Searched refs:cipher (Results 1 - 25 of 181) sorted by relevance

12345678

/freebsd-10-stable/lib/libutil/
H A Dlogin_crypt.c39 const char *cipher; local
41 cipher = login_getcapstr(lc, "passwd_format", def, NULL);
44 "passwd_format = %s\n", cipher);
45 if (cipher == NULL)
47 if (!crypt_set_format(cipher))
49 return (cipher);
/freebsd-10-stable/sys/opencrypto/
H A Dskipjack.h17 extern void skipjack_forwards(u_int8_t *plain, u_int8_t *cipher, u_int8_t **key);
18 extern void skipjack_backwards(u_int8_t *cipher, u_int8_t *plain, u_int8_t **key);
/freebsd-10-stable/crypto/openssh/regress/
H A Ddhgex.sh15 cipher="$1"; shift
20 echo "Ciphers=$cipher" >> $OBJ/sshd_proxy
22 opts="-oKexAlgorithms=$kex -oCiphers=$cipher"
26 verbose "$tid bits $bits $kex $cipher"
56 check 3072 `${SSH} -Q cipher | grep 128`
58 check 7680 `${SSH} -Q cipher | grep 192`
59 check 8192 `${SSH} -Q cipher | grep 256`
H A Dtry-ciphers.sh8 for c in `${SSH} -Q cipher`; do
11 trace "proto 2 cipher $c mac $m"
12 verbose "test $tid: proto 2 cipher $c mac $m"
18 fail "ssh -2 failed with mac $m cipher $c"
22 if ${SSH} -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then
35 trace "proto 1 cipher $c"
36 verbose "test $tid: proto 1 cipher $c"
39 fail "ssh -1 failed with cipher $c"
/freebsd-10-stable/contrib/wpa/src/crypto/
H A Daes-wrap.c22 * @cipher: Wrapped key, (n + 1) * 64 bits
25 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument
31 a = cipher;
32 r = cipher + 8;
50 r = cipher + 8;
65 * These are already in @cipher due to the location of temporary
H A Daes-unwrap.c21 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument
32 os_memcpy(a, cipher, 8);
34 os_memcpy(r, cipher + 8, 8 * n);
/freebsd-10-stable/crypto/openssl/crypto/evp/
H A Devp_enc.c75 # define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl)
83 /* ctx->cipher=NULL; */
94 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
97 if (cipher)
99 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc);
102 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument
120 if (ctx->engine && ctx->cipher && (!cipher ||
121 (cipher
122 && (cipher
279 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument
285 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
292 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument
298 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument
[all...]
H A Devp_lib.c68 if (c->cipher->set_asn1_parameters != NULL)
69 ret = c->cipher->set_asn1_parameters(c, type);
70 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) {
91 if (c->cipher->get_asn1_parameters != NULL)
92 ret = c->cipher->get_asn1_parameters(c, type);
93 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) {
141 /* Convert the various cipher NIDs and dummies to a proper OID NID */
208 return ctx->cipher->block_size;
214 return ctx->cipher->do_cipher(ctx, out, in, inl);
219 return ctx->cipher;
222 EVP_CIPHER_flags(const EVP_CIPHER *cipher) argument
242 EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) argument
252 EVP_CIPHER_key_length(const EVP_CIPHER *cipher) argument
262 EVP_CIPHER_nid(const EVP_CIPHER *cipher) argument
[all...]
H A Devp_test.c141 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c),
228 static int test_cipher(const char *cipher, const unsigned char *key, int kn, argument
235 c = EVP_get_cipherbyname(cipher);
339 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use
348 char *cipher; local
358 cipher = sstrsep(&p, ":");
376 (cipher, key, kn, iv, in, plaintext, pn, ciphertext, cn, encdec)
377 && !test_digest(cipher, plaintext, pn, ciphertext, cn)) {
379 if (strstr(cipher, "AES") == cipher) {
[all...]
H A Dp5_crpt.c75 ASN1_TYPE *param, const EVP_CIPHER *cipher,
135 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp));
136 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher));
137 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16);
138 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)),
139 EVP_CIPHER_iv_length(cipher));
140 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de))
74 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
H A Dbio_enc.c86 EVP_CIPHER_CTX cipher; member in struct:enc_struct
95 BIO_TYPE_CIPHER, "cipher",
118 EVP_CIPHER_CTX_init(&ctx->cipher);
139 EVP_CIPHER_CTX_cleanup(&(b->cipher));
194 i = EVP_CipherFinal_ex(&(ctx->cipher),
204 EVP_CipherUpdate(&(ctx->cipher),
263 EVP_CipherUpdate(&(ctx->cipher),
301 EVP_CipherInit_ex(&(ctx->cipher), NULL, NULL, NULL, NULL,
302 ctx->cipher.encrypt);
333 ret = EVP_CipherFinal_ex(&(ctx->cipher),
[all...]
/freebsd-10-stable/tests/sys/geom/class/eli/
H A Dconf.sh14 # Execute `func` for each combination of cipher, sectorsize, and hmac algo
16 # func <cipher> <aalgo> <secsize>
20 for cipher in aes-xts:128 aes-xts:256 \
28 ealgo=${cipher%%:*}
29 keylen=${cipher##*:}
33 ${func} $cipher $aalgo $secsize
39 # Execute `func` for each combination of cipher, and sectorsize, with no hmac
41 # func <cipher> <secsize>
45 for cipher in aes-xts:128 aes-xts:256 \
53 ealgo=${cipher
[all...]
H A Donetime_a_test.sh13 cipher=$1
16 ealgo=${cipher%%:*}
17 keylen=${cipher##*:}
/freebsd-10-stable/crypto/openssl/crypto/asn1/
H A Dx_pkey.c82 ret->cipher.cipher =
85 if (ret->cipher.cipher == NULL) {
97 memcpy(ret->cipher.iv,
100 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
117 ret->cipher.cipher = NULL;
118 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
H A Dp5_pbev2.c90 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
101 alg_nid = EVP_CIPHER_type(cipher);
120 if (EVP_CIPHER_iv_length(cipher)) {
122 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher));
123 else if (RAND_bytes(iv, EVP_CIPHER_iv_length(cipher)) <= 0)
130 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0))
138 * If prf NID unspecified see if cipher has a preference. An error is OK
151 keylen = EVP_CIPHER_key_length(cipher);
198 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
201 return PKCS5_pbe2_set_iv(cipher, ite
[all...]
/freebsd-10-stable/crypto/openssl/crypto/pkcs12/
H A Dp12_crpt.c71 ASN1_TYPE *param, const EVP_CIPHER *cipher,
80 if (cipher == NULL)
103 iter, EVP_CIPHER_key_length(cipher), key, md)) {
109 iter, EVP_CIPHER_iv_length(cipher), iv, md)) {
115 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de);
70 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
H A Dp12_p8e.c64 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument
78 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
/freebsd-10-stable/crypto/openssh/
H A Dcipher.c1 /* $OpenBSD: cipher.c,v 1.101 2015/12/10 17:08:40 mmcc Exp $ */
46 #include "cipher.h"
189 * Default is cipher block size, except for chacha20+poly1305 that
265 * Parses the name of the cipher. Returns the number of the corresponding
266 * cipher, or -1 on error.
291 if (cc == NULL || cc->cipher == NULL)
293 if (cc->cipher->number == SSH_CIPHER_DES)
300 cipher_init(struct sshcipher_ctx *cc, const struct sshcipher *cipher, argument
310 if (cipher->number == SSH_CIPHER_DES) {
315 cc->plaintext = (cipher
490 cipher_set_key_string(struct sshcipher_ctx *cc, const struct sshcipher *cipher, const char *passphrase, int do_encrypt) argument
[all...]
/freebsd-10-stable/sys/dev/random/
H A Dhash.h41 cipherInstance cipher; /* Rijndael internal */ member in struct:randomdev_key
H A Dhash.c69 rijndael_cipherInit(&context->cipher, MODE_CBC, NULL);
80 rijndael_blockEncrypt(&context->cipher, &context->key, d_in, length*8, d_out);
/freebsd-10-stable/sys/crypto/rijndael/
H A Drijndael-api-fst.c71 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument
73 cipher->mode = mode;
78 memcpy(cipher->IV, IV, RIJNDAEL_MAX_IV_SIZE);
80 memset(cipher->IV, 0, RIJNDAEL_MAX_IV_SIZE);
85 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument
90 if (cipher == NULL ||
101 switch (cipher->mode) {
112 memcpy(block, cipher->IV, 16);
119 ((u_int32_t*)block)[0] = ((u_int32_t*)cipher->IV)[0] ^ ((u_int32_t*)input)[0];
120 ((u_int32_t*)block)[1] = ((u_int32_t*)cipher
200 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument
263 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument
362 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument
[all...]
/freebsd-10-stable/crypto/openssl/engines/ccgost/
H A Dgost89.h46 void gost_enc(gost_ctx * ctx, const byte * clear, byte * cipher, int blocks);
48 void gost_dec(gost_ctx * ctx, const byte * cipher, byte * clear, int blocks);
51 byte * cipher, int blocks);
53 void gost_dec_cfb(gost_ctx * ctx, const byte * iv, const byte * cipher,
H A Dgost_eng.c22 /* Symmetric cipher and digest function registrar */
24 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
186 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument
190 if (!cipher) {
196 *cipher = &cipher_gost;
198 *cipher = &cipher_gost_cpacnt;
201 *cipher = NULL;
/freebsd-10-stable/secure/lib/libssh/
H A DMakefile11 canohost.c channels.c cipher.c cipher-aes.c cipher-aesctr.c \
12 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \
20 poly1305.c chacha.c cipher-chachapoly.c \
/freebsd-10-stable/contrib/apr-util/crypto/
H A Dapr_crypto_openssl.c56 const EVP_CIPHER * cipher; member in struct:apr_crypto_key_t
375 /* determine the cipher to be used */
382 key->cipher = EVP_des_ede3_cbc();
385 key->cipher = EVP_des_ede3_ecb();
392 key->cipher = EVP_aes_128_cbc();
395 key->cipher = EVP_aes_128_ecb();
402 key->cipher = EVP_aes_192_cbc();
405 key->cipher = EVP_aes_192_ecb();
412 key->cipher = EVP_aes_256_cbc();
415 key->cipher
[all...]

Completed in 141 milliseconds

12345678