/freebsd-10.0-release/sys/kgssapi/krb5/ |
H A D | kcrypto.h | 66 struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen); 119 size_t skip, size_t len, void *ivec, size_t ivlen) 122 ks->ks_class->ec_encrypt(ks, inout, skip, len, ivec, ivlen); 127 size_t skip, size_t len, void *ivec, size_t ivlen) 130 ks->ks_class->ec_decrypt(ks, inout, skip, len, ivec, ivlen); 118 krb5_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 126 krb5_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
H A D | kcrypto_arcfour.c | 132 size_t skip, size_t len, void *ivec, size_t ivlen) 144 arcfour_hmac(newkey, ivec, ivlen, kk); 131 arcfour_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
H A D | kcrypto_des.c | 203 size_t skip, size_t len, void *ivec, size_t ivlen) 212 size_t skip, size_t len, void *ivec, size_t ivlen) 202 des1_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 211 des1_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
H A D | kcrypto_aes.c | 174 size_t skip, size_t len, void *ivec, size_t ivlen) 245 size_t skip, size_t len, void *ivec, size_t ivlen) 173 aes_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 244 aes_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
H A D | kcrypto_des3.c | 213 size_t skip, size_t len, void *ivec, size_t ivlen) 221 size_t skip, size_t len, void *ivec, size_t ivlen) 212 des3_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 220 des3_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
/freebsd-10.0-release/crypto/openssl/crypto/evp/ |
H A D | e_aes.c | 80 int ivlen; /* IV length */ member in struct:__anon5125 324 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 333 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 335 memcpy(gctx->iv, iv, gctx->ivlen); 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 427 keylen/8,ivlen, \ 437 #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ 440 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ 449 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ [all...] |
/freebsd-10.0-release/sys/mips/nlm/dev/sec/ |
H A D | nlmseclib.c | 106 cmd->iv, cmd->ivlen); 108 cmd->iv, cmd->ivlen); 182 cmd->ivlen, cmd->cipheroff, cmd->cipherlen); 242 cmd->ivoff, cmd->ivlen, cmd->hashoff, cmd->hashlen, 285 cmd->ivlen = XLP_SEC_DES_IV_LENGTH; 290 cmd->ivlen = XLP_SEC_DES_IV_LENGTH; 295 cmd->ivlen = XLP_SEC_AES_IV_LENGTH; 300 cmd->ivlen = XLP_SEC_ARC4_IV_LENGTH;
|
H A D | nlmsec.c | 258 printf("ivlen :%d\n",cmd->ivlen); 293 unsigned int ivlen = 0; local 322 ivlen = ((crd->crd_alg == CRYPTO_AES_CBC) ? 325 crd->crd_skip + crd->crd_len - ivlen, ivlen, 571 unsigned int ivlen = 0; local 579 ivlen = ((enccrd->crd_alg == CRYPTO_AES_CBC) ? 583 bcopy(enccrd->crd_iv, cmd->iv, ivlen); 586 ivlen); [all...] |
H A D | nlmseclib.h | 110 uint32_t ivlen; member in struct:xlp_sec_command
|
/freebsd-10.0-release/sys/mips/nlm/hal/ |
H A D | nlmsaelib.h | 240 * ivlen : iv length in bytes 245 unsigned int hashout_l3alloc, unsigned int encrypt, unsigned int ivlen, 252 left_shift64_mask((ivlen - 1), 41, 16) | 497 * ivlen : iv length in bytes 508 unsigned int hash_source, unsigned int ivoff, unsigned int ivlen, 513 ivlen, vtophys(hashdst_addr)); 528 * ivlen : iv length in bytes 537 unsigned int ivoff, unsigned int ivlen, unsigned int cipheroff, 540 param->desc0 = nlm_crypto_form_pkt_desc0(0, 0, 0, encrypt, ivlen, 0ULL); 244 nlm_crypto_form_pkt_desc0(unsigned int tls, unsigned int hash_source, unsigned int hashout_l3alloc, unsigned int encrypt, unsigned int ivlen, uint64_t hashdst_addr) argument 506 nlm_crypto_fill_cipher_auth_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int encrypt, unsigned int hash_source, unsigned int ivoff, unsigned int ivlen, unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, unsigned int cipheroff, unsigned int cipherlen, unsigned char *hashdst_addr) argument 535 nlm_crypto_fill_cipher_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int encrypt, unsigned int ivoff, unsigned int ivlen, unsigned int cipheroff, unsigned int cipherlen) argument
|
/freebsd-10.0-release/contrib/tcpdump/ |
H A D | print-esp.c | 79 int ivlen; member in struct:sa_list 121 buf = buf + sa->ivlen; 251 sa->ivlen = 0; 257 sa->ivlen = EVP_CIPHER_iv_length(evp); 545 int ivlen = 0; local 651 ivlen = sa->ivlen; 665 EVP_Cipher(&ctx, p + ivlen, p + ivlen, ep - (p + ivlen)); [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/cms/ |
H A D | cms_enc.c | 125 int ivlen; local 128 ivlen = EVP_CIPHER_CTX_iv_length(ctx); 129 if (ivlen > 0) 131 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
|
H A D | cms_pwri.c | 95 int ivlen; local 133 ivlen = EVP_CIPHER_CTX_iv_length(&ctx); 135 if (ivlen > 0) 137 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | cipher.c | 251 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, 278 if (iv != NULL && ivlen < cipher_ivlen(cipher)) 280 ivlen, cipher->name); 422 int ivlen; local 425 ivlen = 24; 427 ivlen = EVP_CIPHER_CTX_iv_length(&cc->evp); 428 return (ivlen); 250 cipher_init(CipherContext *cc, const Cipher *cipher, const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, int do_encrypt) argument
|
H A D | monitor_wrap.c | 610 u_int ivlen, keylen; local 624 ivlen = packet_get_keyiv_len(MODE_OUT); 625 packet_get_keyiv(MODE_OUT, iv, ivlen); 626 buffer_put_string(&m, iv, ivlen); 627 ivlen = packet_get_keyiv_len(MODE_IN); 628 packet_get_keyiv(MODE_IN, iv, ivlen); 629 buffer_put_string(&m, iv, ivlen);
|
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | crypto_gnutls.c | 202 int ivlen; local 261 ivlen = gcry_cipher_get_algo_blklen(a); 262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
|
/freebsd-10.0-release/sys/netipsec/ |
H A D | xform_esp.c | 196 * crypto code happy but if we use it to set ivlen then 200 sav->ivlen = (txform == &enc_xform_null ? 0 : txform->blocksize); 201 sav->iv = (caddr_t) malloc(sav->ivlen, M_XDATA, M_WAITOK); 202 key_randomfill(sav->iv, sav->ivlen); /*XXX*/ 301 hlen = sizeof (struct esp) + sav->ivlen; 303 hlen = sizeof (struct newesp) + sav->ivlen; 439 crde->crd_inject = skip + hlen - sav->ivlen; 586 hlen = sizeof (struct esp) + sav->ivlen; 588 hlen = sizeof (struct newesp) + sav->ivlen; 697 hlen = sizeof (struct esp) + sav->ivlen; [all...] |
H A D | keydb.h | 134 u_int ivlen; /* length of IV */ member in struct:secasvar
|
H A D | key_debug.c | 285 printf(" { id=%d ivlen=%d min=%d max=%d }\n", 597 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
|
H A D | key.c | 3200 sav->ivlen = 0; 7940 key_randomfill(sav->iv, sav->ivlen);
|
/freebsd-10.0-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 329 int keylen,ivlen; local 339 ivlen=EVP_CIPHER_iv_length(evp_cipher); 341 if (ivlen > 0) 342 if (RAND_pseudo_bytes(iv,ivlen) <= 0) 351 if (ivlen > 0) { 513 int keylen,ivlen;
|
/freebsd-10.0-release/sys/dev/hifn/ |
H A D | hifn7751.c | 1555 int using_mac, using_crypt, len, ivlen; local 1644 ivlen = HIFN_AES_IV_LENGTH; 1647 ivlen = HIFN_IV_LENGTH; 1650 bcopy(cmd->iv, buf_pos, ivlen); 1651 buf_pos += ivlen; 2450 int session, err, ivlen; local 2568 ivlen = ((enccrd->crd_alg == CRYPTO_AES_CBC) ? 2572 bcopy(enccrd->crd_iv, cmd->iv, ivlen); 2575 cmd->iv, ivlen); 2581 ivlen, cm 2772 int totlen, i, u, ivlen; local [all...] |
/freebsd-10.0-release/crypto/openssl/ssl/ |
H A D | t1_enc.c | 358 fprintf(stderr,"\tevp_cipher: nid, blksz= %d, %d, keylen=%d, ivlen=%d\n", 705 int ivlen; local 710 ivlen = EVP_CIPHER_iv_length(enc); 712 ivlen = 0; 713 if (ivlen > 1) 722 else if (RAND_bytes(rec->input, ivlen) <= 0)
|