/freebsd-11-stable/crypto/openssl/crypto/aes/ |
H A D | aes.h | 137 int AES_wrap_key(AES_KEY *key, const unsigned char *iv, 140 int AES_unwrap_key(AES_KEY *key, const unsigned char *iv,
|
/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 97 unsigned char iv[EVP_MAX_IV_LENGTH]; 120 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher)); 121 else if (RAND_bytes(iv, EVP_CIPHER_iv_length(cipher)) <= 0) 128 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0))
|
/freebsd-11-stable/contrib/apr-util/include/private/ |
H A D | apr_crypto_internal.h | 121 * @param iv Optional initialisation vector. If the buffer pointed to is NULL, 133 const unsigned char **iv, const apr_crypto_key_t *key, 184 * @param iv Optional initialisation vector. If the buffer pointed to is NULL, 194 apr_size_t *blockSize, const unsigned char *iv,
|
/freebsd-11-stable/crypto/openssl/crypto/idea/ |
H A D | ideatest.c | 116 unsigned char iv[8]; local 151 memcpy(iv, k, 8); 152 idea_cbc_encrypt((unsigned char *)text, out, strlen(text) + 1, &key, iv, 154 memcpy(iv, k, 8); 155 idea_cbc_encrypt(out, out, 8, &dkey, iv, 0); 156 idea_cbc_encrypt(&(out[8]), &(out[8]), strlen(text) + 1 - 8, &dkey, iv,
|
/freebsd-11-stable/contrib/libpcap/ |
H A D | pcap-bt-monitor-linux.c | 90 struct iovec iv[2]; local 100 iv[0].iov_base = &hdr; 101 iv[0].iov_len = sizeof(hdr); 102 iv[1].iov_base = pktd + sizeof(pcap_bluetooth_linux_monitor_header); 103 iv[1].iov_len = handle->snapshot; 107 msg.msg_iov = iv;
|
/freebsd-11-stable/crypto/openssl/crypto/aes/asm/ |
H A D | aesni-sha256-x86_64.pl | 89 # unsigned char *iv, 204 ($iv,$inout,$roundkey,$temp, 216 '&vpxor ($inout,$inout,$iv);', 249 '&vpand ($iv,$temp,$mask10);'. 261 '&vpor ($iv,$iv,$temp);'. 268 ## &vpor ($iv,$iv,$temp); 269 ## &vmovdqu ($iv,($out,$inp); 382 vmovdqu ($ivp),$iv # loa [all...] |
/freebsd-11-stable/tools/tools/net80211/wesside/wesside/ |
H A D | aircrack-ptw-lib.c | 182 * iv - IV which was used for this packet 187 static void guesskeybytes(uint8_t * iv, uint8_t * keystream, uint8_t * result, int kb) { argument 197 j += state[i] + iv[i]; 227 memcpy(keybuf, state->sessions[i].iv, IVBYTES); 433 * iv - IV used in the session 436 int PTW_addsession(PTW_attackstate * state, uint8_t * iv, uint8_t * keystream) { argument 442 i = (iv[0] << 16) | (iv[1] << 8) | (iv[2]); 448 guesskeybytes(iv, keystrea [all...] |
/freebsd-11-stable/sys/sparc64/sbus/ |
H A D | dma_sbus.c | 286 uint32_t base, iv, *intr; local 334 iv = intr[i]; 339 if ((iv & INTMAP_OBIO_MASK) == 0) 340 iv |= slot << 3; 342 iv |= dsc->sc_ign << INTMAP_IGN_SHIFT; 344 iv, iv, 1);
|
H A D | sbus.c | 469 u_int32_t base, iv, *intr; local 517 iv = intr[i]; 522 if ((iv & INTMAP_OBIO_MASK) == 0) 523 iv |= slot << 3; 524 iv = INTMAP_VEC(sc->sc_ign, iv); 526 iv, iv, 1); 618 struct intr_vector *iv = arg; local 619 struct sbus_icarg *sica = iv 628 struct intr_vector *iv = arg; local 637 struct intr_vector *iv = arg; local 647 struct intr_vector *iv = arg; local [all...] |
/freebsd-11-stable/sys/crypto/aesni/ |
H A D | aesni.c | 519 uint8_t iv[AES_BLOCK_LEN]; local 578 /* Setup iv */ 581 bcopy(enccrd->crd_iv, iv, ivlen); 583 arc4rand(iv, ivlen, 0); 587 enccrd->crd_inject, ivlen, iv); 590 bcopy(enccrd->crd_iv, iv, ivlen); 593 enccrd->crd_inject, ivlen, iv); 607 enccrd->crd_len, buf, buf, iv); 610 enccrd->crd_len, buf, iv); 615 enccrd->crd_len, buf, buf, iv); [all...] |
H A D | aesni_wrap.c | 58 const uint8_t *from, uint8_t *to, const uint8_t iv[static AES_BLOCK_LEN]) 64 ivreg = _mm_loadu_si128((const __m128i *)iv); 77 uint8_t *buf, const uint8_t iv[static AES_BLOCK_LEN]) 84 ivreg = _mm_loadu_si128((const __m128i *)iv); 207 const uint8_t *from, uint8_t *to, const uint8_t iv[static AES_BLOCK_LEN]) 222 ctr1 = _mm_loadu_si128((__m128i*)iv); 381 uint8_t *to, const uint8_t iv[static AES_BLOCK_LEN], int do_encrypt) 392 bcopy(iv, tweak, AES_XTS_IVSIZE); 421 const uint8_t iv[static AES_BLOCK_LEN]) 425 iv, [all...] |
/freebsd-11-stable/crypto/openssl/crypto/rc2/ |
H A D | rc2test.c | 189 memcpy(iv, k, 8); 190 idea_cbc_encrypt((unsigned char *)text, out, strlen(text) + 1, &key, iv, 192 memcpy(iv, k, 8); 193 idea_cbc_encrypt(out, out, 8, &dkey, iv, 0); 194 idea_cbc_encrypt(&(out[8]), &(out[8]), strlen(text) + 1 - 8, &dkey, iv,
|
/freebsd-11-stable/usr.bin/timeout/ |
H A D | timeout.c | 149 set_interval(double iv) argument 154 tim.it_value.tv_sec = (time_t)iv; 155 iv -= (time_t)iv; 156 tim.it_value.tv_usec = (suseconds_t)(iv * 1000000UL);
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | e_aes_cbc_hmac_sha1.c | 112 const AES_KEY *key, unsigned char iv[16], 116 const AES_KEY *key, unsigned char iv[16], 123 const unsigned char *iv, int enc) 203 u64 iv[2]; member in struct:__anon4585 251 memcpy(ciph_d[0].iv, IVs, 16); 258 memcpy(ciph_d[i].iv, IVs, 16); 331 memcpy(ciph_d[i].iv, ciph_d[i].out - 16, 16); 434 len += 16; /* account for explicit iv */ 461 size_t plen = key->payload_length, iv = 0, /* explicit IV in TLS 1.1 and local 483 iv 121 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument [all...] |
H A D | openbsd_hw.c | 177 cryp.iv = (caddr_t) ctx->iv; 230 memcpy(ctx->iv, &out[cryp.len - ctx->cipher->iv_len], 233 memcpy(ctx->iv, lb, ctx->cipher->iv_len); 240 const unsigned char *iv, int enc) 254 const unsigned char *iv, int enc)
|
H A D | e_aes_cbc_hmac_sha256.c | 112 const AES_KEY *key, unsigned char iv[16], 119 const unsigned char *iv, int enc) 199 u64 iv[2]; member in struct:__anon4593 248 memcpy(ciph_d[0].iv, IVs, 16); 255 memcpy(ciph_d[i].iv, IVs, 16); 331 memcpy(ciph_d[i].iv, ciph_d[i].out - 16, 16); 449 len += 16; /* account for explicit iv */ 477 size_t plen = key->payload_length, iv = 0, /* explicit IV in TLS 1.1 and local 499 iv = AES_BLOCK_SIZE; 516 plen > (sha_off + iv) 117 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument [all...] |
/freebsd-11-stable/sys/net80211/ |
H A D | ieee80211_crypto_wep.c | 127 uint32_t iv; local 151 iv = ctx->wc_iv; 152 if ((iv & 0xff00) == 0xff00) { 153 int B = (iv & 0xff0000) >> 16; 155 iv += 0x0100; 157 ctx->wc_iv = iv + 1; 164 ivp[0] = iv >> 0; 165 ivp[1] = iv >> 8; 166 ivp[2] = iv >> 16; 168 ivp[2] = iv >> [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 175 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument 193 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 210 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 435 const u8 *pos, *end, *iv, *integ; local 467 iv = encrypted; 468 pos = iv + iv_len; 499 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, 537 u8 *icv, *iv; local 574 iv [all...] |
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost_asn1.c | 45 ASN1_SIMPLE(GOST_CIPHER_PARAMS, iv, ASN1_OCTET_STRING),
|
/freebsd-11-stable/sys/opencrypto/ |
H A D | gmac.c | 64 AES_GMAC_Reinit(struct aes_gmac_ctx *agc, const uint8_t *iv, uint16_t ivlen) argument 68 bcopy(iv, agc->counter, ivlen);
|
H A D | xform_aes_xts.c | 76 aes_xts_reinit(caddr_t key, u_int8_t *iv) argument 86 bcopy(iv, &blocknum, AES_XTS_IVSIZE);
|
H A D | cryptosoft.c | 87 unsigned char iv[EALG_MAX_BLOCK_LEN], blk[EALG_MAX_BLOCK_LEN], *idat; local 115 bcopy(crd->crd_iv, iv, ivlen); 117 arc4rand(iv, ivlen, 0); 121 crypto_copyback(flags, buf, crd->crd_inject, ivlen, iv); 126 bcopy(crd->crd_iv, iv, ivlen); 129 crypto_copydata(flags, buf, crd->crd_inject, ivlen, iv); 165 ivp = iv; 172 exf->reinit(sw->sw_kschedule, iv); 213 bcopy(blk, iv, blks); 214 ivp = iv; 465 u_char iv[EALG_MAX_BLOCK_LEN]; local [all...] |
/freebsd-11-stable/crypto/openssl/crypto/bf/ |
H A D | bftest.c | 367 unsigned char cbc_in[40], cbc_out[40], iv[8]; local 467 memcpy(iv, cbc_iv, sizeof(iv)); 469 &key, iv, BF_ENCRYPT); 476 memcpy(iv, cbc_iv, 8); 477 BF_cbc_encrypt(cbc_out, cbc_in, len, &key, iv, BF_DECRYPT); 488 memcpy(iv, cbc_iv, 8); 491 &key, iv, &n, BF_ENCRYPT); 493 len - 13, &key, iv, &n, BF_ENCRYPT); 501 memcpy(iv, cbc_i [all...] |
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | pkcs5.c | 33 u8 iv[8]; member in struct:pkcs5_params 269 os_memcpy(params->iv, hdr.payload, hdr.length); 271 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); 402 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len); 404 return crypto_cipher_init(CRYPTO_CIPHER_ALG_3DES, params->iv, 517 u8 iv[8]; local 537 sizeof(iv), iv) < 0) { 545 wpa_hexdump_key(MSG_DEBUG, "PKCS #12: DES IV", iv, sizeof(iv)); [all...] |
/freebsd-11-stable/crypto/openssl/crypto/des/ |
H A D | des.c | 355 DES_cblock iv, iv2; local 438 memset(iv, 0, sizeof(iv)); 494 (long)l, ks, ks2, &iv, &iv2, do_encrypt); 498 DES_cbc_encrypt(buf, obuf, (long)l, &ks, &iv, do_encrypt); 500 memcpy(iv, &(obuf[l - 8]), 8); 555 (long)l, ks, ks2, &iv, &iv2, do_encrypt); 557 DES_cbc_encrypt(buf, obuf, (long)l, &ks, &iv, do_encrypt); 559 memcpy(iv, &(buf[l - 8]), 8); 617 OPENSSL_cleanse(iv, sizeo [all...] |