Searched refs:ivlen (Results 1 - 23 of 23) sorted by relevance

/freebsd-10.0-release/sys/kgssapi/krb5/
H A Dkcrypto.h66 struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen);
119 size_t skip, size_t len, void *ivec, size_t ivlen)
122 ks->ks_class->ec_encrypt(ks, inout, skip, len, ivec, ivlen);
127 size_t skip, size_t len, void *ivec, size_t ivlen)
130 ks->ks_class->ec_decrypt(ks, inout, skip, len, ivec, ivlen);
118 krb5_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
126 krb5_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
H A Dkcrypto_arcfour.c132 size_t skip, size_t len, void *ivec, size_t ivlen)
144 arcfour_hmac(newkey, ivec, ivlen, kk);
131 arcfour_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
H A Dkcrypto_des.c203 size_t skip, size_t len, void *ivec, size_t ivlen)
212 size_t skip, size_t len, void *ivec, size_t ivlen)
202 des1_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
211 des1_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
H A Dkcrypto_aes.c174 size_t skip, size_t len, void *ivec, size_t ivlen)
245 size_t skip, size_t len, void *ivec, size_t ivlen)
173 aes_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
244 aes_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
H A Dkcrypto_des3.c213 size_t skip, size_t len, void *ivec, size_t ivlen)
221 size_t skip, size_t len, void *ivec, size_t ivlen)
212 des3_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
220 des3_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
/freebsd-10.0-release/crypto/openssl/crypto/evp/
H A De_aes.c80 int ivlen; /* IV length */ member in struct:__anon5125
324 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen);
333 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen);
335 memcpy(gctx->iv, iv, gctx->ivlen);
416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \
418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \
427 keylen/8,ivlen, \
437 #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \
440 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \
449 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \
[all...]
/freebsd-10.0-release/sys/mips/nlm/dev/sec/
H A Dnlmseclib.c106 cmd->iv, cmd->ivlen);
108 cmd->iv, cmd->ivlen);
182 cmd->ivlen, cmd->cipheroff, cmd->cipherlen);
242 cmd->ivoff, cmd->ivlen, cmd->hashoff, cmd->hashlen,
285 cmd->ivlen = XLP_SEC_DES_IV_LENGTH;
290 cmd->ivlen = XLP_SEC_DES_IV_LENGTH;
295 cmd->ivlen = XLP_SEC_AES_IV_LENGTH;
300 cmd->ivlen = XLP_SEC_ARC4_IV_LENGTH;
H A Dnlmsec.c258 printf("ivlen :%d\n",cmd->ivlen);
293 unsigned int ivlen = 0; local
322 ivlen = ((crd->crd_alg == CRYPTO_AES_CBC) ?
325 crd->crd_skip + crd->crd_len - ivlen, ivlen,
571 unsigned int ivlen = 0; local
579 ivlen = ((enccrd->crd_alg == CRYPTO_AES_CBC) ?
583 bcopy(enccrd->crd_iv, cmd->iv, ivlen);
586 ivlen);
[all...]
H A Dnlmseclib.h110 uint32_t ivlen; member in struct:xlp_sec_command
/freebsd-10.0-release/sys/mips/nlm/hal/
H A Dnlmsaelib.h240 * ivlen : iv length in bytes
245 unsigned int hashout_l3alloc, unsigned int encrypt, unsigned int ivlen,
252 left_shift64_mask((ivlen - 1), 41, 16) |
497 * ivlen : iv length in bytes
508 unsigned int hash_source, unsigned int ivoff, unsigned int ivlen,
513 ivlen, vtophys(hashdst_addr));
528 * ivlen : iv length in bytes
537 unsigned int ivoff, unsigned int ivlen, unsigned int cipheroff,
540 param->desc0 = nlm_crypto_form_pkt_desc0(0, 0, 0, encrypt, ivlen, 0ULL);
244 nlm_crypto_form_pkt_desc0(unsigned int tls, unsigned int hash_source, unsigned int hashout_l3alloc, unsigned int encrypt, unsigned int ivlen, uint64_t hashdst_addr) argument
506 nlm_crypto_fill_cipher_auth_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int encrypt, unsigned int hash_source, unsigned int ivoff, unsigned int ivlen, unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, unsigned int cipheroff, unsigned int cipherlen, unsigned char *hashdst_addr) argument
535 nlm_crypto_fill_cipher_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int encrypt, unsigned int ivoff, unsigned int ivlen, unsigned int cipheroff, unsigned int cipherlen) argument
/freebsd-10.0-release/contrib/tcpdump/
H A Dprint-esp.c79 int ivlen; member in struct:sa_list
121 buf = buf + sa->ivlen;
251 sa->ivlen = 0;
257 sa->ivlen = EVP_CIPHER_iv_length(evp);
545 int ivlen = 0; local
651 ivlen = sa->ivlen;
665 EVP_Cipher(&ctx, p + ivlen, p + ivlen, ep - (p + ivlen));
[all...]
/freebsd-10.0-release/crypto/openssl/crypto/cms/
H A Dcms_enc.c125 int ivlen; local
128 ivlen = EVP_CIPHER_CTX_iv_length(ctx);
129 if (ivlen > 0)
131 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
H A Dcms_pwri.c95 int ivlen; local
133 ivlen = EVP_CIPHER_CTX_iv_length(&ctx);
135 if (ivlen > 0)
137 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
/freebsd-10.0-release/crypto/openssh/
H A Dcipher.c251 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen,
278 if (iv != NULL && ivlen < cipher_ivlen(cipher))
280 ivlen, cipher->name);
422 int ivlen; local
425 ivlen = 24;
427 ivlen = EVP_CIPHER_CTX_iv_length(&cc->evp);
428 return (ivlen);
250 cipher_init(CipherContext *cc, const Cipher *cipher, const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, int do_encrypt) argument
H A Dmonitor_wrap.c610 u_int ivlen, keylen; local
624 ivlen = packet_get_keyiv_len(MODE_OUT);
625 packet_get_keyiv(MODE_OUT, iv, ivlen);
626 buffer_put_string(&m, iv, ivlen);
627 ivlen = packet_get_keyiv_len(MODE_IN);
628 packet_get_keyiv(MODE_IN, iv, ivlen);
629 buffer_put_string(&m, iv, ivlen);
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Dcrypto_gnutls.c202 int ivlen; local
261 ivlen = gcry_cipher_get_algo_blklen(a);
262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR ||
263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
/freebsd-10.0-release/sys/netipsec/
H A Dxform_esp.c196 * crypto code happy but if we use it to set ivlen then
200 sav->ivlen = (txform == &enc_xform_null ? 0 : txform->blocksize);
201 sav->iv = (caddr_t) malloc(sav->ivlen, M_XDATA, M_WAITOK);
202 key_randomfill(sav->iv, sav->ivlen); /*XXX*/
301 hlen = sizeof (struct esp) + sav->ivlen;
303 hlen = sizeof (struct newesp) + sav->ivlen;
439 crde->crd_inject = skip + hlen - sav->ivlen;
586 hlen = sizeof (struct esp) + sav->ivlen;
588 hlen = sizeof (struct newesp) + sav->ivlen;
697 hlen = sizeof (struct esp) + sav->ivlen;
[all...]
H A Dkeydb.h134 u_int ivlen; /* length of IV */ member in struct:secasvar
H A Dkey_debug.c285 printf(" { id=%d ivlen=%d min=%d max=%d }\n",
597 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
H A Dkey.c3200 sav->ivlen = 0;
7940 key_randomfill(sav->iv, sav->ivlen);
/freebsd-10.0-release/crypto/openssl/crypto/pkcs7/
H A Dpk7_doit.c329 int keylen,ivlen; local
339 ivlen=EVP_CIPHER_iv_length(evp_cipher);
341 if (ivlen > 0)
342 if (RAND_pseudo_bytes(iv,ivlen) <= 0)
351 if (ivlen > 0) {
513 int keylen,ivlen;
/freebsd-10.0-release/sys/dev/hifn/
H A Dhifn7751.c1555 int using_mac, using_crypt, len, ivlen; local
1644 ivlen = HIFN_AES_IV_LENGTH;
1647 ivlen = HIFN_IV_LENGTH;
1650 bcopy(cmd->iv, buf_pos, ivlen);
1651 buf_pos += ivlen;
2450 int session, err, ivlen; local
2568 ivlen = ((enccrd->crd_alg == CRYPTO_AES_CBC) ?
2572 bcopy(enccrd->crd_iv, cmd->iv, ivlen);
2575 cmd->iv, ivlen);
2581 ivlen, cm
2772 int totlen, i, u, ivlen; local
[all...]
/freebsd-10.0-release/crypto/openssl/ssl/
H A Dt1_enc.c358 fprintf(stderr,"\tevp_cipher: nid, blksz= %d, %d, keylen=%d, ivlen=%d\n",
705 int ivlen; local
710 ivlen = EVP_CIPHER_iv_length(enc);
712 ivlen = 0;
713 if (ivlen > 1)
722 else if (RAND_bytes(rec->input, ivlen) <= 0)

Completed in 177 milliseconds