/freebsd-11-stable/contrib/unbound/util/ |
H A D | net_help.c | 96 * @param evp_ctx: the evp cipher context, function sets this. 948 /* if we have sha256, set the cipher list to have no known vulns */ 950 log_crypto_err("could not set cipher list with SSL_CTX_set_cipher_list"); 1477 const EVP_CIPHER *cipher; variable 1482 cipher = EVP_aes_256_cbc(); 1483 evp_cipher_length = EVP_CIPHER_iv_length(cipher); 1492 if (EVP_EncryptInit_ex(evp_sctx, cipher, NULL, ticket_keys->aes_key, iv) != 1) { 1550 if (EVP_DecryptInit_ex(evp_sctx, cipher, NULL, key->aes_key, iv) != 1) {
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | s3_lib.c | 120 * ECC cipher suite support in OpenSSL originally written by 3483 const SSL_CIPHER *cipher; local 3486 cipher = s->s3->tmp.new_cipher; 3487 if (!cipher) 3493 if (cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP)) 4102 fprintf(stderr, "Unknown cipher ID %x\n", (p[0] << 8) | p[1]); 4230 * if we are considering an ECC cipher suite that uses an ephemeral 4362 * ECDSA certs can be used with RSA cipher suites as well so we don't
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | evp_enc.c | 76 # define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl) 84 /* ctx->cipher=NULL; */ 95 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 98 if (cipher) 100 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc); 103 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 121 if (ctx->engine && ctx->cipher && (!cipher || 122 (cipher 123 && (cipher 295 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 301 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument 308 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 314 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument [all...] |
H A D | evp.h | 336 /* Values for cipher flags */ 351 /* Set if variable length cipher */ 353 /* Set if the iv handling should be done by the cipher itself */ 355 /* Set if the cipher's init() function should be called if key is NULL */ 357 /* Call ctrl() to init cipher parameters */ 363 /* cipher handles random key generation */ 365 /* cipher has its own additional copying logic */ 373 /* Allow non FIPS cipher in FIPS mode */ 411 * AEAD cipher deduces payload length and returns number of bytes required to 445 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 450 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
/freebsd-11-stable/sys/opencrypto/ |
H A D | cryptodev.h | 182 #define CRYPTO_AES_NIST_GMAC 24 /* cipher side */ 210 u_int32_t cipher; /* ie. CRYPTO_DES_CBC */ member in struct:session_op 213 u_int32_t keylen; /* cipher key */ 222 u_int32_t cipher; /* ie. CRYPTO_DES_CBC */ member in struct:session2_op 225 u_int32_t keylen; /* cipher key */
|
H A D | cryptodev.c | 78 u_int32_t cipher; member in struct:session_op32 88 u_int32_t cipher; member in struct:session2_op32 155 CP(*from, *to, cipher); 177 CP(*from, *to, cipher); 275 u_int32_t cipher; member in struct:csession 413 switch (sop->cipher) { 454 CRYPTDEB("invalid cipher"); 515 CRYPTDEB("invalid cipher parameters"); 583 cria.cri_key, cria.cri_klen, sop->cipher, sop->mac, txform, 755 switch (cse->cipher) { 1378 csecreate(struct fcrypt *fcr, u_int64_t sid, caddr_t key, u_int64_t keylen, caddr_t mackey, u_int64_t mackeylen, u_int32_t cipher, u_int32_t mac, struct enc_xform *txform, struct auth_hash *thash) argument [all...] |
/freebsd-11-stable/contrib/apr-util/crypto/ |
H A D | apr_crypto_openssl.c | 68 const EVP_CIPHER * cipher; member in struct:apr_crypto_key_t 378 /* determine the cipher to be used */ 385 key->cipher = EVP_des_ede3_cbc(); 388 key->cipher = EVP_des_ede3_ecb(); 395 key->cipher = EVP_aes_128_cbc(); 398 key->cipher = EVP_aes_128_ecb(); 405 key->cipher = EVP_aes_192_cbc(); 408 key->cipher = EVP_aes_192_ecb(); 415 key->cipher = EVP_aes_256_cbc(); 418 key->cipher [all...] |
/freebsd-11-stable/sys/dev/urtwn/ |
H A D | if_urtwn.c | 1055 uint8_t rate, cipher; local 1064 cipher = MS(rxdw0, R92C_RXDW0_CIPHER); 1115 cipher != R92C_CAM_ALGO_NONE) { 2293 /* Map net80211 cipher to HW crypto algorithm. */ 2308 device_printf(sc->sc_dev, "%s: undefined cipher %d\n", 3093 uint8_t cipher; local 3098 cipher = R92C_TXDW1_CIPHER_RC4; 3101 cipher = R92C_TXDW1_CIPHER_AES; 3104 device_printf(sc->sc_dev, "%s: unknown cipher %d\n", 3109 txd->txdw1 |= htole32(SM(R92C_TXDW1_CIPHER, cipher)); 3137 uint8_t cipher, ridx, type; local [all...] |
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-esp.c | 150 * Initialize the cipher by calling EVP_CipherInit_ex(), because 151 * calling EVP_CipherInit() will reset the cipher context, clearing 152 * the cipher, so calling it twice, with the second call having a 153 * null cipher, will clear the already-set cipher. EVP_CipherInit_ex(), 154 * however, won't reset the cipher context, so you can use it to specify 156 * to set the cipher and the key. 161 set_cipher_parameters(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 165 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc); 169 * Initialize the cipher b 173 set_cipher_parameters(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv, int enc) argument [all...] |
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | s_server.c | 113 * ECC cipher suite support in OpenSSL originally developed by 574 " -cipher arg - play with 'openssl ciphers' to see what goes here\n"); 575 BIO_printf(bio_err, " -serverpref - Use server's cipher preferences\n"); 1810 if (cipher == NULL) 1811 cipher = getenv("SSL_CIPHER");
|
/freebsd-11-stable/sys/dev/cxgbe/crypto/ |
H A D | t4_crypto.c | 105 * For block cipher replies, the updated IV is supplied in data[2] and 188 * 'sg_dsgl' is used to describe the destination that cipher 793 * before the cipher/plain text, not after. This is true of 816 * The output buffer consists of the cipher text followed by 865 * cipher/plain text. For decryption requests the hash is 866 * appended after the cipher text. 916 * Any auth-only data before the cipher region is marked as AAD. 917 * Auth-data that overlaps with the cipher region is placed in 1095 * For encryption requests, crd should be the cipher request 1137 * AAD is only permitted before the cipher/plai 1883 struct cryptoini *c, *hash, *cipher; local [all...] |
/freebsd-11-stable/sys/dev/if_ndis/ |
H A D | if_ndis.c | 2210 ndis_set_cipher(struct ndis_softc *sc, int cipher) argument 2218 if (cipher == WPA_CSE_WEP40 || cipher == WPA_CSE_WEP104) { 2224 if (cipher == WPA_CSE_TKIP) { 2230 if (cipher == WPA_CSE_CCMP) { 2236 DPRINTF(("Setting cipher to %d\n", arg)); 2243 /* Check that the cipher was set correctly. */ 2290 /* Skip over the ucast cipher OIDs. */ 2321 /* First, set up the multicast group cipher. */ 3132 * cipher ye [all...] |
/freebsd-11-stable/sys/dev/otus/ |
H A D | if_otusreg.h | 325 uint16_t cipher; member in struct:ar_cmd_ekey
|
H A D | if_otus.c | 2887 uint16_t cipher; local 2900 /* Map net80211 cipher to hardware. */ 2903 cipher = AR_CIPHER_WEP64; 2906 cipher = AR_CIPHER_WEP128; 2909 cipher = AR_CIPHER_TKIP; 2912 cipher = AR_CIPHER_AES; 2917 key.cipher = htole16(cipher);
|
/freebsd-11-stable/sys/dev/usb/wlan/ |
H A D | if_zydreg.h | 1064 uint8_t cipher; member in struct:zyd_rx_stat
|
H A D | if_run.c | 2229 u_int cipher = k->wk_cipher->ic_cipher; local 2242 /* map net80211 cipher to RT2860 security mode */ 2243 switch (cipher) { 2276 if (cipher == IEEE80211_CIPHER_TKIP) { 2292 if (cipher == IEEE80211_CIPHER_WEP) { 2296 if (cipher == IEEE80211_CIPHER_TKIP) {
|
H A D | if_rum.c | 1283 * Map net80211 cipher to RT2573 security mode. 1286 rum_crypto_mode(struct rum_softc *sc, u_int cipher, int keylen) argument 1288 switch (cipher) { 1296 device_printf(sc->sc_dev, "unknown cipher %d\n", cipher); 1417 u_int cipher; local 1422 cipher = k->wk_cipher->ic_cipher; 1424 mode = rum_crypto_mode(sc, cipher, k->wk_keylen); 1439 if (cipher == IEEE80211_CIPHER_TKIP) 2862 /* Set cipher mod [all...] |
H A D | if_rsu.c | 1291 /* Map net80211 cipher to HW crypto algorithm. */ 2199 cipher = R92S_TXDW1_CIPHER_WEP; 2202 cipher = R92S_TXDW1_CIPHER_TKIP; 2205 cipher = R92S_TXDW1_CIPHER_AES; 2208 cipher = R92S_TXDW1_CIPHER_NONE; 2211 SM(R92S_TXDW1_CIPHER, cipher) |
|
/freebsd-11-stable/sys/net80211/ |
H A D | ieee80211_crypto.c | 54 * Table of registered cipher modules. 171 * This is useful especially for the cipher test modules. 190 * Register a crypto cipher module. 196 printf("%s: cipher %s has an invalid cipher index %u\n", 201 printf("%s: cipher %s registered with a different template\n", 209 * Unregister a crypto cipher module. 215 printf("%s: cipher %s has an invalid cipher index %u\n", 220 printf("%s: cipher 230 ieee80211_crypto_available(u_int cipher) argument 262 ieee80211_crypto_newkey(struct ieee80211vap *vap, int cipher, int flags, struct ieee80211_key *key) argument [all...] |
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpas_glue.c | 236 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local 239 wpa_s->pairwise_cipher = cipher; 241 wpa_s->group_cipher = cipher;
|
H A D | mesh.c | 75 int cipher; local 102 cipher = wpa_pick_pairwise_cipher(ssid->pairwise_cipher, 0); 103 if (cipher < 0 || cipher == WPA_CIPHER_TKIP) { 104 wpa_msg(wpa_s, MSG_INFO, "mesh: Invalid pairwise cipher"); 108 conf->pairwise_cipher = cipher; 110 cipher = wpa_pick_group_cipher(ssid->group_cipher); 111 if (cipher < 0 || cipher == WPA_CIPHER_TKIP || 112 cipher [all...] |
H A D | ctrl_iface.c | 2570 static char * wpa_supplicant_cipher_txt(char *pos, char *end, int cipher) argument 2577 ret = wpa_write_ciphers(pos, end, cipher, "+");
|
H A D | config.c | 1087 wpa_printf(MSG_ERROR, "Line %d: invalid cipher '%s'.", 1092 wpa_printf(MSG_ERROR, "Line %d: no cipher values configured.", 1102 static char * wpa_config_write_cipher(int cipher) argument 1111 if (wpa_write_ciphers(buf, buf + 50, cipher, " ") < 0) { 1131 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher " 1169 wpa_printf(MSG_ERROR, "Line %d: not allowed group cipher " 1203 "Line %d: not allowed group management cipher (0x%x).",
|
H A D | ap.c | 467 int cipher = WPA_CIPHER_NONE; local 471 cipher = bss->default_wep_key_len >= 13 ? 473 bss->wpa_group = cipher; 474 bss->wpa_pairwise = cipher; 475 bss->rsn_pairwise = cipher; 477 int cipher = WPA_CIPHER_WEP40; local 479 cipher = WPA_CIPHER_WEP104; 481 bss->wpa_group = cipher; 482 bss->wpa_pairwise = cipher; 483 bss->rsn_pairwise = cipher; [all...] |
H A D | Android.mk | 1126 OBJS += src/crypto/crypto_internal-cipher.c
|