/freebsd-11-stable/sys/kgssapi/krb5/ |
H A D | kcrypto.h | 66 struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen); 120 size_t skip, size_t len, void *ivec, size_t ivlen) 123 ks->ks_class->ec_encrypt(ks, inout, skip, len, ivec, ivlen); 128 size_t skip, size_t len, void *ivec, size_t ivlen) 131 ks->ks_class->ec_decrypt(ks, inout, skip, len, ivec, ivlen); 119 krb5_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 127 krb5_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
H A D | kcrypto_arcfour.c | 135 size_t skip, size_t len, void *ivec, size_t ivlen) 147 arcfour_hmac(newkey, ivec, ivlen, kk); 134 arcfour_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
H A D | kcrypto_des.c | 206 size_t skip, size_t len, void *ivec, size_t ivlen) 215 size_t skip, size_t len, void *ivec, size_t ivlen) 205 des1_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 214 des1_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
H A D | kcrypto_aes.c | 180 size_t skip, size_t len, void *ivec, size_t ivlen) 251 size_t skip, size_t len, void *ivec, size_t ivlen) 179 aes_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 250 aes_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
H A D | kcrypto_des3.c | 216 size_t skip, size_t len, void *ivec, size_t ivlen) 224 size_t skip, size_t len, void *ivec, size_t ivlen) 215 des3_encrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument 223 des3_decrypt(const struct krb5_key_state *ks, struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen) argument
|
/freebsd-11-stable/sys/opencrypto/ |
H A D | gmac.c | 64 AES_GMAC_Reinit(struct aes_gmac_ctx *agc, const uint8_t *iv, uint16_t ivlen) argument 67 KASSERT(ivlen <= sizeof agc->counter, ("passed ivlen too large!")); 68 bcopy(iv, agc->counter, ivlen);
|
H A D | cryptosoft.c | 90 int i, j, k, blks, ind, count, ivlen; local 101 ivlen = exf->ivsize; 115 bcopy(crd->crd_iv, iv, ivlen); 117 arc4rand(iv, ivlen, 0); 121 crypto_copyback(flags, buf, crd->crd_inject, ivlen, iv); 126 bcopy(crd->crd_iv, iv, ivlen); 129 crypto_copydata(flags, buf, crd->crd_inject, ivlen, iv); 473 int aadlen, blksz, i, ivlen, len, iskip, oskip, r; local 475 ivlen = blksz = iskip = oskip = 0; 491 ivlen [all...] |
H A D | cryptodev.h | 257 u_int ivlen; member in struct:crypt_aead
|
/freebsd-11-stable/sys/mips/nlm/dev/sec/ |
H A D | nlmseclib.c | 106 cmd->iv, cmd->ivlen); 108 cmd->iv, cmd->ivlen); 182 cmd->ivlen, cmd->cipheroff, cmd->cipherlen); 242 cmd->ivoff, cmd->ivlen, cmd->hashoff, cmd->hashlen, 285 cmd->ivlen = XLP_SEC_DES_IV_LENGTH; 290 cmd->ivlen = XLP_SEC_DES_IV_LENGTH; 295 cmd->ivlen = XLP_SEC_AES_IV_LENGTH; 300 cmd->ivlen = XLP_SEC_ARC4_IV_LENGTH;
|
H A D | nlmsec.c | 258 printf("ivlen :%d\n",cmd->ivlen); 293 unsigned int ivlen = 0; local 322 ivlen = ((crd->crd_alg == CRYPTO_AES_CBC) ? 325 crd->crd_skip + crd->crd_len - ivlen, ivlen, 571 unsigned int ivlen = 0; local 579 ivlen = ((enccrd->crd_alg == CRYPTO_AES_CBC) ? 583 bcopy(enccrd->crd_iv, cmd->iv, ivlen); 586 ivlen); [all...] |
H A D | nlmseclib.h | 110 uint32_t ivlen; member in struct:xlp_sec_command
|
/freebsd-11-stable/sys/mips/nlm/hal/ |
H A D | nlmsaelib.h | 240 * ivlen : iv length in bytes 245 unsigned int hashout_l3alloc, unsigned int encrypt, unsigned int ivlen, 252 left_shift64_mask((ivlen - 1), 41, 16) | 497 * ivlen : iv length in bytes 508 unsigned int hash_source, unsigned int ivoff, unsigned int ivlen, 513 ivlen, vtophys(hashdst_addr)); 528 * ivlen : iv length in bytes 535 unsigned int ivoff, unsigned int ivlen, unsigned int cipheroff, 538 param->desc0 = nlm_crypto_form_pkt_desc0(0, 0, 0, encrypt, ivlen, 0ULL); 244 nlm_crypto_form_pkt_desc0(unsigned int tls, unsigned int hash_source, unsigned int hashout_l3alloc, unsigned int encrypt, unsigned int ivlen, uint64_t hashdst_addr) argument 506 nlm_crypto_fill_cipher_auth_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int encrypt, unsigned int hash_source, unsigned int ivoff, unsigned int ivlen, unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, unsigned int cipheroff, unsigned int cipherlen, unsigned char *hashdst_addr) argument 533 nlm_crypto_fill_cipher_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int encrypt, unsigned int ivoff, unsigned int ivlen, unsigned int cipheroff, unsigned int cipherlen) argument
|
/freebsd-11-stable/sys/crypto/aesni/ |
H A D | aesni.c | 523 int ivlen, encflag; local 568 ivlen = AES_BLOCK_LEN; 571 ivlen = 8; 574 ivlen = 12; /* should support arbitarily larger */ 581 bcopy(enccrd->crd_iv, iv, ivlen); 583 arc4rand(iv, ivlen, 0); 587 enccrd->crd_inject, ivlen, iv); 590 bcopy(enccrd->crd_iv, iv, ivlen); 593 enccrd->crd_inject, ivlen, iv); 630 enccrd->crd_len, authcrd->crd_len, ivlen, [all...] |
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-esp.c | 114 int ivlen; member in struct:sa_list 218 buf = buf + sa->ivlen; 389 sa->ivlen = 0; 395 sa->ivlen = EVP_CIPHER_iv_length(evp); 682 int ivlen = 0; local 788 ivlen = sa->ivlen; 800 len = ep - (p + ivlen); 823 memcpy(input_buffer, p + ivlen, len); 844 memcpy(__DECONST(u_char *, p + ivlen), output_buffe [all...] |
/freebsd-11-stable/crypto/openssl/crypto/evp/ |
H A D | e_aes.c | 87 int ivlen; /* IV length */ member in struct:__anon4573 358 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 365 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 367 memcpy(gctx->iv, iv, gctx->ivlen); 441 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 443 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 452 keylen/8,ivlen, \ 462 # define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ 465 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ 474 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ [all...] |
H A D | e_camellia.c | 208 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 210 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 219 keylen/8,ivlen, \ 231 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 233 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \
|
/freebsd-11-stable/crypto/openssl/crypto/cms/ |
H A D | cms_enc.c | 117 int ivlen; local 120 ivlen = EVP_CIPHER_CTX_iv_length(ctx); 121 if (ivlen > 0) { 122 if (RAND_bytes(iv, ivlen) <= 0)
|
H A D | cms_pwri.c | 96 int ivlen; local 134 ivlen = EVP_CIPHER_CTX_iv_length(&ctx); 136 if (ivlen > 0) { 137 if (RAND_bytes(iv, ivlen) <= 0)
|
/freebsd-11-stable/sys/netipsec/ |
H A D | xform_esp.c | 197 sav->ivlen = 8; /* RFC4106 3.1 and RFC3686 3.1 */ 199 sav->ivlen = txform->ivsize; 323 hlen = sizeof (struct esp) + sav->ivlen; 325 hlen = sizeof (struct newesp) + sav->ivlen; 431 crde->crd_inject = skip + hlen - sav->ivlen; 445 be32enc(&ivp[sav->ivlen + 4], 1); 448 m_copydata(m, skip + hlen - sav->ivlen, sav->ivlen, &ivp[4]); 573 hlen = sizeof (struct esp) + sav->ivlen; 575 hlen = sizeof (struct newesp) + sav->ivlen; [all...] |
H A D | keydb.h | 150 u_int ivlen; /* length of IV */ member in struct:secasvar
|
/freebsd-11-stable/crypto/openssh/ |
H A D | cipher.c | 322 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, 346 (iv != NULL && ivlen < cipher_ivlen(cipher))) { 358 aesctr_keysetup(&cc->ac_ctx, key, 8 * keylen, 8 * ivlen); 569 int ivlen = 0; local 572 ivlen = 24; 574 ivlen = 0; 576 ivlen = sizeof(cc->ac_ctx.ctr); 579 ivlen = EVP_CIPHER_CTX_iv_length(cc->evp); 581 return (ivlen); 321 cipher_init(struct sshcipher_ctx **ccp, const struct sshcipher *cipher, const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, int do_encrypt) argument
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | crypto_gnutls.c | 409 int ivlen; local 468 ivlen = gcry_cipher_get_algo_blklen(a); 469 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 470 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
|
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 334 int keylen, ivlen; local 343 ivlen = EVP_CIPHER_iv_length(evp_cipher); 345 if (ivlen > 0) 346 if (RAND_bytes(iv, ivlen) <= 0) 355 if (ivlen > 0) { 534 int keylen, ivlen;
|
/freebsd-11-stable/sys/dev/hifn/ |
H A D | hifn7751.c | 1553 int using_mac, using_crypt, len, ivlen; local 1642 ivlen = HIFN_AES_IV_LENGTH; 1645 ivlen = HIFN_IV_LENGTH; 1648 bcopy(cmd->iv, buf_pos, ivlen); 1649 buf_pos += ivlen; 2446 int session, err, ivlen; local 2564 ivlen = ((enccrd->crd_alg == CRYPTO_AES_CBC) ? 2568 bcopy(enccrd->crd_iv, cmd->iv, ivlen); 2571 cmd->iv, ivlen); 2577 ivlen, cm 2768 int totlen, i, u, ivlen; local [all...] |
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | t1_enc.c | 357 fprintf(stderr, "\tevp_cipher: nid, blksz= %d, %d, keylen=%d, ivlen=%d\n", 768 int ivlen; local 773 ivlen = EVP_CIPHER_iv_length(enc); 775 ivlen = 0; 776 if (ivlen > 1) { 785 else if (RAND_bytes(rec->input, ivlen) <= 0)
|