/external/openssl/crypto/des/ |
FILES0 | 35 the new iv values back in the passed iv vector.
|
des_old.c | 181 _ossl_old_des_cblock *iv) 183 return DES_enc_read(fd, buf, len, (DES_key_schedule *)sched, iv); 186 _ossl_old_des_cblock *iv) 188 return DES_enc_write(fd, buf, len, (DES_key_schedule *)sched, iv);
|
/external/openssl/crypto/md4/ |
md4s.cpp | 48 unsigned char iv[8]; local
|
/external/openssl/crypto/md5/ |
md5s.cpp | 48 unsigned char iv[8]; local
|
/external/openssl/crypto/rc4/ |
rc4s.cpp | 44 unsigned char iv[8]; local
|
/external/openssl/crypto/ripemd/asm/ |
rips.cpp | 50 unsigned char iv[8]; local
|
/external/srtp/crypto/cipher/ |
null_cipher.c | 110 null_cipher_set_iv(null_cipher_ctx_t *c, void *iv) {
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 44 const u8 *iv, const u8 *key, 76 os_memcpy(ctx->u.aes.cbc, iv, AES_BLOCK_SIZE); 84 os_memcpy(ctx->u.des3.cbc, iv, 8); 92 os_memcpy(ctx->u.des.cbc, iv, 8);
|
/frameworks/av/media/libmediaplayerservice/ |
Crypto.h | 51 const uint8_t iv[16],
|
Drm.h | 94 Vector<uint8_t> const &iv, 100 Vector<uint8_t> const &iv,
|
/frameworks/av/drm/mediadrm/plugins/mock/ |
MockDrmCryptoPlugin.cpp | 446 Vector<uint8_t> const &iv, 450 ALOGD("MockDrmPlugin::encrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)", 454 vectorToString(iv).string()); 465 // byte[] iv -> mock-iv 468 mByteArrayProperties.add(String8("mock-iv"), iv); 485 Vector<uint8_t> const &iv, 489 ALOGD("MockDrmPlugin::decrypt(sessionId=%s, keyId=%s, input=%s, iv=%s)", 493 vectorToString(iv).string()) [all...] |
/frameworks/base/tests/ActivityTests/src/com/google/android/test/activity/ |
ActivityTestMain.java | 76 ImageView iv = new ImageView(this); local 78 iv.setImageBitmap(bm); 80 iv.setBackgroundResource(android.R.drawable.gallery_thumb); 83 container.addView(iv, new LinearLayout.LayoutParams(w, h)); 85 iv.setOnClickListener(new View.OnClickListener() { 103 iv.setOnLongClickListener(new View.OnLongClickListener() {
|
/external/ppp/pppd/ |
options.c | 628 int iv, a; local 691 iv = 0; 693 if (!int_option(*argv, &iv)) 695 if ((((opt->flags & OPT_LLIMIT) && iv < opt->lower_limit) 696 || ((opt->flags & OPT_ULIMIT) && iv > opt->upper_limit)) 697 && !((opt->flags & OPT_ZEROOK && iv == 0))) { 719 iv += a; 721 iv += *(int *)(opt->addr); 725 (oldv != 0 && (iv == 0 || iv > oldv)) : (iv > oldv)) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS12ParametersGenerator.java | 188 * @param ivSize the size of the iv we want (in bits) 200 byte[] iv = generateDerivedKey(IV_MATERIAL, ivSize); 202 return new ParametersWithIV(new KeyParameter(dKey, 0, keySize), iv, 0, ivSize);
|
/external/openssl/crypto/pem/ |
pem_seal.c | 71 unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, 103 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk);
|
pem_info.c | 321 unsigned char *iv=NULL; local 349 iv=xi->enc_cipher.iv; 370 PEM_dek_info(buf,objstr,enc->iv_len,(char *)iv);
|
/frameworks/av/include/media/ |
IDrm.h | 90 Vector<uint8_t> const &iv, 96 Vector<uint8_t> const &iv,
|
/frameworks/native/include/media/drm/ |
DrmAPI.h | 257 Vector<uint8_t> const &iv, 266 Vector<uint8_t> const &iv,
|
/external/dropbear/ |
keyimport.c | 356 char iv[32]; member in struct:openssh_key 374 memset(ret->iv, 0, sizeof(ret->iv)); 435 ret->iv[i] = j; 439 errmsg = "Expected 16-digit iv in DEK-Info"; 535 * Derive encryption key from passphrase and iv/salt: 537 * - let block A equal MD5(passphrase || iv) 538 * - let block B equal MD5(A || passphrase || iv) 539 * - block C would be MD5(B || passphrase || iv) and so on 547 MD5Update(&md5c, (unsigned char *)key->iv, 8) 704 unsigned char iv[8]; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.h | 75 const u8 *iv; member in struct:eap_sake_parse_attr
|
ikev2_common.c | 189 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 248 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 497 const u8 *pos, *end, *iv, *integ; local 524 wpa_printf(MSG_INFO, "IKEV2: No room for IV or Integrity " 529 iv = encrypted; 530 pos = iv + iv_len; 561 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, 599 u8 *icv, *iv; local [all...] |
/frameworks/base/media/jni/ |
android_media_MediaCodec.h | 68 const uint8_t iv[16],
|
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 45 #define KM_IV_LENGTH (16) /* AES128 CBC IV */ 55 uint8_t iv[KM_IV_LENGTH]; member in struct:qcom_km_key_blob
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
BaseStreamCipher.java | 222 byte[] iv = new byte[ivLength]; 224 ivRandom.nextBytes(iv); 225 param = new ParametersWithIV(param, iv); 230 throw new InvalidAlgorithmParameterException("no IV set when one expected");
|
/external/openssl/crypto/evp/ |
evp_locl.h | 85 cprefix##_ofb##cbits##_encrypt(in, out, (long)EVP_MAXCHUNK, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, &ctx->num);\ 91 cprefix##_ofb##cbits##_encrypt(in, out, (long)inl, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, &ctx->num);\ 100 cprefix##_cbc_encrypt(in, out, (long)EVP_MAXCHUNK, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, ctx->encrypt);\ 106 cprefix##_cbc_encrypt(in, out, (long)inl, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, ctx->encrypt);\ 118 cprefix##_cfb##cbits##_encrypt(in, out, (long)((cbits==1) && !(ctx->flags & EVP_CIPH_FLAG_LENGTH_BITS) ?inl*8:inl), &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, &ctx->num, ctx->encrypt);\
|