/external/openssl/crypto/pem/ |
pem_lib.c | 343 unsigned char iv[EVP_MAX_IV_LENGTH]; local 392 OPENSSL_assert(enc->iv_len <= (int)sizeof(iv)); 393 if (RAND_pseudo_bytes(iv,enc->iv_len) < 0) /* Generate a salt */ 395 /* The 'iv' is used as the iv and as a salt. It is 397 if (!EVP_BytesToKey(enc,EVP_md5(),iv,kstr,klen,1,key,NULL)) 406 PEM_dek_info(buf,objstr,enc->iv_len,(char *)iv); 411 if (!EVP_EncryptInit_ex(&ctx,enc,NULL,key,iv) 429 OPENSSL_cleanse(iv,sizeof(iv)); [all...] |
/external/regex-re2/util/ |
sparse_array.h | 113 inline const IndexValue& iv(int i) const; 260 SparseArray<Value>::iv(int i) const { function in class:re2::SparseArray
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.c | 375 u8 iv[AES_BLOCK_SIZE]; local 389 if (random_get_bytes(iv, AES_BLOCK_SIZE)) 391 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Encr(key, y)", 392 iv, AES_BLOCK_SIZE); 394 if (aes_128_cbc_encrypt(key, iv, pub, dh_len) < 0) 396 os_memcpy(ret_dhcomp, iv, AES_BLOCK_SIZE); 618 u8 *pos, *iv, *e; local 643 iv = pos; 644 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Prot()", iv, block_size) [all...] |
eap_sake_common.h | 75 const u8 *iv; member in struct:eap_sake_parse_attr
|
eap_sim_common.c | 738 attr->iv = apos + 2; 936 size_t encr_data_len, const u8 *iv, 941 if (!iv) { 942 wpa_printf(MSG_INFO, "EAP-SIM: Encrypted data, but no IV"); 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg 1118 msg->iv = (pos - wpabuf_head_u8(msg->buf)) + 4; 1119 if (random_get_bytes(wpabuf_mhead_u8(msg->buf) + msg->iv, 1121 msg->iv = 0; 1127 msg->iv = 0 [all...] |
ikev2_common.c | 189 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 248 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 497 const u8 *pos, *end, *iv, *integ; local 524 wpa_printf(MSG_INFO, "IKEV2: No room for IV or Integrity " 529 iv = encrypted; 530 pos = iv + iv_len; 561 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, 599 u8 *icv, *iv; local [all...] |
/hardware/qcom/keymaster/ |
keymaster_qcom.h | 45 #define KM_IV_LENGTH (16) /* AES128 CBC IV */ 55 uint8_t iv[KM_IV_LENGTH]; member in struct:qcom_km_key_blob
|
/packages/apps/Gallery2/src/com/android/photos/ |
AlbumFragment.java | 90 ImageView iv = (ImageView) mHeaderView.findViewById(R.id.album_header_image); local 98 iv.setImageDrawable(mLoaderCompatShim.drawableForItem(mAdapter.getItem(0), null));
|
/packages/apps/Music/src/com/android/music/ |
MediaPickerActivity.java | 244 ImageView iv = (ImageView) v.findViewById(R.id.icon); local 245 iv.setVisibility(View.VISIBLE); 246 ViewGroup.LayoutParams p = iv.getLayoutParams(); 252 iv = (ImageView) v.findViewById(R.id.play_indicator); 253 iv.setVisibility(View.GONE); 283 ImageView iv = (ImageView) view.findViewById(R.id.icon);; local 285 iv.setImageResource(R.drawable.midi); 289 iv.setImageResource(R.drawable.ic_search_category_music_song); 291 iv.setImageResource(R.drawable.movie); 293 iv.setImageResource(0) [all...] |
/packages/apps/Camera2/src/com/android/camera/data/ |
LocalMediaData.java | 748 ImageView iv = new ImageView(activity); local 749 iv.setLayoutParams(new FrameLayout.LayoutParams( 752 fillImageView(activity, iv, decodeWidth, decodeHeight, placeHolder, 770 f.addView(iv); [all...] |
/development/samples/Vault/src/com/example/android/vault/ |
EncryptedDocument.java | 57 * Each section is encrypted using AES-128 with a random IV, and authenticated 277 final IvParameterSpec ivSpec = new IvParameterSpec(section.iv); 317 mRandom.nextBytes(section.iv); 319 final IvParameterSpec ivSpec = new IvParameterSpec(section.iv); 360 final byte[] iv = new byte[DATA_KEY_LENGTH]; field in class:EncryptedDocument.Section 365 f.readFully(iv); 371 f.write(iv);
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 213 byte[] iv = null; 216 iv = new byte[8]; 217 sr.nextBytes(iv); 218 ivAVP = new IvParameterSpec(iv); 226 assertTrue("IVs differ", Arrays.equals(cipherIV, iv)); 239 byte[] iv = null; 242 iv = new byte[8]; 243 sr.nextBytes(iv); 244 ivAVP = new IvParameterSpec(iv); 252 assertTrue("IVs differ", Arrays.equals(cipherIV, iv)); 270 IvParameterSpec iv = new IvParameterSpec(ivMaterial); local 319 IvParameterSpec iv = new IvParameterSpec(ivMaterial); local [all...] |
/external/chromium_org/ppapi/c/private/ |
pp_content_decryptor.h | 123 uint8_t iv[16]; member in struct:PP_EncryptedBlockInfo
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pk7_doit.c | 328 unsigned char iv[EVP_MAX_IV_LENGTH]; local 342 if (RAND_pseudo_bytes(iv,ivlen) <= 0) 348 if (EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, 1) <= 0) 506 unsigned char iv[EVP_MAX_IV_LENGTH];
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
d1_clnt.c | 1054 unsigned char iv[EVP_MAX_IV_LENGTH]; local 1144 ** EVP_EncryptInit_ex(&ciph_ctx,NULL, key,iv); 1147 memset(iv, 0, sizeof iv); /* per RFC 1510 */ 1149 kssl_ctx->key,iv); [all...] |
d1_srvr.c | 1612 unsigned char iv[EVP_MAX_IV_LENGTH]; local [all...] |
s3_enc.c | 221 unsigned char *ms,*key,*iv,*er1,*er2; local 330 iv= &(p[ n]); n+=k+k; 339 iv= &(p[ n]); n+=k; 354 /* In here I set both the read and write key/iv to the 370 iv= &(exp_iv[0]); 376 EVP_CipherInit_ex(dd,c,NULL,key,iv,(which & SSL3_CC_WRITE)); 434 * known-IV problem (http://www.openssl.org/~bodo/tls-cbc.txt)
|
/external/dropbear/ |
keyimport.c | 356 char iv[32]; member in struct:openssh_key 374 memset(ret->iv, 0, sizeof(ret->iv)); 435 ret->iv[i] = j; 439 errmsg = "Expected 16-digit iv in DEK-Info"; 535 * Derive encryption key from passphrase and iv/salt: 537 * - let block A equal MD5(passphrase || iv) 538 * - let block B equal MD5(A || passphrase || iv) 539 * - block C would be MD5(B || passphrase || iv) and so on 547 MD5Update(&md5c, (unsigned char *)key->iv, 8) 704 unsigned char iv[8]; local [all...] |
/external/icu4c/test/cintltst/ |
cintltst.c | 704 UVersionInfo iv; local 710 u_getVersion(iv); 711 return uprv_memcmp(iv, ov, U_MAX_VERSION_LENGTH) < 0;
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
AbstractSampleEncryptionBox.java | 66 e.iv = new byte[useThisIvSize < 0 ? 8 : useThisIvSize]; // default to 8 67 content.get(e.iv); 155 System.arraycopy(entry.iv, 0, ivFull, ivSize - entry.iv.length, entry.iv.length); 158 // just put the iv - i don't know any better 159 byteBuffer.put(entry.iv); 195 public byte[] iv; field in class:AbstractSampleEncryptionBox.Entry 203 size = iv.length; 276 if (!new BigInteger(iv).equals(new BigInteger(entry.iv))) [all...] |
/external/openssh/ |
kex.h | 94 u_char *iv; member in struct:Enc
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 328 unsigned char iv[EVP_MAX_IV_LENGTH]; local 342 if (RAND_pseudo_bytes(iv,ivlen) <= 0) 348 if (EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, 1) <= 0) 506 unsigned char iv[EVP_MAX_IV_LENGTH];
|
/external/openssl/ssl/ |
d1_clnt.c | 1054 unsigned char iv[EVP_MAX_IV_LENGTH]; local 1144 ** EVP_EncryptInit_ex(&ciph_ctx,NULL, key,iv); 1147 memset(iv, 0, sizeof iv); /* per RFC 1510 */ 1149 kssl_ctx->key,iv); [all...] |
d1_srvr.c | 1612 unsigned char iv[EVP_MAX_IV_LENGTH]; local [all...] |
s3_enc.c | 221 unsigned char *ms,*key,*iv,*er1,*er2; local 330 iv= &(p[ n]); n+=k+k; 339 iv= &(p[ n]); n+=k; 354 /* In here I set both the read and write key/iv to the 370 iv= &(exp_iv[0]); 376 EVP_CipherInit_ex(dd,c,NULL,key,iv,(which & SSL3_CC_WRITE)); 434 * known-IV problem (http://www.openssl.org/~bodo/tls-cbc.txt)
|