| /freebsd/contrib/wpa/src/crypto/ |
| H A D | aes-gcm.c | 192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) in aes_gcm_prepare_j0() argument 196 if (iv_len == 12) { in aes_gcm_prepare_j0() 198 os_memcpy(J0, iv, iv_len); in aes_gcm_prepare_j0() 199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len); in aes_gcm_prepare_j0() 207 ghash(H, iv, iv_len, J0); in aes_gcm_prepare_j0() 209 WPA_PUT_BE64(len_buf + 8, iv_len * 8); in aes_gcm_prepare_j0() 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gcm_ae() argument 267 aes_gcm_prepare_j0(iv, iv_len, H, J0); in aes_gcm_ae() 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gcm_ad() argument 301 aes_gcm_prepare_j0(iv, iv_len, H, J0); in aes_gcm_ad() [all …]
|
| H A D | crypto_linux.c | 686 size_t iv_len = AES_BLOCK_SIZE; in aes_128_cbc_oper() local 698 CMSG_SPACE(sizeof(*alg_iv) + iv_len); in aes_128_cbc_oper() 712 hdr->cmsg_len = CMSG_SPACE(sizeof(*alg_iv) + iv_len); in aes_128_cbc_oper() 714 alg_iv->ivlen = iv_len; in aes_128_cbc_oper() 715 os_memcpy(alg_iv->iv, iv, iv_len); in aes_128_cbc_oper() 795 size_t iv_len = 8; in aes_unwrap() local 801 io[0].iov_base = (void *) (cipher + iv_len); in aes_unwrap() 807 CMSG_SPACE(sizeof(*alg_iv) + iv_len); in aes_unwrap() 821 hdr->cmsg_len = CMSG_SPACE(sizeof(*alg_iv) + iv_len); in aes_unwrap() 823 alg_iv->ivlen = iv_len; in aes_unwrap() [all …]
|
| H A D | aes_wrap.h | 53 const u8 *iv, size_t iv_len, 58 const u8 *iv, size_t iv_len, 63 const u8 *iv, size_t iv_len,
|
| /freebsd/sys/net80211/ |
| H A D | ieee80211_crypto_gcm.c | 247 aes_gcm_prepare_j0(const uint8_t *iv, size_t iv_len, const uint8_t *H, in aes_gcm_prepare_j0() argument 252 if (iv_len == 12) { in aes_gcm_prepare_j0() 254 memcpy(J0, iv, iv_len); in aes_gcm_prepare_j0() 255 memset(J0 + iv_len, 0, AES_BLOCK_LEN - iv_len); in aes_gcm_prepare_j0() 263 ghash(H, iv, iv_len, J0); in aes_gcm_prepare_j0() 265 WPA_PUT_BE64(len_buf + 8, iv_len * 8); in aes_gcm_prepare_j0() 309 ieee80211_crypto_aes_gcm_ae(rijndael_ctx *aes, const uint8_t *iv, size_t iv_len, in ieee80211_crypto_aes_gcm_ae() argument 319 aes_gcm_prepare_j0(iv, iv_len, H, J0); in ieee80211_crypto_aes_gcm_ae() 338 ieee80211_crypto_aes_gcm_ad(rijndael_ctx *aes, const uint8_t *iv, size_t iv_len, in ieee80211_crypto_aes_gcm_ad() argument 348 aes_gcm_prepare_j0(iv, iv_len, H, J0); in ieee80211_crypto_aes_gcm_ad()
|
| H A D | ieee80211_crypto_gcm.h | 48 size_t iv_len, const uint8_t *plain, size_t plain_len, 52 size_t iv_len, const uint8_t *crypt, size_t crypt_len,
|
| H A D | ieee80211_crypto_gcmp.c | 424 int data_len, aad_len, iv_len, ret; in gcmp_encrypt() local 461 iv_len = gcmp_init_iv(iv, wh, key->wk_keytsc); in gcmp_encrypt() 472 ieee80211_crypto_aes_gcm_ae(&ctx->cc_aes, iv, iv_len, in gcmp_encrypt() 514 int data_len, aad_len, iv_len, ret; in gcmp_decrypt() local 551 iv_len = gcmp_init_iv(iv, wh, pn); in gcmp_decrypt() 566 ret = ieee80211_crypto_aes_gcm_ad(&ctx->cc_aes, iv, iv_len, in gcmp_decrypt()
|
| /freebsd/tools/tools/crypto/ |
| H A D | cryptocheck.c | 800 u_int iv_len, key_len; in run_cipher_test() local 826 iv_len = EVP_CIPHER_iv_length(cipher); in run_cipher_test() 829 iv = generate_iv(iv_len, alg); in run_cipher_test() 913 ocf_eta(const struct ocf_session *ses, const char *iv, size_t iv_len, in ocf_eta() argument 926 caead.ivlen = iv_len; in ocf_eta() 961 u_int iv_len, auth_key_len, cipher_key_len, digest_len; in run_eta_test() local 990 iv_len = EVP_CIPHER_iv_length(cipher); in run_eta_test() 994 iv = generate_iv(iv_len, alg); in run_eta_test() 1025 error = ocf_eta(&ses, iv, iv_len, aad_len != 0 ? cleartext : NULL, in run_eta_test() 1057 error = ocf_eta(&ses, iv, iv_len, aad_len != 0 ? ciphertext : NULL, in run_eta_test() [all …]
|
| /freebsd/sys/dev/cxgbe/crypto/ |
| H A D | t4_crypto.c | 160 unsigned int iv_len; member 629 u_int imm_len, iv_len; in ccr_cipher() 669 iv_len = AES_BLOCK_LEN; in ccr_cipher() 671 iv_len = s->cipher.iv_len; in ccr_cipher() 673 if (ccr_use_imm_data(transhdr_len, crp->crp_payload_length + iv_len)) { in ccr_cipher() 688 wr_len = roundup2(transhdr_len, 16) + iv_len + in ccr_cipher() 703 memset(iv + s->cipher.iv_len, 0, iv_len - s->cipher.iv_len); in ccr_cipher() 627 u_int imm_len, iv_len; ccr_cipher() local 820 u_int hash_size_in_response, imm_len, iopad_size, iv_len; ccr_eta() local 1123 u_int iv_len, kctx_len, op_type, transhdr_len, wr_len; ccr_gcm() local 1453 u_int iv_len, kctx_len, op_type, transhdr_len, wr_len; ccr_ccm() local [all...] |
| /freebsd/crypto/openssl/providers/implementations/kdfs/ |
| H A D | kbkdf.c | 72 size_t iv_len; member 150 OPENSSL_clear_free(ctx->iv, ctx->iv_len); in kbkdf_reset() 171 || !ossl_prov_memdup(src->iv, src->iv_len, in kbkdf_dup() 172 &dest->iv, &dest->iv_len)) in kbkdf_dup() 208 size_t iv_len, unsigned char *label, size_t label_len, in derive() argument 215 size_t written = 0, to_write, k_i_len = iv_len; in derive() 231 if (iv_len > 0) in derive() 232 memcpy(k_i, iv, iv_len); in derive() 335 if (ctx->iv_len != 0 && ctx->iv_len != h) { in kbkdf_derive() 356 ret = derive(ctx->ctx_init, ctx->mode, ctx->iv, ctx->iv_len, ctx->label, in kbkdf_derive() [all …]
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | evp.h | 306 int iv_len; member 449 key_len, iv_len, flags, init_key, cleanup, \ argument 452 nid##_##nmode, block_size, key_len, iv_len, \ 466 iv_len, flags, init_key, cleanup, set_asn1, \ argument 469 iv_len, flags, init_key, cleanup, set_asn1, get_asn1, ctrl) 472 iv_len, cbits, flags, init_key, cleanup, \ argument 475 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 479 iv_len, cbits, flags, init_key, cleanup, \ argument 482 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 492 nid, block_size, key_len, iv_len, cbits, flags, \ argument [all …]
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | cmeth_lib.c | 67 int EVP_CIPHER_meth_set_iv_length(EVP_CIPHER *cipher, int iv_len) in EVP_CIPHER_meth_set_iv_length() argument 69 if (cipher->iv_len != 0) in EVP_CIPHER_meth_set_iv_length() 72 cipher->iv_len = iv_len; in EVP_CIPHER_meth_set_iv_length()
|
| H A D | evp_enc.c | 49 ctx->iv_len = -1; in OSSL_SAFE_MATH_SIGNED() 68 ctx->iv_len = -1; in OSSL_SAFE_MATH_SIGNED() 80 ctx->iv_len = -1; in EVP_CIPHER_CTX_new() 484 const unsigned char *iv, size_t iv_len, in evp_cipher_init_skey_internal() argument 577 iv_len = 0; in evp_cipher_init_skey_internal() 595 iv, iv_len, params); in evp_cipher_init_skey_internal() 599 iv, iv_len, params); in evp_cipher_init_skey_internal() 616 iv, iv_len, params); in evp_cipher_init_skey_internal() 620 iv, iv_len, params); in evp_cipher_init_skey_internal() 628 EVP_SKEY *skey, const unsigned char *iv, size_t iv_len, in EVP_CipherInit_SKEY() argument [all …]
|
| /freebsd/contrib/wpa/src/eap_common/ |
| H A D | ikev2_common.c | 434 size_t iv_len; in ikev2_decrypt_payload() local 453 iv_len = encr_alg->block_size; in ikev2_decrypt_payload() 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { in ikev2_decrypt_payload() 468 pos = iv + iv_len; in ikev2_decrypt_payload() 536 size_t iv_len, pad_len; in ikev2_build_encrypted() local 552 iv_len = encr_alg->block_size; in ikev2_build_encrypted() 574 iv = wpabuf_put(msg, iv_len); in ikev2_build_encrypted() 575 if (random_get_bytes(iv, iv_len)) { in ikev2_build_encrypted() 580 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len; in ikev2_build_encrypted() 581 if (pad_len == iv_len) in ikev2_build_encrypted()
|
| /freebsd/contrib/bearssl/src/ssl/ |
| H A D | ssl_engine.c | 1381 size_t mac_key_len, mac_out_len, iv_len; in br_ssl_engine_switch_cbc_in() local 1391 iv_len = 0; in br_ssl_engine_switch_cbc_in() 1393 iv_len = bc_impl->block_size; in br_ssl_engine_switch_cbc_in() 1396 mac_key_len + cipher_key_len + iv_len, kb); in br_ssl_engine_switch_cbc_in() 1400 iv = &kb[((mac_key_len + cipher_key_len) << 1) + iv_len]; in br_ssl_engine_switch_cbc_in() 1406 if (iv_len == 0) { in br_ssl_engine_switch_cbc_in() 1424 size_t mac_key_len, mac_out_len, iv_len; in br_ssl_engine_switch_cbc_out() local 1434 iv_len = 0; in br_ssl_engine_switch_cbc_out() 1436 iv_len = bc_impl->block_size; in br_ssl_engine_switch_cbc_out() 1439 mac_key_len + cipher_key_len + iv_len, kb); in br_ssl_engine_switch_cbc_out() [all …]
|
| /freebsd/sys/sys/ |
| H A D | ktls.h | 116 int iv_len; member 131 int iv_len; member 158 uint16_t iv_len; member 180 uint16_t iv_len; member
|
| /freebsd/crypto/openssl/ssl/ |
| H A D | s3_enc.c | 100 size_t n, iv_len, key_len; in ssl3_change_cipher_state() local 123 iv_len = EVP_CIPHER_get_iv_length(ciph); in ssl3_change_cipher_state() 131 n += iv_len + iv_len; in ssl3_change_cipher_state() 137 n += key_len + iv_len; in ssl3_change_cipher_state() 139 n += iv_len; in ssl3_change_cipher_state() 150 NULL, 0, key, key_len, iv, iv_len, mac_secret, in ssl3_change_cipher_state()
|
| /freebsd/crypto/openssl/ssl/quic/ |
| H A D | quic_port.c | 950 int iv_len, len, ret = 0; in encrypt_validation_token() local 955 || (iv_len = EVP_CIPHER_CTX_get_iv_length(port->token_ctx)) <= 0) in encrypt_validation_token() 958 *ct_len = iv_len + pt_len + tag_len + QUIC_RETRY_INTEGRITY_TAG_LEN; in encrypt_validation_token() 964 data = ciphertext + iv_len; in encrypt_validation_token() 967 if (!RAND_bytes_ex(port->engine->libctx, ciphertext, iv_len, 0) in encrypt_validation_token() 1000 int iv_len, len = 0, ret = 0; in decrypt_validation_token() local 1005 || (iv_len = EVP_CIPHER_CTX_get_iv_length(port->token_ctx)) <= 0) in decrypt_validation_token() 1009 if (ct_len < (iv_len + tag_len) || ct_len > ENCRYPTED_TOKEN_MAX_LEN) in decrypt_validation_token() 1012 *pt_len = ct_len - iv_len - tag_len; in decrypt_validation_token() 1018 data = ciphertext + iv_len; in decrypt_validation_token() [all …]
|
| H A D | quic_record_shared.c | 110 size_t key_len = 0, iv_len = 0; in el_setup_keyslot() local 123 iv_len = ossl_qrl_get_suite_cipher_iv_len(el->suite_id); in el_setup_keyslot() 145 el->iv[keyslot], iv_len, 1)) in el_setup_keyslot() 169 if (!ossl_assert(iv_len == (size_t)EVP_CIPHER_get_iv_length(cipher)) in el_setup_keyslot()
|
| /freebsd/sys/contrib/openzfs/module/icp/algs/modes/ |
| H A D | gcm.c | 486 gcm_format_initial_blocks(const uint8_t *iv, ulong_t iv_len, in gcm_format_initial_blocks() argument 493 ulong_t remainder = iv_len; in gcm_format_initial_blocks() 501 if (iv_len == 12) { in gcm_format_initial_blocks() 526 len_a_len_c[1] = htonll(CRYPTO_BYTES2BITS(iv_len)); in gcm_format_initial_blocks() 535 gcm_init(gcm_ctx_t *ctx, const uint8_t *iv, size_t iv_len, in gcm_init() argument 550 gcm_format_initial_blocks(iv, iv_len, ctx, block_size, in gcm_init() 603 size_t tag_len, iv_len; in gcm_init_ctx() local 616 iv_len = gcm_param->ulIvLen; in gcm_init_ctx() 684 rv = gcm_init_avx(gcm_ctx, iv, iv_len, aad, aad_len, in gcm_init_ctx() 689 if (gcm_init(gcm_ctx, iv, iv_len, aad, aad_len, block_size, in gcm_init_ctx() [all …]
|
| /freebsd/contrib/wpa/src/tls/ |
| H A D | pkcs5.c | 34 size_t iv_len; member 254 params->iv_len = hdr.length; in pkcs5_get_params_pbes2() 255 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); in pkcs5_get_params_pbes2() 367 params->iv_len != 8) in pkcs5_crypto_init_pbes2() 380 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len); in pkcs5_crypto_init_pbes2()
|
| /freebsd/sys/opencrypto/ |
| H A D | xform_aes_cbc.c | 161 aes_cbc_reinit(void *vctx, const uint8_t *iv, size_t iv_len) in aes_cbc_reinit() argument 165 KASSERT(iv_len == sizeof(ctx->iv), ("%s: bad IV length", __func__)); in aes_cbc_reinit()
|
| H A D | xform_cml.c | 163 cml_reinit(void *vctx, const uint8_t *iv, size_t iv_len) in cml_reinit() argument 167 KASSERT(iv_len == sizeof(ctx->iv), ("%s: bad IV length", __func__)); in cml_reinit()
|
| /freebsd/crypto/openssl/test/ |
| H A D | acvp_test.c | 879 const unsigned char *iv, size_t iv_len, in cipher_enc() argument 913 tst->iv, tst->iv_len, in cipher_enc_dec_test() 917 tst->iv, tst->iv_len, in cipher_enc_dec_test() 924 const unsigned char *iv, size_t iv_len, in aes_ccm_enc_dec() argument 942 || !TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_IVLEN, iv_len, in aes_ccm_enc_dec() 997 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_ccm_enc_dec_test() 1001 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_ccm_enc_dec_test() 1006 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_ccm_enc_dec_test() 1014 const unsigned char *iv, size_t iv_len, in aes_gcm_enc_dec() argument 1033 || !TEST_int_gt(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_IVLEN, iv_len, in aes_gcm_enc_dec() [all …]
|
| /freebsd/sys/kern/ |
| H A D | uipc_ktls.c | 322 tls->iv_len = tls_v0.iv_len; in ktls_copyin_tls_enable() 336 if (tls->iv_len < 0 || tls->iv_len > sizeof(((struct ktls_session *)NULL)->params.iv)) in ktls_copyin_tls_enable() 362 if (tls->iv_len != 0) { in ktls_copyin_tls_enable() 363 iv = malloc(tls->iv_len, M_KTLS, M_WAITOK); in ktls_copyin_tls_enable() 365 error = copyin(tls->iv, iv, tls->iv_len); in ktls_copyin_tls_enable() 369 bcopy(tls->iv, iv, tls->iv_len); in ktls_copyin_tls_enable() 640 if (en->iv_len != TLS_AEAD_GCM_LEN) in ktls_create_session() 644 if (en->iv_len != TLS_1_3_GCM_IV_LEN) in ktls_create_session() 672 if (en->iv_len != TLS_CBC_IMPLICIT_IV_LEN) in ktls_create_session() 678 en->iv_len = 0; in ktls_create_session() [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | cipher.c | 70 u_int iv_len; /* defaults to block_size */ member 176 return (c->iv_len != 0 || (c->flags & CFLAG_CHACHAPOLY) != 0) ? in cipher_ivlen() 177 c->iv_len : c->block_size; in cipher_ivlen()
|