHER,
151 { .name = "aes-ctr192", .cipher = CRYPTO_AES_ICM, .type = T_BLKCIPHER,
153 { .name = "aes-ctr256", .cipher = CRYPTO_AES_ICM, .type = T_BLKCIPHER,
155 { .name = "aes-xts", .cipher
194 build_authenc(struct alg *cipher, struct alg *hmac) argument
215 struct alg *cipher, *hmac; local
440 openssl_cipher(struct alg *alg, const EVP_CIPHER *cipher, const char *key, const char *iv, const char *input, char *output, size_t size, int enc) argument
519 const EVP_CIPHER *cipher; local
675 const EVP_CIPHER *cipher; local
793 openssl_gcm_encrypt(struct alg *alg, const EVP_CIPHER *cipher, const char *key, const char *iv, const char *aad, size_t aad_len, const char *input, char *output, size_t size, char *tag) argument
889 openssl_gcm_decrypt(struct alg *alg, const EVP_CIPHER *cipher, const char *key, const char *iv, const char *aad, size_t aad_len, const char *input, char *output, size_t size, char *tag) argument
935 const EVP_CIPHER *cipher; local
1070 struct alg *authenc, *cipher, *hmac; local
[all...]
/freebsd-11-stable/crypto/openssl/apps/
H A Denc.c92 const EVP_CIPHER *cipher; local
98 cipher = EVP_get_cipherbyname(name->name);
99 if (cipher == NULL ||
100 (EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) != 0 ||
101 EVP_CIPHER_mode(cipher) == EVP_CIPH_XTS_MODE)
134 const EVP_CIPHER *cipher = NULL, *c; local
165 cipher = EVP_get_cipherbyname(pname);
167 if (!do_zlib && !base64 && (cipher == NULL)
170 if (!base64 && (cipher == NULL) && (strcmp(pname, "enc") != 0))
173 BIO_printf(bio_err, "%s is an unknown cipher\
[all...]
/freebsd-11-stable/secure/lib/libssh/
H A DMakefile11 canohost.c channels.c cipher.c cipher-aes.c cipher-aesctr.c \
12 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \
20 poly1305.c chacha.c cipher-chachapoly.c \

Completed in 313 milliseconds

12345678