| /f-stack/freebsd/netipsec/ |
| H A D | xform_esp.c | 181 sav->ivlen = txform->ivsize; in esp_init() 302 hlen = sizeof (struct esp) + sav->ivlen; in esp_input() 455 m_copydata(m, skip + hlen - sav->ivlen, sav->ivlen, &ivp[4]); in esp_input() 457 be32enc(&ivp[sav->ivlen + 4], 1); in esp_input() 460 } else if (sav->ivlen != 0) in esp_input() 583 hlen = sizeof (struct esp) + sav->ivlen; in esp_input_cb() 699 hlen = sizeof (struct esp) + sav->ivlen; in esp_output() 879 be32enc(&ivp[sav->ivlen + 4], 1); in esp_output() 881 m_copyback(m, skip + hlen - sav->ivlen, sav->ivlen, &ivp[4]); in esp_output() 883 } else if (sav->ivlen != 0) { in esp_output() [all …]
|
| H A D | keydb.h | 153 u_int ivlen; /* length of IV */ member
|
| H A D | key.c | 3450 sav->ivlen = 0; in key_setsaval()
|
| /f-stack/freebsd/opencrypto/ |
| H A D | gmac.c | 68 AES_GMAC_Reinit(void *ctx, const uint8_t *iv, u_int ivlen) in AES_GMAC_Reinit() argument 73 KASSERT(ivlen <= sizeof agc->counter, ("passed ivlen too large!")); in AES_GMAC_Reinit() 74 bcopy(iv, agc->counter, ivlen); in AES_GMAC_Reinit()
|
| H A D | cryptosoft.c | 119 ivlen = exf->ivsize; in swcr_encdec() 411 ivlen = AES_GCM_IV_LEN; in swcr_gmac() 414 axf->Reinit(&ctx, iv, ivlen); in swcr_gmac() 499 ivlen = AES_GCM_IV_LEN; in swcr_gcm() 500 bcopy(crp->crp_iv, iv, ivlen); in swcr_gcm() 503 axf->Reinit(&ctx, iv, ivlen); in swcr_gcm() 655 int error, ivlen; in swcr_ccm_cbc_mac() local 663 ivlen = AES_CCM_IV_LEN; in swcr_ccm_cbc_mac() 673 axf->Reinit(&ctx, iv, ivlen); in swcr_ccm_cbc_mac() 736 ivlen = AES_CCM_IV_LEN; in swcr_ccm() [all …]
|
| H A D | cryptodev.c | 122 u_int ivlen; member 232 CP(*from, *to, ivlen); in crypt_aead_from_32() 249 CP(*from, *to, ivlen); in crypt_aead_to_32() 1111 caead->ivlen == AES_BLOCK_LEN && in cryptodev_aead() 1113 caead->ivlen = AES_XTS_IV_LEN; in cryptodev_aead() 1115 if (caead->ivlen != cse->ivsize) { in cryptodev_aead()
|
| H A D | cryptodev.h | 271 u_int ivlen; member
|
| /f-stack/freebsd/mips/nlm/dev/sec/ |
| H A D | nlmseclib.c | 107 cmd->iv, cmd->ivlen); in nlm_crypto_form_srcdst_segs() 109 cmd->iv, cmd->ivlen); in nlm_crypto_form_srcdst_segs() 183 cmd->ivlen, cmd->cipheroff, cmd->cipherlen); in nlm_crypto_do_cipher() 239 cmd->ivoff, cmd->ivlen, cmd->hashoff, cmd->hashlen, in nlm_crypto_do_cipher_digest() 276 cmd->ivlen = XLP_SEC_AES_IV_LENGTH; in nlm_get_cipher_param()
|
| H A D | nlmsec.c | 221 printf("ivlen :%d\n",cmd->ivlen); in print_cmd() 620 cmd->cipheroff += cmd->ivlen; in xlp_sec_process() 665 cmd->hashoff += cmd->ivlen; in xlp_sec_process() 666 cmd->cipheroff += cmd->ivlen; in xlp_sec_process()
|
| H A D | nlmseclib.h | 106 uint32_t ivlen; member
|
| /f-stack/freebsd/mips/nlm/hal/ |
| H A D | nlmsaelib.h | 247 unsigned int hashout_l3alloc, unsigned int encrypt, unsigned int ivlen, in nlm_crypto_form_pkt_desc0() argument 254 left_shift64_mask((ivlen - 1), 41, 16) | in nlm_crypto_form_pkt_desc0() 510 unsigned int hash_source, unsigned int ivoff, unsigned int ivlen, in nlm_crypto_fill_cipher_auth_pkt_param() argument 515 ivlen, vtophys(hashdst_addr)); in nlm_crypto_fill_cipher_auth_pkt_param() 537 unsigned int ivoff, unsigned int ivlen, unsigned int cipheroff, in nlm_crypto_fill_cipher_pkt_param() argument 540 param->desc0 = nlm_crypto_form_pkt_desc0(0, 0, 0, encrypt, ivlen, 0ULL); in nlm_crypto_fill_cipher_pkt_param()
|
| /f-stack/dpdk/drivers/common/dpaax/caamflib/desc/ |
| H A D | algo.h | 293 uint32_t ivlen, uint8_t dir) in cnstr_shdsc_blkcipher() argument 340 SEQLOAD(p, CONTEXT1, iv_off, ivlen, 0); in cnstr_shdsc_blkcipher() 343 if (cipherdata->algmode == OP_ALG_AAI_CTR && ivlen < 16) { in cnstr_shdsc_blkcipher() 348 LOAD(p, counter, CONTEXT1, (iv_off + ivlen), 16 - ivlen, IMMED); in cnstr_shdsc_blkcipher() 695 uint32_t ivlen, uint32_t icvsize) in cnstr_shdsc_gcm_encap() argument 732 MATHB(p, SEQINSZ, SUB, ivlen, VSEQOUTSZ, 4, IMMED2); in cnstr_shdsc_gcm_encap() 735 SEQFIFOLOAD(p, IV1, ivlen, FLUSH1); in cnstr_shdsc_gcm_encap() 774 SEQFIFOLOAD(p, IV1, ivlen, FLUSH1 | LAST1); in cnstr_shdsc_gcm_encap() 804 uint32_t ivlen, uint32_t icvsize) in cnstr_shdsc_gcm_decap() argument 837 SEQFIFOLOAD(p, IV1, ivlen, FLUSH1); in cnstr_shdsc_gcm_decap()
|
| H A D | ipsec.h | 1505 uint16_t ivlen, in cnstr_shdsc_authenc() argument 1590 SEQLOAD(p, CONTEXT1, 16, ivlen, 0); in cnstr_shdsc_authenc() 1592 SEQLOAD(p, CONTEXT1, 0, ivlen, 0); in cnstr_shdsc_authenc()
|
| /f-stack/dpdk/drivers/crypto/qat/ |
| H A D | qat_sym.h | 57 uint8_t *iv, int ivlen, int srclen, in bpi_cipher_encrypt() argument 66 if (EVP_EncryptUpdate(ctx, encrypted_iv, &encrypted_ivlen, iv, ivlen) in bpi_cipher_encrypt()
|
| H A D | qat_sym.c | 22 uint8_t *iv, int ivlen, int srclen, in bpi_cipher_decrypt() argument 31 if (EVP_EncryptUpdate(ctx, encrypted_iv, &encrypted_ivlen, iv, ivlen) in bpi_cipher_decrypt()
|
| /f-stack/dpdk/drivers/crypto/nitrox/ |
| H A D | nitrox_sym_reqmgr.c | 388 create_cipher_gph(uint32_t cryptlen, uint16_t ivlen, struct gphdr *gph) in create_cipher_gph() argument 392 gph->param2 = rte_cpu_to_be_16(ivlen); in create_cipher_gph() 612 create_aead_gph(uint32_t cryptlen, uint16_t ivlen, uint32_t authlen, in create_aead_gph() argument 633 gph->param2 = rte_cpu_to_be_16(ivlen + auth_only_len); in create_aead_gph() 636 param3.auth_offset = ivlen; in create_aead_gph()
|
| /f-stack/dpdk/drivers/crypto/bcmfs/ |
| H A D | bcmfs_sym_engine.c | 949 uint64_t *ivlen, bool is_esp) in bcmfs_crypto_ccm_update_iv() argument 965 *ivlen -= (1 + L); in bcmfs_crypto_ccm_update_iv() 966 memmove(ivbuf, &ivbuf[1], *ivlen); in bcmfs_crypto_ccm_update_iv()
|