Searched refs:iv_len (Results 1 - 25 of 29) sorted by relevance

12

/freebsd-10.1-release/contrib/wpa/src/crypto/
H A Daes-gcm.c192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) argument
196 if (iv_len == 12) {
198 os_memcpy(J0, iv, iv_len);
199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len);
207 ghash(H, iv, iv_len, J0);
209 WPA_PUT_BE64(len_buf + 8, iv_len * 8);
254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
267 aes_gcm_prepare_j0(iv, iv_len, H, J0);
288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
[all...]
H A Daes_wrap.h44 const u8 *iv, size_t iv_len,
49 const u8 *iv, size_t iv_len,
54 const u8 *iv, size_t iv_len,
/freebsd-10.1-release/crypto/openssl/crypto/evp/
H A Devp_locl.h135 key_len, iv_len, flags, init_key, cleanup, \
138 nid##_##nmode, block_size, key_len, iv_len, \
151 iv_len, flags, init_key, cleanup, set_asn1, \
154 iv_len, flags, init_key, cleanup, set_asn1, get_asn1, ctrl)
157 iv_len, cbits, flags, init_key, cleanup, \
160 key_len, iv_len, flags, init_key, cleanup, set_asn1, \
164 iv_len, cbits, flags, init_key, cleanup, \
167 key_len, iv_len, flags, init_key, cleanup, set_asn1, \
177 nid, block_size, key_len, iv_len, cbits, flags, \
179 BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, iv_len, flag
[all...]
H A Dopenbsd_hw.c137 assert(ctx->cipher->iv_len <= MAX_HW_IV);
172 if (ctx->cipher->iv_len)
176 memcpy(lb, &in[cryp.len - ctx->cipher->iv_len], ctx->cipher->iv_len);
221 memcpy(ctx->iv, &out[cryp.len - ctx->cipher->iv_len],
222 ctx->cipher->iv_len);
224 memcpy(ctx->iv, lb, ctx->cipher->iv_len);
H A Devp_lib.c223 return cipher->iv_len;
228 return ctx->cipher->iv_len;
H A Devp_key.c130 niv = type->iv_len;
/freebsd-10.1-release/contrib/subversion/subversion/libsvn_subr/
H A Dcrypto.c264 apr_size_t iv_len;
283 apr_err = apr_crypto_passphrase(&key, &iv_len,
297 if (iv_len == 0)
302 SVN_ERR(get_random_bytes(&iv_vector, ctx, iv_len, result_pool));
379 *iv = wrap_as_string(iv_vector, iv_len, result_pool);
406 apr_size_t block_size, iv_len;
412 apr_err = apr_crypto_passphrase(&key, &iv_len,
425 if (iv_len == 0)
428 if (iv_len != iv->len)
501 apr_size_t iv_len;
262 apr_size_t iv_len; local
404 apr_size_t block_size, iv_len; local
499 apr_size_t iv_len; local
623 apr_size_t block_size, iv_len; local
[all...]
/freebsd-10.1-release/crypto/openssl/ssl/
H A Dd1_enc.c215 ("\tEVP_CIPHER_CTX: %d buf_len, %d key_len [%d %d], %d iv_len\n",
217 DES_SCHEDULE_SZ, ds->cipher->iv_len);
219 for (i = 0; i < ds->cipher->iv_len; i++)
H A Ds2_enc.c107 OPENSSL_assert(c->iv_len <= (int)sizeof(s->session->key_arg));
H A Dt1_enc.c359 c->nid, c->block_size, c->key_len, c->iv_len);
552 for (i = 0; i < c->iv_len; i++)
843 "\tEVP_CIPHER_CTX: %d buf_len, %d key_len [%lu %lu], %d iv_len\n",
845 DES_SCHEDULE_SZ, ds->cipher->iv_len);
847 for (i = 0; i < ds->cipher->iv_len; i++)
/freebsd-10.1-release/contrib/wpa/src/eap_common/
H A Deap_sake_common.h76 size_t iv_len; member in struct:eap_sake_parse_attr
H A Dikev2_common.c496 size_t iv_len; local
515 iv_len = encr_alg->block_size;
523 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) {
530 pos = iv + iv_len;
598 size_t iv_len, pad_len; local
614 iv_len = encr_alg->block_size;
636 iv = wpabuf_put(msg, iv_len);
637 if (random_get_bytes(iv, iv_len)) {
642 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len;
[all...]
H A Deap_sake_common.c106 attr->iv_len = pos[1] - 2;
/freebsd-10.1-release/crypto/openssh/
H A Dcipher-ctr.c134 aes_ctr.iv_len = AES_BLOCK_SIZE;
H A Dcipher.c66 u_int iv_len; /* defaults to block_size */ member in struct:Cipher
164 * needs no IV. XXX make iv_len == -1 default?
166 return (c->iv_len != 0 || (c->flags & CFLAG_CHACHAPOLY) != 0) ?
167 c->iv_len : c->block_size;
H A Dcipher-3des1.c174 ssh1_3des.iv_len = 0;
H A Dcipher-aes.c150 rijndal_cbc.iv_len = RIJNDAEL_BLOCKSIZE;
H A Dkex.h96 u_int iv_len; member in struct:Enc
H A Dkex.c368 enc->iv_len = cipher_ivlen(enc->cipher);
538 need = MAX(need, newkeys->enc.iv_len);
542 dh_need = MAX(dh_need, newkeys->enc.iv_len);
/freebsd-10.1-release/crypto/openssl/crypto/pem/
H A Dpem_info.c350 OPENSSL_assert(strlen(objstr) + 23 + 2 * enc->iv_len + 13 <=
354 PEM_dek_info(buf, objstr, enc->iv_len, (char *)iv);
H A Dpem_lib.c385 OPENSSL_assert(enc->iv_len <= (int)sizeof(iv));
386 if (RAND_pseudo_bytes(iv, enc->iv_len) < 0) /* Generate a salt */
398 OPENSSL_assert(strlen(objstr) + 23 + 2 * enc->iv_len + 13 <=
403 PEM_dek_info(buf, objstr, enc->iv_len, (char *)iv);
542 if (!load_iv(header_pp, &(cipher->iv[0]), enc->iv_len))
/freebsd-10.1-release/crypto/openssl/crypto/engine/
H A Deng_cryptodev.c422 if (ctx->cipher->iv_len) {
425 iiv = in + inl - ctx->cipher->iv_len;
426 memcpy(save_iv, iiv, ctx->cipher->iv_len);
439 if (ctx->cipher->iv_len) {
441 iiv = out + inl - ctx->cipher->iv_len;
444 memcpy(ctx->iv, iiv, ctx->cipher->iv_len);
459 ctx->cipher->iv_len <= ciphers[i].ivmax &&
/freebsd-10.1-release/sys/mips/rmi/dev/sec/
H A Drmilib.c144 int iv_len; local
184 iv_len = 0;
188 iv_len = XLR_SEC_DES_IV_LENGTH;
193 iv_len = XLR_SEC_AES_IV_LENGTH;
196 iv_len = XLR_SEC_ARC4_IV_LENGTH;
199 iv_len = XLR_SEC_KASUMI_F8_IV_LENGTH;
207 size = op->source_buf_size + iv_len;
226 memcpy(desc->user.aligned_src, &op->initial_vector[0], iv_len);
229 memcpy((uint8_t *) (desc->user.aligned_src + iv_len),
238 op->source_buf_size += iv_len;
[all...]
/freebsd-10.1-release/crypto/openssl/apps/
H A Denc.c623 if (cipher->iv_len > 0) {
625 for (i = 0; i < cipher->iv_len; i++)
/freebsd-10.1-release/crypto/openssl/engines/ccgost/
H A Dgost_crypt.c44 8, /* iv_len */
61 8, /* iv_len */
439 if (!ASN1_OCTET_STRING_set(gcp->iv, ctx->iv, ctx->cipher->iv_len)) {
488 if (len != ctx->cipher->iv_len) {

Completed in 364 milliseconds

12