/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | aes-gcm.c | 192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) argument 196 if (iv_len == 12) { 198 os_memcpy(J0, iv, iv_len); 199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len); 207 ghash(H, iv, iv_len, J0); 209 WPA_PUT_BE64(len_buf + 8, iv_len * 8); 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 267 aes_gcm_prepare_j0(iv, iv_len, H, J0); 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument [all...] |
H A D | aes_wrap.h | 44 const u8 *iv, size_t iv_len, 49 const u8 *iv, size_t iv_len, 54 const u8 *iv, size_t iv_len,
|
/freebsd-10.0-release/crypto/openssl/crypto/evp/ |
H A D | evp_locl.h | 134 key_len, iv_len, flags, init_key, cleanup, \ 137 nid##_##nmode, block_size, key_len, iv_len, \ 150 iv_len, flags, init_key, cleanup, set_asn1, \ 153 iv_len, flags, init_key, cleanup, set_asn1, get_asn1, ctrl) 156 iv_len, cbits, flags, init_key, cleanup, \ 159 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 163 iv_len, cbits, flags, init_key, cleanup, \ 166 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 176 nid, block_size, key_len, iv_len, cbits, flags, \ 178 BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, iv_len, flag [all...] |
H A D | openbsd_hw.c | 138 assert(ctx->cipher->iv_len <= MAX_HW_IV); 174 if(ctx->cipher->iv_len) 178 memcpy(lb,&in[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len); 231 memcpy(ctx->iv,&out[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len); 233 memcpy(ctx->iv,lb,ctx->cipher->iv_len);
|
H A D | evp_lib.c | 223 return cipher->iv_len; 228 return ctx->cipher->iv_len;
|
H A D | evp_key.c | 125 niv=type->iv_len;
|
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_subr/ |
H A D | crypto.c | 264 apr_size_t iv_len; 283 apr_err = apr_crypto_passphrase(&key, &iv_len, 297 if (iv_len == 0) 302 SVN_ERR(get_random_bytes(&iv_vector, ctx, iv_len, result_pool)); 379 *iv = wrap_as_string(iv_vector, iv_len, result_pool); 406 apr_size_t block_size, iv_len; 412 apr_err = apr_crypto_passphrase(&key, &iv_len, 425 if (iv_len == 0) 428 if (iv_len != iv->len) 501 apr_size_t iv_len; 262 apr_size_t iv_len; local 404 apr_size_t block_size, iv_len; local 499 apr_size_t iv_len; local 623 apr_size_t block_size, iv_len; local [all...] |
/freebsd-10.0-release/crypto/openssl/ssl/ |
H A D | d1_enc.c | 225 printf("\tEVP_CIPHER_CTX: %d buf_len, %d key_len [%d %d], %d iv_len\n", 228 ds->cipher->iv_len); 230 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
H A D | s2_enc.c | 105 OPENSSL_assert(c->iv_len <= (int)sizeof(s->session->key_arg));
|
H A D | t1_enc.c | 359 c->nid,c->block_size,c->key_len,c->iv_len); 546 fprintf(stderr,"\t iv= "); for (i=0; i<c->iv_len; i++) fprintf(stderr,"%02x", iv[i]); 817 fprintf(stderr,"\tEVP_CIPHER_CTX: %d buf_len, %d key_len [%lu %lu], %d iv_len\n", 820 ds->cipher->iv_len); 822 for (i=0; i<ds->cipher->iv_len; i++) fprintf(stderr,"%02X", ds->iv[i]);
|
/freebsd-10.0-release/contrib/wpa/src/eap_common/ |
H A D | eap_sake_common.h | 76 size_t iv_len; member in struct:eap_sake_parse_attr
|
H A D | ikev2_common.c | 496 size_t iv_len; local 515 iv_len = encr_alg->block_size; 523 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 530 pos = iv + iv_len; 598 size_t iv_len, pad_len; local 614 iv_len = encr_alg->block_size; 636 iv = wpabuf_put(msg, iv_len); 637 if (random_get_bytes(iv, iv_len)) { 642 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len; [all...] |
H A D | eap_sake_common.c | 106 attr->iv_len = pos[1] - 2;
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | cipher-ctr.c | 134 aes_ctr.iv_len = AES_BLOCK_SIZE;
|
H A D | kex.h | 94 u_int iv_len; member in struct:Enc
|
H A D | cipher.c | 64 u_int iv_len; /* defaults to block_size */ member in struct:Cipher 146 return (c->iv_len ? c->iv_len : c->block_size);
|
H A D | cipher-3des1.c | 174 ssh1_3des.iv_len = 0;
|
H A D | cipher-aes.c | 150 rijndal_cbc.iv_len = RIJNDAEL_BLOCKSIZE;
|
H A D | kex.c | 358 enc->iv_len = cipher_ivlen(enc->cipher); 530 if (need < newkeys->enc.iv_len) 531 need = newkeys->enc.iv_len;
|
/freebsd-10.0-release/crypto/openssl/crypto/pem/ |
H A D | pem_info.c | 368 OPENSSL_assert(strlen(objstr)+23+2*enc->iv_len+13 <= sizeof buf); 371 PEM_dek_info(buf,objstr,enc->iv_len,(char *)iv);
|
H A D | pem_lib.c | 392 OPENSSL_assert(enc->iv_len <= (int)sizeof(iv)); 393 if (RAND_pseudo_bytes(iv,enc->iv_len) < 0) /* Generate a salt */ 402 OPENSSL_assert(strlen(objstr)+23+2*enc->iv_len+13 <= sizeof buf); 406 PEM_dek_info(buf,objstr,enc->iv_len,(char *)iv); 540 if (!load_iv(header_pp,&(cipher->iv[0]),enc->iv_len))
|
/freebsd-10.0-release/crypto/openssl/crypto/engine/ |
H A D | eng_cryptodev.c | 391 if (ctx->cipher->iv_len) { 394 iiv = in + inl - ctx->cipher->iv_len; 395 memcpy(save_iv, iiv, ctx->cipher->iv_len); 407 if (ctx->cipher->iv_len) { 409 iiv = out + inl - ctx->cipher->iv_len; 412 memcpy(ctx->iv, iiv, ctx->cipher->iv_len); 427 ctx->cipher->iv_len <= ciphers[i].ivmax &&
|
/freebsd-10.0-release/sys/mips/rmi/dev/sec/ |
H A D | rmilib.c | 144 int iv_len; local 184 iv_len = 0; 188 iv_len = XLR_SEC_DES_IV_LENGTH; 193 iv_len = XLR_SEC_AES_IV_LENGTH; 196 iv_len = XLR_SEC_ARC4_IV_LENGTH; 199 iv_len = XLR_SEC_KASUMI_F8_IV_LENGTH; 207 size = op->source_buf_size + iv_len; 226 memcpy(desc->user.aligned_src, &op->initial_vector[0], iv_len); 229 memcpy((uint8_t *) (desc->user.aligned_src + iv_len), 238 op->source_buf_size += iv_len; [all...] |
/freebsd-10.0-release/crypto/openssl/apps/ |
H A D | enc.c | 655 if (cipher->iv_len > 0) 658 for (i=0; i<cipher->iv_len; i++)
|
/freebsd-10.0-release/crypto/openssl/engines/ccgost/ |
H A D | gost_crypt.c | 45 8,/*iv_len */ 63 8,/*iv_len */ 432 if (!ASN1_OCTET_STRING_set(gcp->iv, ctx->iv, ctx->cipher->iv_len)) 485 if (len != ctx->cipher->iv_len)
|