/external/srtp/crypto/include/ |
cryptoalg.h | 107 unsigned iv_len; member in struct:cryptoalg_ctx_t 116 #define cryptoalg_get_iv_len(cryptoalg) ((cryptoalg)->iv_len)
|
xfm.h | 78 unsigned iv_len; member in struct:xfm_ctx_t 86 #define xfm_get_iv_len(xfm) ((xfm)->iv_len) 118 unsigned iv_len; member in struct:cryptoalg_ctx_t 127 #define cryptoalg_get_iv_len(cryptoalg) ((cryptoalg)->iv_len)
|
/external/wpa_supplicant_8/src/crypto/ |
aes-gcm.c | 192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) 196 if (iv_len == 12) { 198 os_memcpy(J0, iv, iv_len); 199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len); 207 ghash(H, iv, iv_len, J0); 209 WPA_PUT_BE64(len_buf + 8, iv_len * 8); 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, 267 aes_gcm_prepare_j0(iv, iv_len, H, J0); 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, [all...] |
aes_wrap.h | 44 const u8 *iv, size_t iv_len, 49 const u8 *iv, size_t iv_len, 54 const u8 *iv, size_t iv_len,
|
/external/chromium_org/net/quic/crypto/ |
aes_128_gcm_12_decrypter_test.cc | 48 size_t iv_len; member in struct:__anon11301::TestGroupInfo 320 size_t iv_len; local 338 ASSERT_TRUE(DecodeHexString(test_vector[j].iv, iv, &iv_len, sizeof(iv))); 349 EXPECT_EQ(test_info.iv_len, iv_len * 8); 368 &decrypter, StringPiece(iv, iv_len),
|
aes_128_gcm_12_encrypter_test.cc | 48 size_t iv_len; member in struct:__anon11305::TestGroupInfo 272 size_t iv_len; local 290 ASSERT_TRUE(DecodeHexString(test_vector[j].iv, iv, &iv_len, sizeof(iv))); 301 EXPECT_EQ(test_info.iv_len, iv_len * 8); 310 &encrypter, StringPiece(iv, iv_len),
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
evp_locl.h | 134 key_len, iv_len, flags, init_key, cleanup, \ 137 nid##_##nmode, block_size, key_len, iv_len, \ 150 iv_len, flags, init_key, cleanup, set_asn1, \ 153 iv_len, flags, init_key, cleanup, set_asn1, get_asn1, ctrl) 156 iv_len, cbits, flags, init_key, cleanup, \ 159 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 163 iv_len, cbits, flags, init_key, cleanup, \ 166 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 176 nid, block_size, key_len, iv_len, cbits, flags, \ 178 BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, iv_len, flags, [all...] |
openbsd_hw.c | 138 assert(ctx->cipher->iv_len <= MAX_HW_IV); 174 if(ctx->cipher->iv_len) 178 memcpy(lb,&in[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len); 231 memcpy(ctx->iv,&out[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len); 233 memcpy(ctx->iv,lb,ctx->cipher->iv_len);
|
evp_lib.c | 223 return cipher->iv_len; 228 return ctx->cipher->iv_len;
|
evp_key.c | 125 niv=type->iv_len;
|
/external/openssl/crypto/evp/ |
evp_locl.h | 134 key_len, iv_len, flags, init_key, cleanup, \ 137 nid##_##nmode, block_size, key_len, iv_len, \ 150 iv_len, flags, init_key, cleanup, set_asn1, \ 153 iv_len, flags, init_key, cleanup, set_asn1, get_asn1, ctrl) 156 iv_len, cbits, flags, init_key, cleanup, \ 159 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 163 iv_len, cbits, flags, init_key, cleanup, \ 166 key_len, iv_len, flags, init_key, cleanup, set_asn1, \ 176 nid, block_size, key_len, iv_len, cbits, flags, \ 178 BLOCK_CIPHER_def_cbc(cname, kstruct, nid, block_size, key_len, iv_len, flags, [all...] |
openbsd_hw.c | 138 assert(ctx->cipher->iv_len <= MAX_HW_IV); 174 if(ctx->cipher->iv_len) 178 memcpy(lb,&in[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len); 231 memcpy(ctx->iv,&out[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len); 233 memcpy(ctx->iv,lb,ctx->cipher->iv_len);
|
evp_lib.c | 223 return cipher->iv_len; 228 return ctx->cipher->iv_len;
|
evp_key.c | 125 niv=type->iv_len;
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
d1_enc.c | 225 printf("\tEVP_CIPHER_CTX: %d buf_len, %d key_len [%d %d], %d iv_len\n", 228 ds->cipher->iv_len); 230 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
s2_enc.c | 105 OPENSSL_assert(c->iv_len <= (int)sizeof(s->session->key_arg));
|
/external/openssl/ssl/ |
d1_enc.c | 225 printf("\tEVP_CIPHER_CTX: %d buf_len, %d key_len [%d %d], %d iv_len\n", 228 ds->cipher->iv_len); 230 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
s2_enc.c | 105 OPENSSL_assert(c->iv_len <= (int)sizeof(s->session->key_arg));
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.h | 76 size_t iv_len; member in struct:eap_sake_parse_attr
|
ikev2_common.c | 496 size_t iv_len; local 515 iv_len = encr_alg->block_size; 523 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 530 pos = iv + iv_len; 598 size_t iv_len, pad_len; local 614 iv_len = encr_alg->block_size; 636 iv = wpabuf_put(msg, iv_len); 637 if (random_get_bytes(iv, iv_len)) { 642 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len; [all...] |
/external/openssh/ |
cipher-ctr.c | 136 aes_ctr.iv_len = AES_BLOCK_SIZE;
|
cipher-3des1.c | 174 ssh1_3des.iv_len = 0;
|
cipher-aes.c | 153 rijndal_cbc.iv_len = RIJNDAEL_BLOCKSIZE;
|
/external/chromium_org/third_party/openssl/openssl/crypto/pem/ |
pem_info.c | 367 OPENSSL_assert(strlen(objstr)+23+2*enc->iv_len+13 <= sizeof buf); 370 PEM_dek_info(buf,objstr,enc->iv_len,(char *)iv);
|
/external/openssl/crypto/pem/ |
pem_info.c | 367 OPENSSL_assert(strlen(objstr)+23+2*enc->iv_len+13 <= sizeof buf); 370 PEM_dek_info(buf,objstr,enc->iv_len,(char *)iv);
|