/macosx-10.10/xnu-2782.1.97/bsd/netinet6/ |
H A D | esp_core.c | 200 int ivlen; local 202 ivlen = 0; 205 if (esp_algorithms[idx]->ivlenval > ivlen) 206 ivlen = esp_algorithms[idx]->ivlenval; 209 return ivlen; 283 __unused int ivlen) 296 __unused int ivlen) 533 esp_cbc_decrypt(m, off, sav, algo, ivlen) 538 int ivlen; 554 if (ivlen ! 278 esp_null_decrypt( __unused struct mbuf *m, __unused size_t off, __unused struct secasvar *sav, __unused const struct esp_algorithm *algo, __unused int ivlen) argument 290 esp_null_encrypt( __unused struct mbuf *m, __unused size_t off, __unused size_t plen, __unused struct secasvar *sav, __unused const struct esp_algorithm *algo, __unused int ivlen) argument 759 esp_cbc_encrypt( struct mbuf *m, size_t off, __unused size_t plen, struct secasvar *sav, const struct esp_algorithm *algo, int ivlen) argument [all...] |
H A D | esp_rijndael.c | 142 esp_cbc_decrypt_aes(m, off, sav, algo, ivlen) 147 int ivlen; 161 if (ivlen != AES_BLOCKLEN) { 163 "unsupported ivlen %d\n", algo->name, ivlen)); 171 bodyoff = off + sizeof(struct esp) + ivlen; 174 bodyoff = off + sizeof(struct newesp) + ivlen; 192 m_copydata(m, ivoff, ivlen, (caddr_t) iv); 341 int ivlen) 355 if (ivlen ! 335 esp_cbc_encrypt_aes( struct mbuf *m, size_t off, __unused size_t plen, struct secasvar *sav, const struct esp_algorithm *algo, int ivlen) argument [all...] |
H A D | esp.h | 109 int (*ivlen)(const struct esp_algorithm *, struct secasvar *); member in struct:esp_algorithm
|
H A D | esp_output.c | 145 size_t ivlen; 166 ivlen = sav->ivlen; 167 if (ivlen < 0) 178 hdrsiz = sizeof(struct esp) + ivlen + maxpad; 186 hdrsiz = sizeof(struct newesp) + ivlen + maxpad + authlen; 204 * esp_max_ivlen() = max ivlen for CBC mode 228 * ivlen 250 int ivlen; local 259 KERNEL_DEBUG(DBG_FNC_ESPOUT | DBG_FUNC_START, sav->ivlen, [all...] |
H A D | esp_input.c | 175 int ivlen; local 250 /* check if we have proper ivlen information */ 251 ivlen = sav->ivlen; 252 if (ivlen < 0) { 253 ipseclog((LOG_ERR, "inproper ivlen in IPv4 ESP input: %s %s\n", 356 if (m->m_pkthdr.len < off + esplen + ivlen + sizeof(esptail)) { 363 if (m->m_len < off + esplen + ivlen) { 364 m = m_pullup(m, off + esplen + ivlen); 387 if ((*algo->decrypt)(m, off, sav, algo, ivlen)) { 759 int ivlen; local [all...] |
/macosx-10.10/tcpdump-61/tcpdump/ |
H A D | print-esp.c | 300 int ivlen; member in struct:sa_list 351 buf = buf + sa->ivlen; 494 sa->ivlen = 0; 504 sa->ivlen = 0; 512 sa->ivlen =IVLengthFromCipherData(&cipherData); 516 sa->ivlen = EVP_CIPHER_iv_length(evp); 806 int ivlen = 0; local 917 ivlen = sa->ivlen; 928 len = ep - (p + ivlen); [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/cms/ |
H A D | cms_enc.c | 125 int ivlen; local 128 ivlen = EVP_CIPHER_CTX_iv_length(ctx); 129 if (ivlen > 0) 131 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | cipher.c | 226 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, 253 if (iv != NULL && ivlen < cipher_ivlen(cipher)) 255 ivlen, cipher->name); 397 int ivlen; local 400 ivlen = 24; 402 ivlen = EVP_CIPHER_CTX_iv_length(&cc->evp); 403 return (ivlen); 225 cipher_init(CipherContext *cc, Cipher *cipher, const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, int do_encrypt) argument
|
H A D | monitor_wrap.c | 614 u_int ivlen, keylen; local 628 ivlen = packet_get_keyiv_len(MODE_OUT); 629 packet_get_keyiv(MODE_OUT, iv, ivlen); 630 buffer_put_string(&m, iv, ivlen); 631 ivlen = packet_get_keyiv_len(MODE_IN); 632 packet_get_keyiv(MODE_IN, iv, ivlen); 633 buffer_put_string(&m, iv, ivlen);
|
/macosx-10.10/xnu-2782.1.97/bsd/netkey/ |
H A D | keydb.h | 93 u_int ivlen; /* length of IV */ member in struct:secasvar
|
H A D | key_debug.c | 282 printf(" { id=%d ivlen=%d min=%d max=%d }\n", 618 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
|
H A D | key.c | 4201 sav->ivlen = 0; 4207 if (algo && algo->ivlen) 4208 sav->ivlen = (*algo->ivlen)(algo, sav); 4209 if (sav->ivlen == 0) 4211 KMALLOC_NOWAIT(sav->iv, caddr_t, sav->ivlen); 4214 KMALLOC_WAIT(sav->iv, caddr_t, sav->ivlen); 4224 key_randomfill(sav->iv, sav->ivlen); 4454 sav->ivlen = 0; 4459 if (algo && algo->ivlen) [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | evp.c | 1366 unsigned int ivlen, keylen; local 1375 ivlen = EVP_CIPHER_iv_length(type); 1419 if (ivlen && mds > i) { 1420 size_t sz = min(ivlen, (mds - i)); 1425 ivlen -= sz; 1427 if (keylen == 0 && ivlen == 0)
|
/macosx-10.10/OpenSSH-189/osslshim/ossl/ |
H A D | ossl-evp.c | 1580 unsigned int ivlen, keylen; local 1589 ivlen = EVP_CIPHER_iv_length(type); 1637 if (ivlen && (mds > i)) { 1638 size_t sz = min(ivlen, (mds - i)); 1643 ivlen -= sz; 1645 if ((keylen == 0) && (ivlen == 0)) {
|
/macosx-10.10/OpenSSL098-52/src/crypto/pkcs7/ |
H A D | pk7_doit.c | 206 int keylen,ivlen; local 218 ivlen=EVP_CIPHER_iv_length(evp_cipher); 220 if (ivlen > 0) 221 if (RAND_pseudo_bytes(iv,ivlen) <= 0) 230 if (ivlen > 0) { 419 int keylen,ivlen;
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/Common/ |
H A D | key_debug.c | 326 printf(" { id=%d ivlen=%d min=%d max=%d }\n", 717 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
|