/freebsd-10-stable/lib/libutil/ |
H A D | login_crypt.c | 39 const char *cipher; local 41 cipher = login_getcapstr(lc, "passwd_format", def, NULL); 44 "passwd_format = %s\n", cipher); 45 if (cipher == NULL) 47 if (!crypt_set_format(cipher)) 49 return (cipher);
|
/freebsd-10-stable/sys/opencrypto/ |
H A D | skipjack.h | 17 extern void skipjack_forwards(u_int8_t *plain, u_int8_t *cipher, u_int8_t **key); 18 extern void skipjack_backwards(u_int8_t *cipher, u_int8_t *plain, u_int8_t **key);
|
/freebsd-10-stable/crypto/openssh/regress/ |
H A D | dhgex.sh | 15 cipher="$1"; shift 20 echo "Ciphers=$cipher" >> $OBJ/sshd_proxy 22 opts="-oKexAlgorithms=$kex -oCiphers=$cipher" 26 verbose "$tid bits $bits $kex $cipher" 56 check 3072 `${SSH} -Q cipher | grep 128` 58 check 7680 `${SSH} -Q cipher | grep 192` 59 check 8192 `${SSH} -Q cipher | grep 256`
|
H A D | try-ciphers.sh | 8 for c in `${SSH} -Q cipher`; do 11 trace "proto 2 cipher $c mac $m" 12 verbose "test $tid: proto 2 cipher $c mac $m" 18 fail "ssh -2 failed with mac $m cipher $c" 22 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then 35 trace "proto 1 cipher $c" 36 verbose "test $tid: proto 1 cipher $c" 39 fail "ssh -1 failed with cipher $c"
|
/freebsd-10-stable/contrib/wpa/src/crypto/ |
H A D | aes-wrap.c | 22 * @cipher: Wrapped key, (n + 1) * 64 bits 25 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument 31 a = cipher; 32 r = cipher + 8; 50 r = cipher + 8; 65 * These are already in @cipher due to the location of temporary
|
H A D | aes-unwrap.c | 21 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 32 os_memcpy(a, cipher, 8); 34 os_memcpy(r, cipher + 8, 8 * n);
|
/freebsd-10-stable/crypto/openssl/crypto/evp/ |
H A D | evp_enc.c | 75 # define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl) 83 /* ctx->cipher=NULL; */ 94 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 97 if (cipher) 99 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc); 102 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 120 if (ctx->engine && ctx->cipher && (!cipher || 121 (cipher 122 && (cipher 279 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 285 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument 292 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 298 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument [all...] |
H A D | evp_lib.c | 68 if (c->cipher->set_asn1_parameters != NULL) 69 ret = c->cipher->set_asn1_parameters(c, type); 70 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) { 91 if (c->cipher->get_asn1_parameters != NULL) 92 ret = c->cipher->get_asn1_parameters(c, type); 93 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) { 141 /* Convert the various cipher NIDs and dummies to a proper OID NID */ 208 return ctx->cipher->block_size; 214 return ctx->cipher->do_cipher(ctx, out, in, inl); 219 return ctx->cipher; 222 EVP_CIPHER_flags(const EVP_CIPHER *cipher) argument 242 EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) argument 252 EVP_CIPHER_key_length(const EVP_CIPHER *cipher) argument 262 EVP_CIPHER_nid(const EVP_CIPHER *cipher) argument [all...] |
H A D | evp_test.c | 141 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c), 228 static int test_cipher(const char *cipher, const unsigned char *key, int kn, argument 235 c = EVP_get_cipherbyname(cipher); 339 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use 348 char *cipher; local 358 cipher = sstrsep(&p, ":"); 376 (cipher, key, kn, iv, in, plaintext, pn, ciphertext, cn, encdec) 377 && !test_digest(cipher, plaintext, pn, ciphertext, cn)) { 379 if (strstr(cipher, "AES") == cipher) { [all...] |
H A D | p5_crpt.c | 75 ASN1_TYPE *param, const EVP_CIPHER *cipher, 135 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); 136 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 137 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); 138 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), 139 EVP_CIPHER_iv_length(cipher)); 140 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de)) 74 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | bio_enc.c | 86 EVP_CIPHER_CTX cipher; member in struct:enc_struct 95 BIO_TYPE_CIPHER, "cipher", 118 EVP_CIPHER_CTX_init(&ctx->cipher); 139 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 194 i = EVP_CipherFinal_ex(&(ctx->cipher), 204 EVP_CipherUpdate(&(ctx->cipher), 263 EVP_CipherUpdate(&(ctx->cipher), 301 EVP_CipherInit_ex(&(ctx->cipher), NULL, NULL, NULL, NULL, 302 ctx->cipher.encrypt); 333 ret = EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
/freebsd-10-stable/tests/sys/geom/class/eli/ |
H A D | conf.sh | 14 # Execute `func` for each combination of cipher, sectorsize, and hmac algo 16 # func <cipher> <aalgo> <secsize> 20 for cipher in aes-xts:128 aes-xts:256 \ 28 ealgo=${cipher%%:*} 29 keylen=${cipher##*:} 33 ${func} $cipher $aalgo $secsize 39 # Execute `func` for each combination of cipher, and sectorsize, with no hmac 41 # func <cipher> <secsize> 45 for cipher in aes-xts:128 aes-xts:256 \ 53 ealgo=${cipher [all...] |
H A D | onetime_a_test.sh | 13 cipher=$1 16 ealgo=${cipher%%:*} 17 keylen=${cipher##*:}
|
/freebsd-10-stable/crypto/openssl/crypto/asn1/ |
H A D | x_pkey.c | 82 ret->cipher.cipher = 85 if (ret->cipher.cipher == NULL) { 97 memcpy(ret->cipher.iv, 100 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH); 117 ret->cipher.cipher = NULL; 118 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
|
H A D | p5_pbev2.c | 90 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, 101 alg_nid = EVP_CIPHER_type(cipher); 120 if (EVP_CIPHER_iv_length(cipher)) { 122 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher)); 123 else if (RAND_bytes(iv, EVP_CIPHER_iv_length(cipher)) <= 0) 130 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0)) 138 * If prf NID unspecified see if cipher has a preference. An error is OK 151 keylen = EVP_CIPHER_key_length(cipher); 198 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 201 return PKCS5_pbe2_set_iv(cipher, ite [all...] |
/freebsd-10-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_crpt.c | 71 ASN1_TYPE *param, const EVP_CIPHER *cipher, 80 if (cipher == NULL) 103 iter, EVP_CIPHER_key_length(cipher), key, md)) { 109 iter, EVP_CIPHER_iv_length(cipher), iv, md)) { 115 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de); 70 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | p12_p8e.c | 64 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument 78 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
|
/freebsd-10-stable/crypto/openssh/ |
H A D | cipher.c | 1 /* $OpenBSD: cipher.c,v 1.101 2015/12/10 17:08:40 mmcc Exp $ */ 46 #include "cipher.h" 189 * Default is cipher block size, except for chacha20+poly1305 that 265 * Parses the name of the cipher. Returns the number of the corresponding 266 * cipher, or -1 on error. 291 if (cc == NULL || cc->cipher == NULL) 293 if (cc->cipher->number == SSH_CIPHER_DES) 300 cipher_init(struct sshcipher_ctx *cc, const struct sshcipher *cipher, argument 310 if (cipher->number == SSH_CIPHER_DES) { 315 cc->plaintext = (cipher 490 cipher_set_key_string(struct sshcipher_ctx *cc, const struct sshcipher *cipher, const char *passphrase, int do_encrypt) argument [all...] |
/freebsd-10-stable/sys/dev/random/ |
H A D | hash.h | 41 cipherInstance cipher; /* Rijndael internal */ member in struct:randomdev_key
|
H A D | hash.c | 69 rijndael_cipherInit(&context->cipher, MODE_CBC, NULL); 80 rijndael_blockEncrypt(&context->cipher, &context->key, d_in, length*8, d_out);
|
/freebsd-10-stable/sys/crypto/rijndael/ |
H A D | rijndael-api-fst.c | 71 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument 73 cipher->mode = mode; 78 memcpy(cipher->IV, IV, RIJNDAEL_MAX_IV_SIZE); 80 memset(cipher->IV, 0, RIJNDAEL_MAX_IV_SIZE); 85 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument 90 if (cipher == NULL || 101 switch (cipher->mode) { 112 memcpy(block, cipher->IV, 16); 119 ((u_int32_t*)block)[0] = ((u_int32_t*)cipher->IV)[0] ^ ((u_int32_t*)input)[0]; 120 ((u_int32_t*)block)[1] = ((u_int32_t*)cipher 200 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument 263 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument 362 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument [all...] |
/freebsd-10-stable/crypto/openssl/engines/ccgost/ |
H A D | gost89.h | 46 void gost_enc(gost_ctx * ctx, const byte * clear, byte * cipher, int blocks); 48 void gost_dec(gost_ctx * ctx, const byte * cipher, byte * clear, int blocks); 51 byte * cipher, int blocks); 53 void gost_dec_cfb(gost_ctx * ctx, const byte * iv, const byte * cipher,
|
H A D | gost_eng.c | 22 /* Symmetric cipher and digest function registrar */ 24 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 186 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 190 if (!cipher) { 196 *cipher = &cipher_gost; 198 *cipher = &cipher_gost_cpacnt; 201 *cipher = NULL;
|
/freebsd-10-stable/secure/lib/libssh/ |
H A D | Makefile | 11 canohost.c channels.c cipher.c cipher-aes.c cipher-aesctr.c \ 12 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \ 20 poly1305.c chacha.c cipher-chachapoly.c \
|
/freebsd-10-stable/contrib/apr-util/crypto/ |
H A D | apr_crypto_openssl.c | 56 const EVP_CIPHER * cipher; member in struct:apr_crypto_key_t 375 /* determine the cipher to be used */ 382 key->cipher = EVP_des_ede3_cbc(); 385 key->cipher = EVP_des_ede3_ecb(); 392 key->cipher = EVP_aes_128_cbc(); 395 key->cipher = EVP_aes_128_ecb(); 402 key->cipher = EVP_aes_192_cbc(); 405 key->cipher = EVP_aes_192_ecb(); 412 key->cipher = EVP_aes_256_cbc(); 415 key->cipher [all...] |