/freebsd-11-stable/contrib/wpa/src/wps/ |
H A D | wps_attr_build.c | 389 u8 *iv, *data; local 400 iv = wpabuf_put(msg, block_size); 401 if (random_get_bytes(iv, block_size) < 0) 406 if (aes_128_cbc_encrypt(wps->keywrapkey, iv, data, wpabuf_len(plain)))
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | t1_enc.c | 328 unsigned char *ms, *key, *iv; local 479 iv = &(p[n]); 490 iv = &(p[n]); 525 * In here I set both the read and write key/iv to the same value 545 iv = iv1; 547 iv = &(iv1[k]); 555 fprintf(stderr, "EVP_CipherInit_ex(dd,c,key=,iv=,which)\n"); 560 fprintf(stderr, "\t iv= "); 562 fprintf(stderr, "%02x", iv[i]); 569 || !EVP_CIPHER_CTX_ctrl(dd, EVP_CTRL_GCM_SET_IV_FIXED, k, iv)) { [all...] |
H A D | bad_dtls_test.c | 588 unsigned char iv[16]; local 629 RAND_bytes(iv, sizeof(iv)); 631 EVP_CipherInit_ex(&enc_ctx, EVP_aes_128_cbc(), NULL, enc_key, iv, 1); 640 lenbytes[0] = (unsigned char)((len + sizeof(iv)) >> 8); 641 lenbytes[1] = (unsigned char)(len + sizeof(iv)); 644 BIO_write(rbio, iv, sizeof(iv));
|
/freebsd-11-stable/crypto/openssl/crypto/aes/asm/ |
H A D | aesni-x86_64.pl | 219 $in0="%xmm8"; $iv="%xmm9"; 952 my $iv="%xmm6"; 963 movaps %xmm6,(%rsp) # $iv 971 movdqu ($ivp),$iv 979 movdqa $iv,$inout0 981 pshufb $bswap_mask,$iv 1007 paddq $increment,$iv 1013 xorps $inout0,$in0 # inp ^= E(iv) 1014 movdqa $iv,$inout0 1026 pxor $iv, [all...] |
/freebsd-11-stable/sys/crypto/via/ |
H A D | padlock_cipher.c | 84 void *iv) 93 : "+a" (iv), "+c" (count), "+D" (out), "+S" (in) 83 padlock_cbc(void *in, void *out, size_t count, void *key, union padlock_cw *cw, void *iv) argument
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.h | 281 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 283 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
|
H A D | eap_sim_common.h | 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs 207 size_t encr_data_len, const u8 *iv,
|
/freebsd-11-stable/sys/netpfil/ipfw/ |
H A D | ip_fw_table.h | 174 void ipfw_import_table_value_v1(ipfw_table_value *iv); 175 void ipfw_export_table_value_v1(struct table_value *v, ipfw_table_value *iv);
|
/freebsd-11-stable/sys/mips/nlm/dev/sec/ |
H A D | nlmsec.c | 314 /* Copy the last 8 or 16 bytes to the session iv, so that in few 583 bcopy(enccrd->crd_iv, cmd->iv, ivlen); 585 bcopy(sc->sc_sessions[session].ses_iv, cmd->iv, 591 ivlen, cmd->iv); 595 bcopy(enccrd->crd_iv, cmd->iv, ivlen); 598 enccrd->crd_inject, ivlen, cmd->iv); 664 if ((cmd->iv = malloc(EALG_MAX_BLOCK_LEN, M_DEVBUF, 685 if (cmd->iv != NULL) 686 free(cmd->iv, M_DEVBUF);
|
/freebsd-11-stable/sys/dev/usb/wlan/ |
H A D | if_rumreg.h | 251 uint32_t iv; member in struct:rum_tx_desc 289 uint32_t iv; member in struct:rum_rx_desc
|
/freebsd-11-stable/crypto/openssl/crypto/modes/ |
H A D | xts128.c | 62 const unsigned char iv[16], 82 memcpy(tweak.c, iv, 16); 61 CRYPTO_xts128_encrypt(const XTS128_CONTEXT *ctx, const unsigned char iv[16], const unsigned char *inp, unsigned char *out, size_t len, int enc) argument
|
/freebsd-11-stable/contrib/apr-util/crypto/ |
H A D | apr_crypto_nss.c | 745 * @param iv Optional initialisation vector. If the buffer pointed to is NULL, 757 const unsigned char **iv, const apr_crypto_key_t *key, 778 if (iv == NULL) { 781 if (*iv == NULL) { 792 *iv = usedIv; 795 usedIv = (unsigned char *) *iv; 927 * @param iv Optional initialisation vector. If the buffer pointed to is NULL, 937 apr_size_t *blockSize, const unsigned char *iv, 957 if (iv == NULL) { 960 ivItem.data = (unsigned char*) iv; 756 crypto_block_encrypt_init(apr_crypto_block_t **ctx, const unsigned char **iv, const apr_crypto_key_t *key, apr_size_t *blockSize, apr_pool_t *p) argument 936 crypto_block_decrypt_init(apr_crypto_block_t **ctx, apr_size_t *blockSize, const unsigned char *iv, const apr_crypto_key_t *key, apr_pool_t *p) argument [all...] |
/freebsd-11-stable/contrib/gcc/ |
H A D | tree-scalar-evolution.c | 905 nb_iter computations in loop-iv. This also allows the 2792 /* Checks whether OP behaves as a simple affine iv of LOOP in STMT and returns argument 2795 integer constant. IV->no_overflow is set to true if we are sure the iv cannot 2799 simple_iv (struct loop *loop, tree stmt, tree op, affine_iv *iv, 2806 iv->base = NULL_TREE; 2807 iv->step = NULL_TREE; 2808 iv->no_overflow = false; 2823 iv->base = ev; 2824 iv->no_overflow = true; 2832 iv [all...] |
H A D | tree-ssa-loop-prefetch.c | 340 affine_iv iv; local 346 if (!simple_iv (ar_data->loop, ar_data->stmt, *index, &iv, false)) 348 ibase = iv.base; 349 step = iv.step;
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | speed.c | 473 unsigned char iv[2 * MAX_BLOCK_SIZE / 8]; local 697 memset(iv, 0, sizeof(iv)); 1738 iv, AES_ENCRYPT); 1751 iv, AES_ENCRYPT); 1764 iv, AES_ENCRYPT); 1778 iv, AES_ENCRYPT); 1791 iv, AES_ENCRYPT); 1804 iv, AES_ENCRYPT); 1834 iv, CAMELLIA_ENCRYP [all...] |
/freebsd-11-stable/contrib/apr-util/test/ |
H A D | testcrypto.c | 278 apr_size_t *cipherTextLen, const unsigned char **iv, 292 rv = apr_crypto_block_encrypt_init(&block, iv, key, blockSize, pool); 370 apr_size_t *plainTextLen, const unsigned char *iv, 384 rv = apr_crypto_block_decrypt_init(&block, blockSize, iv, key, pool); 481 const unsigned char *iv = NULL; local 490 &cipherText, &cipherTextLen, &iv, &blockSize, description); 492 cipherTextLen, &plainText, &plainTextLen, iv, &blockSize, 507 iv = NULL; 512 &cipherText, &cipherTextLen, &iv, &blockSize, description); 514 cipherTextLen, &plainText, &plainTextLen, iv, 274 encrypt_block(abts_case *tc, apr_pool_t *pool, const apr_crypto_driver_t *driver, const apr_crypto_t *f, const apr_crypto_key_t *key, const unsigned char *in, const apr_size_t inlen, unsigned char **cipherText, apr_size_t *cipherTextLen, const unsigned char **iv, apr_size_t *blockSize, const char *description) argument 366 decrypt_block(abts_case *tc, apr_pool_t *pool, const apr_crypto_driver_t *driver, const apr_crypto_t *f, const apr_crypto_key_t *key, unsigned char *cipherText, apr_size_t cipherTextLen, unsigned char **plainText, apr_size_t *plainTextLen, const unsigned char *iv, apr_size_t *blockSize, const char *description) argument [all...] |
/freebsd-11-stable/crypto/openssh/openbsd-compat/ |
H A D | blowfish.c | 585 blf_cbc_encrypt(blf_ctx *c, u_int8_t *iv, u_int8_t *data, u_int32_t len) argument 592 data[j] ^= iv[j]; 604 iv = data; 613 u_int8_t *iv; local 616 iv = data + len - 16; 631 data[j] ^= iv[j]; 632 iv -= 8;
|
/freebsd-11-stable/usr.sbin/mfiutil/ |
H A D | mfi_config.c | 56 long iv; local 60 iv = strtoq(value, &vtp, 0); 66 iv *= 1024; 68 iv *= 1024; 70 iv *= 1024; 72 iv *= 1024; 78 return (iv);
|
/freebsd-11-stable/usr.sbin/mptutil/ |
H A D | mpt_config.c | 57 long iv; local 61 iv = strtoq(value, &vtp, 0); 67 iv *= 1024; 70 iv *= 1024; 73 iv *= 1024; 76 iv *= 1024; 83 return (iv);
|
/freebsd-11-stable/tools/regression/net80211/wep/ |
H A D | test_wep.c | 130 /* XXX fix byte order of iv */ 142 u_int8_t iv[4]; member in struct:ciphertest 257 memcpy(&ctx->wc_iv, t->iv, sizeof(t->iv)); /* for encap/encrypt */
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | evp.h | 318 const unsigned char *iv, int enc); 353 /* Set if the iv handling should be done by the cipher itself */ 367 /* Allow use default ASN1 get/set iv */ 446 unsigned char iv[EVP_MAX_IV_LENGTH]; member in struct:evp_cipher_info_st 455 unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ 456 unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ member in struct:evp_cipher_ctx_st 614 unsigned char *iv); 621 const unsigned char *key, const unsigned char *iv); 624 const unsigned char *iv); [all...] |
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 2212 rc2params.iv = *ivec; 2263 ret = der_copy_octet_string(&rc2param.iv, ivec); 2743 heim_octet_string *key, heim_octet_string *iv, 2778 PKCS12_IV_ID, iter, iv->length, iv->data, md)) { 2866 heim_octet_string key, iv; local 2875 memset(&iv, 0, sizeof(iv)); 2895 iv.length = EVP_CIPHER_iv_length(c); 2896 iv 2739 PBE_string2key(hx509_context context, const char *password, const heim_octet_string *parameters, hx509_crypto *crypto, heim_octet_string *key, heim_octet_string *iv, const heim_oid *enc_oid, const EVP_MD *md) argument [all...] |
/freebsd-11-stable/crypto/openssl/engines/ccgost/ |
H A D | gost_lcl.h | 115 ASN1_OCTET_STRING *iv; member in struct:__anon6463
|
/freebsd-11-stable/contrib/nvi/cl/ |
H A D | cl_funcs.c | 44 int iv; local 53 iv = 0; 57 iv = 1; 70 if (iv)
|
/freebsd-11-stable/tools/tools/net80211/wesside/wesside/ |
H A D | wesside.c | 93 unsigned char iv[3]; member in struct:prga_info 107 unsigned char iv[3]; member in struct:wep_log 642 // iv 643 memcpy(body, prgainfo.iv, 3); 826 void set_prga(unsigned char* iv, unsigned char* cipher, argument 842 memcpy(prgainfo.iv, iv, 3); 850 prgainfo.len, prgainfo.iv[0], prgainfo.iv[1], prgainfo.iv[ [all...] |