/freebsd-current/sys/geom/eli/ |
H A D | g_eli_crypto.c | 112 u_char iv[G_ELI_IVKEYLEN]; local 164 bzero(iv, sizeof(iv)); 165 EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, enc);
|
/freebsd-current/sys/crypto/openssl/ |
H A D | ossl_aes_gcm.h | 37 void (*setiv)(struct ossl_gcm_context *ctx, const unsigned char *iv,
|
/freebsd-current/crypto/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon.c | 190 const unsigned char *iv, size_t ivlen, 201 if (iv != NULL && ctx->mode != EVP_CIPH_ECB_MODE) { 202 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) 205 if (iv == NULL && ctx->iv_set 210 memcpy(ctx->iv, ctx->oiv, ctx->ivlen); 229 size_t keylen, const unsigned char *iv, 233 iv, ivlen, params, 1); 237 size_t keylen, const unsigned char *iv, 241 iv, ivlen, params, 0); 598 && !OSSL_PARAM_set_octet_ptr(p, &ctx->iv, ct 188 cipher_generic_init_internal(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument 228 ossl_cipher_generic_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 236 ossl_cipher_generic_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 677 ossl_cipher_generic_initiv(PROV_CIPHER_CTX *ctx, const unsigned char *iv, size_t ivlen) argument [all...] |
H A D | cipher_cts.c | 155 /* Save the iv that will be used by the second last block */ 156 memcpy(mid_iv.c, ctx->iv, CTS_BLOCK_SIZE); 160 /* Decrypt the last block first using an iv of zero */ 161 memset(ctx->iv, 0, CTS_BLOCK_SIZE); 181 /* Restore the iv needed by the second last block */ 182 memcpy(ctx->iv, mid_iv.c, CTS_BLOCK_SIZE); 191 /* The returned iv is the C(n) block */ 192 memcpy(ctx->iv, cn.c, CTS_BLOCK_SIZE); 261 /* Save the iv that will be used by the second last block */ 262 memcpy(mid_iv.c, ctx->iv, CTS_BLOCK_SIZ [all...] |
H A D | cipher_chacha20.c | 169 const unsigned char *iv, size_t ivlen, 175 ret = ossl_cipher_generic_einit(vctx, key, keylen, iv, ivlen, NULL); 176 if (ret && iv != NULL) { 188 const unsigned char *iv, size_t ivlen, 194 ret = ossl_cipher_generic_dinit(vctx, key, keylen, iv, ivlen, NULL); 195 if (ret && iv != NULL) { 168 ossl_chacha20_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 187 ossl_chacha20_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
|
H A D | cipher_aes_cbc_hmac_sha256_hw.c | 37 const AES_KEY *key, unsigned char iv[16], 119 u64 iv[2]; member in struct:__anon4112 170 memcpy(ciph_d[0].iv, IVs, 16); 177 memcpy(ciph_d[i].iv, IVs, 16); 254 memcpy(ciph_d[i].iv, ciph_d[i].out - 16, 16); 372 len += 16; /* account for explicit iv */ 403 size_t iv = 0; /* explicit IV in TLS 1.1 and * later */ local 420 iv = AES_BLOCK_SIZE; 436 plen > (sha_off + iv) && 437 (blocks = (plen - (sha_off + iv)) / SHA256_CBLOC [all...] |
/freebsd-current/contrib/bearssl/src/symcipher/ |
H A D | aes_ct64_ctr.c | 52 const void *iv, uint32_t cc, void *data, size_t len) 59 br_range_dec32le(ivw, 3, iv); 51 br_aes_ct64_ctr_run(const br_aes_ct64_ctr_keys *ctx, const void *iv, uint32_t cc, void *data, size_t len) argument
|
H A D | aes_ct_ctr.c | 52 const void *iv, uint32_t cc, void *data, size_t len) 60 ivbuf = iv; 51 br_aes_ct_ctr_run(const br_aes_ct_ctr_keys *ctx, const void *iv, uint32_t cc, void *data, size_t len) argument
|
H A D | aes_ct_cbcenc.c | 39 void *iv, void *data, size_t len) 51 ivbuf = iv; 38 br_aes_ct_cbcenc_run(const br_aes_ct_cbcenc_keys *ctx, void *iv, void *data, size_t len) argument
|
/freebsd-current/contrib/netbsd-tests/crypto/opencrypto/ |
H A D | h_aesctr2.c | 42 unsigned char iv[8] = {0}; variable 69 memcpy(ibuf, iv, 8);
|
/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | e_sm4.c | 27 const unsigned char *iv, int enc) 85 CRYPTO_ctr128_encrypt(in, out, len, &dat->ks, ctx->iv, 26 sm4_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) argument
|
H A D | evp_enc.c | 85 const unsigned char *iv, int enc, 272 iv, 273 iv == NULL ? 0 287 iv, 288 iv == NULL ? 0 397 if (n < 0 || n > (int)sizeof(ctx->iv)) { 401 if (iv != NULL) 402 memcpy(ctx->oiv, iv, n); 403 memcpy(ctx->iv, ctx->oiv, n); 409 if (iv ! 82 evp_cipher_init_internal(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv, int enc, const OSSL_PARAM params[]) argument 434 EVP_CipherInit_ex2(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv, int enc, const OSSL_PARAM params[]) argument 441 EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv, int enc) argument 449 EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv, int enc) argument 481 EVP_EncryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 487 EVP_EncryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument 494 EVP_EncryptInit_ex2(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv, const OSSL_PARAM params[]) argument 501 EVP_DecryptInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 507 EVP_DecryptInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, const unsigned char *key, const unsigned char *iv) argument 514 EVP_DecryptInit_ex2(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv, const OSSL_PARAM params[]) argument [all...] |
H A D | e_aes_cbc_hmac_sha1.c | 60 const AES_KEY *key, unsigned char iv[16], 64 const AES_KEY *key, unsigned char iv[16], 71 const unsigned char *iv, int enc) 155 u64 iv[2]; member in struct:__anon3919 203 memcpy(ciph_d[0].iv, IVs, 16); 210 memcpy(ciph_d[i].iv, IVs, 16); 283 memcpy(ciph_d[i].iv, ciph_d[i].out - 16, 16); 386 len += 16; /* account for explicit iv */ 413 size_t plen = key->payload_length, iv = 0, /* explicit IV in TLS 1.1 and local 435 iv 69 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument [all...] |
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | aes.h | 97 int AES_wrap_key(AES_KEY *key, const unsigned char *iv, 101 int AES_unwrap_key(AES_KEY *key, const unsigned char *iv,
|
H A D | des.h | 64 # define DES_ede2_cbc_encrypt(i,o,l,k1,k2,iv,e) \ 65 DES_ede3_cbc_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(e)) 67 # define DES_ede2_cfb64_encrypt(i,o,l,k1,k2,iv,n,e) \ 68 DES_ede3_cfb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n),(e)) 70 # define DES_ede2_ofb64_encrypt(i,o,l,k1,k2,iv,n) \ 71 DES_ede3_ofb64_encrypt((i),(o),(l),(k1),(k2),(k1),(iv),(n))
|
H A D | modes.h | 118 void CRYPTO_gcm128_setiv(GCM128_CONTEXT *ctx, const unsigned char *iv, 163 const unsigned char iv[16], 167 size_t CRYPTO_128_wrap(void *key, const unsigned char *iv, 172 size_t CRYPTO_128_unwrap(void *key, const unsigned char *iv, 201 int CRYPTO_ocb128_setiv(OCB128_CONTEXT *ctx, const unsigned char *iv,
|
/freebsd-current/contrib/libpcap/ |
H A D | pcap-bt-monitor-linux.c | 98 struct iovec iv[2]; local 108 iv[0].iov_base = &hdr; 109 iv[0].iov_len = sizeof(hdr); 110 iv[1].iov_base = pktd + sizeof(pcap_bluetooth_linux_monitor_header); 111 iv[1].iov_len = handle->snapshot; 115 msg.msg_iov = iv;
|
/freebsd-current/tools/tools/net80211/wesside/wesside/ |
H A D | aircrack-ptw-lib.c | 180 * iv - IV which was used for this packet 185 static void guesskeybytes(uint8_t * iv, uint8_t * keystream, uint8_t * result, int kb) { argument 195 j += state[i] + iv[i]; 225 memcpy(keybuf, state->sessions[i].iv, IVBYTES); 431 * iv - IV used in the session 434 int PTW_addsession(PTW_attackstate * state, uint8_t * iv, uint8_t * keystream) { argument 440 i = (iv[0] << 16) | (iv[1] << 8) | (iv[2]); 446 guesskeybytes(iv, keystrea [all...] |
/freebsd-current/tests/sys/opencrypto/ |
H A D | cryptotest.py | 111 iv = binascii.unhexlify(data['IV']) 118 if len(iv) != 12: 134 rct, rtag = c.encrypt(pt, iv, aad) 148 args = (ct, iv, aad, tag) 185 iv = binascii.unhexlify(data['IV']) 193 r = curfun(c, pt, iv) 218 iv = struct.pack('QQ', int(data['DataUnitSeqNumber']), 0) 230 r = curfun(c, pt, iv) 378 _, r = c.encrypt(msg, iv="") 439 _, r = c.encrypt(msg, iv [all...] |
/freebsd-current/contrib/tcpdump/ |
H A D | print-esp.c | 167 const unsigned char *iv) 169 return EVP_DecryptInit_ex(ctx, cipher, NULL, key, iv); 179 const unsigned char *iv) 181 return EVP_DecryptInit(ctx, cipher, key, iv); 187 const u_char *iv, const u_char *ct, unsigned int ctlen) 214 if (set_cipher_parameters(ctx, NULL, NULL, iv) < 0) { 291 const u_char *iv; local 316 iv = buf; 317 ct = iv + sa->ivlen; 322 pt = do_decrypt(ndo, __func__, sa, iv, 165 set_cipher_parameters(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 177 set_cipher_parameters(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, const unsigned char *key, const unsigned char *iv) argument 186 do_decrypt(netdissect_options *ndo, const char *caller, struct sa_list *sa, const u_char *iv, const u_char *ct, unsigned int ctlen) argument 741 const u_char *iv; local [all...] |
/freebsd-current/crypto/openssl/crypto/cms/ |
H A D | cms_enc.c | 34 unsigned char iv[EVP_MAX_IV_LENGTH], *piv = NULL; local 97 if (RAND_bytes_ex(libctx, iv, ivlen, 0) <= 0) 99 piv = iv; 107 piv = aparams.iv; 175 memcpy(aparams.iv, piv, ivlen);
|
/freebsd-current/bin/timeout/ |
H A D | timeout.c | 146 set_interval(double iv) argument 151 tim.it_value.tv_sec = (time_t)iv; 152 iv -= (time_t)iv; 153 tim.it_value.tv_usec = (suseconds_t)(iv * 1000000UL);
|
/freebsd-current/crypto/openssl/test/ |
H A D | bftest.c | 350 unsigned char cbc_in[40], cbc_out[40], iv[8]; local 360 memcpy(iv, cbc_iv, sizeof(iv)); 362 &key, iv, BF_ENCRYPT); 366 memcpy(iv, cbc_iv, 8); 367 BF_cbc_encrypt(cbc_out, cbc_in, len, &key, iv, BF_DECRYPT); 376 unsigned char cbc_in[40], cbc_out[40], iv[8]; local 386 memcpy(iv, cbc_iv, 8); 389 &key, iv, &n, BF_ENCRYPT); 391 len - 13, &key, iv, 408 unsigned char cbc_in[40], cbc_out[40], iv[8]; local [all...] |
/freebsd-current/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 175 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument 193 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 210 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 435 const u8 *pos, *end, *iv, *integ; local 467 iv = encrypted; 468 pos = iv + iv_len; 499 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, 537 u8 *icv, *iv; local 574 iv [all...] |
/freebsd-current/crypto/openssl/crypto/asn1/ |
H A D | a_bitstr.c | 148 int w, v, iv; local 156 iv = ~v; 178 a->data[w] = ((a->data[w]) & iv) | v;
|