HomeSort by relevance Sort by last modified time
    Searched defs:iv (Results 126 - 150 of 238) sorted by null

1 2 3 4 56 7 8 910

  /external/openssl/crypto/pem/
pem_lib.c 343 unsigned char iv[EVP_MAX_IV_LENGTH]; local
392 OPENSSL_assert(enc->iv_len <= (int)sizeof(iv));
393 if (RAND_pseudo_bytes(iv,enc->iv_len) < 0) /* Generate a salt */
395 /* The 'iv' is used as the iv and as a salt. It is
397 if (!EVP_BytesToKey(enc,EVP_md5(),iv,kstr,klen,1,key,NULL))
406 PEM_dek_info(buf,objstr,enc->iv_len,(char *)iv);
411 if (!EVP_EncryptInit_ex(&ctx,enc,NULL,key,iv)
429 OPENSSL_cleanse(iv,sizeof(iv));
    [all...]
  /external/regex-re2/util/
sparse_array.h 113 inline const IndexValue& iv(int i) const;
260 SparseArray<Value>::iv(int i) const { function in class:re2::SparseArray
  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.c 375 u8 iv[AES_BLOCK_SIZE]; local
389 if (random_get_bytes(iv, AES_BLOCK_SIZE))
391 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Encr(key, y)",
392 iv, AES_BLOCK_SIZE);
394 if (aes_128_cbc_encrypt(key, iv, pub, dh_len) < 0)
396 os_memcpy(ret_dhcomp, iv, AES_BLOCK_SIZE);
618 u8 *pos, *iv, *e; local
643 iv = pos;
644 wpa_hexdump(MSG_DEBUG, "EAP-EKE: IV for Prot()", iv, block_size)
    [all...]
eap_sake_common.h 75 const u8 *iv; member in struct:eap_sake_parse_attr
eap_sim_common.c 738 attr->iv = apos + 2;
936 size_t encr_data_len, const u8 *iv,
941 if (!iv) {
942 wpa_printf(MSG_INFO, "EAP-SIM: Encrypted data, but no IV");
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg
1118 msg->iv = (pos - wpabuf_head_u8(msg->buf)) + 4;
1119 if (random_get_bytes(wpabuf_mhead_u8(msg->buf) + msg->iv,
1121 msg->iv = 0;
1127 msg->iv = 0
    [all...]
ikev2_common.c 189 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
248 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
497 const u8 *pos, *end, *iv, *integ; local
524 wpa_printf(MSG_INFO, "IKEV2: No room for IV or Integrity "
529 iv = encrypted;
530 pos = iv + iv_len;
561 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos,
599 u8 *icv, *iv; local
    [all...]
  /hardware/qcom/keymaster/
keymaster_qcom.h 45 #define KM_IV_LENGTH (16) /* AES128 CBC IV */
55 uint8_t iv[KM_IV_LENGTH]; member in struct:qcom_km_key_blob
  /packages/apps/Gallery2/src/com/android/photos/
AlbumFragment.java 90 ImageView iv = (ImageView) mHeaderView.findViewById(R.id.album_header_image); local
98 iv.setImageDrawable(mLoaderCompatShim.drawableForItem(mAdapter.getItem(0), null));
  /packages/apps/Music/src/com/android/music/
MediaPickerActivity.java 244 ImageView iv = (ImageView) v.findViewById(R.id.icon); local
245 iv.setVisibility(View.VISIBLE);
246 ViewGroup.LayoutParams p = iv.getLayoutParams();
252 iv = (ImageView) v.findViewById(R.id.play_indicator);
253 iv.setVisibility(View.GONE);
283 ImageView iv = (ImageView) view.findViewById(R.id.icon);; local
285 iv.setImageResource(R.drawable.midi);
289 iv.setImageResource(R.drawable.ic_search_category_music_song);
291 iv.setImageResource(R.drawable.movie);
293 iv.setImageResource(0)
    [all...]
  /packages/apps/Camera2/src/com/android/camera/data/
LocalMediaData.java 748 ImageView iv = new ImageView(activity); local
749 iv.setLayoutParams(new FrameLayout.LayoutParams(
752 fillImageView(activity, iv, decodeWidth, decodeHeight, placeHolder,
770 f.addView(iv);
    [all...]
  /development/samples/Vault/src/com/example/android/vault/
EncryptedDocument.java 57 * Each section is encrypted using AES-128 with a random IV, and authenticated
277 final IvParameterSpec ivSpec = new IvParameterSpec(section.iv);
317 mRandom.nextBytes(section.iv);
319 final IvParameterSpec ivSpec = new IvParameterSpec(section.iv);
360 final byte[] iv = new byte[DATA_KEY_LENGTH]; field in class:EncryptedDocument.Section
365 f.readFully(iv);
371 f.write(iv);
  /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
CipherTest.java 213 byte[] iv = null;
216 iv = new byte[8];
217 sr.nextBytes(iv);
218 ivAVP = new IvParameterSpec(iv);
226 assertTrue("IVs differ", Arrays.equals(cipherIV, iv));
239 byte[] iv = null;
242 iv = new byte[8];
243 sr.nextBytes(iv);
244 ivAVP = new IvParameterSpec(iv);
252 assertTrue("IVs differ", Arrays.equals(cipherIV, iv));
270 IvParameterSpec iv = new IvParameterSpec(ivMaterial); local
319 IvParameterSpec iv = new IvParameterSpec(ivMaterial); local
    [all...]
  /external/chromium_org/ppapi/c/private/
pp_content_decryptor.h 123 uint8_t iv[16]; member in struct:PP_EncryptedBlockInfo
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/
pk7_doit.c 328 unsigned char iv[EVP_MAX_IV_LENGTH]; local
342 if (RAND_pseudo_bytes(iv,ivlen) <= 0)
348 if (EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, 1) <= 0)
506 unsigned char iv[EVP_MAX_IV_LENGTH];
  /external/chromium_org/third_party/openssl/openssl/ssl/
d1_clnt.c 1054 unsigned char iv[EVP_MAX_IV_LENGTH]; local
1144 ** EVP_EncryptInit_ex(&ciph_ctx,NULL, key,iv);
1147 memset(iv, 0, sizeof iv); /* per RFC 1510 */
1149 kssl_ctx->key,iv);
    [all...]
d1_srvr.c 1612 unsigned char iv[EVP_MAX_IV_LENGTH]; local
    [all...]
s3_enc.c 221 unsigned char *ms,*key,*iv,*er1,*er2; local
330 iv= &(p[ n]); n+=k+k;
339 iv= &(p[ n]); n+=k;
354 /* In here I set both the read and write key/iv to the
370 iv= &(exp_iv[0]);
376 EVP_CipherInit_ex(dd,c,NULL,key,iv,(which & SSL3_CC_WRITE));
434 * known-IV problem (http://www.openssl.org/~bodo/tls-cbc.txt)
  /external/dropbear/
keyimport.c 356 char iv[32]; member in struct:openssh_key
374 memset(ret->iv, 0, sizeof(ret->iv));
435 ret->iv[i] = j;
439 errmsg = "Expected 16-digit iv in DEK-Info";
535 * Derive encryption key from passphrase and iv/salt:
537 * - let block A equal MD5(passphrase || iv)
538 * - let block B equal MD5(A || passphrase || iv)
539 * - block C would be MD5(B || passphrase || iv) and so on
547 MD5Update(&md5c, (unsigned char *)key->iv, 8)
704 unsigned char iv[8]; local
    [all...]
  /external/icu4c/test/cintltst/
cintltst.c 704 UVersionInfo iv; local
710 u_getVersion(iv);
711 return uprv_memcmp(iv, ov, U_MAX_VERSION_LENGTH) < 0;
  /external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/
AbstractSampleEncryptionBox.java 66 e.iv = new byte[useThisIvSize < 0 ? 8 : useThisIvSize]; // default to 8
67 content.get(e.iv);
155 System.arraycopy(entry.iv, 0, ivFull, ivSize - entry.iv.length, entry.iv.length);
158 // just put the iv - i don't know any better
159 byteBuffer.put(entry.iv);
195 public byte[] iv; field in class:AbstractSampleEncryptionBox.Entry
203 size = iv.length;
276 if (!new BigInteger(iv).equals(new BigInteger(entry.iv)))
    [all...]
  /external/openssh/
kex.h 94 u_char *iv; member in struct:Enc
  /external/openssl/crypto/pkcs7/
pk7_doit.c 328 unsigned char iv[EVP_MAX_IV_LENGTH]; local
342 if (RAND_pseudo_bytes(iv,ivlen) <= 0)
348 if (EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, 1) <= 0)
506 unsigned char iv[EVP_MAX_IV_LENGTH];
  /external/openssl/ssl/
d1_clnt.c 1054 unsigned char iv[EVP_MAX_IV_LENGTH]; local
1144 ** EVP_EncryptInit_ex(&ciph_ctx,NULL, key,iv);
1147 memset(iv, 0, sizeof iv); /* per RFC 1510 */
1149 kssl_ctx->key,iv);
    [all...]
d1_srvr.c 1612 unsigned char iv[EVP_MAX_IV_LENGTH]; local
    [all...]
s3_enc.c 221 unsigned char *ms,*key,*iv,*er1,*er2; local
330 iv= &(p[ n]); n+=k+k;
339 iv= &(p[ n]); n+=k;
354 /* In here I set both the read and write key/iv to the
370 iv= &(exp_iv[0]);
376 EVP_CipherInit_ex(dd,c,NULL,key,iv,(which & SSL3_CC_WRITE));
434 * known-IV problem (http://www.openssl.org/~bodo/tls-cbc.txt)

Completed in 544 milliseconds

1 2 3 4 56 7 8 910