Searched refs:IV (Results 1 – 15 of 15) sorted by relevance
| /f-stack/freebsd/crypto/rijndael/ |
| H A D | rijndael-api-fst.c | 76 if (IV != NULL) { in rijndael_cipherInit() 77 memcpy(cipher->IV, IV, RIJNDAEL_MAX_IV_SIZE); in rijndael_cipherInit() 79 memset(cipher->IV, 0, RIJNDAEL_MAX_IV_SIZE); in rijndael_cipherInit() 111 memcpy(block, cipher->IV, 16); in rijndael_blockEncrypt() 147 memcpy(iv, cipher->IV, 16); in rijndael_blockEncrypt() 149 *((uint32_t*)iv[0]) = *((uint32_t*)(cipher->IV )); in rijndael_blockEncrypt() 233 iv = cipher->IV; in rijndael_padEncrypt() 291 memcpy(iv, cipher->IV, 16); in rijndael_blockDecrypt() 320 memcpy(iv, cipher->IV, 16); in rijndael_blockDecrypt() 322 *((uint32_t*)iv[0]) = *((uint32_t*)(cipher->IV)); in rijndael_blockDecrypt() [all …]
|
| H A D | rijndael-api-fst.h | 54 u_int8_t IV[RIJNDAEL_MAX_IV_SIZE]; /* A possible Initialization Vector for ciphering */ member
|
| /f-stack/dpdk/doc/guides/sample_app_ug/ |
| H A D | l2_forward_crypto.rst | 45 [--cipher_key_random_size SIZE] [--cipher_iv IV] [--cipher_iv_random_size SIZE] / 47 [--auth_key_random_size SIZE] [--auth_iv IV] [--auth_iv_random_size SIZE] / 92 * cipher_iv: set the cipher IV to be used. Bytes has to be separated with ":" 94 * cipher_iv_random_size: set the size of the cipher IV, which will be generated randomly. 112 * auth_iv: set the auth IV to be used. Bytes has to be separated with ":" 114 * auth_iv_random_size: set the size of the auth IV, which will be generated randomly. 132 * aead_iv: set the AEAD IV to be used. Bytes has to be separated with ":" 134 * aead_iv_random_size: set the size of the AEAD IV, which will be generated randomly. 215 * Keys, IV and AAD are generated randomly. 217 There are two methods to pass keys, IV and ADD from the command line: [all …]
|
| /f-stack/freebsd/crypto/openssl/arm/ |
| H A D | bsaes-armv7.S | 1136 vld1.8 {q15}, [r8] @ load IV 1159 vldmia r9, {q14} @ reload IV 1161 veor q0, q0, q14 @ ^= IV 1215 veor q0, q0, q14 @ ^= IV 1236 vldmia r9,{q14} @ reload IV 1238 veor q0, q0, q14 @ ^= IV 1259 veor q0, q0, q14 @ ^= IV 1277 veor q0, q0, q14 @ ^= IV 1293 veor q0, q0, q14 @ ^= IV 1306 veor q0, q0, q14 @ ^= IV [all …]
|
| /f-stack/dpdk/doc/guides/prog_guide/ |
| H A D | ipsec_lib.rst | 72 - remove ESP header and trailer, padding, IV and ICV data 77 - generate SQN and IV 79 - add ESP header and trailer, padding and IV data 104 - remove ESP header and trailer, padding, IV and ICV data 109 - generate SQN and IV 111 - add ESP header and trailer, padding and IV data
|
| H A D | cryptodev_lib.rst | 339 be an IV also for authentication). 623 - pointers to arrays of size ``num`` containing IV, AAD and digest information 798 * The IV is always placed after the crypto operation, 934 /* Modify bytes of the IV at the end of the crypto operation */
|
| H A D | rte_flow.rst | 1945 security protocol headers and IV are fully provided by the application as
|
| /f-stack/dpdk/doc/guides/rel_notes/ |
| H A D | release_17_08.rst | 143 * Replaced the pointer and physical address of IV with offset from the start 145 * Moved length and offset of cipher IV to ``rte_crypto_cipher_xform``. 191 * 12-byte IV on AES Counter Mode, apart from the previous 16-byte IV. 342 * Added cipher IV length and offset parameters. 347 * Added authentication IV length and offset parameters.
|
| H A D | release_16_11.rst | 153 * AES CBC IV generation with cipher forward function.
|
| H A D | release_16_04.rst | 382 due to incorrect IV setting.
|
| H A D | release_20_05.rst | 227 user can use this feature by passing a zero length IV in the appropriate
|
| H A D | release_18_11.rst | 225 algorithm, key, and IV, etc. for the cryptodev port to process.
|
| /f-stack/dpdk/doc/guides/cryptodevs/ |
| H A D | aesni_mb.rst | 170 Vector (IV):
|
| /f-stack/app/redis-5.0.5/ |
| H A D | MANIFESTO | 55 this is like if Shakespeare decided to end Enrico IV using the Paradiso from
|
| /f-stack/freebsd/contrib/openzfs/config/ |
| H A D | host-cpu-c-abi.m4 | 40 dnl (Pentium), AMD K7, Pentium II, Pentium IV, etc., because
|