Searched refs:ivlen (Results 1 - 24 of 24) sorted by relevance

/freebsd-10.1-release/sys/kgssapi/krb5/
H A Dkcrypto.h66 struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen);
119 size_t skip, size_t len, void *ivec, size_t ivlen)
122 ks->ks_class->ec_encrypt(ks, inout, skip, len, ivec, ivlen);
127 size_t skip, size_t len, void *ivec, size_t ivlen)
130 ks->ks_class->ec_decrypt(ks, inout, skip, len, ivec, ivlen);
118 krb5_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
126 krb5_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
H A Dkcrypto_arcfour.c132 size_t skip, size_t len, void *ivec, size_t ivlen)
144 arcfour_hmac(newkey, ivec, ivlen, kk);
131 arcfour_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
H A Dkcrypto_des.c203 size_t skip, size_t len, void *ivec, size_t ivlen)
212 size_t skip, size_t len, void *ivec, size_t ivlen)
202 des1_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
211 des1_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
H A Dkcrypto_aes.c174 size_t skip, size_t len, void *ivec, size_t ivlen)
245 size_t skip, size_t len, void *ivec, size_t ivlen)
173 aes_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
244 aes_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
H A Dkcrypto_des3.c213 size_t skip, size_t len, void *ivec, size_t ivlen)
221 size_t skip, size_t len, void *ivec, size_t ivlen)
212 des3_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
220 des3_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
/freebsd-10.1-release/sys/mips/nlm/dev/sec/
H A Dnlmseclib.c106 cmd->iv, cmd->ivlen);
108 cmd->iv, cmd->ivlen);
182 cmd->ivlen, cmd->cipheroff, cmd->cipherlen);
242 cmd->ivoff, cmd->ivlen, cmd->hashoff, cmd->hashlen,
285 cmd->ivlen = XLP_SEC_DES_IV_LENGTH;
290 cmd->ivlen = XLP_SEC_DES_IV_LENGTH;
295 cmd->ivlen = XLP_SEC_AES_IV_LENGTH;
300 cmd->ivlen = XLP_SEC_ARC4_IV_LENGTH;
H A Dnlmsec.c258 printf("ivlen :%d\n",cmd->ivlen);
293 unsigned int ivlen = 0; local
322 ivlen = ((crd->crd_alg == CRYPTO_AES_CBC) ?
325 crd->crd_skip + crd->crd_len - ivlen, ivlen,
571 unsigned int ivlen = 0; local
579 ivlen = ((enccrd->crd_alg == CRYPTO_AES_CBC) ?
583 bcopy(enccrd->crd_iv, cmd->iv, ivlen);
586 ivlen);
[all...]
H A Dnlmseclib.h110 uint32_t ivlen; member in struct:xlp_sec_command
/freebsd-10.1-release/crypto/openssl/crypto/evp/
H A De_aes.c79 int ivlen; /* IV length */ member in struct:__anon144
310 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen);
317 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen);
319 memcpy(gctx->iv, iv, gctx->ivlen);
393 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \
395 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \
404 keylen/8,ivlen, \
414 # define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \
417 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \
426 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \
[all...]
/freebsd-10.1-release/sys/mips/nlm/hal/
H A Dnlmsaelib.h240 * ivlen : iv length in bytes
245 unsigned int hashout_l3alloc, unsigned int encrypt, unsigned int ivlen,
252 left_shift64_mask((ivlen - 1), 41, 16) |
497 * ivlen : iv length in bytes
508 unsigned int hash_source, unsigned int ivoff, unsigned int ivlen,
513 ivlen, vtophys(hashdst_addr));
528 * ivlen : iv length in bytes
537 unsigned int ivoff, unsigned int ivlen, unsigned int cipheroff,
540 param->desc0 = nlm_crypto_form_pkt_desc0(0, 0, 0, encrypt, ivlen, 0ULL);
244 nlm_crypto_form_pkt_desc0(unsigned int tls, unsigned int hash_source, unsigned int hashout_l3alloc, unsigned int encrypt, unsigned int ivlen, uint64_t hashdst_addr) argument
506 nlm_crypto_fill_cipher_auth_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int encrypt, unsigned int hash_source, unsigned int ivoff, unsigned int ivlen, unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, unsigned int cipheroff, unsigned int cipherlen, unsigned char *hashdst_addr) argument
535 nlm_crypto_fill_cipher_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int encrypt, unsigned int ivoff, unsigned int ivlen, unsigned int cipheroff, unsigned int cipherlen) argument
/freebsd-10.1-release/crypto/openssh/
H A Dcipher.c270 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen,
297 if (iv != NULL && ivlen < cipher_ivlen(cipher))
299 ivlen, cipher->name);
464 int ivlen; local
467 ivlen = 24;
469 ivlen = 0;
471 ivlen = EVP_CIPHER_CTX_iv_length(&cc->evp);
472 return (ivlen);
269 cipher_init(CipherContext *cc, const Cipher *cipher, const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, int do_encrypt) argument
H A Dauthfile.c99 size_t keylen, ivlen, blocksize, authlen; local
122 ivlen = cipher_ivlen(c);
124 key = xcalloc(1, keylen + ivlen);
128 salt, SALT_LEN, key, keylen + ivlen, rounds) < 0)
133 cipher_init(&ctx, c, key, keylen, key + keylen , ivlen, 1);
134 explicit_bzero(key, keylen + ivlen);
208 u_int keylen = 0, ivlen, blocksize, slen, klen, len, rounds, nkeys; local
336 ivlen = cipher_ivlen(c);
337 key = xcalloc(1, keylen + ivlen);
348 key, keylen + ivlen, round
[all...]
H A Dmonitor_wrap.c608 u_int ivlen, keylen; local
622 ivlen = packet_get_keyiv_len(MODE_OUT);
623 packet_get_keyiv(MODE_OUT, iv, ivlen);
624 buffer_put_string(&m, iv, ivlen);
625 ivlen = packet_get_keyiv_len(MODE_IN);
626 packet_get_keyiv(MODE_IN, iv, ivlen);
627 buffer_put_string(&m, iv, ivlen);
/freebsd-10.1-release/contrib/tcpdump/
H A Dprint-esp.c79 int ivlen; member in struct:sa_list
121 buf = buf + sa->ivlen;
251 sa->ivlen = 0;
257 sa->ivlen = EVP_CIPHER_iv_length(evp);
545 int ivlen = 0; local
651 ivlen = sa->ivlen;
665 EVP_Cipher(&ctx, p + ivlen, p + ivlen, ep - (p + ivlen));
[all...]
/freebsd-10.1-release/crypto/openssl/crypto/cms/
H A Dcms_enc.c117 int ivlen; local
120 ivlen = EVP_CIPHER_CTX_iv_length(ctx);
121 if (ivlen > 0) {
122 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
H A Dcms_pwri.c96 int ivlen; local
131 ivlen = EVP_CIPHER_CTX_iv_length(&ctx);
133 if (ivlen > 0) {
134 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
/freebsd-10.1-release/contrib/wpa/src/crypto/
H A Dcrypto_gnutls.c202 int ivlen; local
261 ivlen = gcry_cipher_get_algo_blklen(a);
262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR ||
263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
/freebsd-10.1-release/sys/netipsec/
H A Dxform_esp.c196 * crypto code happy but if we use it to set ivlen then
200 sav->ivlen = (txform == &enc_xform_null ? 0 : txform->blocksize);
201 sav->iv = (caddr_t) malloc(sav->ivlen, M_XDATA, M_WAITOK);
202 key_randomfill(sav->iv, sav->ivlen); /*XXX*/
301 hlen = sizeof (struct esp) + sav->ivlen;
303 hlen = sizeof (struct newesp) + sav->ivlen;
439 crde->crd_inject = skip + hlen - sav->ivlen;
586 hlen = sizeof (struct esp) + sav->ivlen;
588 hlen = sizeof (struct newesp) + sav->ivlen;
697 hlen = sizeof (struct esp) + sav->ivlen;
[all...]
H A Dkeydb.h134 u_int ivlen; /* length of IV */ member in struct:secasvar
H A Dkey_debug.c285 printf(" { id=%d ivlen=%d min=%d max=%d }\n",
597 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
H A Dkey.c3214 sav->ivlen = 0;
7954 key_randomfill(sav->iv, sav->ivlen);
/freebsd-10.1-release/crypto/openssl/crypto/pkcs7/
H A Dpk7_doit.c331 int keylen, ivlen; local
340 ivlen = EVP_CIPHER_iv_length(evp_cipher);
342 if (ivlen > 0)
343 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
352 if (ivlen > 0) {
529 int keylen, ivlen;
/freebsd-10.1-release/sys/dev/hifn/
H A Dhifn7751.c1555 int using_mac, using_crypt, len, ivlen; local
1644 ivlen = HIFN_AES_IV_LENGTH;
1647 ivlen = HIFN_IV_LENGTH;
1650 bcopy(cmd->iv, buf_pos, ivlen);
1651 buf_pos += ivlen;
2450 int session, err, ivlen; local
2568 ivlen = ((enccrd->crd_alg == CRYPTO_AES_CBC) ?
2572 bcopy(enccrd->crd_iv, cmd->iv, ivlen);
2575 cmd->iv, ivlen);
2581 ivlen, cm
2772 int totlen, i, u, ivlen; local
[all...]
/freebsd-10.1-release/crypto/openssl/ssl/
H A Dt1_enc.c358 fprintf(stderr, "\tevp_cipher: nid, blksz= %d, %d, keylen=%d, ivlen=%d\n",
741 int ivlen; local
746 ivlen = EVP_CIPHER_iv_length(enc);
748 ivlen = 0;
749 if (ivlen > 1) {
758 else if (RAND_bytes(rec->input, ivlen) <= 0)

Completed in 304 milliseconds