HomeSort by relevance Sort by last modified time
    Searched defs:iv (Results 101 - 125 of 238) sorted by null

1 2 3 45 6 7 8 910

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/
BaseCipherSpi.java 54 private byte[] iv; field in class:BaseCipherSpi
  /external/chromium_org/crypto/
encryptor_unittest.cc 21 // The IV must be exactly as long as the cipher block size.
22 std::string iv("the iv: 16 bytes");
23 EXPECT_EQ(16U, iv.size());
24 EXPECT_TRUE(encryptor.Init(key.get(), crypto::Encryptor::CBC, iv));
65 // The IV must be exactly as long as the cipher block size.
66 std::string iv("the iv: 16 bytes");
67 EXPECT_EQ(16U, iv.size());
68 EXPECT_TRUE(encryptor.Init(key.get(), crypto::Encryptor::CBC, iv));
434 std::string iv = "Sweet Sixteen IV"; local
462 std::string iv = "Sweet Sixteen IV"; local
490 std::string iv = "Sweet Sixteen IV"; local
504 std::string iv = "OnlyForteen :("; local
515 std::string iv = "Sweet Sixteen IV"; local
    [all...]
  /external/chromium_org/net/quic/crypto/
aes_128_gcm_12_decrypter_test.cc 25 // IV = 113b9785971864c83b01c787
33 // IV = 907763b19b9b4ab6bd4f0281
44 // Describes a group of test vectors that all have a given key length, IV
60 const char* iv; member in struct:__anon11301::TestVector
319 char iv[1024]; local
338 ASSERT_TRUE(DecodeHexString(test_vector[j].iv, iv, &iv_len, sizeof(iv)));
368 &decrypter, StringPiece(iv, iv_len),
aes_128_gcm_12_encrypter_test.cc 25 // IV = 3c819d9a9bed087615030b65
33 // IV = ffd2b598feabc9019262d2be
44 // Describes a group of test vectors that all have a given key length, IV
59 const char* iv; member in struct:__anon11305::TestVector
271 char iv[1024]; local
290 ASSERT_TRUE(DecodeHexString(test_vector[j].iv, iv, &iv_len, sizeof(iv)));
310 &encrypter, StringPiece(iv, iv_len),
  /external/chromium_org/third_party/WebKit/Source/modules/crypto/
NormalizeAlgorithm.cpp 165 RefPtr<ArrayBufferView> iv; local
166 if (!raw.get("iv", iv) || !iv)
169 if (iv->byteLength() != 16)
172 return adoptPtr(new WebKit::WebCryptoAesCbcParams(static_cast<unsigned char*>(iv->baseAddress()), iv->byteLength()));
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
evp_test.c 137 const unsigned char *iv,int in,
150 hexdump(stdout,"IV",iv,in);
163 if(!EVP_EncryptInit_ex(&ctx,c,NULL,key,iv))
202 if(!EVP_DecryptInit_ex(&ctx,c,NULL,key,iv))
245 const unsigned char *iv,int in,
256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec);
369 unsigned char *iv,*key,*plaintext,*ciphertext; local
380 iv=ustrsep(&p,":");
392 in=convert(iv);
    [all...]
e_aes_cbc_hmac_sha1.c 112 const AES_KEY *key, unsigned char iv[16],
119 const unsigned char *iv, int enc)
185 iv = 0, /* explicit IV in TLS 1.1 and later */ local
204 iv = AES_BLOCK_SIZE;
207 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) {
208 SHA1_Update(&key->md,in+iv,sha_off);
211 ctx->iv,&key->md,in+iv+sha_off)
    [all...]
  /external/openssl/crypto/evp/
evp_test.c 137 const unsigned char *iv,int in,
150 hexdump(stdout,"IV",iv,in);
163 if(!EVP_EncryptInit_ex(&ctx,c,NULL,key,iv))
202 if(!EVP_DecryptInit_ex(&ctx,c,NULL,key,iv))
245 const unsigned char *iv,int in,
256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec);
369 unsigned char *iv,*key,*plaintext,*ciphertext; local
380 iv=ustrsep(&p,":");
392 in=convert(iv);
    [all...]
e_aes_cbc_hmac_sha1.c 112 const AES_KEY *key, unsigned char iv[16],
119 const unsigned char *iv, int enc)
185 iv = 0, /* explicit IV in TLS 1.1 and later */ local
204 iv = AES_BLOCK_SIZE;
207 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) {
208 SHA1_Update(&key->md,in+iv,sha_off);
211 ctx->iv,&key->md,in+iv+sha_off)
    [all...]
  /external/wpa_supplicant_8/src/wps/
wps_attr_build.c 342 u8 *iv, *data; local
353 iv = wpabuf_put(msg, block_size);
354 if (random_get_bytes(iv, block_size) < 0)
359 if (aes_128_cbc_encrypt(wps->keywrapkey, iv, data, wpabuf_len(plain)))
  /frameworks/av/media/libmedia/
ICrypto.cpp 97 const uint8_t iv[16],
114 if (iv == NULL) {
115 iv = kDummy;
119 data.write(iv, 16);
234 uint8_t iv[16]; local
235 data.read(iv, sizeof(iv));
261 iv,
  /frameworks/base/tools/layoutlib/bridge/src/com/android/layoutlib/bridge/impl/binding/
AdapterHelper.java 126 ImageView iv = (ImageView) view; local
133 resolvedRef, ViewAttribute.SRC, iv.getDrawable());
  /packages/apps/Gallery2/jni/filters/
hsv.c 86 int H,X,ih,is,iv; local
108 iv=(int)cv;
111 X = ((iv*is)/k2)*(k2- abs(6*ih- 2*(H>>1)*k2 - k2)) ;
114 X=( (X+iv*(k1 - is ))/k1 + k3 ) >> ABITS;
  /packages/apps/Stk/src/com/android/stk/
ToneDialog.java 78 ImageView iv = (ImageView) findViewById(R.id.icon); local
83 iv.setImageResource(com.android.internal.R.drawable.ic_volume);
85 iv.setImageBitmap(toneMsg.icon);
  /packages/apps/Camera2/src/com/android/camera/ui/
ModuleSwitcher.java 300 RotateImageView iv = (RotateImageView) content.getChildAt(i); local
301 iv.setOrientation(degree, animate);
  /cts/tests/tests/widget/src/android/widget/cts/
ImageSwitcherTest.java 58 ImageView iv = new ImageView(getContext()); local
59 imageSwitcher.addView(iv);
63 assertSame(iv, imageSwitcher.getCurrentView());
74 assertSame(iv, imageSwitcher.getCurrentView());
88 ImageView iv = new ImageView(getContext()); local
89 imageSwitcher.addView(iv);
100 assertSame(iv, imageSwitcher.getCurrentView());
115 assertSame(iv, imageSwitcher.getCurrentView());
130 ImageView iv = new ImageView(getContext()); local
131 imageSwitcher.addView(iv);
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/
BaseBlockCipher.java 422 // a note on iv's - if ivLength is zero the IV gets ignored (we don't use it).
442 IvParameterSpec iv = (IvParameterSpec)params; local
444 param = new ParametersWithIV(param, iv.getIV());
474 throw new InvalidAlgorithmParameterException("IV must be " + ivLength + " bytes long.");
492 throw new InvalidAlgorithmParameterException("ECB mode does not use an IV");
573 byte[] iv = new byte[ivLength];
575 ivRandom.nextBytes(iv);
576 param = new ParametersWithIV(param, iv);
581 throw new InvalidAlgorithmParameterException("no IV set when one expected")
    [all...]
BaseWrapCipher.java 66 private byte[] iv; field in class:BaseWrapCipher
93 return (byte[])iv.clone();
160 IvParameterSpec iv = (IvParameterSpec) params; local
161 param = new ParametersWithIV(param, iv.getIV());
166 iv = new byte[ivSize];
167 random.nextBytes(iv);
168 param = new ParametersWithIV(param, iv);
  /external/chromium_org/net/third_party/nss/ssl/
preenc.h 29 unsigned char iv[24]; member in struct:PEFortezzaHeaderStr
36 unsigned char iv[24]; member in struct:PEFortezzaGeneratedHeaderStr
  /external/chromium_org/third_party/openssl/openssl/apps/
enc.c 111 unsigned char key[EVP_MAX_KEY_LENGTH],iv[EVP_MAX_IV_LENGTH]; local
275 else if (strcmp(*argv,"-iv") == 0)
310 BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv");
311 BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]");
557 strlen(str),1,key,iv);
567 if ((hiv != NULL) && !set_hex(hiv,iv,sizeof iv))
569 BIO_printf(bio_err,"invalid hex iv value\n");
575 /* No IV was explicitly set and no IV was generate
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/pem/
pem_lib.c 343 unsigned char iv[EVP_MAX_IV_LENGTH]; local
392 OPENSSL_assert(enc->iv_len <= (int)sizeof(iv));
393 if (RAND_pseudo_bytes(iv,enc->iv_len) < 0) /* Generate a salt */
395 /* The 'iv' is used as the iv and as a salt. It is
397 if (!EVP_BytesToKey(enc,EVP_md5(),iv,kstr,klen,1,key,NULL))
406 PEM_dek_info(buf,objstr,enc->iv_len,(char *)iv);
411 if (!EVP_EncryptInit_ex(&ctx,enc,NULL,key,iv)
429 OPENSSL_cleanse(iv,sizeof(iv));
    [all...]
  /external/chromium_org/third_party/re2/util/
sparse_array.h 113 inline const IndexValue& iv(int i) const;
260 SparseArray<Value>::iv(int i) const { function in class:re2::SparseArray
  /external/dropbear/libtomcrypt/demos/
tv_gen.c 703 unsigned char tweak[16], key[16], iv[16], buf[1024]; local
709 tweak[x] = key[x] = iv[x] = x;
714 if ((err = lrw_start(find_cipher("aes"), iv, key, 16, tweak, 0, &lrw)) != CRYPT_OK) {
736 /* reset IV */
737 if ((err = lrw_setiv(iv, 16, &lrw)) != CRYPT_OK) {
738 fprintf(stderr, "Error setting IV: %s\n", error_to_string(err));
742 /* copy new tweak, iv and key */
745 iv[y] = buf[(y+16)%x];
  /external/opencv/cv/src/
cvgeometry.cpp 243 CvPoint iv; local
251 CV_READ_SEQ_ELEM( iv, reader );
252 v = cvPointTo32f( iv );
267 CV_READ_SEQ_ELEM( iv, reader );
268 v = cvPointTo32f( iv );
304 CV_READ_SEQ_ELEM( iv, reader );
305 v = cvPointTo32f( iv );
  /external/openssl/apps/
enc.c 111 unsigned char key[EVP_MAX_KEY_LENGTH],iv[EVP_MAX_IV_LENGTH]; local
275 else if (strcmp(*argv,"-iv") == 0)
310 BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv");
311 BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]");
557 strlen(str),1,key,iv);
567 if ((hiv != NULL) && !set_hex(hiv,iv,sizeof iv))
569 BIO_printf(bio_err,"invalid hex iv value\n");
575 /* No IV was explicitly set and no IV was generate
    [all...]

Completed in 1465 milliseconds

1 2 3 45 6 7 8 910