iv_len
if (mech_params[iv_len] != 0)
mech_params[iv_len] = try_int(optarg,
li.li_iv_len = cipher->iv_len; /* 0 when no iv needed */
size_t iv_len; /* for ioctl */
gcm_format_initial_blocks(uchar_t *iv, ulong_t iv_len,
ulong_t remainder = iv_len;
if (iv_len == 12) {
len_a_len_c[1] = htonll(CRYPTO_BYTES2BITS(iv_len));
gcm_init(gcm_ctx_t *ctx, unsigned char *iv, size_t iv_len,
gcm_format_initial_blocks(iv, iv_len, ctx, block_size,
ulong_t iv_len;
iv_len = STRUCT_FGET(in_param, ulIvLen);
if (iv_len > kcf_param_copyin_max ||
s1 = roundup(iv_len, sizeof (caddr_t));
if (copyin(uptr, ivp, iv_len) != 0)
out_param->ulIvLen = iv_len;
ulong_t iv_len;
iv_len = AES_GMAC_IV_LEN;
s1 = roundup(iv_len, sizeof (caddr_t));
if (copyin(uptr, ivp, iv_len) != 0)
uint_t iv_len = assoc->ipsa_iv_len;
encr_offset = esph_offset + sizeof (esph_t) + iv_len;
uint_t iv_len = assoc->ipsa_iv_len;
auth_len = payload_len + iv_len + sizeof (esph_t);
uint_t iv_len, block_size, mac_len = 0;
iv_len = assoc->ipsa_iv_len;
ASSERT(ISP2(iv_len));
iv_len = 0;
esplen += iv_len;
if (!esp_age_bytes(assoc, datalen + padlen + iv_len + 2, B_FALSE)) {
size_t iv_len;
iv_len = lsp->ls_iv_len;
iv = kmem_zalloc(iv_len, KM_SLEEP);
iv_len = lsp->ls_mech.cm_param_len;
bzero(iv, iv_len);
min = MIN(datasz, iv_len);
bcopy(data, iv + (iv_len - min), min);
SETUP_C_DATA(cdata, iv, iv_len);
kmem_free(iv, iv_len);
lsp->ls_mech.cm_param_len = iv_len;