Searched refs:cipher (Results 1 - 25 of 197) sorted by last modified time

12345678

/freebsd-11-stable/contrib/unbound/util/
H A Dnet_help.c96 * @param evp_ctx: the evp cipher context, function sets this.
948 /* if we have sha256, set the cipher list to have no known vulns */
950 log_crypto_err("could not set cipher list with SSL_CTX_set_cipher_list");
1477 const EVP_CIPHER *cipher; variable
1482 cipher = EVP_aes_256_cbc();
1483 evp_cipher_length = EVP_CIPHER_iv_length(cipher);
1492 if (EVP_EncryptInit_ex(evp_sctx, cipher, NULL, ticket_keys->aes_key, iv) != 1) {
1550 if (EVP_DecryptInit_ex(evp_sctx, cipher, NULL, key->aes_key, iv) != 1) {
/freebsd-11-stable/crypto/openssl/ssl/
H A Ds3_lib.c120 * ECC cipher suite support in OpenSSL originally written by
3483 const SSL_CIPHER *cipher; local
3486 cipher = s->s3->tmp.new_cipher;
3487 if (!cipher)
3493 if (cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP))
4102 fprintf(stderr, "Unknown cipher ID %x\n", (p[0] << 8) | p[1]);
4230 * if we are considering an ECC cipher suite that uses an ephemeral
4362 * ECDSA certs can be used with RSA cipher suites as well so we don't
/freebsd-11-stable/crypto/openssl/crypto/evp/
H A Devp_enc.c76 # define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl)
84 /* ctx->cipher=NULL; */
95 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
98 if (cipher)
100 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc);
103 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
121 if (ctx->engine && ctx->cipher && (!cipher ||
122 (cipher
123 && (cipher
295 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument
301 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
308 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument
314 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
[all...]
H A Devp.h336 /* Values for cipher flags */
351 /* Set if variable length cipher */
353 /* Set if the iv handling should be done by the cipher itself */
355 /* Set if the cipher's init() function should be called if key is NULL */
357 /* Call ctrl() to init cipher parameters */
363 /* cipher handles random key generation */
365 /* cipher has its own additional copying logic */
373 /* Allow non FIPS cipher in FIPS mode */
411 * AEAD cipher deduces payload length and returns number of bytes required to
445 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
450 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
[all...]
/freebsd-11-stable/sys/opencrypto/
H A Dcryptodev.h182 #define CRYPTO_AES_NIST_GMAC 24 /* cipher side */
210 u_int32_t cipher; /* ie. CRYPTO_DES_CBC */ member in struct:session_op
213 u_int32_t keylen; /* cipher key */
222 u_int32_t cipher; /* ie. CRYPTO_DES_CBC */ member in struct:session2_op
225 u_int32_t keylen; /* cipher key */
H A Dcryptodev.c78 u_int32_t cipher; member in struct:session_op32
88 u_int32_t cipher; member in struct:session2_op32
155 CP(*from, *to, cipher);
177 CP(*from, *to, cipher);
275 u_int32_t cipher; member in struct:csession
413 switch (sop->cipher) {
454 CRYPTDEB("invalid cipher");
515 CRYPTDEB("invalid cipher parameters");
583 cria.cri_key, cria.cri_klen, sop->cipher, sop->mac, txform,
755 switch (cse->cipher) {
1378 csecreate(struct fcrypt *fcr, u_int64_t sid, caddr_t key, u_int64_t keylen, caddr_t mackey, u_int64_t mackeylen, u_int32_t cipher, u_int32_t mac, struct enc_xform *txform, struct auth_hash *thash) argument
[all...]
/freebsd-11-stable/contrib/apr-util/crypto/
H A Dapr_crypto_openssl.c68 const EVP_CIPHER * cipher; member in struct:apr_crypto_key_t
378 /* determine the cipher to be used */
385 key->cipher = EVP_des_ede3_cbc();
388 key->cipher = EVP_des_ede3_ecb();
395 key->cipher = EVP_aes_128_cbc();
398 key->cipher = EVP_aes_128_ecb();
405 key->cipher = EVP_aes_192_cbc();
408 key->cipher = EVP_aes_192_ecb();
415 key->cipher = EVP_aes_256_cbc();
418 key->cipher
[all...]
/freebsd-11-stable/sys/dev/urtwn/
H A Dif_urtwn.c1055 uint8_t rate, cipher; local
1064 cipher = MS(rxdw0, R92C_RXDW0_CIPHER);
1115 cipher != R92C_CAM_ALGO_NONE) {
2293 /* Map net80211 cipher to HW crypto algorithm. */
2308 device_printf(sc->sc_dev, "%s: undefined cipher %d\n",
3093 uint8_t cipher; local
3098 cipher = R92C_TXDW1_CIPHER_RC4;
3101 cipher = R92C_TXDW1_CIPHER_AES;
3104 device_printf(sc->sc_dev, "%s: unknown cipher %d\n",
3109 txd->txdw1 |= htole32(SM(R92C_TXDW1_CIPHER, cipher));
3137 uint8_t cipher, ridx, type; local
[all...]
/freebsd-11-stable/contrib/tcpdump/
H A Dprint-esp.c150 * Initialize the cipher by calling EVP_CipherInit_ex(), because
151 * calling EVP_CipherInit() will reset the cipher context, clearing
152 * the cipher, so calling it twice, with the second call having a
153 * null cipher, will clear the already-set cipher. EVP_CipherInit_ex(),
154 * however, won't reset the cipher context, so you can use it to specify
156 * to set the cipher and the key.
161 set_cipher_parameters(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
165 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc);
169 * Initialize the cipher b
173 set_cipher_parameters(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv, int enc) argument
[all...]
/freebsd-11-stable/crypto/openssl/apps/
H A Ds_server.c113 * ECC cipher suite support in OpenSSL originally developed by
574 " -cipher arg - play with 'openssl ciphers' to see what goes here\n");
575 BIO_printf(bio_err, " -serverpref - Use server's cipher preferences\n");
1810 if (cipher == NULL)
1811 cipher = getenv("SSL_CIPHER");
/freebsd-11-stable/sys/dev/cxgbe/crypto/
H A Dt4_crypto.c105 * For block cipher replies, the updated IV is supplied in data[2] and
188 * 'sg_dsgl' is used to describe the destination that cipher
793 * before the cipher/plain text, not after. This is true of
816 * The output buffer consists of the cipher text followed by
865 * cipher/plain text. For decryption requests the hash is
866 * appended after the cipher text.
916 * Any auth-only data before the cipher region is marked as AAD.
917 * Auth-data that overlaps with the cipher region is placed in
1095 * For encryption requests, crd should be the cipher request
1137 * AAD is only permitted before the cipher/plai
1883 struct cryptoini *c, *hash, *cipher; local
[all...]
/freebsd-11-stable/sys/dev/if_ndis/
H A Dif_ndis.c2210 ndis_set_cipher(struct ndis_softc *sc, int cipher) argument
2218 if (cipher == WPA_CSE_WEP40 || cipher == WPA_CSE_WEP104) {
2224 if (cipher == WPA_CSE_TKIP) {
2230 if (cipher == WPA_CSE_CCMP) {
2236 DPRINTF(("Setting cipher to %d\n", arg));
2243 /* Check that the cipher was set correctly. */
2290 /* Skip over the ucast cipher OIDs. */
2321 /* First, set up the multicast group cipher. */
3132 * cipher ye
[all...]
/freebsd-11-stable/sys/dev/otus/
H A Dif_otusreg.h325 uint16_t cipher; member in struct:ar_cmd_ekey
H A Dif_otus.c2887 uint16_t cipher; local
2900 /* Map net80211 cipher to hardware. */
2903 cipher = AR_CIPHER_WEP64;
2906 cipher = AR_CIPHER_WEP128;
2909 cipher = AR_CIPHER_TKIP;
2912 cipher = AR_CIPHER_AES;
2917 key.cipher = htole16(cipher);
/freebsd-11-stable/sys/dev/usb/wlan/
H A Dif_zydreg.h1064 uint8_t cipher; member in struct:zyd_rx_stat
H A Dif_run.c2229 u_int cipher = k->wk_cipher->ic_cipher; local
2242 /* map net80211 cipher to RT2860 security mode */
2243 switch (cipher) {
2276 if (cipher == IEEE80211_CIPHER_TKIP) {
2292 if (cipher == IEEE80211_CIPHER_WEP) {
2296 if (cipher == IEEE80211_CIPHER_TKIP) {
H A Dif_rum.c1283 * Map net80211 cipher to RT2573 security mode.
1286 rum_crypto_mode(struct rum_softc *sc, u_int cipher, int keylen) argument
1288 switch (cipher) {
1296 device_printf(sc->sc_dev, "unknown cipher %d\n", cipher);
1417 u_int cipher; local
1422 cipher = k->wk_cipher->ic_cipher;
1424 mode = rum_crypto_mode(sc, cipher, k->wk_keylen);
1439 if (cipher == IEEE80211_CIPHER_TKIP)
2862 /* Set cipher mod
[all...]
H A Dif_rsu.c1291 /* Map net80211 cipher to HW crypto algorithm. */
2199 cipher = R92S_TXDW1_CIPHER_WEP;
2202 cipher = R92S_TXDW1_CIPHER_TKIP;
2205 cipher = R92S_TXDW1_CIPHER_AES;
2208 cipher = R92S_TXDW1_CIPHER_NONE;
2211 SM(R92S_TXDW1_CIPHER, cipher) |
/freebsd-11-stable/sys/net80211/
H A Dieee80211_crypto.c54 * Table of registered cipher modules.
171 * This is useful especially for the cipher test modules.
190 * Register a crypto cipher module.
196 printf("%s: cipher %s has an invalid cipher index %u\n",
201 printf("%s: cipher %s registered with a different template\n",
209 * Unregister a crypto cipher module.
215 printf("%s: cipher %s has an invalid cipher index %u\n",
220 printf("%s: cipher
230 ieee80211_crypto_available(u_int cipher) argument
262 ieee80211_crypto_newkey(struct ieee80211vap *vap, int cipher, int flags, struct ieee80211_key *key) argument
[all...]
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dwpas_glue.c236 int cipher = (keylen == 5) ? WPA_CIPHER_WEP40 : local
239 wpa_s->pairwise_cipher = cipher;
241 wpa_s->group_cipher = cipher;
H A Dmesh.c75 int cipher; local
102 cipher = wpa_pick_pairwise_cipher(ssid->pairwise_cipher, 0);
103 if (cipher < 0 || cipher == WPA_CIPHER_TKIP) {
104 wpa_msg(wpa_s, MSG_INFO, "mesh: Invalid pairwise cipher");
108 conf->pairwise_cipher = cipher;
110 cipher = wpa_pick_group_cipher(ssid->group_cipher);
111 if (cipher < 0 || cipher == WPA_CIPHER_TKIP ||
112 cipher
[all...]
H A Dctrl_iface.c2570 static char * wpa_supplicant_cipher_txt(char *pos, char *end, int cipher) argument
2577 ret = wpa_write_ciphers(pos, end, cipher, "+");
H A Dconfig.c1087 wpa_printf(MSG_ERROR, "Line %d: invalid cipher '%s'.",
1092 wpa_printf(MSG_ERROR, "Line %d: no cipher values configured.",
1102 static char * wpa_config_write_cipher(int cipher) argument
1111 if (wpa_write_ciphers(buf, buf + 50, cipher, " ") < 0) {
1131 wpa_printf(MSG_ERROR, "Line %d: not allowed pairwise cipher "
1169 wpa_printf(MSG_ERROR, "Line %d: not allowed group cipher "
1203 "Line %d: not allowed group management cipher (0x%x).",
H A Dap.c467 int cipher = WPA_CIPHER_NONE; local
471 cipher = bss->default_wep_key_len >= 13 ?
473 bss->wpa_group = cipher;
474 bss->wpa_pairwise = cipher;
475 bss->rsn_pairwise = cipher;
477 int cipher = WPA_CIPHER_WEP40; local
479 cipher = WPA_CIPHER_WEP104;
481 bss->wpa_group = cipher;
482 bss->wpa_pairwise = cipher;
483 bss->rsn_pairwise = cipher;
[all...]
H A DAndroid.mk1126 OBJS += src/crypto/crypto_internal-cipher.c

Completed in 366 milliseconds

12345678