/dports/security/n2n/n2n-2.8/legacy/ |
H A D | transform_aes.c | 143 static void set_aes_cbc_iv(sa_aes_t *sa, n2n_aes_ivec_t ivec, uint64_t iv_seed) { in set_aes_cbc_iv() argument 148 memcpy(iv_full + sizeof(iv_seed), &iv_seed, sizeof(iv_seed)); in set_aes_cbc_iv() 189 uint64_t iv_seed = 0; in transop_encode_aes() local 210 ((uint32_t*)&iv_seed)[0] = rand(); in transop_encode_aes() 211 ((uint32_t*)&iv_seed)[1] = rand(); in transop_encode_aes() 212 encode_buf(outbuf, &idx, &iv_seed, sizeof(iv_seed)); in transop_encode_aes() 228 traceEvent( TRACE_DEBUG, "padding = %u, seed = %016lx", padding, iv_seed ); in transop_encode_aes() 230 set_aes_cbc_iv(sa, enc_ivec, iv_seed); in transop_encode_aes() 297 uint64_t iv_seed=0; in transop_decode_aes() local 314 decode_buf((uint8_t *)&iv_seed, sizeof(iv_seed), inbuf, &rem, &idx); in transop_decode_aes() [all …]
|
/dports/security/n2n/n2n-2.8/src/ |
H A D | transform_aes.c | 121 static void set_aes_cbc_iv(transop_aes_t *priv, n2n_aes_ivec_t ivec, uint8_t * iv_seed) { in set_aes_cbc_iv() argument 126 memcpy(iv_full + TRANSOP_AES_IV_PADDING_SIZE, iv_seed, TRANSOP_AES_IV_SEED_SIZE); in set_aes_cbc_iv() 162 uint8_t iv_seed[TRANSOP_AES_IV_SEED_SIZE]; in transop_encode_aes() local 177 memcpy(iv_seed + TRANSOP_AES_IV_SEED_SIZE - i, &rand_value, sizeof(rand_value)); in transop_encode_aes() 182 memcpy(iv_seed, &rand_value, i); in transop_encode_aes() 184 encode_buf(outbuf, &idx, iv_seed, TRANSOP_AES_IV_SEED_SIZE); in transop_encode_aes() 201 …traceEvent(TRACE_DEBUG, "padding = %u, seed = 0x%s", padding, to_hex (iv_seed, TRANSOP_AES_IV_SEED… in transop_encode_aes() 203 set_aes_cbc_iv(priv, enc_ivec, iv_seed); in transop_encode_aes() 266 uint8_t iv_seed[TRANSOP_AES_IV_SEED_SIZE]; in transop_decode_aes() local 273 decode_buf((uint8_t *)&iv_seed, TRANSOP_AES_IV_SEED_SIZE, inbuf, &rem, &idx); in transop_decode_aes() [all …]
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/drivers/md/ |
H A D | dm-crypt.c | 118 u8 *iv_seed; member 566 kfree_sensitive(tcw->iv_seed); in crypt_iv_tcw_dtr() 567 tcw->iv_seed = NULL; in crypt_iv_tcw_dtr() 598 tcw->iv_seed = kzalloc(cc->iv_size, GFP_KERNEL); in crypt_iv_tcw_ctr() 600 if (!tcw->iv_seed || !tcw->whitening) { in crypt_iv_tcw_ctr() 614 memcpy(tcw->iv_seed, &cc->key[key_offset], cc->iv_size); in crypt_iv_tcw_init() 625 memset(tcw->iv_seed, 0, cc->iv_size); in crypt_iv_tcw_wipe() 687 crypto_xor_cpy(iv, tcw->iv_seed, (u8 *)§or, 8); in crypt_iv_tcw_gen() 689 crypto_xor_cpy(&iv[8], tcw->iv_seed + 8, (u8 *)§or, in crypt_iv_tcw_gen()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/drivers/md/ |
H A D | dm-crypt.c | 118 u8 *iv_seed; member 566 kfree_sensitive(tcw->iv_seed); in crypt_iv_tcw_dtr() 567 tcw->iv_seed = NULL; in crypt_iv_tcw_dtr() 598 tcw->iv_seed = kzalloc(cc->iv_size, GFP_KERNEL); in crypt_iv_tcw_ctr() 600 if (!tcw->iv_seed || !tcw->whitening) { in crypt_iv_tcw_ctr() 614 memcpy(tcw->iv_seed, &cc->key[key_offset], cc->iv_size); in crypt_iv_tcw_init() 625 memset(tcw->iv_seed, 0, cc->iv_size); in crypt_iv_tcw_wipe() 687 crypto_xor_cpy(iv, tcw->iv_seed, (u8 *)§or, 8); in crypt_iv_tcw_gen() 689 crypto_xor_cpy(&iv[8], tcw->iv_seed + 8, (u8 *)§or, in crypt_iv_tcw_gen()
|
/dports/multimedia/libv4l/linux-5.13-rc2/drivers/md/ |
H A D | dm-crypt.c | 118 u8 *iv_seed; member 566 kfree_sensitive(tcw->iv_seed); in crypt_iv_tcw_dtr() 567 tcw->iv_seed = NULL; in crypt_iv_tcw_dtr() 598 tcw->iv_seed = kzalloc(cc->iv_size, GFP_KERNEL); in crypt_iv_tcw_ctr() 600 if (!tcw->iv_seed || !tcw->whitening) { in crypt_iv_tcw_ctr() 614 memcpy(tcw->iv_seed, &cc->key[key_offset], cc->iv_size); in crypt_iv_tcw_init() 625 memset(tcw->iv_seed, 0, cc->iv_size); in crypt_iv_tcw_wipe() 687 crypto_xor_cpy(iv, tcw->iv_seed, (u8 *)§or, 8); in crypt_iv_tcw_gen() 689 crypto_xor_cpy(&iv[8], tcw->iv_seed + 8, (u8 *)§or, in crypt_iv_tcw_gen()
|