/freebsd-11-stable/contrib/netbsd-tests/crypto/opencrypto/ |
H A D | h_aesctr1.c | 220 cs.cipher = CRYPTO_AES_CTR;
|
H A D | h_aesctr2.c | 62 cs.cipher = CRYPTO_AES_CTR;
|
H A D | h_arc4.c | 58 cs.cipher = CRYPTO_ARC4;
|
H A D | h_camellia.c | 64 cs.cipher = CRYPTO_CAMELLIA_CBC;
|
H A D | h_cbcdes.c | 59 cs.cipher = CRYPTO_DES_CBC;
|
H A D | h_gcm.c | 68 cs.cipher = CRYPTO_AES_GCM_16;
|
H A D | h_null.c | 54 cs.cipher = CRYPTO_NULL_CBC;
|
/freebsd-11-stable/contrib/ntp/util/ |
H A D | ntp-keygen.c | 183 const EVP_CIPHER * cipher = NULL; variable 570 cipher = EVP_get_cipherbyname(ciphername); 571 if (cipher == NULL) { 572 fprintf(stderr, "Unknown cipher %s\n", ciphername); 691 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0, 757 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0, 813 PEM_write_PKCS8PrivateKey(stdout, pkey, cipher, NULL, 0, 1030 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NULL, 0, NULL, 1082 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NULL, 0, NULL, 1250 PEM_write_PKCS8PrivateKey(str, pkey, cipher, NUL [all...] |
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | aes-unwrap.c | 22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 35 os_memcpy(a, cipher, 8); 37 os_memcpy(r, cipher + 8, 8 * n);
|
H A D | aes-wrap.c | 23 * @cipher: Wrapped key, (n + 1) * 64 bits 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 33 a = cipher; 34 r = cipher + 8; 52 r = cipher + 8; 71 * These are already in @cipher due to the location of temporary
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 178 struct crypto_cipher *cipher; local 193 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 194 if (cipher == NULL) { 195 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 199 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 201 crypto_cipher_deinit(cipher); 204 crypto_cipher_deinit(cipher); 213 struct crypto_cipher *cipher; local 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 229 if (cipher [all...] |
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_common.h | 218 tls_cipher cipher; member in struct:tls_cipher_suite 228 tls_cipher cipher; member in struct:tls_cipher_data 251 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 252 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
H A D | tlsv1_record.c | 20 * tlsv1_record_set_cipher_suite - TLS record layer: Set cipher suite 22 * @cipher_suite: New cipher suite 25 * This function is used to prepare TLS record layer for cipher suite change. 36 wpa_printf(MSG_DEBUG, "TLSv1: Selected cipher suite: 0x%04x", 55 data = tls_get_cipher_data(suite->cipher); 68 * tlsv1_record_change_write_cipher - TLS record layer: Change write cipher 70 * Returns: 0 on success (cipher changed), -1 on failure 72 * This function changes TLS record layer to use the new cipher suite 77 wpa_printf(MSG_DEBUG, "TLSv1: Record Layer - New write cipher suite " 92 "cipher"); [all...] |
/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | cfx.c | 1171 krb5_data cipher; local 1287 &cipher); 1293 assert(sizeof(*token) + cipher.length == wrapped_len); 1302 ret = rrc_rotate(cipher.data, cipher.length, rrc+padlength, FALSE); 1304 ret = rrc_rotate(cipher.data, cipher.length, rrc, FALSE); 1311 memcpy(p, cipher.data, cipher.length); 1312 krb5_data_free(&cipher); [all...] |
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 2127 const struct hx509cipher *cipher; member in struct:hx509_crypto_data 2381 const struct hx509cipher *cipher; local 2383 cipher = find_cipher_by_name(name); 2384 if (cipher == NULL) 2386 return cipher->oid; 2395 const struct hx509cipher *cipher; local 2399 cipher = find_cipher_by_oid(enctype); 2400 if (cipher == NULL) { 2413 (*crypto)->cipher = cipher; 3092 const struct hx509cipher *cipher; local [all...] |
H A D | ks_file.c | 75 const void *cipher, 113 EVP_Cipher(&ctx, clear.data, cipher, len); 177 const EVP_CIPHER *cipher; local 231 cipher = EVP_get_cipherbyname(type); 232 if (cipher == NULL) { 236 "unsupported cipher: %s", 249 if (ssize < 0 || ssize < PKCS5_SALT_LEN || ssize < EVP_CIPHER_iv_length(cipher)) { 266 ret = try_decrypt(context, c, ai, cipher, ivdata, 287 ret = try_decrypt(context, c, ai, cipher, ivdata, password, 68 try_decrypt(hx509_context context, struct hx509_collector *collector, const AlgorithmIdentifier *alg, const EVP_CIPHER *c, const void *ivdata, const void *password, size_t passwordlen, const void *cipher, size_t len) argument
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | aes-test.c | 289 krb5_data *cipher, 300 cipher->data, 301 cipher->length, 363 errx(1, "cipher len wrong"); 428 krb5_data *cipher, 436 p = cipher->data; 437 len = cipher->length; 524 krb5_data *cipher, 535 e.ciphertext = *cipher; 553 if (len != cipher 286 krb_enc(krb5_context context, krb5_crypto crypto, unsigned usage, krb5_data *cipher, krb5_data *clear) argument 425 krb_enc_iov(krb5_context context, krb5_crypto crypto, unsigned usage, krb5_data *cipher, krb5_data *clear) argument 520 krb_enc_mit(krb5_context context, krb5_enctype enctype, krb5_keyblock *key, unsigned usage, krb5_data *cipher, krb5_data *clear) argument 595 krb5_data cipher, plain; local [all...] |
H A D | build_ap_req.c | 65 ap.authenticator.cipher = authenticator;
|
H A D | crypto.c | 1793 return krb5_encrypt(context, crypto, usage, data, len, &result->cipher); 1835 e->cipher.data, e->cipher.length, result);
|
H A D | get_for_creds.c | 412 cred.enc_part.cipher.data = buf; 413 cred.enc_part.cipher.length = buf_size;
|
H A D | mk_priv.c | 96 krb5_data_zero (&s.enc_part.cipher); 119 &s.enc_part.cipher); 134 krb5_data_free (&s.enc_part.cipher); 151 krb5_data_free (&s.enc_part.cipher);
|
H A D | mk_rep.c | 111 &ap.enc_part.cipher);
|
H A D | rd_cred.c | 101 enc_krb_cred_part_data.length = cred.enc_part.cipher.length; 102 enc_krb_cred_part_data.data = cred.enc_part.cipher.data; 155 if (enc_krb_cred_part_data.data != cred.enc_part.cipher.data)
|
/freebsd-11-stable/crypto/openssh/ |
H A D | cipher.c | 1 /* $OpenBSD: cipher.c,v 1.102 2016/08/03 05:41:57 djm Exp $ */ 46 #include "cipher.h" 66 const struct sshcipher *cipher; member in struct:sshcipher_ctx 198 * Default is cipher block size, except for chacha20+poly1305 that 226 return cc->cipher->number; 286 * Parses the name of the cipher. Returns the number of the corresponding 287 * cipher, or -1 on error. 312 if (cc == NULL || cc->cipher == NULL) 314 if (cc->cipher->number == SSH_CIPHER_DES) 321 cipher_init(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, argument 543 cipher_set_key_string(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, const char *passphrase, int do_encrypt) argument [all...] |
H A D | kex.c | 43 #include "cipher.h" 657 if ((enc->cipher = cipher_by_name(name)) == NULL) { 664 enc->iv_len = cipher_ivlen(enc->cipher); 666 enc->key_len = cipher_keylen(enc->cipher); 667 enc->block_size = cipher_blocksize(enc->cipher); 835 authlen = cipher_authlen(newkeys->enc.cipher); 850 debug("kex: %s cipher: %s MAC: %s compression: %s", 863 dh_need = MAXIMUM(dh_need, cipher_seclen(newkeys->enc.cipher));
|