Home
last modified time | relevance | path

Searched refs:IV (Results 1 – 15 of 15) sorted by relevance

/f-stack/freebsd/crypto/rijndael/
H A Drijndael-api-fst.c76 if (IV != NULL) { in rijndael_cipherInit()
77 memcpy(cipher->IV, IV, RIJNDAEL_MAX_IV_SIZE); in rijndael_cipherInit()
79 memset(cipher->IV, 0, RIJNDAEL_MAX_IV_SIZE); in rijndael_cipherInit()
111 memcpy(block, cipher->IV, 16); in rijndael_blockEncrypt()
147 memcpy(iv, cipher->IV, 16); in rijndael_blockEncrypt()
149 *((uint32_t*)iv[0]) = *((uint32_t*)(cipher->IV )); in rijndael_blockEncrypt()
233 iv = cipher->IV; in rijndael_padEncrypt()
291 memcpy(iv, cipher->IV, 16); in rijndael_blockDecrypt()
320 memcpy(iv, cipher->IV, 16); in rijndael_blockDecrypt()
322 *((uint32_t*)iv[0]) = *((uint32_t*)(cipher->IV)); in rijndael_blockDecrypt()
[all …]
H A Drijndael-api-fst.h54 u_int8_t IV[RIJNDAEL_MAX_IV_SIZE]; /* A possible Initialization Vector for ciphering */ member
/f-stack/dpdk/doc/guides/sample_app_ug/
H A Dl2_forward_crypto.rst45 [--cipher_key_random_size SIZE] [--cipher_iv IV] [--cipher_iv_random_size SIZE] /
47 [--auth_key_random_size SIZE] [--auth_iv IV] [--auth_iv_random_size SIZE] /
92 * cipher_iv: set the cipher IV to be used. Bytes has to be separated with ":"
94 * cipher_iv_random_size: set the size of the cipher IV, which will be generated randomly.
112 * auth_iv: set the auth IV to be used. Bytes has to be separated with ":"
114 * auth_iv_random_size: set the size of the auth IV, which will be generated randomly.
132 * aead_iv: set the AEAD IV to be used. Bytes has to be separated with ":"
134 * aead_iv_random_size: set the size of the AEAD IV, which will be generated randomly.
215 * Keys, IV and AAD are generated randomly.
217 There are two methods to pass keys, IV and ADD from the command line:
[all …]
/f-stack/freebsd/crypto/openssl/arm/
H A Dbsaes-armv7.S1136 vld1.8 {q15}, [r8] @ load IV
1159 vldmia r9, {q14} @ reload IV
1161 veor q0, q0, q14 @ ^= IV
1215 veor q0, q0, q14 @ ^= IV
1236 vldmia r9,{q14} @ reload IV
1238 veor q0, q0, q14 @ ^= IV
1259 veor q0, q0, q14 @ ^= IV
1277 veor q0, q0, q14 @ ^= IV
1293 veor q0, q0, q14 @ ^= IV
1306 veor q0, q0, q14 @ ^= IV
[all …]
/f-stack/dpdk/doc/guides/prog_guide/
H A Dipsec_lib.rst72 - remove ESP header and trailer, padding, IV and ICV data
77 - generate SQN and IV
79 - add ESP header and trailer, padding and IV data
104 - remove ESP header and trailer, padding, IV and ICV data
109 - generate SQN and IV
111 - add ESP header and trailer, padding and IV data
H A Dcryptodev_lib.rst339 be an IV also for authentication).
623 - pointers to arrays of size ``num`` containing IV, AAD and digest information
798 * The IV is always placed after the crypto operation,
934 /* Modify bytes of the IV at the end of the crypto operation */
H A Drte_flow.rst1945 security protocol headers and IV are fully provided by the application as
/f-stack/dpdk/doc/guides/rel_notes/
H A Drelease_17_08.rst143 * Replaced the pointer and physical address of IV with offset from the start
145 * Moved length and offset of cipher IV to ``rte_crypto_cipher_xform``.
191 * 12-byte IV on AES Counter Mode, apart from the previous 16-byte IV.
342 * Added cipher IV length and offset parameters.
347 * Added authentication IV length and offset parameters.
H A Drelease_16_11.rst153 * AES CBC IV generation with cipher forward function.
H A Drelease_16_04.rst382 due to incorrect IV setting.
H A Drelease_20_05.rst227 user can use this feature by passing a zero length IV in the appropriate
H A Drelease_18_11.rst225 algorithm, key, and IV, etc. for the cryptodev port to process.
/f-stack/dpdk/doc/guides/cryptodevs/
H A Daesni_mb.rst170 Vector (IV):
/f-stack/app/redis-5.0.5/
H A DMANIFESTO55 this is like if Shakespeare decided to end Enrico IV using the Paradiso from
/f-stack/freebsd/contrib/openzfs/config/
H A Dhost-cpu-c-abi.m440 dnl (Pentium), AMD K7, Pentium II, Pentium IV, etc., because