Searched refs:cipher (Results 1 - 25 of 197) sorted by path

12345678

/freebsd-11-stable/contrib/netbsd-tests/crypto/opencrypto/
H A Dh_aesctr1.c220 cs.cipher = CRYPTO_AES_CTR;
H A Dh_aesctr2.c62 cs.cipher = CRYPTO_AES_CTR;
H A Dh_arc4.c58 cs.cipher = CRYPTO_ARC4;
H A Dh_camellia.c64 cs.cipher = CRYPTO_CAMELLIA_CBC;
H A Dh_cbcdes.c59 cs.cipher = CRYPTO_DES_CBC;
H A Dh_gcm.c68 cs.cipher = CRYPTO_AES_GCM_16;
H A Dh_null.c54 cs.cipher = CRYPTO_NULL_CBC;
/freebsd-11-stable/contrib/ntp/util/
H A Dntp-keygen.c183 const EVP_CIPHER * cipher = NULL; variable
570 cipher = EVP_get_cipherbyname(ciphername);
571 if (cipher == NULL) {
572 fprintf(stderr, "Unknown cipher %s\n", ciphername);
691 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0,
757 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0,
813 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0,
1030 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NULL, 0, NULL,
1082 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NULL, 0, NULL,
1250 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NUL
[all...]
/freebsd-11-stable/contrib/wpa/src/crypto/
H A Daes-unwrap.c22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
35 os_memcpy(a, cipher, 8);
37 os_memcpy(r, cipher + 8, 8 * n);
H A Daes-wrap.c23 * @cipher: Wrapped key, (n + 1) * 64 bits
26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument
33 a = cipher;
34 r = cipher + 8;
52 r = cipher + 8;
71 * These are already in @cipher due to the location of temporary
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Dikev2_common.c178 struct crypto_cipher *cipher; local
193 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
194 if (cipher == NULL) {
195 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
199 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
201 crypto_cipher_deinit(cipher);
204 crypto_cipher_deinit(cipher);
213 struct crypto_cipher *cipher; local
228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
229 if (cipher
[all...]
/freebsd-11-stable/contrib/wpa/src/tls/
H A Dtlsv1_common.h218 tls_cipher cipher; member in struct:tls_cipher_suite
228 tls_cipher cipher; member in struct:tls_cipher_data
251 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
252 int tls_server_key_exchange_allowed(tls_cipher cipher);
H A Dtlsv1_record.c20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite
22 * @cipher_suite: New cipher suite
25 * This function is used to prepare TLS record layer for cipher suite change.
36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x",
55 data = tls_get_cipher_data(suite->cipher);
68 * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher
70 * Returns: 0 on success (cipher changed), -1 on failure
72 * This function changes TLS record layer to use the new cipher suite
77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite "
92 "cipher");
[all...]
/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/
H A Dcfx.c1171 krb5_data cipher; local
1287 &cipher);
1293 assert(sizeof(*token) + cipher.length == wrapped_len);
1302 ret = rrc_rotate(cipher.data, cipher.length, rrc+padlength, FALSE);
1304 ret = rrc_rotate(cipher.data, cipher.length, rrc, FALSE);
1311 memcpy(p, cipher.data, cipher.length);
1312 krb5_data_free(&cipher);
[all...]
/freebsd-11-stable/crypto/heimdal/lib/hx509/
H A Dcrypto.c2127 const struct hx509cipher *cipher; member in struct:hx509_crypto_data
2381 const struct hx509cipher *cipher; local
2383 cipher = find_cipher_by_name(name);
2384 if (cipher == NULL)
2386 return cipher->oid;
2395 const struct hx509cipher *cipher; local
2399 cipher = find_cipher_by_oid(enctype);
2400 if (cipher == NULL) {
2413 (*crypto)->cipher = cipher;
3092 const struct hx509cipher *cipher; local
[all...]
H A Dks_file.c75 const void *cipher,
113 EVP_Cipher(&ctx, clear.data, cipher, len);
177 const EVP_CIPHER *cipher; local
231 cipher = EVP_get_cipherbyname(type);
232 if (cipher == NULL) {
236 "unsupported cipher: %s",
249 if (ssize < 0 || ssize < PKCS5_SALT_LEN || ssize < EVP_CIPHER_iv_length(cipher)) {
266 ret = try_decrypt(context, c, ai, cipher, ivdata,
287 ret = try_decrypt(context, c, ai, cipher, ivdata, password,
68 try_decrypt(hx509_context context, struct hx509_collector *collector, const AlgorithmIdentifier *alg, const EVP_CIPHER *c, const void *ivdata, const void *password, size_t passwordlen, const void *cipher, size_t len) argument
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Daes-test.c289 krb5_data *cipher,
300 cipher->data,
301 cipher->length,
363 errx(1, "cipher len wrong");
428 krb5_data *cipher,
436 p = cipher->data;
437 len = cipher->length;
524 krb5_data *cipher,
535 e.ciphertext = *cipher;
553 if (len != cipher
286 krb_enc(krb5_context context, krb5_crypto crypto, unsigned usage, krb5_data *cipher, krb5_data *clear) argument
425 krb_enc_iov(krb5_context context, krb5_crypto crypto, unsigned usage, krb5_data *cipher, krb5_data *clear) argument
520 krb_enc_mit(krb5_context context, krb5_enctype enctype, krb5_keyblock *key, unsigned usage, krb5_data *cipher, krb5_data *clear) argument
595 krb5_data cipher, plain; local
[all...]
H A Dbuild_ap_req.c65 ap.authenticator.cipher = authenticator;
H A Dcrypto.c1793 return krb5_encrypt(context, crypto, usage, data, len, &result->cipher);
1835 e->cipher.data, e->cipher.length, result);
H A Dget_for_creds.c412 cred.enc_part.cipher.data = buf;
413 cred.enc_part.cipher.length = buf_size;
H A Dmk_priv.c96 krb5_data_zero (&s.enc_part.cipher);
119 &s.enc_part.cipher);
134 krb5_data_free (&s.enc_part.cipher);
151 krb5_data_free (&s.enc_part.cipher);
H A Dmk_rep.c111 &ap.enc_part.cipher);
H A Drd_cred.c101 enc_krb_cred_part_data.length = cred.enc_part.cipher.length;
102 enc_krb_cred_part_data.data = cred.enc_part.cipher.data;
155 if (enc_krb_cred_part_data.data != cred.enc_part.cipher.data)
/freebsd-11-stable/crypto/openssh/
H A Dcipher.c1 /* $OpenBSD: cipher.c,v 1.102 2016/08/03 05:41:57 djm Exp $ */
46 #include "cipher.h"
66 const struct sshcipher *cipher; member in struct:sshcipher_ctx
198 * Default is cipher block size, except for chacha20+poly1305 that
226 return cc->cipher->number;
286 * Parses the name of the cipher. Returns the number of the corresponding
287 * cipher, or -1 on error.
312 if (cc == NULL || cc->cipher == NULL)
314 if (cc->cipher->number == SSH_CIPHER_DES)
321 cipher_init(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, argument
543 cipher_set_key_string(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, const char *passphrase, int do_encrypt) argument
[all...]
H A Dkex.c43 #include "cipher.h"
657 if ((enc->cipher = cipher_by_name(name)) == NULL) {
664 enc->iv_len = cipher_ivlen(enc->cipher);
666 enc->key_len = cipher_keylen(enc->cipher);
667 enc->block_size = cipher_blocksize(enc->cipher);
835 authlen = cipher_authlen(newkeys->enc.cipher);
850 debug("kex: %s cipher: %s MAC: %s compression: %s",
863 dh_need = MAXIMUM(dh_need, cipher_seclen(newkeys->enc.cipher));

Completed in 212 milliseconds

12345678