/freebsd/contrib/wpa/src/crypto/ |
H A D | aes-gcm.c | 196 if (iv_len == 12) { in aes_gcm_prepare_j0() 198 os_memcpy(J0, iv, iv_len); in aes_gcm_prepare_j0() 199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len); in aes_gcm_prepare_j0() 207 ghash(H, iv, iv_len, J0); in aes_gcm_prepare_j0() 209 WPA_PUT_BE64(len_buf + 8, iv_len * 8); in aes_gcm_prepare_j0() 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gcm_ae() argument 267 aes_gcm_prepare_j0(iv, iv_len, H, J0); in aes_gcm_ae() 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gcm_ad() argument 301 aes_gcm_prepare_j0(iv, iv_len, H, J0); in aes_gcm_ad() 322 int aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gmac() argument [all …]
|
H A D | crypto_linux.c | 686 size_t iv_len = AES_BLOCK_SIZE; in aes_128_cbc_oper() local 714 alg_iv->ivlen = iv_len; in aes_128_cbc_oper() 715 os_memcpy(alg_iv->iv, iv, iv_len); in aes_128_cbc_oper() 795 size_t iv_len = 8; in aes_unwrap() local 823 alg_iv->ivlen = iv_len; in aes_unwrap() 865 size_t iv_len = 0; in crypto_cipher_init() local 881 iv_len = AES_BLOCK_SIZE; in crypto_cipher_init() 885 iv_len = 8; in crypto_cipher_init() 889 iv_len = 8; in crypto_cipher_init() 902 if (iv && iv_len) { in crypto_cipher_init() [all …]
|
H A D | aes_wrap.h | 53 const u8 *iv, size_t iv_len, 58 const u8 *iv, size_t iv_len, 63 const u8 *iv, size_t iv_len,
|
/freebsd/tools/tools/crypto/ |
H A D | cryptocheck.c | 795 u_int iv_len, key_len; in run_cipher_test() local 824 iv = generate_iv(iv_len, alg); in run_cipher_test() 921 caead.ivlen = iv_len; in ocf_eta() 1186 u_int iv_len, key_len; in run_gmac_test() local 1538 sop.ivlen = iv_len; in ocf_init_aead_session() 1553 caead.ivlen = iv_len; in ocf_aead() 1571 const u_int L = 15 - iv_len; in max_ccm_buffer_length() 1598 size_t iv_len) in run_aead_test() argument 1665 iv_len, aad_len, size); in run_aead_test() 1674 iv_len, aad_len, size); in run_aead_test() [all …]
|
/freebsd/sys/dev/cxgbe/crypto/ |
H A D | t4_crypto.c | 160 unsigned int iv_len; member 627 u_int imm_len, iv_len; in ccr_cipher() local 669 iv_len = s->cipher.iv_len; in ccr_cipher() 701 memset(iv + s->cipher.iv_len, 0, iv_len - s->cipher.iv_len); in ccr_cipher() 767 dst += iv_len; in ccr_cipher() 843 iv_len = s->cipher.iv_len; in ccr_eta() 1002 memset(iv + s->cipher.iv_len, 0, iv_len - s->cipher.iv_len); in ccr_eta() 1078 dst += iv_len; in ccr_eta() 1349 dst += iv_len; in ccr_gcm() 1639 memset(iv, 0, iv_len); in ccr_ccm() [all …]
|
/freebsd/crypto/openssl/providers/implementations/kdfs/ |
H A D | kbkdf.c | 70 size_t iv_len; member 144 OPENSSL_clear_free(ctx->iv, ctx->iv_len); in kbkdf_reset() 152 size_t iv_len, unsigned char *label, size_t label_len, in derive() argument 159 size_t written = 0, to_write, k_i_len = iv_len; in derive() 175 if (iv_len > 0) in derive() 176 memcpy(k_i, iv, iv_len); in derive() 246 if (ctx->iv_len != 0 && ctx->iv_len != h) { in kbkdf_derive() 258 ret = derive(ctx->ctx_init, ctx->mode, ctx->iv, ctx->iv_len, ctx->label, in kbkdf_derive() 325 if (p != NULL && !kbkdf_set_buffer(&ctx->iv, &ctx->iv_len, p)) in kbkdf_set_ctx_params()
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | evp.h | 296 int iv_len; member 435 key_len, iv_len, flags, init_key, cleanup, \ argument 438 nid##_##nmode, block_size, key_len, iv_len, \ 458 iv_len, cbits, flags, init_key, cleanup, \ argument 461 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 465 iv_len, cbits, flags, init_key, cleanup, \ argument 468 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 482 BLOCK_CIPHER_def_cfb(cname, kstruct, nid, key_len, iv_len, cbits, \ 484 BLOCK_CIPHER_def_ofb(cname, kstruct, nid, key_len, iv_len, cbits, \ 552 block_size, key_len, iv_len, cbits, \ argument [all …]
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | cmeth_lib.c | 66 int EVP_CIPHER_meth_set_iv_length(EVP_CIPHER *cipher, int iv_len) in EVP_CIPHER_meth_set_iv_length() argument 68 if (cipher->iv_len != 0) in EVP_CIPHER_meth_set_iv_length() 71 cipher->iv_len = iv_len; in EVP_CIPHER_meth_set_iv_length()
|
H A D | evp_lib.c | 258 asn1_params->iv_len = i; in evp_cipher_get_asn1_aead_params() 271 asn1_params->iv_len); in evp_cipher_set_asn1_aead_params() 366 cipher->iv_len = ivlen; in evp_cipher_cache_constants() 502 return cipher->iv_len; in EVP_CIPHER_get_iv_length() 507 if (ctx->iv_len < 0) { in EVP_CIPHER_CTX_get_iv_length() 536 ((EVP_CIPHER_CTX *)ctx)->iv_len = len; in EVP_CIPHER_CTX_get_iv_length() 538 return ctx->iv_len; in EVP_CIPHER_CTX_get_iv_length()
|
H A D | evp_enc.c | 46 ctx->iv_len = -1; in EVP_CIPHER_CTX_reset() 65 ctx->iv_len = -1; in EVP_CIPHER_CTX_reset() 93 ctx->iv_len = -1; in evp_cipher_init_internal() 1138 ctx->iv_len = -1; in EVP_CIPHER_CTX_ctrl() 1145 ctx->iv_len = -1; in EVP_CIPHER_CTX_ctrl() 1310 ctx->iv_len = -1; in EVP_CIPHER_CTX_set_params()
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 434 size_t iv_len; in ikev2_decrypt_payload() local 453 iv_len = encr_alg->block_size; in ikev2_decrypt_payload() 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { in ikev2_decrypt_payload() 468 pos = iv + iv_len; in ikev2_decrypt_payload() 536 size_t iv_len, pad_len; in ikev2_build_encrypted() local 552 iv_len = encr_alg->block_size; in ikev2_build_encrypted() 574 iv = wpabuf_put(msg, iv_len); in ikev2_build_encrypted() 575 if (random_get_bytes(iv, iv_len)) { in ikev2_build_encrypted() 580 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len; in ikev2_build_encrypted() 581 if (pad_len == iv_len) in ikev2_build_encrypted()
|
H A D | eap_sake_common.h | 76 size_t iv_len; member
|
/freebsd/crypto/openssl/ssl/ |
H A D | ktls.c | 135 crypto_info->iv_len = EVP_CIPHER_CTX_get_iv_length(dd); in ktls_configure_crypto() 136 if (crypto_info->iv_len < 0) in ktls_configure_crypto() 140 crypto_info->iv_len = EVP_GCM_TLS_FIXED_IV_LEN; in ktls_configure_crypto() 145 crypto_info->iv_len = EVP_CIPHER_CTX_get_iv_length(dd); in ktls_configure_crypto() 164 crypto_info->iv_len = EVP_CIPHER_get_iv_length(c); in ktls_configure_crypto()
|
/freebsd/contrib/bearssl/src/ssl/ |
H A D | ssl_engine.c | 1381 size_t mac_key_len, mac_out_len, iv_len; in br_ssl_engine_switch_cbc_in() local 1391 iv_len = 0; in br_ssl_engine_switch_cbc_in() 1393 iv_len = bc_impl->block_size; in br_ssl_engine_switch_cbc_in() 1396 mac_key_len + cipher_key_len + iv_len, kb); in br_ssl_engine_switch_cbc_in() 1400 iv = &kb[((mac_key_len + cipher_key_len) << 1) + iv_len]; in br_ssl_engine_switch_cbc_in() 1406 if (iv_len == 0) { in br_ssl_engine_switch_cbc_in() 1424 size_t mac_key_len, mac_out_len, iv_len; in br_ssl_engine_switch_cbc_out() local 1434 iv_len = 0; in br_ssl_engine_switch_cbc_out() 1436 iv_len = bc_impl->block_size; in br_ssl_engine_switch_cbc_out() 1439 mac_key_len + cipher_key_len + iv_len, kb); in br_ssl_engine_switch_cbc_out() [all …]
|
/freebsd/sys/sys/ |
H A D | ktls.h | 112 int iv_len; member 127 int iv_len; member 154 uint16_t iv_len; member
|
/freebsd/sys/contrib/openzfs/module/icp/algs/modes/ |
H A D | gcm.c | 494 ulong_t remainder = iv_len; in gcm_format_initial_blocks() 502 if (iv_len == 12) { in gcm_format_initial_blocks() 527 len_a_len_c[1] = htonll(CRYPTO_BYTES2BITS(iv_len)); in gcm_format_initial_blocks() 536 gcm_init(gcm_ctx_t *ctx, const uint8_t *iv, size_t iv_len, in gcm_init() argument 551 gcm_format_initial_blocks(iv, iv_len, ctx, block_size, in gcm_init() 633 size_t tag_len, iv_len; in gcm_init_ctx_impl() local 647 iv_len = gcm_param->ulIvLen; in gcm_init_ctx_impl() 652 iv_len = AES_GMAC_IV_LEN; in gcm_init_ctx_impl() 739 if (gcm_init_avx(gcm_ctx, iv, iv_len, aad, aad_len, in gcm_init_ctx_impl() 1490 if (iv_len == 12) { in gcm_init_avx() [all …]
|
/freebsd/sys/opencrypto/ |
H A D | xform_aes_cbc.c | 161 aes_cbc_reinit(void *vctx, const uint8_t *iv, size_t iv_len) in aes_cbc_reinit() argument 165 KASSERT(iv_len == sizeof(ctx->iv), ("%s: bad IV length", __func__)); in aes_cbc_reinit()
|
H A D | xform_cml.c | 163 cml_reinit(void *vctx, const uint8_t *iv, size_t iv_len) in cml_reinit() argument 167 KASSERT(iv_len == sizeof(ctx->iv), ("%s: bad IV length", __func__)); in cml_reinit()
|
/freebsd/contrib/wpa/src/tls/ |
H A D | pkcs5.c | 34 size_t iv_len; member 254 params->iv_len = hdr.length; in pkcs5_get_params_pbes2() 255 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); in pkcs5_get_params_pbes2() 367 params->iv_len != 8) in pkcs5_crypto_init_pbes2() 380 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len); in pkcs5_crypto_init_pbes2()
|
/freebsd/crypto/openssl/test/ |
H A D | acvp_test.c | 674 const unsigned char *iv, size_t iv_len, in cipher_enc() argument 708 tst->iv, tst->iv_len, in cipher_enc_dec_test() 712 tst->iv, tst->iv_len, in cipher_enc_dec_test() 719 const unsigned char *iv, size_t iv_len, in aes_ccm_enc_dec() argument 789 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_ccm_enc_dec_test() 793 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_ccm_enc_dec_test() 798 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_ccm_enc_dec_test() 806 const unsigned char *iv, size_t iv_len, in aes_gcm_enc_dec() argument 877 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_gcm_enc_dec_test() 882 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_gcm_enc_dec_test() [all …]
|
H A D | evp_test.c | 530 size_t iv_len; member 627 return parse_bin(value, &cdat->iv, &cdat->iv_len); in cipher_test_parse() 629 return parse_bin(value, &cdat->next_iv, &cdat->iv_len); in cipher_test_parse() 762 expected->iv_len, 0) <= 0) { in cipher_test_enc() 824 expected->iv_len))) { in cipher_test_enc() 974 tmplen -= expected->iv_len; in cipher_test_enc() 975 expected_out += expected->iv_len; in cipher_test_enc() 976 out_misalign += expected->iv_len; in cipher_test_enc() 1008 expected->iv_len))) { in cipher_test_enc() 1133 size_t iv_len; member [all …]
|
/freebsd/sys/kern/ |
H A D | uipc_ktls.c | 322 tls->iv_len = tls_v0.iv_len; in ktls_copyin_tls_enable() 336 if (tls->iv_len < 0 || tls->iv_len > sizeof(((struct ktls_session *)NULL)->params.iv)) in ktls_copyin_tls_enable() 362 if (tls->iv_len != 0) { in ktls_copyin_tls_enable() 365 error = copyin(tls->iv, iv, tls->iv_len); in ktls_copyin_tls_enable() 369 bcopy(tls->iv, iv, tls->iv_len); in ktls_copyin_tls_enable() 640 if (en->iv_len != TLS_AEAD_GCM_LEN) in ktls_create_session() 644 if (en->iv_len != TLS_1_3_GCM_IV_LEN) in ktls_create_session() 678 en->iv_len = 0; in ktls_create_session() 690 if (en->iv_len != TLS_CHACHA20_IV_LEN) in ktls_create_session() 806 if (en->iv_len != 0) { in ktls_create_session() [all …]
|
/freebsd/crypto/openssh/ |
H A D | cipher.c | 71 u_int iv_len; /* defaults to block_size */ member 186 return (c->iv_len != 0 || (c->flags & CFLAG_CHACHAPOLY) != 0) ? in cipher_ivlen() 187 c->iv_len : c->block_size; in cipher_ivlen()
|
/freebsd/sys/contrib/dev/iwlwifi/pcie/ |
H A D | tx.c | 1310 u16 length, iv_len, amsdu_pad; in iwl_fill_data_tbs_amsdu() local 1317 iv_len = ieee80211_has_protected(hdr->frame_control) ? in iwl_fill_data_tbs_amsdu() 1327 total_len = skb->len - snap_ip_tcp_hdrlen - hdr_len - iv_len; in iwl_fill_data_tbs_amsdu() 1332 (3 + snap_ip_tcp_hdrlen + sizeof(struct ethhdr)) + iv_len; in iwl_fill_data_tbs_amsdu() 1340 memcpy(hdr_page->pos, skb->data + hdr_len, iv_len); in iwl_fill_data_tbs_amsdu() 1341 hdr_page->pos += iv_len; in iwl_fill_data_tbs_amsdu() 1347 skb_pull(skb, hdr_len + iv_len); in iwl_fill_data_tbs_amsdu() 1426 skb_push(skb, hdr_len + iv_len); in iwl_fill_data_tbs_amsdu()
|
/freebsd/sys/dev/cxgbe/tom/ |
H A D | t4_tls.h | 78 u_int iv_len; member
|