/freebsd-10.1-release/lib/libutil/ |
H A D | login_crypt.c | 39 const char *cipher; local 41 cipher = login_getcapstr(lc, "passwd_format", def, NULL); 44 "passwd_format = %s\n", cipher); 45 if (cipher == NULL) 47 if (!crypt_set_format(cipher)) 49 return (cipher);
|
/freebsd-10.1-release/sys/opencrypto/ |
H A D | skipjack.h | 17 extern void skipjack_forwards(u_int8_t *plain, u_int8_t *cipher, u_int8_t **key); 18 extern void skipjack_backwards(u_int8_t *cipher, u_int8_t *plain, u_int8_t **key);
|
/freebsd-10.1-release/crypto/openssl/crypto/evp/ |
H A D | evp_lib.c | 68 if (c->cipher->set_asn1_parameters != NULL) 69 ret = c->cipher->set_asn1_parameters(c, type); 70 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) 81 if (c->cipher->get_asn1_parameters != NULL) 82 ret = c->cipher->get_asn1_parameters(c, type); 83 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) 120 /* Convert the various cipher NIDs and dummies to a proper OID NID */ 187 return ctx->cipher->block_size; 193 return ctx->cipher->do_cipher(ctx, out, in, inl); 198 return ctx->cipher; 201 EVP_CIPHER_flags(const EVP_CIPHER *cipher) argument 221 EVP_CIPHER_iv_length(const EVP_CIPHER *cipher) argument 231 EVP_CIPHER_key_length(const EVP_CIPHER *cipher) argument 241 EVP_CIPHER_nid(const EVP_CIPHER *cipher) argument [all...] |
H A D | evp_enc.c | 75 # define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl) 83 /* ctx->cipher=NULL; */ 94 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 97 if (cipher) 99 return EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, enc); 102 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, argument 120 if (ctx->engine && ctx->cipher && (!cipher || 121 (cipher 122 && (cipher 279 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 285 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument 292 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 298 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument [all...] |
H A D | evp_test.c | 141 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c), 228 static int test_cipher(const char *cipher, const unsigned char *key, int kn, argument 235 c = EVP_get_cipherbyname(cipher); 339 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use 348 char *cipher; local 358 cipher = sstrsep(&p, ":"); 376 (cipher, key, kn, iv, in, plaintext, pn, ciphertext, cn, encdec) 377 && !test_digest(cipher, plaintext, pn, ciphertext, cn)) { 379 if (strstr(cipher, "AES") == cipher) { [all...] |
H A D | p5_crpt.c | 75 ASN1_TYPE *param, const EVP_CIPHER *cipher, 135 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); 136 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 137 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); 138 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), 139 EVP_CIPHER_iv_length(cipher)); 140 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de)) 74 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | bio_enc.c | 86 EVP_CIPHER_CTX cipher; member in struct:enc_struct 95 BIO_TYPE_CIPHER, "cipher", 118 EVP_CIPHER_CTX_init(&ctx->cipher); 139 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 194 i = EVP_CipherFinal_ex(&(ctx->cipher), 204 EVP_CipherUpdate(&(ctx->cipher), 263 EVP_CipherUpdate(&(ctx->cipher), 301 EVP_CipherInit_ex(&(ctx->cipher), NULL, NULL, NULL, NULL, 302 ctx->cipher.encrypt); 333 ret = EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
/freebsd-10.1-release/contrib/wpa/src/crypto/ |
H A D | aes-wrap.c | 22 * @cipher: Wrapped key, (n + 1) * 64 bits 25 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) argument 31 a = cipher; 32 r = cipher + 8; 50 r = cipher + 8; 65 * These are already in @cipher due to the location of temporary
|
H A D | aes-unwrap.c | 21 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 32 os_memcpy(a, cipher, 8); 34 os_memcpy(r, cipher + 8, 8 * n);
|
/freebsd-10.1-release/crypto/openssh/regress/ |
H A D | dhgex.sh | 14 cipher="$1"; shift 18 opts="-oKexAlgorithms=$kex -oCiphers=$cipher" 20 verbose "$tid bits $bits $kex $cipher" 50 check 3072 `${SSH} -Q cipher | grep 128` 52 check 7680 `${SSH} -Q cipher | grep 192` 53 check 8192 `${SSH} -Q cipher | grep 256`
|
H A D | try-ciphers.sh | 6 for c in `${SSH} -Q cipher`; do 9 trace "proto 2 cipher $c mac $m" 10 verbose "test $tid: proto 2 cipher $c mac $m" 13 fail "ssh -2 failed with mac $m cipher $c" 17 if ssh -Q cipher-auth | grep "^${c}\$" >/dev/null 2>&1 ; then 26 trace "proto 1 cipher $c" 27 verbose "test $tid: proto 1 cipher $c" 30 fail "ssh -1 failed with cipher $c"
|
/freebsd-10.1-release/crypto/openssl/crypto/asn1/ |
H A D | x_pkey.c | 82 ret->cipher.cipher = 85 if (ret->cipher.cipher == NULL) { 97 memcpy(ret->cipher.iv, 100 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH); 117 ret->cipher.cipher = NULL; 118 memset(ret->cipher.iv, 0, EVP_MAX_IV_LENGTH);
|
H A D | p5_pbev2.c | 90 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, 101 alg_nid = EVP_CIPHER_type(cipher); 120 if (EVP_CIPHER_iv_length(cipher)) { 122 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher)); 123 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0) 130 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0)) 138 * If prf NID unspecified see if cipher has a preference. An error is OK 151 keylen = EVP_CIPHER_key_length(cipher); 198 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 201 return PKCS5_pbe2_set_iv(cipher, ite [all...] |
/freebsd-10.1-release/crypto/openssh/ |
H A D | cipher.c | 1 /* $OpenBSD: cipher.c,v 1.97 2014/02/07 06:55:54 djm Exp $ */ 50 #include "cipher.h" 163 * Default is cipher block size, except for chacha20+poly1305 that 234 debug("bad cipher %s [%s]", p, names); 245 * Parses the name of the cipher. Returns the number of the corresponding 246 * cipher, or -1 on error. 269 cipher_init(CipherContext *cc, const Cipher *cipher, argument 282 if (cipher->number == SSH_CIPHER_DES) { 291 cc->plaintext = (cipher->number == SSH_CIPHER_NONE); 294 if (keylen < cipher 440 cipher_set_key_string(CipherContext *cc, const Cipher *cipher, const char *passphrase, int do_encrypt) argument [all...] |
/freebsd-10.1-release/sys/dev/random/ |
H A D | hash.h | 41 cipherInstance cipher; /* Rijndael internal */ member in struct:randomdev_key
|
H A D | hash.c | 69 rijndael_cipherInit(&context->cipher, MODE_CBC, NULL); 80 rijndael_blockEncrypt(&context->cipher, &context->key, d_in, length*8, d_out);
|
/freebsd-10.1-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_crpt.c | 71 ASN1_TYPE *param, const EVP_CIPHER *cipher, 100 iter, EVP_CIPHER_key_length(cipher), key, md)) { 106 iter, EVP_CIPHER_iv_length(cipher), iv, md)) { 112 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de); 70 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | p12_p8e.c | 64 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument 78 pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
|
/freebsd-10.1-release/sys/crypto/rijndael/ |
H A D | rijndael-api-fst.c | 71 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument 73 cipher->mode = mode; 78 memcpy(cipher->IV, IV, RIJNDAEL_MAX_IV_SIZE); 80 memset(cipher->IV, 0, RIJNDAEL_MAX_IV_SIZE); 85 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument 90 if (cipher == NULL || 101 switch (cipher->mode) { 112 memcpy(block, cipher->IV, 16); 119 ((u_int32_t*)block)[0] = ((u_int32_t*)cipher->IV)[0] ^ ((u_int32_t*)input)[0]; 120 ((u_int32_t*)block)[1] = ((u_int32_t*)cipher 200 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument 263 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument 362 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument [all...] |
/freebsd-10.1-release/crypto/openssl/engines/ccgost/ |
H A D | gost89.h | 46 void gost_enc(gost_ctx * ctx, const byte * clear, byte * cipher, int blocks); 48 void gost_dec(gost_ctx * ctx, const byte * cipher, byte * clear, int blocks); 51 byte * cipher, int blocks); 53 void gost_dec_cfb(gost_ctx * ctx, const byte * iv, const byte * cipher,
|
H A D | gost_eng.c | 22 /* Symmetric cipher and digest function registrar */ 24 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 186 static int gost_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 190 if (!cipher) { 196 *cipher = &cipher_gost; 198 *cipher = &cipher_gost_cpacnt; 201 *cipher = NULL;
|
/freebsd-10.1-release/contrib/apr-util/crypto/ |
H A D | apr_crypto_openssl.c | 56 const EVP_CIPHER * cipher; member in struct:apr_crypto_key_t 375 /* determine the cipher to be used */ 382 key->cipher = EVP_des_ede3_cbc(); 385 key->cipher = EVP_des_ede3_ecb(); 392 key->cipher = EVP_aes_128_cbc(); 395 key->cipher = EVP_aes_128_ecb(); 402 key->cipher = EVP_aes_192_cbc(); 405 key->cipher = EVP_aes_192_ecb(); 412 key->cipher = EVP_aes_256_cbc(); 415 key->cipher [all...] |
/freebsd-10.1-release/secure/lib/libssh/ |
H A D | Makefile | 9 canohost.c channels.c cipher.c cipher-aes.c \ 10 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \ 19 kexc25519.c kexc25519c.c poly1305.c chacha.c cipher-chachapoly.c \
|
/freebsd-10.1-release/crypto/openssl/apps/ |
H A D | enc.c | 122 const EVP_CIPHER *cipher = NULL, *c; local 153 cipher = EVP_get_cipherbyname(pname); 155 if (!do_zlib && !base64 && (cipher == NULL) 158 if (!base64 && (cipher == NULL) && (strcmp(pname, "enc") != 0)) 161 BIO_printf(bio_err, "%s is an unknown cipher\n", pname); 273 cipher = c; 275 cipher = NULL; 329 if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) { 335 if (cipher [all...] |
/freebsd-10.1-release/crypto/openssl/ssl/ |
H A D | d1_enc.c | 163 else if (EVP_CIPHER_block_size(ds->cipher) > 1) { 164 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) 191 bs = EVP_CIPHER_block_size(ds->cipher); 216 ds->buf_len, ds->cipher->key_len, DES_KEY_SZ, 217 DES_SCHEDULE_SZ, ds->cipher->iv_len); 219 for (i = 0; i < ds->cipher->iv_len; i++)
|