/freebsd-13-stable/sys/mips/cavium/cryptocteon/ |
H A D | cryptocteonvar.h | 37 typedef int octo_encrypt_t(struct octo_sess *od, struct iovec *iov, size_t iovcnt, size_t iovlen, int auth_off, int auth_len, int crypt_off, int crypt_len, uint8_t *icv, uint8_t *ivp); 38 typedef int octo_decrypt_t(struct octo_sess *od, struct iovec *iov, size_t iovcnt, size_t iovlen, int auth_off, int auth_len, int crypt_off, int crypt_len, uint8_t *icv, uint8_t *ivp);
|
H A D | cavium_crypto.c | 328 int crypt_off, int crypt_len, 337 (crypt_off & 0x7) || (crypt_off + crypt_len > iovlen))) { 339 "auth_off=%d auth_len=%d crypt_off=%d crypt_len=%d " 341 auth_off, auth_len, crypt_off, crypt_len, icv, ivp); 377 while (crypt_len > 0) { 385 crypt_len -= 16; 396 int crypt_off, int crypt_len, 405 (crypt_off & 0x7) || (crypt_off + crypt_len > iovlen))) { 407 "auth_off=%d auth_len=%d crypt_off=%d crypt_len=%d " 409 auth_off, auth_len, crypt_off, crypt_len, ic 324 octo_aes_cbc_encrypt( struct octo_sess *od, struct iovec *iov, size_t iovcnt, size_t iovlen, int auth_off, int auth_len, int crypt_off, int crypt_len, uint8_t *icv, uint8_t *ivp) argument 392 octo_aes_cbc_decrypt( struct octo_sess *od, struct iovec *iov, size_t iovcnt, size_t iovlen, int auth_off, int auth_len, int crypt_off, int crypt_len, uint8_t *icv, uint8_t *ivp) argument 463 octo_null_sha1_encrypt( struct octo_sess *od, struct iovec *iov, size_t iovcnt, size_t iovlen, int auth_off, int auth_len, int crypt_off, int crypt_len, uint8_t *icv, uint8_t *ivp) argument 564 octo_aes_cbc_sha1_encrypt( struct octo_sess *od, struct iovec *iov, size_t iovcnt, size_t iovlen, int auth_off, int auth_len, int crypt_off, int crypt_len, uint8_t *icv, uint8_t *ivp) argument 755 octo_aes_cbc_sha1_decrypt( struct octo_sess *od, struct iovec *iov, size_t iovcnt, size_t iovlen, int auth_off, int auth_len, int crypt_off, int crypt_len, uint8_t *icv, uint8_t *ivp) argument [all...] |
H A D | cryptocteon.c | 255 int auth_off, auth_len, crypt_off, crypt_len; local 286 crypt_len = crp->crp_payload_length; 292 auth_len = crypt_len; 385 auth_off, auth_len, crypt_off, crypt_len, icv, ivp); local 388 auth_off, auth_len, crypt_off, crypt_len, icv, ivp); local
|
/freebsd-13-stable/contrib/wpa/src/tls/ |
H A D | pkcs1.h | 22 const u8 *crypt, size_t crypt_len,
|
H A D | pkcs1.c | 135 const u8 *crypt, size_t crypt_len, 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | crypto_internal-rsa.c | 112 const u8 *crypt, size_t crypt_len, 116 crypt, crypt_len, plain, plain_len); 111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
H A D | aes-siv.c | 170 size_t crypt_len; local 179 crypt_len = iv_c_len - AES_BLOCK_SIZE; 189 _len[num_elem] = crypt_len; 192 os_memcpy(out, iv_crypt + AES_BLOCK_SIZE, crypt_len); 197 ret = aes_ctr_encrypt(k2, key_len, iv, out, crypt_len);
|
H A D | aes-gcm.c | 230 const u8 *crypt, size_t crypt_len, u8 *S) 242 ghash(H, crypt, crypt_len, S); 244 WPA_PUT_BE64(len_buf + 8, crypt_len * 8); 289 const u8 *crypt, size_t crypt_len, 304 aes_gcm_gctr(aes, J0, crypt, crypt_len, plain); 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); 229 aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, const u8 *crypt, size_t crypt_len, u8 *S) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
|
H A D | aes-ccm.c | 179 size_t M, const u8 *crypt, size_t crypt_len, 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 202 aes_ccm_auth(aes, plain, crypt_len, x); 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
H A D | aes_wrap.h | 59 const u8 *crypt, size_t crypt_len, 69 size_t M, const u8 *crypt, size_t crypt_len,
|
H A D | crypto_libtomcrypt.c | 616 const u8 *crypt, size_t crypt_len, 624 res = rsa_exptmod(crypt, crypt_len, plain, &len, PK_PUBLIC, 615 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
H A D | crypto.h | 411 * @crypt_len: Encrypted signature data length 412 * @plain: Buffer for plaintext (at least crypt_len bytes) 417 struct crypto_public_key *key, const u8 *crypt, size_t crypt_len,
|
/freebsd-13-stable/sys/contrib/openzfs/module/os/linux/zfs/ |
H A D | zio_crypt.c | 1382 uint_t nr_src, nr_dst, crypt_len; local 1489 crypt_len = sizeof (lr_write_t) - 1492 src_iovecs[nr_iovecs].iov_len = crypt_len; 1494 dst_iovecs[nr_iovecs].iov_len = crypt_len; 1505 total_len += crypt_len; 1508 crypt_len = lr_len - sizeof (lr_write_t); 1511 src_iovecs[nr_iovecs].iov_len = crypt_len; 1514 dst_iovecs[nr_iovecs].iov_len = crypt_len; 1516 total_len += crypt_len; 1519 crypt_len 1576 uint_t nr_src, nr_dst, crypt_len; local 1709 bcopy(DN_BONUS(dnp), DN_BONUS(&ddnp[i]), crypt_len); local 1710 bcopy(DN_BONUS(dnp), aadp, crypt_len); local [all...] |
/freebsd-13-stable/sys/contrib/openzfs/module/os/freebsd/zfs/ |
H A D | zio_crypt.c | 1260 uint_t crypt_len, nr_iovecs, vec; local 1346 crypt_len = sizeof (lr_write_t) - 1350 dst_iovecs[vec].iov_len = crypt_len; 1361 total_len += crypt_len; 1364 crypt_len = lr_len - sizeof (lr_write_t); 1367 dst_iovecs[vec].iov_len = crypt_len; 1369 total_len += crypt_len; 1372 crypt_len = lr_len - sizeof (lr_t); 1375 dst_iovecs[vec].iov_len = crypt_len; 1377 total_len += crypt_len; 1414 uint_t nr_iovecs, crypt_len, vec; local 1523 bcopy(DN_BONUS(dnp), DN_BONUS(&ddnp[i]), crypt_len); local 1524 bcopy(DN_BONUS(dnp), aadp, crypt_len); local [all...] |
/freebsd-13-stable/contrib/wpa/wpa_supplicant/ |
H A D | mesh_rsn.c | 643 size_t crypt_len; local 677 crypt_len = elems_len - (elems->mic - start); 678 if (crypt_len < 2 + AES_BLOCK_SIZE) { 684 crypt = os_zalloc(crypt_len); 691 os_memcpy(crypt, elems->mic, crypt_len); 693 if (aes_siv_decrypt(sta->aek, sizeof(sta->aek), crypt, crypt_len, 3, 700 crypt_len -= AES_BLOCK_SIZE; 702 ampe_buf, crypt_len); 708 (size_t) 2 + ampe_ie_len > crypt_len ||
|