/freebsd-9.3-release/sys/kgssapi/krb5/ |
H A D | kcrypto.h | 66 struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen); 119 size_t skip, size_t len, void *ivec, size_t ivlen) 122 ks->ks_class->ec_encrypt(ks, inout, skip, len, ivec, ivlen); 127 size_t skip, size_t len, void *ivec, size_t ivlen) 130 ks->ks_class->ec_decrypt(ks, inout, skip, len, ivec, ivlen); 118 krb5_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 126 krb5_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
H A D | kcrypto_arcfour.c | 132 size_t skip, size_t len, void *ivec, size_t ivlen) 144 arcfour_hmac(newkey, ivec, ivlen, kk); 131 arcfour_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
H A D | kcrypto_des.c | 203 size_t skip, size_t len, void *ivec, size_t ivlen) 212 size_t skip, size_t len, void *ivec, size_t ivlen) 202 des1_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 211 des1_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
H A D | kcrypto_aes.c | 174 size_t skip, size_t len, void *ivec, size_t ivlen) 245 size_t skip, size_t len, void *ivec, size_t ivlen) 173 aes_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 244 aes_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
H A D | kcrypto_des3.c | 213 size_t skip, size_t len, void *ivec, size_t ivlen) 221 size_t skip, size_t len, void *ivec, size_t ivlen) 212 des3_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 220 des3_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | cipher.c | 271 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, 298 if (iv != NULL && ivlen < cipher_ivlen(cipher)) 300 ivlen, cipher->name); 465 int ivlen; local 468 ivlen = 24; 470 ivlen = 0; 472 ivlen = EVP_CIPHER_CTX_iv_length(&cc->evp); 473 return (ivlen); 270 cipher_init(CipherContext *cc, const Cipher *cipher, const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, int do_encrypt) argument
|
H A D | authfile.c | 99 size_t keylen, ivlen, blocksize, authlen; local 122 ivlen = cipher_ivlen(c); 124 key = xcalloc(1, keylen + ivlen); 128 salt, SALT_LEN, key, keylen + ivlen, rounds) < 0) 133 cipher_init(&ctx, c, key, keylen, key + keylen , ivlen, 1); 134 explicit_bzero(key, keylen + ivlen); 208 u_int keylen = 0, ivlen, blocksize, slen, klen, len, rounds, nkeys; local 336 ivlen = cipher_ivlen(c); 337 key = xcalloc(1, keylen + ivlen); 348 key, keylen + ivlen, round [all...] |
H A D | monitor_wrap.c | 608 u_int ivlen, keylen; local 622 ivlen = packet_get_keyiv_len(MODE_OUT); 623 packet_get_keyiv(MODE_OUT, iv, ivlen); 624 buffer_put_string(&m, iv, ivlen); 625 ivlen = packet_get_keyiv_len(MODE_IN); 626 packet_get_keyiv(MODE_IN, iv, ivlen); 627 buffer_put_string(&m, iv, ivlen);
|
/freebsd-9.3-release/contrib/tcpdump/ |
H A D | print-esp.c | 79 int ivlen; member in struct:sa_list 121 buf = buf + sa->ivlen; 251 sa->ivlen = 0; 257 sa->ivlen = EVP_CIPHER_iv_length(evp); 545 int ivlen = 0; local 651 ivlen = sa->ivlen; 665 EVP_Cipher(&ctx, p + ivlen, p + ivlen, ep - (p + ivlen)); [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_enc.c | 117 int ivlen; local 120 ivlen = EVP_CIPHER_CTX_iv_length(ctx); 121 if (ivlen > 0) { 122 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | crypto_gnutls.c | 208 int ivlen; local 267 ivlen = gcry_cipher_get_algo_blklen(a); 268 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 269 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
|
/freebsd-9.3-release/sys/netipsec/ |
H A D | xform_esp.c | 193 * crypto code happy but if we use it to set ivlen then 197 sav->ivlen = (txform == &enc_xform_null ? 0 : txform->blocksize); 198 sav->iv = (caddr_t) malloc(sav->ivlen, M_XDATA, M_WAITOK); 203 key_randomfill(sav->iv, sav->ivlen); /*XXX*/ 302 hlen = sizeof (struct esp) + sav->ivlen; 304 hlen = sizeof (struct newesp) + sav->ivlen; 440 crde->crd_inject = skip + hlen - sav->ivlen; 589 hlen = sizeof (struct esp) + sav->ivlen; 591 hlen = sizeof (struct newesp) + sav->ivlen; 700 hlen = sizeof (struct esp) + sav->ivlen; [all...] |
H A D | keydb.h | 134 u_int ivlen; /* length of IV */ member in struct:secasvar
|
H A D | key_debug.c | 285 printf(" { id=%d ivlen=%d min=%d max=%d }\n", 597 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
|
H A D | key.c | 3206 sav->ivlen = 0; 7964 key_randomfill(sav->iv, sav->ivlen);
|
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 215 int keylen, ivlen; local 226 ivlen = EVP_CIPHER_iv_length(evp_cipher); 228 if (ivlen > 0) 229 if (RAND_pseudo_bytes(iv, ivlen) <= 0) 238 if (ivlen > 0) { 438 int keylen, ivlen;
|
/freebsd-9.3-release/sys/dev/hifn/ |
H A D | hifn7751.c | 1555 int using_mac, using_crypt, len, ivlen; local 1644 ivlen = HIFN_AES_IV_LENGTH; 1647 ivlen = HIFN_IV_LENGTH; 1650 bcopy(cmd->iv, buf_pos, ivlen); 1651 buf_pos += ivlen; 2450 int session, err, ivlen; local 2568 ivlen = ((enccrd->crd_alg == CRYPTO_AES_CBC) ? 2572 bcopy(enccrd->crd_iv, cmd->iv, ivlen); 2575 cmd->iv, ivlen); 2581 ivlen, cm 2772 int totlen, i, u, ivlen; local [all...] |