HomeSort by relevance Sort by last modified time
    Searched refs:ivlen (Results 1 - 12 of 12) sorted by null

  /bionic/libc/kernel/common/linux/
if_alg.h 32 __u32 ivlen; member in struct:af_alg_iv
  /external/kernel-headers/original/linux/
if_alg.h 27 __u32 ivlen; member in struct:af_alg_iv
  /external/tcpdump/
print-esp.c 76 int ivlen; member in struct:sa_list
257 sa1.ivlen = 0;
263 sa1.ivlen = EVP_CIPHER_iv_length(evp);
357 int ivlen = 0; local
469 ivlen = sa->ivlen;
483 EVP_Cipher(&ctx, p + ivlen, p + ivlen, ep - (p + ivlen));
484 advance = ivoff - (u_char *)esp + ivlen;
    [all...]
  /external/openssl/crypto/evp/
e_aes.c 80 int ivlen; /* IV length */ member in struct:__anon12606
324 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen);
333 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen);
335 memcpy(gctx->iv, iv, gctx->ivlen);
416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \
418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \
427 keylen/8,ivlen, \
437 #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \
440 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \
449 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \
    [all...]
  /external/openssh/
cipher.c 207 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen,
233 if (iv != NULL && ivlen < cipher->block_size)
235 ivlen, cipher->name);
326 int ivlen; local
329 ivlen = 24;
331 ivlen = EVP_CIPHER_CTX_iv_length(&cc->evp);
332 return (ivlen);
monitor_wrap.c 498 fatal("%s: bad ivlen: expected %u != %u", __func__,
609 u_int ivlen, keylen; local
623 ivlen = packet_get_keyiv_len(MODE_OUT);
624 packet_get_keyiv(MODE_OUT, iv, ivlen);
625 buffer_put_string(&m, iv, ivlen);
626 ivlen = packet_get_keyiv_len(MODE_OUT);
627 packet_get_keyiv(MODE_IN, iv, ivlen);
628 buffer_put_string(&m, iv, ivlen);
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_gnutls.c 202 int ivlen; local
261 ivlen = gcry_cipher_get_algo_blklen(a);
262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR ||
263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
  /external/dropbear/libtomcrypt/src/prngs/
sober128.c 436 int keylen, ivlen, len;
469 if ((err = sober128_add_entropy(tests[x].iv, tests[x].ivlen, &prng)) != CRYPT_OK) {
  /external/openssl/crypto/pkcs7/
pk7_doit.c 329 int keylen,ivlen; local
339 ivlen=EVP_CIPHER_iv_length(evp_cipher);
341 if (ivlen > 0)
342 if (RAND_pseudo_bytes(iv,ivlen) <= 0)
351 if (ivlen > 0) {
508 int keylen,ivlen;
  /external/openssl/ssl/
t1_enc.c 358 printf("\tevp_cipher: nid, blksz= %d, %d, keylen=%d, ivlen=%d\n",
700 int ivlen; local
705 ivlen = EVP_CIPHER_iv_length(enc);
707 ivlen = 0;
708 if (ivlen > 1)
717 else if (RAND_bytes(rec->input, ivlen) <= 0)
    [all...]
  /external/ipsec-tools/src/libipsec/
key_debug.c 321 printf(" { id=%d ivlen=%d min=%d max=%d }\n",
675 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
  /external/dropbear/libtomcrypt/
crypt.tex     [all...]

Completed in 694 milliseconds