/freebsd-current/contrib/wpa/src/eap_common/ |
H A D | eap_ikev2_common.c | 74 u8 icv[IKEV2_MAX_HASH_LEN]; local 98 wpabuf_len(msg) - icv_len, icv) < 0) { 103 if (os_memcmp_const(icv, end - icv_len, icv_len) != 0) { 106 icv, icv_len);
|
H A D | ikev2_common.c | 537 u8 *icv, *iv; local 594 icv = wpabuf_put(msg, integ_alg->hash_len); 602 wpabuf_len(msg) - integ_alg->hash_len, icv);
|
H A D | eap_eke_common.c | 642 u8 icv[EAP_EKE_MAX_HASH_LEN]; local 661 prot_len - block_size - icv_len, icv) < 0) 663 if (os_memcmp_const(icv, prot + prot_len - icv_len, icv_len) != 0) {
|
/freebsd-current/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_ccm_hw_s390x.inc | 88 sctx->ccm.s390x.kmac.icv.g[0] = 0; 89 sctx->ccm.s390x.kmac.icv.g[1] = 0; 103 sctx->ccm.s390x.kmac.icv.b[i] ^= aad[i]; 105 s390x_km(sctx->ccm.s390x.kmac.icv.b, 16, 106 sctx->ccm.s390x.kmac.icv.b, sctx->ccm.s390x.fc, 128 s390x_km(sctx->ccm.s390x.nonce.b, 16, sctx->ccm.s390x.kmac.icv.b, 168 sctx->ccm.s390x.kmac.icv.b[i] ^= in[len + i]; 170 s390x_km(sctx->ccm.s390x.kmac.icv.b, 16, 171 sctx->ccm.s390x.kmac.icv.b, 188 sctx->ccm.s390x.kmac.icv [all...] |
H A D | cipher_tdes_wrap.c | 38 unsigned char icv[8], iv[TDES_IVLEN], sha1tmp[SHA_DIGEST_LENGTH]; local 47 /* Decrypt first block which will end up as icv */ 48 ctx->hw->cipher(ctx, icv, in, 8); 62 BUF_reverse(icv, NULL, 8); 67 ctx->hw->cipher(ctx, icv, icv, 8); 69 && CRYPTO_memcmp(sha1tmp, icv, 8) == 0) 71 OPENSSL_cleanse(icv, 8);
|
/freebsd-current/crypto/openssl/crypto/modes/ |
H A D | wrap128.c | 173 * @param[in] icv (Non-standard) IV, 4 bytes. NULL = use default_aiv. 183 size_t CRYPTO_128_wrap_pad(void *key, const unsigned char *icv, argument 206 if (!icv) 209 memcpy(aiv, icv, 4); /* Standard doesn't mention this. */ 239 * @param[in] icv (Non-standard) IV, 4 bytes. NULL = use default_aiv. 251 size_t CRYPTO_128_unwrap_pad(void *key, const unsigned char *icv, argument 299 if ((!icv && CRYPTO_memcmp(aiv, default_aiv, 4)) 300 || (icv && CRYPTO_memcmp(aiv, icv, 4))) {
|
H A D | siv128.c | 131 SIV_BLOCK *icv) 135 if (!EVP_CipherInit_ex(ctx, NULL, NULL, NULL, icv->byte, 1)) 129 siv128_do_encrypt(EVP_CIPHER_CTX *ctx, unsigned char *out, unsigned char const *in, size_t len, SIV_BLOCK *icv) argument
|
/freebsd-current/contrib/wpa/src/pae/ |
H A D | ieee802_1x_key.h | 22 size_t msg_bytes, u8 *icv);
|
H A D | ieee802_1x_key.c | 180 size_t msg_bytes, u8 *icv) 185 res = omac1_aes_128(ick, msg, msg_bytes, icv); 187 res = omac1_aes_256(ick, msg, msg_bytes, icv); 179 ieee802_1x_icv_aes_cmac(const u8 *ick, size_t ick_bytes, const u8 *msg, size_t msg_bytes, u8 *icv) argument
|
H A D | ieee802_1x_kay_i.h | 80 const u8 *msg, size_t msg_len, u8 *icv); 422 u8 icv[0]; member in struct:ieee802_1x_mka_icv_body
|
H A D | ieee802_1x_kay.c | 1933 return body->icv; 3075 u8 icv[MAX_ICV_LEN]; local 3170 buf, len - mka_alg_tbl[kay->mka_algindex].icv_len, icv)) { 3184 if (os_memcmp_const(msg_icv, icv, 3189 icv, mka_alg_tbl[kay->mka_algindex].icv_len);
|
/freebsd-current/sys/net80211/ |
H A D | ieee80211_crypto_wep.c | 352 uint8_t icv[IEEE80211_WEP_CRCLEN]; local 413 icv[0] = crc; 414 icv[1] = crc >> 8; 415 icv[2] = crc >> 16; 416 icv[3] = crc >> 24; 421 icv[k] ^= S[(S[i] + S[j]) & 0xff]; 423 return m_append(m0, IEEE80211_WEP_CRCLEN, icv); 435 uint8_t icv[IEEE80211_WEP_CRCLEN]; local 496 icv[0] = crc; 497 icv[ [all...] |
H A D | ieee80211_crypto_tkip.c | 667 uint8_t icv[IEEE80211_WEP_CRCLEN]) 714 icv[0] = crc; 715 icv[1] = crc >> 8; 716 icv[2] = crc >> 16; 717 icv[3] = crc >> 24; 722 icv[k] ^= S[(S[i] + S[j]) & 0xff]; 731 u8 *pos, icv[4]; local 773 icv[0] = crc; 774 icv[1] = crc >> 8; 775 icv[ 666 wep_encrypt(u8 *key, struct mbuf *m0, u_int off, size_t data_len, uint8_t icv[IEEE80211_WEP_CRCLEN]) argument 1003 uint8_t icv[IEEE80211_WEP_CRCLEN]; local [all...] |
/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | e_des3.c | 320 unsigned char icv[8], iv[8], sha1tmp[SHA_DIGEST_LENGTH]; local 327 /* Decrypt first block which will end up as icv */ 328 des_ede_cbc_cipher(ctx, icv, in, 8); 342 BUF_reverse(icv, NULL, 8); 347 des_ede_cbc_cipher(ctx, icv, icv, 8); 349 && CRYPTO_memcmp(sha1tmp, icv, 8) == 0) 351 OPENSSL_cleanse(icv, 8);
|
H A D | e_aes.c | 924 } icv; member in struct:__anon40::__anon41::__anon43::__anon44 1750 ctx->aes.ccm.kmac_param.icv.g[0] = 0; 1751 ctx->aes.ccm.kmac_param.icv.g[1] = 0; 1765 ctx->aes.ccm.kmac_param.icv.b[i] ^= aad[i]; 1767 s390x_km(ctx->aes.ccm.kmac_param.icv.b, 16, 1768 ctx->aes.ccm.kmac_param.icv.b, ctx->aes.ccm.fc, 1787 s390x_km(ctx->aes.ccm.nonce.b, 16, ctx->aes.ccm.kmac_param.icv.b, 1827 ctx->aes.ccm.kmac_param.icv.b[i] ^= in[len + i]; 1829 s390x_km(ctx->aes.ccm.kmac_param.icv.b, 16, 1830 ctx->aes.ccm.kmac_param.icv [all...] |
/freebsd-current/contrib/bzip2/ |
H A D | compress.c | 361 register UInt16 icv; local 365 icv = mtfv[gs+(nn)]; \ 366 cost01 += s->len_pack[icv][0]; \ 367 cost23 += s->len_pack[icv][1]; \ 368 cost45 += s->len_pack[icv][2]; \ 390 UInt16 icv = mtfv[i]; local 391 for (t = 0; t < nGroups; t++) cost[t] += s->len[t][icv];
|
/freebsd-current/crypto/openssl/providers/implementations/include/prov/ |
H A D | ciphercommon_ccm.h | 23 } icv; member in struct:S390X_kmac_params_st
|
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | modes.h | 176 size_t CRYPTO_128_wrap_pad(void *key, const unsigned char *icv, 179 size_t CRYPTO_128_unwrap_pad(void *key, const unsigned char *icv,
|
/freebsd-current/contrib/wpa/src/eap_peer/ |
H A D | eap_pax.c | 340 const u8 *icv, *pos; local 417 icv = pos + len - EAP_PAX_ICV_LEN; 418 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); 428 if (os_memcmp_const(icv, icvbuf, EAP_PAX_ICV_LEN) != 0) {
|
/freebsd-current/contrib/wpa/src/eap_server/ |
H A D | eap_server_pax.c | 205 u8 icvbuf[EAP_PAX_ICV_LEN], *icv; local 280 icv = wpabuf_mhead_u8(respData) + mlen - EAP_PAX_ICV_LEN; 281 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); 291 if (os_memcmp_const(icvbuf, icv, EAP_PAX_ICV_LEN) != 0) {
|
/freebsd-current/sys/dev/qat/qat/ |
H A D | qat_ocf.c | 118 char icv[QAT_OCF_MAX_DIGEST] = { 0 }; local 122 icv); 123 if (timingsafe_bcmp(icv,
|
/freebsd-current/sys/dev/qat_c2xxx/ |
H A D | qat.c | 1762 char icv[QAT_SYM_HASH_BUFFER_LEN]; local 1793 auth_sz, icv); 1794 if (timingsafe_bcmp(icv, qsc->qsc_auth_res,
|