/freebsd/crypto/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon_gcm.c | 39 ctx->ivlen = (EVP_GCM_TLS_FIXED_IV_LEN + EVP_GCM_TLS_EXPLICIT_IV_LEN); in ossl_gcm_initctx() 49 const unsigned char *iv, size_t ivlen, in gcm_init() argument 60 if (ivlen == 0 || ivlen > sizeof(ctx->iv)) { in gcm_init() 64 ctx->ivlen = ivlen; in gcm_init() 65 memcpy(ctx->iv, iv, ivlen); in gcm_init() 82 const unsigned char *iv, size_t ivlen, in ossl_gcm_einit() argument 85 return gcm_init(vctx, key, keylen, iv, ivlen, params, 1); in ossl_gcm_einit() 89 const unsigned char *iv, size_t ivlen, in ossl_gcm_dinit() argument 92 return gcm_init(vctx, key, keylen, iv, ivlen, params, 0); in ossl_gcm_dinit() 115 || !ctx->hw->setiv(ctx, ctx->iv, ctx->ivlen)) in getivgen() [all …]
|
H A D | cipher_aes_ocb.c | 52 size_t ivlen, size_t taglen) in aes_generic_ocb_setiv() argument 54 return (CRYPTO_ocb128_setiv(&ctx->ocb, iv, ivlen, taglen) == 1); in aes_generic_ocb_setiv() 105 const unsigned char *iv, size_t ivlen, in aes_ocb_init() argument 118 if (ivlen != ctx->base.ivlen) { in aes_ocb_init() 120 if (ivlen < OCB_MIN_IV_LEN || ivlen > OCB_MAX_IV_LEN) { in aes_ocb_init() 124 ctx->base.ivlen = ivlen; in aes_ocb_init() 126 if (!ossl_cipher_generic_initiv(&ctx->base, iv, ivlen)) in aes_ocb_init() 142 const unsigned char *iv, size_t ivlen, in aes_ocb_einit() argument 145 return aes_ocb_init(vctx, key, keylen, iv, ivlen, params, 1); in aes_ocb_einit() 149 const unsigned char *iv, size_t ivlen, in aes_ocb_dinit() argument [all …]
|
H A D | cipher_tdes_wrap.c | 85 size_t ivlen = TDES_IVLEN; in des_ede3_wrap() local 87 size_t len = inl + ivlen + icvlen; in des_ede3_wrap() 93 memmove(out + ivlen, in, inl); in des_ede3_wrap() 97 memcpy(out + inl + ivlen, sha1tmp, icvlen); in des_ede3_wrap() 100 if (RAND_bytes_ex(ctx->libctx, ctx->iv, ivlen, 0) <= 0) in des_ede3_wrap() 102 memcpy(out, ctx->iv, ivlen); in des_ede3_wrap() 104 ctx->hw->cipher(ctx, out + ivlen, out + ivlen, inl + ivlen); in des_ede3_wrap() 106 memcpy(ctx->iv, wrap_iv, ivlen); in des_ede3_wrap()
|
H A D | cipher_tdes_common.c | 65 const unsigned char *iv, size_t ivlen, in tdes_init() argument 78 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) in tdes_init() 85 memcpy(ctx->iv, ctx->oiv, ctx->ivlen); in tdes_init() 101 const unsigned char *iv, size_t ivlen, in ossl_tdes_einit() argument 104 return tdes_init(vctx, key, keylen, iv, ivlen, params, 1); in ossl_tdes_einit() 108 const unsigned char *iv, size_t ivlen, in ossl_tdes_dinit() argument 111 return tdes_init(vctx, key, keylen, iv, ivlen, params, 0); in ossl_tdes_dinit()
|
H A D | ciphercommon.c | 190 const unsigned char *iv, size_t ivlen, in cipher_generic_init_internal() argument 202 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) in cipher_generic_init_internal() 210 memcpy(ctx->iv, ctx->oiv, ctx->ivlen); in cipher_generic_init_internal() 230 size_t ivlen, const OSSL_PARAM params[]) in ossl_cipher_generic_einit() argument 233 iv, ivlen, params, 1); in ossl_cipher_generic_einit() 238 size_t ivlen, const OSSL_PARAM params[]) in ossl_cipher_generic_dinit() argument 241 iv, ivlen, params, 0); in ossl_cipher_generic_dinit() 580 if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->ivlen)) { in ossl_cipher_generic_get_ctx_params() 591 && !OSSL_PARAM_set_octet_ptr(p, &ctx->oiv, ctx->ivlen) in ossl_cipher_generic_get_ctx_params() 592 && !OSSL_PARAM_set_octet_string(p, &ctx->oiv, ctx->ivlen)) { in ossl_cipher_generic_get_ctx_params() [all …]
|
H A D | ciphercommon_ccm.c | 101 size_t ivlen; in ossl_ccm_set_ctx_params() local 107 ivlen = 15 - sz; in ossl_ccm_set_ctx_params() 108 if (ivlen < 2 || ivlen > 8) { in ossl_ccm_set_ctx_params() 112 if (ctx->l != ivlen) { in ossl_ccm_set_ctx_params() 113 ctx->l = ivlen; in ossl_ccm_set_ctx_params() 226 const unsigned char *iv, size_t ivlen, in ccm_init() argument 237 if (ivlen != ccm_get_ivlen(ctx)) { in ccm_init() 241 memcpy(ctx->iv, iv, ivlen); in ccm_init() 256 const unsigned char *iv, size_t ivlen, in ossl_ccm_einit() argument 259 return ccm_init(vctx, key, keylen, iv, ivlen, params, 1); in ossl_ccm_einit() [all …]
|
H A D | cipher_rc2.c | 91 const unsigned char *iv, size_t ivlen, in rc2_einit() argument 94 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) in rc2_einit() 100 const unsigned char *iv, size_t ivlen, in rc2_dinit() argument 103 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) in rc2_dinit() 140 ctx->base.iv, ctx->base.ivlen)) { in rc2_get_ctx_params() 188 || ctx->base.ivlen > sizeof(iv) in rc2_set_ctx_params() 191 ctx->base.ivlen) in rc2_set_ctx_params() 192 != ctx->base.ivlen) in rc2_set_ctx_params() 193 || !ossl_cipher_generic_initiv(&ctx->base, iv, ctx->base.ivlen) in rc2_set_ctx_params()
|
H A D | cipher_des.c | 74 const unsigned char *iv, size_t ivlen, in des_init() argument 87 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) in des_init() 91 memcpy(ctx->iv, ctx->oiv, ctx->ivlen); in des_init() 107 const unsigned char *iv, size_t ivlen, in des_einit() argument 110 return des_init(vctx, key, keylen, iv, ivlen, params, 1); in des_einit() 114 const unsigned char *iv, size_t ivlen, in des_dinit() argument 117 return des_init(vctx, key, keylen, iv, ivlen, params, 0); in des_dinit()
|
H A D | cipher_rc4_hmac_md5.c | 86 size_t ivlen, const OSSL_PARAM params[]) in rc4_hmac_md5_einit() argument 88 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) in rc4_hmac_md5_einit() 95 size_t ivlen, const OSSL_PARAM params[]) in rc4_hmac_md5_dinit() argument 97 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) in rc4_hmac_md5_dinit() 126 if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->base.ivlen)) { in rc4_hmac_md5_get_ctx_params() 177 if (ctx->base.ivlen != sz) { in rc4_hmac_md5_set_ctx_params()
|
H A D | cipher_rc4.c | 56 const unsigned char *iv, size_t ivlen, in rc4_einit() argument 59 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) in rc4_einit() 65 const unsigned char *iv, size_t ivlen, in rc4_dinit() argument 68 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) in rc4_dinit()
|
H A D | cipher_aes_wrp.c | 64 ctx->pad = (ctx->ivlen == AES_WRAP_PAD_IVLEN); in aes_wrap_newctx() 99 size_t ivlen, const OSSL_PARAM params[], int enc) in aes_wrap_init() argument 114 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) in aes_wrap_init() 149 const unsigned char *iv, size_t ivlen, in aes_wrap_einit() argument 152 return aes_wrap_init(ctx, key, keylen, iv, ivlen, params, 1); in aes_wrap_einit() 156 const unsigned char *iv, size_t ivlen, in aes_wrap_dinit() argument 159 return aes_wrap_init(ctx, key, keylen, iv, ivlen, params, 0); in aes_wrap_dinit()
|
H A D | cipher_aes_cbc_hmac_sha.c | 50 const unsigned char *iv, size_t ivlen, in aes_einit() argument 53 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) in aes_einit() 59 const unsigned char *iv, size_t ivlen, in aes_dinit() argument 62 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) in aes_dinit() 268 if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->base.ivlen)) { in aes_get_ctx_params() 274 && !OSSL_PARAM_set_octet_string(p, ctx->base.oiv, ctx->base.ivlen) in aes_get_ctx_params() 275 && !OSSL_PARAM_set_octet_ptr(p, &ctx->base.oiv, ctx->base.ivlen)) { in aes_get_ctx_params() 281 && !OSSL_PARAM_set_octet_string(p, ctx->base.iv, ctx->base.ivlen) in aes_get_ctx_params() 282 && !OSSL_PARAM_set_octet_ptr(p, &ctx->base.iv, ctx->base.ivlen)) { in aes_get_ctx_params()
|
H A D | cipher_aes_xts.c | 69 const unsigned char *iv, size_t ivlen, in aes_xts_init() argument 81 if (!ossl_cipher_generic_initiv(vctx, iv, ivlen)) in aes_xts_init() 98 const unsigned char *iv, size_t ivlen, in aes_xts_einit() argument 101 return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 1); in aes_xts_einit() 105 const unsigned char *iv, size_t ivlen, in aes_xts_dinit() argument 108 return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 0); in aes_xts_dinit()
|
H A D | cipher_aes_cts.inc | 29 const unsigned char *iv, size_t ivlen, 32 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) 38 const unsigned char *iv, size_t ivlen, 41 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL))
|
/freebsd/sys/opencrypto/ |
H A D | xform_aes_icm.c | 146 aes_icm_reinit(void *key, const uint8_t *iv, size_t ivlen) in aes_icm_reinit() argument 151 KASSERT(ivlen <= sizeof(ctx->ac_block), in aes_icm_reinit() 153 bcopy(iv, ctx->ac_block, ivlen); in aes_icm_reinit() 157 aes_gcm_reinit(void *vctx, const uint8_t *iv, size_t ivlen) in aes_gcm_reinit() argument 161 KASSERT(ivlen == AES_GCM_IV_LEN, in aes_gcm_reinit() 163 aes_icm_reinit(&ctx->cipher, iv, ivlen); in aes_gcm_reinit() 169 AES_GMAC_Reinit(&ctx->gmac, iv, ivlen); in aes_gcm_reinit() 173 aes_ccm_reinit(void *vctx, const uint8_t *iv, size_t ivlen) in aes_ccm_reinit() argument 177 KASSERT(ivlen >= 7 && ivlen <= 13, in aes_ccm_reinit() 182 ctx->cipher.ac_block[0] = (15 - ivlen) - 1; in aes_ccm_reinit() [all …]
|
H A D | xform_chacha20_poly1305.c | 62 chacha20_poly1305_reinit(void *vctx, const uint8_t *iv, size_t ivlen) in chacha20_poly1305_reinit() argument 67 KASSERT(ivlen == 8 || ivlen == sizeof(ctx->nonce), in chacha20_poly1305_reinit() 70 memcpy(ctx->nonce, iv, ivlen); in chacha20_poly1305_reinit() 71 ctx->ietf = (ivlen == CHACHA20_POLY1305_IV_LEN); in chacha20_poly1305_reinit() 189 xchacha20_poly1305_reinit(void *vctx, const uint8_t *iv, size_t ivlen) in xchacha20_poly1305_reinit() argument 194 KASSERT(ivlen == XCHACHA20_POLY1305_IV_LEN, in xchacha20_poly1305_reinit()
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | e_aria.c | 38 int ivlen; /* IV length */ member 162 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ argument 164 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 240 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); in aria_gcm_init_key() 247 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); in aria_gcm_init_key() 249 memcpy(gctx->iv, iv, gctx->ivlen); in aria_gcm_init_key() 264 gctx->ivlen = EVP_CIPHER_get_iv_length(c->cipher); in aria_gcm_ctrl() 272 *(int *)ptr = gctx->ivlen; in aria_gcm_ctrl() 279 if ((arg > EVP_MAX_IV_LENGTH) && (arg > gctx->ivlen)) { in aria_gcm_ctrl() 287 gctx->ivlen = arg; in aria_gcm_ctrl() [all …]
|
H A D | e_aes.c | 53 int ivlen; /* IV length */ member 114 int ivlen; /* IV length */ member 240 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); in aesni_gcm_init_key() 247 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); in aesni_gcm_init_key() 249 memcpy(gctx->iv, iv, gctx->ivlen); in aesni_gcm_init_key() 374 if (CRYPTO_ocb128_setiv(&octx->ocb, iv, octx->ivlen, octx->taglen) in aesni_ocb_init_key() 383 CRYPTO_ocb128_setiv(&octx->ocb, iv, octx->ivlen, octx->taglen); in aesni_ocb_init_key() 385 memcpy(octx->iv, iv, octx->ivlen); in aesni_ocb_init_key() 396 # define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ argument 398 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ [all …]
|
/freebsd/sys/kgssapi/krb5/ |
H A D | kcrypto.h | 66 struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen); 115 size_t skip, size_t len, void *ivec, size_t ivlen) in krb5_encrypt() argument 118 ks->ks_class->ec_encrypt(ks, inout, skip, len, ivec, ivlen); in krb5_encrypt() 123 size_t skip, size_t len, void *ivec, size_t ivlen) in krb5_decrypt() argument 126 ks->ks_class->ec_decrypt(ks, inout, skip, len, ivec, ivlen); in krb5_decrypt()
|
/freebsd/crypto/openssl/crypto/cms/ |
H A D | cms_enc.c | 37 int ivlen = 0; in ossl_cms_EncryptedContent_init_bio() local 90 ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); in ossl_cms_EncryptedContent_init_bio() 91 if (ivlen < 0) { in ossl_cms_EncryptedContent_init_bio() 96 if (ivlen > 0) { in ossl_cms_EncryptedContent_init_bio() 97 if (RAND_bytes_ex(libctx, iv, ivlen, 0) <= 0) in ossl_cms_EncryptedContent_init_bio() 175 memcpy(aparams.iv, piv, ivlen); in ossl_cms_EncryptedContent_init_bio() 176 aparams.iv_len = ivlen; in ossl_cms_EncryptedContent_init_bio()
|
/freebsd/sys/netipsec/ |
H A D | xform_esp.c | 181 sav->ivlen = 8; /* RFC4106 3.1 and RFC3686 3.1 */ in esp_init() 183 sav->ivlen = txform->ivsize; in esp_init() 312 hlen = sizeof (struct esp) + sav->ivlen; in esp_input() 314 hlen = sizeof (struct newesp) + sav->ivlen; in esp_input() 463 m_copydata(m, skip + hlen - sav->ivlen, sav->ivlen, &ivp[4]); in esp_input() 465 be32enc(&ivp[sav->ivlen + 4], 1); in esp_input() 468 } else if (sav->ivlen != 0) in esp_input() 469 crp->crp_iv_start = skip + hlen - sav->ivlen; in esp_input() 603 hlen = sizeof (struct esp) + sav->ivlen; in esp_input_cb() 605 hlen = sizeof (struct newesp) + sav->ivlen; in esp_input_cb() [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | tls13encryptiontest.c | 240 unsigned char *iv, size_t ivlen, unsigned char *seq) in load_record() argument 263 memcpy(iv, ivtmp, ivlen); in load_record() 312 size_t ivlen, ctr; in test_tls13_encryption() local 350 ivlen = EVP_CIPHER_get_iv_length(ciph); in test_tls13_encryption() 351 if (!load_record(&rec, &refdata[ctr], &key, s->read_iv, ivlen, in test_tls13_encryption() 360 memcpy(s->write_iv, s->read_iv, ivlen); in test_tls13_encryption()
|
/freebsd/crypto/openssl/ssl/record/ |
H A D | ssl3_record_tls13.c | 29 int ivlen; in tls13_enc() local 65 ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); in tls13_enc() 66 if (ivlen < 0) { in tls13_enc() 125 if (ivlen < SEQ_NUM_SIZE) { in tls13_enc() 130 offset = ivlen - SEQ_NUM_SIZE; in tls13_enc()
|
/freebsd/crypto/openssl/crypto/asn1/ |
H A D | p5_pbev2.c | 48 int alg_nid, keylen, ivlen; variable 69 ivlen = EVP_CIPHER_get_iv_length(cipher); 70 if (ivlen > 0) { 72 memcpy(iv, aiv, ivlen); 73 else if (RAND_bytes_ex(libctx, iv, ivlen, 0) <= 0)
|
/freebsd/crypto/openssl/engines/ |
H A D | e_devcrypto.c | 119 int ivlen; member 250 size_t nblocks, ivlen; in cipher_do_cipher() local 263 ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); in cipher_do_cipher() 264 if (ivlen > 0) in cipher_do_cipher() 267 assert(inl >= ivlen); in cipher_do_cipher() 269 ivptr = in + inl - ivlen; in cipher_do_cipher() 270 memcpy(saved_iv, ivptr, ivlen); in cipher_do_cipher() 290 if (ivlen > 0) in cipher_do_cipher() 293 assert(inl >= ivlen); in cipher_do_cipher() 295 ivptr = out + inl - ivlen; in cipher_do_cipher() [all …]
|