/freebsd-current/sys/opencrypto/ |
H A D | xform_aes_icm.c | 146 aes_icm_reinit(void *key, const uint8_t *iv, size_t ivlen) argument 151 KASSERT(ivlen <= sizeof(ctx->ac_block), 152 ("%s: ivlen too large", __func__)); 153 bcopy(iv, ctx->ac_block, ivlen); 157 aes_gcm_reinit(void *vctx, const uint8_t *iv, size_t ivlen) argument 161 KASSERT(ivlen == AES_GCM_IV_LEN, 163 aes_icm_reinit(&ctx->cipher, iv, ivlen); 169 AES_GMAC_Reinit(&ctx->gmac, iv, ivlen); 173 aes_ccm_reinit(void *vctx, const uint8_t *iv, size_t ivlen) argument 177 KASSERT(ivlen > [all...] |
H A D | xform_chacha20_poly1305.c | 62 chacha20_poly1305_reinit(void *vctx, const uint8_t *iv, size_t ivlen) argument 67 KASSERT(ivlen == 8 || ivlen == sizeof(ctx->nonce), 70 memcpy(ctx->nonce, iv, ivlen); 71 ctx->ietf = (ivlen == CHACHA20_POLY1305_IV_LEN); 189 xchacha20_poly1305_reinit(void *vctx, const uint8_t *iv, size_t ivlen) argument 194 KASSERT(ivlen == XCHACHA20_POLY1305_IV_LEN,
|
H A D | gmac.c | 65 AES_GMAC_Reinit(void *ctx, const uint8_t *iv, u_int ivlen) argument 70 KASSERT(ivlen <= sizeof agc->counter, ("passed ivlen too large!")); 72 bcopy(iv, agc->counter, ivlen);
|
/freebsd-current/crypto/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon_gcm.c | 39 ctx->ivlen = (EVP_GCM_TLS_FIXED_IV_LEN + EVP_GCM_TLS_EXPLICIT_IV_LEN); 49 const unsigned char *iv, size_t ivlen, 60 if (ivlen == 0 || ivlen > sizeof(ctx->iv)) { 64 ctx->ivlen = ivlen; 65 memcpy(ctx->iv, iv, ivlen); 82 const unsigned char *iv, size_t ivlen, 85 return gcm_init(vctx, key, keylen, iv, ivlen, params, 1); 89 const unsigned char *iv, size_t ivlen, 48 gcm_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument 81 ossl_gcm_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 88 ossl_gcm_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument [all...] |
H A D | cipher_tdes_common.c | 65 const unsigned char *iv, size_t ivlen, 78 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) 85 memcpy(ctx->iv, ctx->oiv, ctx->ivlen); 101 const unsigned char *iv, size_t ivlen, 104 return tdes_init(vctx, key, keylen, iv, ivlen, params, 1); 108 const unsigned char *iv, size_t ivlen, 111 return tdes_init(vctx, key, keylen, iv, ivlen, params, 0); 64 tdes_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument 100 ossl_tdes_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 107 ossl_tdes_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
|
H A D | cipher_tdes_wrap.c | 85 size_t ivlen = TDES_IVLEN; local 87 size_t len = inl + ivlen + icvlen; 93 memmove(out + ivlen, in, inl); 97 memcpy(out + inl + ivlen, sha1tmp, icvlen); 100 if (RAND_bytes_ex(ctx->libctx, ctx->iv, ivlen, 0) <= 0) 102 memcpy(out, ctx->iv, ivlen); 104 ctx->hw->cipher(ctx, out + ivlen, out + ivlen, inl + ivlen); 106 memcpy(ctx->iv, wrap_iv, ivlen); [all...] |
H A D | cipher_aes_ocb.c | 52 size_t ivlen, size_t taglen) 54 return (CRYPTO_ocb128_setiv(&ctx->ocb, iv, ivlen, taglen) == 1); 105 const unsigned char *iv, size_t ivlen, 118 if (ivlen != ctx->base.ivlen) { 120 if (ivlen < OCB_MIN_IV_LEN || ivlen > OCB_MAX_IV_LEN) { 124 ctx->base.ivlen = ivlen; 126 if (!ossl_cipher_generic_initiv(&ctx->base, iv, ivlen)) 50 aes_generic_ocb_setiv(PROV_AES_OCB_CTX *ctx, const unsigned char *iv, size_t ivlen, size_t taglen) argument 104 aes_ocb_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument 141 aes_ocb_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 148 aes_ocb_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument [all...] |
H A D | cipher_rc2.c | 91 const unsigned char *iv, size_t ivlen, 94 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) 100 const unsigned char *iv, size_t ivlen, 103 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) 140 ctx->base.iv, ctx->base.ivlen)) { 188 || ctx->base.ivlen > sizeof(iv) 191 ctx->base.ivlen) 192 != ctx->base.ivlen) 193 || !ossl_cipher_generic_initiv(&ctx->base, iv, ctx->base.ivlen) 90 rc2_einit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 99 rc2_dinit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
|
H A D | cipher_rc4.c | 56 const unsigned char *iv, size_t ivlen, 59 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) 65 const unsigned char *iv, size_t ivlen, 68 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) 55 rc4_einit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 64 rc4_dinit(void *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
|
H A D | ciphercommon_gcm_hw.c | 14 int ossl_gcm_setiv(PROV_GCM_CTX *ctx, const unsigned char *iv, size_t ivlen) argument 16 CRYPTO_gcm128_setiv(&ctx->gcm, iv, ivlen);
|
H A D | ciphercommon.c | 190 const unsigned char *iv, size_t ivlen, 202 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) 210 memcpy(ctx->iv, ctx->oiv, ctx->ivlen); 230 size_t ivlen, const OSSL_PARAM params[]) 233 iv, ivlen, params, 1); 238 size_t ivlen, const OSSL_PARAM params[]) 241 iv, ivlen, params, 0); 580 if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->ivlen)) { 591 && !OSSL_PARAM_set_octet_ptr(p, &ctx->oiv, ctx->ivlen) 592 && !OSSL_PARAM_set_octet_string(p, &ctx->oiv, ctx->ivlen)) { 188 cipher_generic_init_internal(PROV_CIPHER_CTX *ctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument 228 ossl_cipher_generic_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 236 ossl_cipher_generic_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 677 ossl_cipher_generic_initiv(PROV_CIPHER_CTX *ctx, const unsigned char *iv, size_t ivlen) argument [all...] |
H A D | ciphercommon_ccm.c | 101 size_t ivlen; local 107 ivlen = 15 - sz; 108 if (ivlen < 2 || ivlen > 8) { 112 if (ctx->l != ivlen) { 113 ctx->l = ivlen; 226 const unsigned char *iv, size_t ivlen, 237 if (ivlen != ccm_get_ivlen(ctx)) { 241 memcpy(ctx->iv, iv, ivlen); 256 const unsigned char *iv, size_t ivlen, 225 ccm_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument 255 ossl_ccm_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 262 ossl_ccm_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument [all...] |
H A D | cipher_des.c | 74 const unsigned char *iv, size_t ivlen, 87 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) 91 memcpy(ctx->iv, ctx->oiv, ctx->ivlen); 107 const unsigned char *iv, size_t ivlen, 110 return des_init(vctx, key, keylen, iv, ivlen, params, 1); 114 const unsigned char *iv, size_t ivlen, 117 return des_init(vctx, key, keylen, iv, ivlen, params, 0); 73 des_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument 106 des_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 113 des_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
|
H A D | cipher_aes_cts.inc | 29 const unsigned char *iv, size_t ivlen, 32 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) 38 const unsigned char *iv, size_t ivlen, 41 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL))
|
H A D | cipher_camellia_cts.inc | 29 const unsigned char *iv, size_t ivlen, 32 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) 38 const unsigned char *iv, size_t ivlen, 41 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL))
|
H A D | cipher_aes_xts.c | 69 const unsigned char *iv, size_t ivlen, 81 if (!ossl_cipher_generic_initiv(vctx, iv, ivlen)) 98 const unsigned char *iv, size_t ivlen, 101 return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 1); 105 const unsigned char *iv, size_t ivlen, 108 return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 0); 68 aes_xts_init(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[], int enc) argument 97 aes_xts_einit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument 104 aes_xts_dinit(void *vctx, const unsigned char *key, size_t keylen, const unsigned char *iv, size_t ivlen, const OSSL_PARAM params[]) argument
|
/freebsd-current/sys/kgssapi/krb5/ |
H A D | kcrypto.h | 66 struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen); 115 size_t skip, size_t len, void *ivec, size_t ivlen) 118 ks->ks_class->ec_encrypt(ks, inout, skip, len, ivec, ivlen); 123 size_t skip, size_t len, void *ivec, size_t ivlen) 126 ks->ks_class->ec_decrypt(ks, inout, skip, len, ivec, ivlen); 114 krb5_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 122 krb5_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
/freebsd-current/sys/crypto/chacha20/ |
H A D | chacha-sw.c | 19 chacha20_xform_reinit(void *ctx, const uint8_t *iv, size_t ivlen) argument 21 KASSERT(ivlen == CHACHA_NONCELEN + CHACHA_CTRLEN,
|
/freebsd-current/crypto/openssl/ssl/record/ |
H A D | ssl3_record_tls13.c | 29 int ivlen; local 65 ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); 66 if (ivlen < 0) { 125 if (ivlen < SEQ_NUM_SIZE) { 130 offset = ivlen - SEQ_NUM_SIZE;
|
/freebsd-current/crypto/openssl/crypto/cms/ |
H A D | cms_enc.c | 37 int ivlen = 0; local 90 ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); 91 if (ivlen < 0) { 96 if (ivlen > 0) { 97 if (RAND_bytes_ex(libctx, iv, ivlen, 0) <= 0) 175 memcpy(aparams.iv, piv, ivlen); 176 aparams.iv_len = ivlen;
|
/freebsd-current/crypto/openssl/providers/implementations/include/prov/ |
H A D | ciphercommon_gcm.h | 50 size_t ivlen; member in struct:prov_gcm_ctx_st 84 size_t ivlen)); 114 int ossl_gcm_setiv(PROV_GCM_CTX *ctx, const unsigned char *iv, size_t ivlen);
|
/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | e_aes.c | 53 int ivlen; /* IV length */ member in struct:__anon16 114 int ivlen; /* IV length */ member in struct:__anon22 240 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 247 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 249 memcpy(gctx->iv, iv, gctx->ivlen); 374 if (CRYPTO_ocb128_setiv(&octx->ocb, iv, octx->ivlen, octx->taglen) 383 CRYPTO_ocb128_setiv(&octx->ocb, iv, octx->ivlen, octx->taglen); 385 memcpy(octx->iv, iv, octx->ivlen); 396 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 398 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 884 int ivlen; member in struct:__anon34 996 const int ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); local 1008 const int ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); local 1054 const int ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); local 1072 const int ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); local 1123 const int ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); local 1139 const int ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); local 1352 int ivlen, enc, len; local [all...] |
H A D | e_aria.c | 38 int ivlen; /* IV length */ member in struct:__anon3932 162 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 164 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 240 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 247 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 249 memcpy(gctx->iv, iv, gctx->ivlen); 264 gctx->ivlen = EVP_CIPHER_get_iv_length(c->cipher); 272 *(int *)ptr = gctx->ivlen; 279 if ((arg > EVP_MAX_IV_LENGTH) && (arg > gctx->ivlen)) { 287 gctx->ivlen [all...] |
/freebsd-current/sys/crypto/openssl/ |
H A D | ossl_aes_gcm.h | 38 size_t ivlen);
|
/freebsd-current/crypto/openssl/test/ |
H A D | tls13encryptiontest.c | 240 unsigned char *iv, size_t ivlen, unsigned char *seq) 263 memcpy(iv, ivtmp, ivlen); 312 size_t ivlen, ctr; local 350 ivlen = EVP_CIPHER_get_iv_length(ciph); 351 if (!load_record(&rec, &refdata[ctr], &key, s->read_iv, ivlen, 360 memcpy(s->write_iv, s->read_iv, ivlen); 239 load_record(SSL3_RECORD *rec, RECORD_DATA *recd, unsigned char **key, unsigned char *iv, size_t ivlen, unsigned char *seq) argument
|