Searched refs:ivlen (Results 1 - 17 of 17) sorted by relevance

/freebsd-9.3-release/sys/kgssapi/krb5/
H A Dkcrypto.h66 struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen);
119 size_t skip, size_t len, void *ivec, size_t ivlen)
122 ks->ks_class->ec_encrypt(ks, inout, skip, len, ivec, ivlen);
127 size_t skip, size_t len, void *ivec, size_t ivlen)
130 ks->ks_class->ec_decrypt(ks, inout, skip, len, ivec, ivlen);
118 krb5_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
126 krb5_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
H A Dkcrypto_arcfour.c132 size_t skip, size_t len, void *ivec, size_t ivlen)
144 arcfour_hmac(newkey, ivec, ivlen, kk);
131 arcfour_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
H A Dkcrypto_des.c203 size_t skip, size_t len, void *ivec, size_t ivlen)
212 size_t skip, size_t len, void *ivec, size_t ivlen)
202 des1_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
211 des1_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
H A Dkcrypto_aes.c174 size_t skip, size_t len, void *ivec, size_t ivlen)
245 size_t skip, size_t len, void *ivec, size_t ivlen)
173 aes_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
244 aes_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
H A Dkcrypto_des3.c213 size_t skip, size_t len, void *ivec, size_t ivlen)
221 size_t skip, size_t len, void *ivec, size_t ivlen)
212 des3_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
220 des3_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
/freebsd-9.3-release/crypto/openssh/
H A Dcipher.c271 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen,
298 if (iv != NULL && ivlen < cipher_ivlen(cipher))
300 ivlen, cipher->name);
465 int ivlen; local
468 ivlen = 24;
470 ivlen = 0;
472 ivlen = EVP_CIPHER_CTX_iv_length(&cc->evp);
473 return (ivlen);
270 cipher_init(CipherContext *cc, const Cipher *cipher, const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, int do_encrypt) argument
H A Dauthfile.c99 size_t keylen, ivlen, blocksize, authlen; local
122 ivlen = cipher_ivlen(c);
124 key = xcalloc(1, keylen + ivlen);
128 salt, SALT_LEN, key, keylen + ivlen, rounds) < 0)
133 cipher_init(&ctx, c, key, keylen, key + keylen , ivlen, 1);
134 explicit_bzero(key, keylen + ivlen);
208 u_int keylen = 0, ivlen, blocksize, slen, klen, len, rounds, nkeys; local
336 ivlen = cipher_ivlen(c);
337 key = xcalloc(1, keylen + ivlen);
348 key, keylen + ivlen, round
[all...]
H A Dmonitor_wrap.c608 u_int ivlen, keylen; local
622 ivlen = packet_get_keyiv_len(MODE_OUT);
623 packet_get_keyiv(MODE_OUT, iv, ivlen);
624 buffer_put_string(&m, iv, ivlen);
625 ivlen = packet_get_keyiv_len(MODE_IN);
626 packet_get_keyiv(MODE_IN, iv, ivlen);
627 buffer_put_string(&m, iv, ivlen);
/freebsd-9.3-release/contrib/tcpdump/
H A Dprint-esp.c79 int ivlen; member in struct:sa_list
121 buf = buf + sa->ivlen;
251 sa->ivlen = 0;
257 sa->ivlen = EVP_CIPHER_iv_length(evp);
545 int ivlen = 0; local
651 ivlen = sa->ivlen;
665 EVP_Cipher(&ctx, p + ivlen, p + ivlen, ep - (p + ivlen));
[all...]
/freebsd-9.3-release/crypto/openssl/crypto/cms/
H A Dcms_enc.c117 int ivlen; local
120 ivlen = EVP_CIPHER_CTX_iv_length(ctx);
121 if (ivlen > 0) {
122 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
/freebsd-9.3-release/contrib/wpa/src/crypto/
H A Dcrypto_gnutls.c208 int ivlen; local
267 ivlen = gcry_cipher_get_algo_blklen(a);
268 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR ||
269 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
/freebsd-9.3-release/sys/netipsec/
H A Dxform_esp.c193 * crypto code happy but if we use it to set ivlen then
197 sav->ivlen = (txform == &enc_xform_null ? 0 : txform->blocksize);
198 sav->iv = (caddr_t) malloc(sav->ivlen, M_XDATA, M_WAITOK);
203 key_randomfill(sav->iv, sav->ivlen); /*XXX*/
302 hlen = sizeof (struct esp) + sav->ivlen;
304 hlen = sizeof (struct newesp) + sav->ivlen;
440 crde->crd_inject = skip + hlen - sav->ivlen;
589 hlen = sizeof (struct esp) + sav->ivlen;
591 hlen = sizeof (struct newesp) + sav->ivlen;
700 hlen = sizeof (struct esp) + sav->ivlen;
[all...]
H A Dkeydb.h134 u_int ivlen; /* length of IV */ member in struct:secasvar
H A Dkey_debug.c285 printf(" { id=%d ivlen=%d min=%d max=%d }\n",
597 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
H A Dkey.c3206 sav->ivlen = 0;
7964 key_randomfill(sav->iv, sav->ivlen);
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/
H A Dpk7_doit.c215 int keylen, ivlen; local
226 ivlen = EVP_CIPHER_iv_length(evp_cipher);
228 if (ivlen > 0)
229 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
238 if (ivlen > 0) {
438 int keylen, ivlen;
/freebsd-9.3-release/sys/dev/hifn/
H A Dhifn7751.c1555 int using_mac, using_crypt, len, ivlen; local
1644 ivlen = HIFN_AES_IV_LENGTH;
1647 ivlen = HIFN_IV_LENGTH;
1650 bcopy(cmd->iv, buf_pos, ivlen);
1651 buf_pos += ivlen;
2450 int session, err, ivlen; local
2568 ivlen = ((enccrd->crd_alg == CRYPTO_AES_CBC) ?
2572 bcopy(enccrd->crd_iv, cmd->iv, ivlen);
2575 cmd->iv, ivlen);
2581 ivlen, cm
2772 int totlen, i, u, ivlen; local
[all...]

Completed in 147 milliseconds