| /freebsd/crypto/openssl/providers/implementations/ciphers/ |
| H A D | ciphercommon_gcm.c | 40 ctx->ivlen = (EVP_GCM_TLS_FIXED_IV_LEN + EVP_GCM_TLS_EXPLICIT_IV_LEN); in ossl_gcm_initctx() 50 const unsigned char *iv, size_t ivlen, in gcm_init() argument 61 if (ivlen == 0 || ivlen > sizeof(ctx->iv)) { in gcm_init() 65 ctx->ivlen = ivlen; in gcm_init() 66 memcpy(ctx->iv, iv, ivlen); in gcm_init() 83 const unsigned char *iv, size_t ivlen, in ossl_gcm_einit() argument 86 return gcm_init(vctx, key, keylen, iv, ivlen, params, 1); in ossl_gcm_einit() 90 const unsigned char *iv, size_t ivlen, in ossl_gcm_dinit() argument 93 return gcm_init(vctx, key, keylen, iv, ivlen, params, 0); in ossl_gcm_dinit() 116 || !ctx->hw->setiv(ctx, ctx->iv, ctx->ivlen)) in getivgen() [all …]
|
| H A D | cipher_aes_ocb.c | 50 size_t ivlen, size_t taglen) in aes_generic_ocb_setiv() argument 52 return (CRYPTO_ocb128_setiv(&ctx->ocb, iv, ivlen, taglen) == 1); in aes_generic_ocb_setiv() 103 const unsigned char *iv, size_t ivlen, in aes_ocb_init() argument 116 if (ivlen != ctx->base.ivlen) { in aes_ocb_init() 118 if (ivlen < OCB_MIN_IV_LEN || ivlen > OCB_MAX_IV_LEN) { in aes_ocb_init() 122 ctx->base.ivlen = ivlen; in aes_ocb_init() 124 if (!ossl_cipher_generic_initiv(&ctx->base, iv, ivlen)) in aes_ocb_init() 140 const unsigned char *iv, size_t ivlen, in aes_ocb_einit() argument 143 return aes_ocb_init(vctx, key, keylen, iv, ivlen, params, 1); in aes_ocb_einit() 147 const unsigned char *iv, size_t ivlen, in aes_ocb_dinit() argument [all …]
|
| H A D | cipher_tdes_wrap.c | 84 size_t ivlen = TDES_IVLEN; in des_ede3_wrap() local 86 size_t len = inl + ivlen + icvlen; in des_ede3_wrap() 92 memmove(out + ivlen, in, inl); in des_ede3_wrap() 96 memcpy(out + inl + ivlen, sha1tmp, icvlen); in des_ede3_wrap() 99 if (RAND_bytes_ex(ctx->libctx, ctx->iv, ivlen, 0) <= 0) in des_ede3_wrap() 101 memcpy(out, ctx->iv, ivlen); in des_ede3_wrap() 103 ctx->hw->cipher(ctx, out + ivlen, out + ivlen, inl + ivlen); in des_ede3_wrap() 105 memcpy(ctx->iv, wrap_iv, ivlen); in des_ede3_wrap()
|
| H A D | ciphercommon.c | 191 const unsigned char *iv, size_t ivlen, in cipher_generic_init_internal() argument 203 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) in cipher_generic_init_internal() 211 memcpy(ctx->iv, ctx->oiv, ctx->ivlen); in cipher_generic_init_internal() 231 size_t ivlen, const OSSL_PARAM params[]) in ossl_cipher_generic_einit() argument 234 iv, ivlen, params, 1); in ossl_cipher_generic_einit() 239 size_t ivlen, const OSSL_PARAM params[]) in ossl_cipher_generic_dinit() argument 242 iv, ivlen, params, 0); in ossl_cipher_generic_dinit() 246 const unsigned char *iv, size_t ivlen, in ossl_cipher_generic_skey_einit() argument 253 iv, ivlen, params, 1); in ossl_cipher_generic_skey_einit() 257 const unsigned char *iv, size_t ivlen, in ossl_cipher_generic_skey_dinit() argument [all …]
|
| H A D | ciphercommon_ccm.c | 101 size_t ivlen; in ossl_ccm_set_ctx_params() local 107 ivlen = 15 - sz; in ossl_ccm_set_ctx_params() 108 if (ivlen < 2 || ivlen > 8) { in ossl_ccm_set_ctx_params() 112 if (ctx->l != ivlen) { in ossl_ccm_set_ctx_params() 113 ctx->l = ivlen; in ossl_ccm_set_ctx_params() 226 const unsigned char *iv, size_t ivlen, in ccm_init() argument 237 if (ivlen != ccm_get_ivlen(ctx)) { in ccm_init() 241 memcpy(ctx->iv, iv, ivlen); in ccm_init() 256 const unsigned char *iv, size_t ivlen, in ossl_ccm_einit() argument 259 return ccm_init(vctx, key, keylen, iv, ivlen, params, 1); in ossl_ccm_einit() [all …]
|
| H A D | cipher_tdes_common.c | 76 const unsigned char *iv, size_t ivlen, in tdes_init() argument 89 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) in tdes_init() 96 memcpy(ctx->iv, ctx->oiv, ctx->ivlen); in tdes_init() 118 const unsigned char *iv, size_t ivlen, in ossl_tdes_einit() argument 121 return tdes_init(vctx, key, keylen, iv, ivlen, params, 1); in ossl_tdes_einit() 125 const unsigned char *iv, size_t ivlen, in ossl_tdes_dinit() argument 128 return tdes_init(vctx, key, keylen, iv, ivlen, params, 0); in ossl_tdes_dinit()
|
| H A D | cipher_aes_xts_s390x.inc | 19 size_t ivlen, const OSSL_PARAM params[], 43 if (ivlen != xctx->base.ivlen 44 || ivlen > sizeof(km->tweak)) { 48 memcpy(km->tweak, iv, ivlen); 80 size_t ivlen, const OSSL_PARAM params[]) 82 return s390x_aes_xts_init(vctx, key, keylen, iv, ivlen, params, 0); 87 size_t ivlen, const OSSL_PARAM params[]) 89 return s390x_aes_xts_init(vctx, key, keylen, iv, ivlen, params,
|
| H A D | cipher_rc2.c | 89 const unsigned char *iv, size_t ivlen, in rc2_einit() argument 92 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) in rc2_einit() 98 const unsigned char *iv, size_t ivlen, in rc2_dinit() argument 101 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) in rc2_dinit() 142 ctx->base.iv, ctx->base.ivlen)) { in rc2_get_ctx_params() 200 || ctx->base.ivlen > sizeof(iv) in rc2_set_ctx_params() 203 ctx->base.ivlen) in rc2_set_ctx_params() 204 != ctx->base.ivlen) in rc2_set_ctx_params() 205 || !ossl_cipher_generic_initiv(&ctx->base, iv, ctx->base.ivlen) in rc2_set_ctx_params()
|
| H A D | cipher_des.c | 72 const unsigned char *iv, size_t ivlen, in des_init() argument 85 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) in des_init() 89 memcpy(ctx->iv, ctx->oiv, ctx->ivlen); in des_init() 105 const unsigned char *iv, size_t ivlen, in des_einit() argument 108 return des_init(vctx, key, keylen, iv, ivlen, params, 1); in des_einit() 112 const unsigned char *iv, size_t ivlen, in des_dinit() argument 115 return des_init(vctx, key, keylen, iv, ivlen, params, 0); in des_dinit()
|
| H A D | cipher_aes_xts.c | 73 const unsigned char *iv, size_t ivlen, in aes_xts_init() argument 85 if (!ossl_cipher_generic_initiv(vctx, iv, ivlen)) in aes_xts_init() 102 const unsigned char *iv, size_t ivlen, in aes_xts_einit() argument 106 if (s390x_aes_xts_einit(vctx, key, keylen, iv, ivlen, params) == 1) in aes_xts_einit() 109 return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 1); in aes_xts_einit() 113 const unsigned char *iv, size_t ivlen, in aes_xts_dinit() argument 117 if (s390x_aes_xts_dinit(vctx, key, keylen, iv, ivlen, params) == 1) in aes_xts_dinit() 120 return aes_xts_init(vctx, key, keylen, iv, ivlen, params, 0); in aes_xts_dinit()
|
| H A D | cipher_rc4_hmac_md5.c | 86 size_t ivlen, const OSSL_PARAM params[]) in rc4_hmac_md5_einit() argument 88 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) in rc4_hmac_md5_einit() 95 size_t ivlen, const OSSL_PARAM params[]) in rc4_hmac_md5_dinit() argument 97 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) in rc4_hmac_md5_dinit() 126 if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->base.ivlen)) { in rc4_hmac_md5_get_ctx_params() 177 if (ctx->base.ivlen != sz) { in rc4_hmac_md5_set_ctx_params()
|
| H A D | cipher_rc4.c | 54 const unsigned char *iv, size_t ivlen, in rc4_einit() argument 57 if (!ossl_cipher_generic_einit(ctx, key, keylen, iv, ivlen, NULL)) in rc4_einit() 63 const unsigned char *iv, size_t ivlen, in rc4_dinit() argument 66 if (!ossl_cipher_generic_dinit(ctx, key, keylen, iv, ivlen, NULL)) in rc4_dinit()
|
| H A D | cipher_aes_wrp.c | 63 ctx->pad = (ctx->ivlen == AES_WRAP_PAD_IVLEN); in aes_wrap_newctx() 101 size_t ivlen, const OSSL_PARAM params[], int enc) in aes_wrap_init() argument 116 if (!ossl_cipher_generic_initiv(ctx, iv, ivlen)) in aes_wrap_init() 151 const unsigned char *iv, size_t ivlen, in aes_wrap_einit() argument 154 return aes_wrap_init(ctx, key, keylen, iv, ivlen, params, 1); in aes_wrap_einit() 158 const unsigned char *iv, size_t ivlen, in aes_wrap_dinit() argument 161 return aes_wrap_init(ctx, key, keylen, iv, ivlen, params, 0); in aes_wrap_dinit()
|
| /freebsd/sys/opencrypto/ |
| H A D | xform_aes_icm.c | 146 aes_icm_reinit(void *key, const uint8_t *iv, size_t ivlen) in aes_icm_reinit() argument 151 KASSERT(ivlen <= sizeof(ctx->ac_block), in aes_icm_reinit() 153 bcopy(iv, ctx->ac_block, ivlen); in aes_icm_reinit() 157 aes_gcm_reinit(void *vctx, const uint8_t *iv, size_t ivlen) in aes_gcm_reinit() argument 161 KASSERT(ivlen == AES_GCM_IV_LEN, in aes_gcm_reinit() 163 aes_icm_reinit(&ctx->cipher, iv, ivlen); in aes_gcm_reinit() 169 AES_GMAC_Reinit(&ctx->gmac, iv, ivlen); in aes_gcm_reinit() 173 aes_ccm_reinit(void *vctx, const uint8_t *iv, size_t ivlen) in aes_ccm_reinit() argument 177 KASSERT(ivlen >= 7 && ivlen <= 13, in aes_ccm_reinit() 182 ctx->cipher.ac_block[0] = (15 - ivlen) - 1; in aes_ccm_reinit() [all …]
|
| H A D | xform_chacha20_poly1305.c | 62 chacha20_poly1305_reinit(void *vctx, const uint8_t *iv, size_t ivlen) in chacha20_poly1305_reinit() argument 67 KASSERT(ivlen == 8 || ivlen == sizeof(ctx->nonce), in chacha20_poly1305_reinit() 70 memcpy(ctx->nonce, iv, ivlen); in chacha20_poly1305_reinit() 71 ctx->ietf = (ivlen == CHACHA20_POLY1305_IV_LEN); in chacha20_poly1305_reinit() 189 xchacha20_poly1305_reinit(void *vctx, const uint8_t *iv, size_t ivlen) in xchacha20_poly1305_reinit() argument 194 KASSERT(ivlen == XCHACHA20_POLY1305_IV_LEN, in xchacha20_poly1305_reinit()
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | e_aes.c | 53 int ivlen; /* IV length */ member 114 int ivlen; /* IV length */ member 246 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); in aesni_gcm_init_key() 253 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); in aesni_gcm_init_key() 255 memcpy(gctx->iv, iv, gctx->ivlen); in aesni_gcm_init_key() 396 if (CRYPTO_ocb128_setiv(&octx->ocb, iv, octx->ivlen, octx->taglen) in aesni_ocb_init_key() 405 CRYPTO_ocb128_setiv(&octx->ocb, iv, octx->ivlen, octx->taglen); in aesni_ocb_init_key() 407 memcpy(octx->iv, iv, octx->ivlen); in aesni_ocb_init_key() 418 #define BLOCK_CIPHER_generic(nid, keylen, blocksize, ivlen, nmode, mode, MODE, flags) \ argument 420 nid##_##keylen##_##nmode, blocksize, keylen / 8, ivlen, \ [all …]
|
| H A D | e_aria.c | 38 int ivlen; /* IV length */ member 162 #define BLOCK_CIPHER_generic(nid, keylen, blocksize, ivlen, nmode, mode, MODE, flags) \ argument 164 nid##_##keylen##_##nmode, blocksize, keylen / 8, ivlen, \ 243 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); in aria_gcm_init_key() 250 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); in aria_gcm_init_key() 252 memcpy(gctx->iv, iv, gctx->ivlen); in aria_gcm_init_key() 267 gctx->ivlen = EVP_CIPHER_get_iv_length(c->cipher); in aria_gcm_ctrl() 275 *(int *)ptr = gctx->ivlen; in aria_gcm_ctrl() 282 if ((arg > EVP_MAX_IV_LENGTH) && (arg > gctx->ivlen)) { in aria_gcm_ctrl() 288 gctx->ivlen = arg; in aria_gcm_ctrl() [all …]
|
| /freebsd/crypto/openssl/ssl/record/methods/ |
| H A D | ktls_meth.c | 76 unsigned char *iv, size_t ivlen, in ktls_configure_crypto() argument 84 crypto_info->iv_len = ivlen; in ktls_configure_crypto() 89 crypto_info->iv_len = ivlen; in ktls_configure_crypto() 104 crypto_info->iv_len = ivlen; in ktls_configure_crypto() 174 unsigned char *iv, size_t ivlen, in ktls_configure_crypto() argument 193 if (!ossl_assert(ivlen == EVP_GCM_TLS_FIXED_IV_LEN)) in ktls_configure_crypto() 205 if (!ossl_assert(ivlen == EVP_GCM_TLS_FIXED_IV_LEN + EVP_GCM_TLS_EXPLICIT_IV_LEN)) in ktls_configure_crypto() 267 if (!ossl_assert(ivlen == TLS_CIPHER_CHACHA20_POLY1305_IV_SIZE)) in ktls_configure_crypto() 273 memcpy(crypto_info->chacha20poly1305.iv, iv, ivlen); in ktls_configure_crypto() 288 unsigned char *iv, size_t ivlen, in ktls_set_crypto_state() argument [all …]
|
| H A D | tls13_meth.c | 18 unsigned char *iv, size_t ivlen, in tls13_set_crypto_state() argument 33 rl->iv = OPENSSL_malloc(ivlen); in tls13_set_crypto_state() 37 rl->nonce = OPENSSL_malloc(ivlen); in tls13_set_crypto_state() 41 memcpy(rl->iv, iv, ivlen); in tls13_set_crypto_state() 72 || EVP_CIPHER_CTX_ctrl(ciph_ctx, EVP_CTRL_AEAD_SET_IVLEN, ivlen, in tls13_set_crypto_state() 136 int ivlen = EVP_CIPHER_CTX_get_iv_length(enc_ctx); in tls13_cipher() local 138 if (ivlen < 0) { in tls13_cipher() 143 nonce_len = (size_t)ivlen; in tls13_cipher()
|
| /freebsd/crypto/openssl/test/ |
| H A D | tls13encryptiontest.c | 216 unsigned char **key, unsigned char *iv, size_t ivlen, in load_record() argument 240 memcpy(iv, ivtmp, ivlen); in load_record() 287 size_t ivlen, ctr; in test_tls13_encryption() local 302 ivlen = EVP_CIPHER_get_iv_length(ciph); in test_tls13_encryption() 303 if (!load_record(&rec, &refdata[ctr], &key, iv, ivlen, seqbuf)) { in test_tls13_encryption() 313 key, 16, iv, ivlen, NULL, 0, EVP_aes_128_gcm(), in test_tls13_encryption() 336 key, 16, iv, ivlen, NULL, 0, EVP_aes_128_gcm(), in test_tls13_encryption()
|
| H A D | fake_pipelineprov.c | 33 size_t ivlen; member 52 ctx->ivlen = ivbits / 8; in fake_pipeline_newctx() 83 size_t ivlen, int enc) in fake_pipeline_init() argument 103 size_t ivlen, const OSSL_PARAM params[]) in fake_pipeline_einit() argument 105 return fake_pipeline_init(vctx, key, keylen, numpipes, iv, ivlen, 1); in fake_pipeline_einit() 111 size_t ivlen, const OSSL_PARAM params[]) in fake_pipeline_dinit() argument 113 return fake_pipeline_init(vctx, key, keylen, numpipes, iv, ivlen, 0); in fake_pipeline_dinit() 189 if (!OSSL_PARAM_set_size_t(p, ctx->ivlen)) { in fake_pipeline_aead_get_ctx_params()
|
| /freebsd/sys/kgssapi/krb5/ |
| H A D | kcrypto.h | 66 struct mbuf *inout, size_t skip, size_t len, void *ivec, size_t ivlen); 115 size_t skip, size_t len, void *ivec, size_t ivlen) in krb5_encrypt() argument 118 ks->ks_class->ec_encrypt(ks, inout, skip, len, ivec, ivlen); in krb5_encrypt() 123 size_t skip, size_t len, void *ivec, size_t ivlen) in krb5_decrypt() argument 126 ks->ks_class->ec_decrypt(ks, inout, skip, len, ivec, ivlen); in krb5_decrypt()
|
| /freebsd/sys/netipsec/ |
| H A D | xform_esp.c | 181 sav->ivlen = 8; /* RFC4106 3.1 and RFC3686 3.1 */ in esp_init() 183 sav->ivlen = txform->ivsize; in esp_init() 312 hlen = sizeof (struct esp) + sav->ivlen; in esp_input() 314 hlen = sizeof (struct newesp) + sav->ivlen; in esp_input() 463 m_copydata(m, skip + hlen - sav->ivlen, sav->ivlen, &ivp[4]); in esp_input() 465 be32enc(&ivp[sav->ivlen + 4], 1); in esp_input() 468 } else if (sav->ivlen != 0) in esp_input() 469 crp->crp_iv_start = skip + hlen - sav->ivlen; in esp_input() 606 hlen = sizeof (struct esp) + sav->ivlen; in esp_input_cb() 608 hlen = sizeof (struct newesp) + sav->ivlen; in esp_input_cb() [all …]
|
| /freebsd/crypto/openssl/crypto/cms/ |
| H A D | cms_enc.c | 37 int ivlen = 0; in ossl_cms_EncryptedContent_init_bio() local 90 ivlen = EVP_CIPHER_CTX_get_iv_length(ctx); in ossl_cms_EncryptedContent_init_bio() 91 if (ivlen < 0) { in ossl_cms_EncryptedContent_init_bio() 96 if (ivlen > 0) { in ossl_cms_EncryptedContent_init_bio() 97 if (RAND_bytes_ex(libctx, iv, ivlen, 0) <= 0) in ossl_cms_EncryptedContent_init_bio() 177 memcpy(aparams.iv, piv, ivlen); in ossl_cms_EncryptedContent_init_bio() 178 aparams.iv_len = ivlen; in ossl_cms_EncryptedContent_init_bio()
|
| /freebsd/crypto/openssl/ssl/ |
| H A D | tls13_enc.c | 139 unsigned char *iv, size_t ivlen) in tls13_derive_iv() argument 145 NULL, 0, iv, ivlen, 1); in tls13_derive_iv() 357 unsigned char **iv, size_t *ivlen, in derive_secret_key_and_iv() argument 387 *ivlen = *taglen = (size_t)mac_mdleni; in derive_secret_key_and_iv() 397 *ivlen = EVP_CCM_TLS_IV_LEN; in derive_secret_key_and_iv() 428 *ivlen = iivlen; in derive_secret_key_and_iv() 432 if (*ivlen > EVP_MAX_IV_LENGTH) { in derive_secret_key_and_iv() 433 *iv = OPENSSL_malloc(*ivlen); in derive_secret_key_and_iv() 441 || !tls13_derive_iv(s, md, secret, *iv, *ivlen)) { in derive_secret_key_and_iv() 509 size_t keylen, ivlen = EVP_MAX_IV_LENGTH, taglen; in tls13_change_cipher_state() local [all …]
|