/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | aes-gcm.c | 192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) argument 196 if (iv_len == 12) { 198 os_memcpy(J0, iv, iv_len); 199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len); 207 ghash(H, iv, iv_len, J0); 209 WPA_PUT_BE64(len_buf + 8, iv_len * 8); 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 267 aes_gcm_prepare_j0(iv, iv_len, H, J0); 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument [all...] |
H A D | crypto_linux.c | 686 size_t iv_len = AES_BLOCK_SIZE; local 698 CMSG_SPACE(sizeof(*alg_iv) + iv_len); 712 hdr->cmsg_len = CMSG_SPACE(sizeof(*alg_iv) + iv_len); 714 alg_iv->ivlen = iv_len; 715 os_memcpy(alg_iv->iv, iv, iv_len); 795 size_t iv_len = 8; local 801 io[0].iov_base = (void *) (cipher + iv_len); 807 CMSG_SPACE(sizeof(*alg_iv) + iv_len); 821 hdr->cmsg_len = CMSG_SPACE(sizeof(*alg_iv) + iv_len); 823 alg_iv->ivlen = iv_len; 865 size_t iv_len = 0; local [all...] |
H A D | aes_wrap.h | 53 const u8 *iv, size_t iv_len, 58 const u8 *iv, size_t iv_len, 63 const u8 *iv, size_t iv_len,
|
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | evp_locl.h | 135 key_len, iv_len, flags, init_key, cleanup, \ 138 nid##_##nmode, block_size, key_len, iv_len, \ 151 iv_len, flags, init_key, cleanup, set_asn1, \ 154 iv_len, flags, init_key, cleanup, set_asn1, get_asn1, ctrl) 157 iv_len, cbits, flags, init_key, cleanup, \ 160 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 164 iv_len, cbits, flags, init_key, cleanup, \ 167 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 177 nid, block_size, key_len, iv_len, cbits, flags, \ 179 BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, iv_len, flag [all...] |
H A D | openbsd_hw.c | 141 assert(ctx->cipher->iv_len <= MAX_HW_IV); 176 if (ctx->cipher->iv_len) 180 memcpy(lb, &in[cryp.len - ctx->cipher->iv_len], ctx->cipher->iv_len); 230 memcpy(ctx->iv, &out[cryp.len - ctx->cipher->iv_len], 231 ctx->cipher->iv_len); 233 memcpy(ctx->iv, lb, ctx->cipher->iv_len);
|
H A D | evp_key.c | 134 niv = type->iv_len;
|
H A D | evp_lib.c | 267 return cipher->iv_len; 272 return ctx->cipher->iv_len;
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | crypto.c | 264 apr_size_t iv_len; 283 apr_err = apr_crypto_passphrase(&key, &iv_len, 297 if (iv_len == 0) 302 SVN_ERR(get_random_bytes(&iv_vector, ctx, iv_len, result_pool)); 379 *iv = wrap_as_string(iv_vector, iv_len, result_pool); 406 apr_size_t block_size, iv_len; 412 apr_err = apr_crypto_passphrase(&key, &iv_len, 425 if (iv_len == 0) 428 if (iv_len != iv->len) 501 apr_size_t iv_len; 262 apr_size_t iv_len; local 404 apr_size_t block_size, iv_len; local 499 apr_size_t iv_len; local 623 apr_size_t block_size, iv_len; local [all...] |
/freebsd-11-stable/sys/dev/cxgbe/crypto/ |
H A D | t4_crypto.c | 154 unsigned int iv_len; member in struct:ccr_session_blkcipher 604 s->blkcipher.iv_len)) { 619 wr_len = roundup2(transhdr_len, 16) + s->blkcipher.iv_len + 638 memcpy(iv, crd->crd_iv, s->blkcipher.iv_len); 640 arc4rand(iv, s->blkcipher.iv_len, 0); 643 crd->crd_inject, s->blkcipher.iv_len, iv); 646 memcpy(iv, crd->crd_iv, s->blkcipher.iv_len); 649 crd->crd_inject, s->blkcipher.iv_len, iv); 663 crwr->sec_cpl.pldlen = htobe32(s->blkcipher.iv_len + crd->crd_len); 666 V_CPL_TX_SEC_PDU_CIPHERSTART(s->blkcipher.iv_len 1118 u_int iv_len, kctx_len, op_type, transhdr_len, wr_len; local 1884 unsigned int auth_mode, cipher_mode, iv_len, mk_size; local [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 434 size_t iv_len; local 453 iv_len = encr_alg->block_size; 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 468 pos = iv + iv_len; 536 size_t iv_len, pad_len; local 552 iv_len = encr_alg->block_size; 574 iv = wpabuf_put(msg, iv_len); 575 if (random_get_bytes(iv, iv_len)) { 580 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len; [all...] |
H A D | eap_sake_common.h | 76 size_t iv_len; member in struct:eap_sake_parse_attr
|
/freebsd-11-stable/tools/tools/crypto/ |
H A D | cryptocheck.c | 522 u_int iv_len, key_len; local 535 iv_len = EVP_CIPHER_iv_length(cipher); 538 iv = generate_iv(iv_len, alg); 598 const char *iv, size_t iv_len, const char *auth_key, size_t auth_key_len, 630 caead.ivlen = iv_len; 679 u_int iv_len, auth_key_len, cipher_key_len, digest_len; local 698 iv_len = EVP_CIPHER_iv_length(cipher); 702 iv = generate_iv(iv_len, alg); 724 if (!ocf_authenc(alg, cipher_key, cipher_key_len, iv, iv_len, auth_key, 752 if (!ocf_authenc(alg, cipher_key, cipher_key_len, iv, iv_len, auth_ke 597 ocf_authenc(struct alg *alg, const char *cipher_key, size_t cipher_key_len, const char *iv, size_t iv_len, const char *auth_key, size_t auth_key_len, const char *aad, size_t aad_len, const char *input, char *output, size_t size, char *digest, int enc, int *cridp) argument 836 ocf_gcm(struct alg *alg, const char *key, size_t key_len, const char *iv, size_t iv_len, const char *aad, size_t aad_len, const char *input, char *output, size_t size, char *tag, int enc, int *cridp) argument 938 u_int iv_len, key_len; local [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | cipher-ctr.c | 134 aes_ctr.iv_len = AES_BLOCK_SIZE;
|
H A D | cipher-aes.c | 150 rijndal_cbc.iv_len = RIJNDAEL_BLOCKSIZE;
|
H A D | kex.h | 112 u_int iv_len; member in struct:sshenc
|
H A D | cipher-3des1.c | 150 ssh1_3des.iv_len = 0;
|
H A D | cipher.c | 74 u_int iv_len; /* defaults to block_size */ member in struct:sshcipher 199 * needs no IV. XXX make iv_len == -1 default? 201 return (c->iv_len != 0 || (c->flags & CFLAG_CHACHAPOLY) != 0) ? 202 c->iv_len : c->block_size;
|
H A D | kex.c | 568 explicit_bzero(newkeys->enc.iv, newkeys->enc.iv_len); 664 enc->iv_len = cipher_ivlen(enc->cipher); 861 need = MAXIMUM(need, newkeys->enc.iv_len); 865 dh_need = MAXIMUM(dh_need, newkeys->enc.iv_len);
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | pkcs5.c | 34 size_t iv_len; member in struct:pkcs5_params 270 params->iv_len = hdr.length; 271 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); 389 params->iv_len != 8) 402 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len);
|
/freebsd-11-stable/sys/dev/cxgbe/tom/ |
H A D | t4_tls.c | 1011 void *iv_buffer, int iv_len, int nsegs, int n) 1054 rc = sglist_append(&sg, iv_buffer, iv_len); 1096 u_int expn_size, iv_len, pdus, sndptroff; local 1212 iv_len = pdus * CIPHER_BLOCK_SIZE; 1268 if (wr_len + iv_len <= space) { 1270 wr_len += iv_len; 1279 iv_buffer = malloc(iv_len, M_CXGBE, M_NOWAIT); 1291 __func__, toep->tid, iv_len); 1304 int n = sglist_count(iv_buffer, iv_len); 1341 buf = (char *)iv_dst + iv_len; 1010 write_tlstx_sgl(void *dst, struct mbuf *start, int skip, int plen, void *iv_buffer, int iv_len, int nsegs, int n) argument [all...] |
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | s2_enc.c | 107 OPENSSL_assert(c->iv_len <= (int)sizeof(s->session->key_arg));
|
/freebsd-11-stable/crypto/openssl/crypto/pem/ |
H A D | pem_info.c | 356 OPENSSL_assert(strlen(objstr) + 23 + 2 * enc->iv_len + 13 <= 360 PEM_dek_info(buf, objstr, enc->iv_len, (char *)iv);
|
H A D | pem_lib.c | 383 OPENSSL_assert(enc->iv_len <= (int)sizeof(iv)); 384 if (RAND_bytes(iv, enc->iv_len) <= 0) /* Generate a salt */ 396 OPENSSL_assert(strlen(objstr) + 23 + 2 * enc->iv_len + 13 <= 401 PEM_dek_info(buf, objstr, enc->iv_len, (char *)iv); 543 if (!load_iv(header_pp, &(cipher->iv[0]), enc->iv_len))
|
/freebsd-11-stable/crypto/openssl/crypto/engine/ |
H A D | eng_cryptodev.c | 434 if (ctx->cipher->iv_len) { 437 iiv = in + inl - ctx->cipher->iv_len; 438 memcpy(save_iv, iiv, ctx->cipher->iv_len); 451 if (ctx->cipher->iv_len) { 453 iiv = out + inl - ctx->cipher->iv_len; 456 memcpy(ctx->iv, iiv, ctx->cipher->iv_len); 471 ctx->cipher->iv_len <= ciphers[i].ivmax &&
|
/freebsd-11-stable/sys/mips/rmi/dev/sec/ |
H A D | rmilib.c | 144 int iv_len; local 184 iv_len = 0; 188 iv_len = XLR_SEC_DES_IV_LENGTH; 193 iv_len = XLR_SEC_AES_IV_LENGTH; 196 iv_len = XLR_SEC_ARC4_IV_LENGTH; 199 iv_len = XLR_SEC_KASUMI_F8_IV_LENGTH; 207 size = op->source_buf_size + iv_len; 226 memcpy(desc->user.aligned_src, &op->initial_vector[0], iv_len); 229 memcpy((uint8_t *) (desc->user.aligned_src + iv_len), 238 op->source_buf_size += iv_len; [all...] |