Searched refs:ivlen (Results 1 - 25 of 76) sorted by relevance

1234

/freebsd-current/sys/opencrypto/
H A Dxform_aes_icm.c146 aes_icm_reinit(void *key, const uint8_t *iv, size_t ivlen) argument
151 KASSERT(ivlen <= sizeof(ctx->ac_block),
152 ("%s: ivlen too large", __func__));
153 bcopy(iv, ctx->ac_block, ivlen);
157 aes_gcm_reinit(void *vctx, const uint8_t *iv, size_t ivlen) argument
161 KASSERT(ivlen == AES_GCM_IV_LEN,
163 aes_icm_reinit(&ctx->cipher, iv, ivlen);
169 AES_GMAC_Reinit(&ctx->gmac, iv, ivlen);
173 aes_ccm_reinit(void *vctx, const uint8_t *iv, size_t ivlen) argument
177 KASSERT(ivlen >
[all...]
H A Dxform_chacha20_poly1305.c62 chacha20_poly1305_reinit(void *vctx, const uint8_t *iv, size_t ivlen) argument
67 KASSERT(ivlen == 8 || ivlen == sizeof(ctx->nonce),
70 memcpy(ctx->nonce, iv, ivlen);
71 ctx->ietf = (ivlen == CHACHA20_POLY1305_IV_LEN);
189 xchacha20_poly1305_reinit(void *vctx, const uint8_t *iv, size_t ivlen) argument
194 KASSERT(ivlen == XCHACHA20_POLY1305_IV_LEN,
H A Dgmac.c65 AES_GMAC_Reinit(void *ctx, const uint8_t *iv, u_int ivlen) argument
70 KASSERT(ivlen <= sizeof agc->counter, ("passed ivlen too large!"));
72 bcopy(iv, agc->counter, ivlen);
/freebsd-current/crypto/openssl/providers/implementations/ciphers/
H A Dciphercommon_gcm.c39 ctx->ivlen = (EVP_GCM_TLS_FIXED_IV_LEN + EVP_GCM_TLS_EXPLICIT_IV_LEN);
49 const unsigned char *iv, size_t ivlen,
60 if (ivlen == 0 || ivlen > sizeof(ctx->iv)) {
64 ctx->ivlen = ivlen;
65 memcpy(ctx->iv, iv, ivlen);
82 const unsigned char *iv, size_t ivlen,
85 return gcm_init(vctx, key, keylen, iv, ivlen, params, 1);
89 const unsigned char *iv, size_t ivlen,
48 gcm_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument
81 ossl_gcm_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
88 ossl_gcm_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
[all...]
H A Dcipher_tdes_common.c65 const unsigned char *iv, size_t ivlen,
78 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen))
85 memcpy(ctx->iv, ctx->oiv, ctx->ivlen);
101 const unsigned char *iv, size_t ivlen,
104 return tdes_init(vctx, key, keylen, iv, ivlen, params, 1);
108 const unsigned char *iv, size_t ivlen,
111 return tdes_init(vctx, key, keylen, iv, ivlen, params, 0);
64 tdes_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument
100 ossl_tdes_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
107 ossl_tdes_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
H A Dcipher_tdes_wrap.c85 size_t ivlen = TDES_IVLEN; local
87 size_t len = inl + ivlen + icvlen;
93 memmove(out + ivlen, in, inl);
97 memcpy(out + inl + ivlen, sha1tmp, icvlen);
100 if (RAND_bytes_ex(ctx->libctx, ctx->iv, ivlen, 0) <= 0)
102 memcpy(out, ctx->iv, ivlen);
104 ctx->hw->cipher(ctx, out + ivlen, out + ivlen, inl + ivlen);
106 memcpy(ctx->iv, wrap_iv, ivlen);
[all...]
H A Dcipher_aes_ocb.c52 size_t ivlen, size_t taglen)
54 return (CRYPTO_ocb128_setiv(&ctx->ocb, iv, ivlen, taglen) == 1);
105 const unsigned char *iv, size_t ivlen,
118 if (ivlen != ctx->base.ivlen) {
120 if (ivlen < OCB_MIN_IV_LEN || ivlen > OCB_MAX_IV_LEN) {
124 ctx->base.ivlen = ivlen;
126 if (!ossl_cipher_generic_initiv(&ctx->base, iv, ivlen))
50 aes_generic_ocb_setiv(PROV_AES_OCB_CTX *ctx, const unsigned char *iv, size_t ivlen, size_t taglen) argument
104 aes_ocb_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument
141 aes_ocb_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
148 aes_ocb_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
[all...]
H A Dcipher_rc2.c91 const unsigned char *iv, size_t ivlen,
94 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL))
100 const unsigned char *iv, size_t ivlen,
103 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL))
140 ctx->base.iv, ctx->base.ivlen)) {
188 || ctx->base.ivlen > sizeof(iv)
191 ctx->base.ivlen)
192 != ctx->base.ivlen)
193 || !ossl_cipher_generic_initiv(&ctx->base, iv, ctx->base.ivlen)
90 rc2_einit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
99 rc2_dinit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
H A Dcipher_rc4.c56 const unsigned char *iv, size_t ivlen,
59 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL))
65 const unsigned char *iv, size_t ivlen,
68 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL))
55 rc4_einit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
64 rc4_dinit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
H A Dciphercommon_gcm_hw.c14 int ossl_gcm_setiv(PROV_GCM_CTX *ctx, const unsigned char *iv, size_t ivlen) argument
16 CRYPTO_gcm128_setiv(&ctx->gcm, iv, ivlen);
H A Dciphercommon.c190 const unsigned char *iv, size_t ivlen,
202 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen))
210 memcpy(ctx->iv, ctx->oiv, ctx->ivlen);
230 size_t ivlen, const OSSL_PARAM params[])
233 iv, ivlen, params, 1);
238 size_t ivlen, const OSSL_PARAM params[])
241 iv, ivlen, params, 0);
580 if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->ivlen)) {
591 && !OSSL_PARAM_set_octet_ptr(p, &ctx->oiv, ctx->ivlen)
592 && !OSSL_PARAM_set_octet_string(p, &ctx->oiv, ctx->ivlen)) {
188 cipher_generic_init_internal(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument
228 ossl_cipher_generic_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
236 ossl_cipher_generic_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
677 ossl_cipher_generic_initiv(PROV_CIPHER_CTX *ctx, const unsigned char *iv, size_t ivlen) argument
[all...]
H A Dciphercommon_ccm.c101 size_t ivlen; local
107 ivlen = 15 - sz;
108 if (ivlen < 2 || ivlen > 8) {
112 if (ctx->l != ivlen) {
113 ctx->l = ivlen;
226 const unsigned char *iv, size_t ivlen,
237 if (ivlen != ccm_get_ivlen(ctx)) {
241 memcpy(ctx->iv, iv, ivlen);
256 const unsigned char *iv, size_t ivlen,
225 ccm_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument
255 ossl_ccm_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
262 ossl_ccm_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
[all...]
H A Dcipher_des.c74 const unsigned char *iv, size_t ivlen,
87 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen))
91 memcpy(ctx->iv, ctx->oiv, ctx->ivlen);
107 const unsigned char *iv, size_t ivlen,
110 return des_init(vctx, key, keylen, iv, ivlen, params, 1);
114 const unsigned char *iv, size_t ivlen,
117 return des_init(vctx, key, keylen, iv, ivlen, params, 0);
73 des_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument
106 des_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
113 des_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
H A Dcipher_aes_cts.inc29 const unsigned char *iv, size_t ivlen,
32 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL))
38 const unsigned char *iv, size_t ivlen,
41 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL))
H A Dcipher_camellia_cts.inc29 const unsigned char *iv, size_t ivlen,
32 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL))
38 const unsigned char *iv, size_t ivlen,
41 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL))
H A Dcipher_aes_xts.c69 const unsigned char *iv, size_t ivlen,
81 if (!ossl_cipher_generic_initiv(vctx, iv, ivlen))
98 const unsigned char *iv, size_t ivlen,
101 return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 1);
105 const unsigned char *iv, size_t ivlen,
108 return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 0);
68 aes_xts_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument
97 aes_xts_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
104 aes_xts_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
/freebsd-current/sys/kgssapi/krb5/
H A Dkcrypto.h66 struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen);
115 size_t skip, size_t len, void *ivec, size_t ivlen)
118 ks->ks_class->ec_encrypt(ks, inout, skip, len, ivec, ivlen);
123 size_t skip, size_t len, void *ivec, size_t ivlen)
126 ks->ks_class->ec_decrypt(ks, inout, skip, len, ivec, ivlen);
114 krb5_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
122 krb5_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
/freebsd-current/sys/crypto/chacha20/
H A Dchacha-sw.c19 chacha20_xform_reinit(void *ctx, const uint8_t *iv, size_t ivlen) argument
21 KASSERT(ivlen == CHACHA_NONCELEN + CHACHA_CTRLEN,
/freebsd-current/crypto/openssl/ssl/record/
H A Dssl3_record_tls13.c29 int ivlen; local
65 ivlen = EVP_CIPHER_CTX_get_iv_length(ctx);
66 if (ivlen < 0) {
125 if (ivlen < SEQ_NUM_SIZE) {
130 offset = ivlen - SEQ_NUM_SIZE;
/freebsd-current/crypto/openssl/crypto/cms/
H A Dcms_enc.c37 int ivlen = 0; local
90 ivlen = EVP_CIPHER_CTX_get_iv_length(ctx);
91 if (ivlen < 0) {
96 if (ivlen > 0) {
97 if (RAND_bytes_ex(libctx, iv, ivlen, 0) <= 0)
175 memcpy(aparams.iv, piv, ivlen);
176 aparams.iv_len = ivlen;
/freebsd-current/crypto/openssl/providers/implementations/include/prov/
H A Dciphercommon_gcm.h50 size_t ivlen; member in struct:prov_gcm_ctx_st
84 size_t ivlen));
114 int ossl_gcm_setiv(PROV_GCM_CTX *ctx, const unsigned char *iv, size_t ivlen);
/freebsd-current/crypto/openssl/crypto/evp/
H A De_aes.c53 int ivlen; /* IV length */ member in struct:__anon16
114 int ivlen; /* IV length */ member in struct:__anon22
240 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen);
247 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen);
249 memcpy(gctx->iv, iv, gctx->ivlen);
374 if (CRYPTO_ocb128_setiv(&octx->ocb, iv, octx->ivlen, octx->taglen)
383 CRYPTO_ocb128_setiv(&octx->ocb, iv, octx->ivlen, octx->taglen);
385 memcpy(octx->iv, iv, octx->ivlen);
396 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \
398 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \
884 int ivlen; member in struct:__anon34
996 const int ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); local
1008 const int ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); local
1054 const int ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); local
1072 const int ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); local
1123 const int ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); local
1139 const int ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); local
1352 int ivlen, enc, len; local
[all...]
H A De_aria.c38 int ivlen; /* IV length */ member in struct:__anon3932
162 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \
164 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \
240 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen);
247 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen);
249 memcpy(gctx->iv, iv, gctx->ivlen);
264 gctx->ivlen = EVP_CIPHER_get_iv_length(c->cipher);
272 *(int *)ptr = gctx->ivlen;
279 if ((arg > EVP_MAX_IV_LENGTH) && (arg > gctx->ivlen)) {
287 gctx->ivlen
[all...]
/freebsd-current/sys/crypto/openssl/
H A Dossl_aes_gcm.h38 size_t ivlen);
/freebsd-current/crypto/openssl/test/
H A Dtls13encryptiontest.c240 unsigned char *iv, size_t ivlen, unsigned char *seq)
263 memcpy(iv, ivtmp, ivlen);
312 size_t ivlen, ctr; local
350 ivlen = EVP_CIPHER_get_iv_length(ciph);
351 if (!load_record(&rec, &refdata[ctr], &key, s->read_iv, ivlen,
360 memcpy(s->write_iv, s->read_iv, ivlen);
239 load_record(SSL3_RECORD *rec, RECORD_DATA *recd, unsigned char **key, unsigned char *iv, size_t ivlen, unsigned char *seq) argument

Completed in 405 milliseconds

1234