HomeSort by relevance Sort by last modified time
    Searched defs:iv (Results 151 - 175 of 238) sorted by null

1 2 3 4 5 67 8 910

  /external/srtp/srtp/
srtp.c 743 v128_t iv; local
745 iv.v32[0] = 0;
746 iv.v32[1] = hdr->ssrc;
748 iv.v64[1] = be64_to_cpu(make64((high32(est) << 16) | (low32(est) >> 16),
751 iv.v64[1] = be64_to_cpu(est << 16);
753 status = cipher_set_iv(stream->rtp_cipher, &iv);
756 v128_t iv; local
760 iv.v32[0] = 0;
761 iv.v32[1] = 0;
763 iv.v64[0] = 0
848 v128_t iv; local
1557 v128_t iv; local
1566 v128_t iv; local
1754 v128_t iv; local
1763 v128_t iv; local
    [all...]
  /external/wpa_supplicant_8/src/ap/
iapp.c 156 u8 iv[8]; member in struct:iapp_send_security_block
164 u8 iv[8]; member in struct:iapp_ack_security_block
  /frameworks/base/core/jni/
android_net_LocalSocketImpl.cpp 501 struct iovec iv; local
508 memset(&iv, 0, sizeof(iv));
510 iv.iov_base = buf;
511 iv.iov_len = len;
513 msg.msg_iov = &iv;
605 struct iovec iv; local
606 memset(&iv, 0, sizeof(iv));
608 iv.iov_base = buffer
    [all...]
  /frameworks/base/media/java/android/media/
MediaCodec.java 397 iv = newIV;
420 public byte[] iv; field in class:MediaCodec.CryptoInfo
436 builder.append("], iv [");
438 builder.append(hexdigits.charAt((iv[i] & 0xf0) >> 4));
439 builder.append(hexdigits.charAt(iv[i] & 0x0f));
  /packages/apps/VideoEditor/src/com/android/videoeditor/
ProjectPickerAdapter.java 137 ImageView iv = (ImageView) v.findViewById(R.id.thumbnail); local
152 thumbnail = getThumbnail(project.getPath(), iv, title, duration);
157 iv.setImageBitmap(thumbnail);
  /external/chromium_org/crypto/
openpgp_symmetric_encryption.cc 150 // in ECB mode and with no IV.
462 // using |decryption_context| and assumes an IV of all zeros.
713 uint8 prefix[kBlockSize + 2], fre[kBlockSize], iv[kBlockSize]; local
714 crypto::RandBytes(iv, kBlockSize);
723 prefix[i] = iv[i] ^ fre[i];
726 prefix[kBlockSize] = iv[kBlockSize - 2] ^ fre[0];
727 prefix[kBlockSize + 1] = iv[kBlockSize - 1] ^ fre[1];
737 HASH_Update(hash_context, iv, sizeof(iv));
738 HASH_Update(hash_context, iv + kBlockSize - 2, 2)
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/des/
des.c 368 DES_cblock iv,iv2; local
463 memset(iv,0,sizeof(iv));
527 (long)l,ks,ks2,&iv,
536 (long)l,&ks,&iv,do_encrypt);
537 if (l >= 8) memcpy(iv,&(obuf[l-8]),8);
602 (long)l,ks,ks2,&iv,
609 (long)l,&ks,&iv,do_encrypt);
610 if (l >= 8) memcpy(iv,&(buf[l-8]),8);
673 OPENSSL_cleanse(iv,sizeof(iv))
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
e_aes.c 77 int iv_set; /* Set if an iv is set */
79 unsigned char *iv; /* Temporary IV store */ member in struct:__anon15543
80 int ivlen; /* IV length */
94 const unsigned char iv[16]);
101 int iv_set; /* Set if an iv is set */
137 const AES_KEY *key2, const unsigned char iv[16]);
140 const AES_KEY *key2, const unsigned char iv[16]);
150 const unsigned char iv[16]);
153 const unsigned char iv[16])
    [all...]
  /external/chromium_org/third_party/openssl/openssl/ssl/
t1_enc.c 328 unsigned char *ms,*key,*iv; local
459 /* If GCM mode only part of IV comes from PRF */
469 iv= &(p[ n]); n+=k+k;
479 iv= &(p[ n]); n+=k;
506 /* In here I set both the read and write key/iv to the
528 iv=iv1;
530 iv= &(iv1[k]);
538 printf("EVP_CipherInit_ex(dd,c,key=,iv=,which)\n");
541 printf("\t iv= "); for (i=0; i<c->iv_len; i++) printf("%02x", iv[i])
    [all...]
  /external/ipsec-tools/src/racoon/
eaytest.c 600 vchar_t *buf, *iv, *res1, *res2; local
601 iv = vmalloc(iv_length);
615 memcpy(iv->v, iv0->v, iv_length);
616 res1 = (encrypt)(buf, key, iv);
624 memcpy(iv->v, iv0->v, iv_length);
625 res2 = (decrypt)(res1, key, iv);
642 vfree(iv);
  /external/openssh/
monitor_wrap.c 496 enc->iv = buffer_get_string(&b, &len);
556 packet_get_keyiv(mode, enc->iv, enc->block_size);
557 buffer_put_string(&b, enc->iv, enc->block_size);
607 u_char iv[24]; local
615 debug3("%s: Sending ssh1 KEY+IV", __func__);
624 packet_get_keyiv(MODE_OUT, iv, ivlen);
625 buffer_put_string(&m, iv, ivlen);
627 packet_get_keyiv(MODE_IN, iv, ivlen);
628 buffer_put_string(&m, iv, ivlen);
    [all...]
  /external/openssl/crypto/des/
des.c 368 DES_cblock iv,iv2; local
463 memset(iv,0,sizeof(iv));
527 (long)l,ks,ks2,&iv,
536 (long)l,&ks,&iv,do_encrypt);
537 if (l >= 8) memcpy(iv,&(obuf[l-8]),8);
602 (long)l,ks,ks2,&iv,
609 (long)l,&ks,&iv,do_encrypt);
610 if (l >= 8) memcpy(iv,&(buf[l-8]),8);
673 OPENSSL_cleanse(iv,sizeof(iv))
    [all...]
  /external/openssl/crypto/evp/
e_aes.c 77 int iv_set; /* Set if an iv is set */
79 unsigned char *iv; /* Temporary IV store */ member in struct:__anon25991
80 int ivlen; /* IV length */
94 const unsigned char iv[16]);
101 int iv_set; /* Set if an iv is set */
137 const AES_KEY *key2, const unsigned char iv[16]);
140 const AES_KEY *key2, const unsigned char iv[16]);
150 const unsigned char iv[16]);
153 const unsigned char iv[16])
    [all...]
  /external/openssl/ssl/
t1_enc.c 328 unsigned char *ms,*key,*iv; local
459 /* If GCM mode only part of IV comes from PRF */
469 iv= &(p[ n]); n+=k+k;
479 iv= &(p[ n]); n+=k;
506 /* In here I set both the read and write key/iv to the
528 iv=iv1;
530 iv= &(iv1[k]);
538 printf("EVP_CipherInit_ex(dd,c,key=,iv=,which)\n");
541 printf("\t iv= "); for (i=0; i<c->iv_len; i++) printf("%02x", iv[i])
    [all...]
  /external/oprofile/gui/
oprof_start.cpp 176 QIntValidator * iv; local
177 iv = new QIntValidator(OP_MIN_BUF_SIZE, OP_MAX_BUF_SIZE, buffer_size_edit);
178 buffer_size_edit->setValidator(iv);
179 iv = new QIntValidator(OP_MIN_NOTE_TABLE_SIZE, OP_MAX_NOTE_TABLE_SIZE, note_table_size_edit);
180 note_table_size_edit->setValidator(iv);
181 iv = new QIntValidator(0, INT_MAX, callgraph_depth_edit);
182 callgraph_depth_edit->setValidator(iv);
183 iv = new QIntValidator(0, INT_MAX, buffer_watershed_edit);
184 buffer_watershed_edit->setValidator(iv);
185 iv = new QIntValidator(0, OP_MAX_CPU_BUF_SIZE, cpu_buffer_size_edit)
    [all...]
  /external/tcpdump/
print-802_11.c 143 u_int32_t iv; local
147 iv = EXTRACT_LE_32BITS(p);
149 printf("Data IV:%3x Pad %x KeyID %x", IV_IV(iv), IV_PAD(iv),
150 IV_KEYID(iv));
  /frameworks/av/media/libmedia/
IDrm.cpp 319 Vector<uint8_t> const &iv,
327 writeVector(data, iv);
338 Vector<uint8_t> const &iv,
346 writeVector(data, iv);
675 Vector<uint8_t> sessionId, keyId, input, iv, output; local
679 readVector(data, iv);
680 uint32_t result = encrypt(sessionId, keyId, input, iv, output);
689 Vector<uint8_t> sessionId, keyId, input, iv, output; local
693 readVector(data, iv);
694 uint32_t result = decrypt(sessionId, keyId, input, iv, output)
    [all...]
  /frameworks/av/media/libstagefright/
MediaCodec.cpp 250 const uint8_t iv[16],
265 msg->setPointer("iv", (void *)iv);
1554 const uint8_t *iv; local
    [all...]
  /frameworks/av/media/libstagefright/httplive/
PlaylistFetcher.cpp 223 AString iv; local
224 if (itemMeta->findString("cipher-iv", &iv)) {
225 if ((!iv.startsWith("0x") && !iv.startsWith("0X"))
226 || iv.size() != 16 * 2 + 2) {
227 ALOGE("malformed cipher IV '%s'.", iv.c_str());
233 char c1 = tolower(iv.c_str()[2 + 2 * i]);
234 char c2 = tolower(iv.c_str()[3 + 2 * i])
    [all...]
  /frameworks/base/media/jni/
android_media_MediaCodec.cpp 166 const uint8_t iv[16],
172 index, offset, subSamples, numSubSamples, key, iv, mode,
600 jbyte *iv = NULL; local
664 iv = env->GetByteArrayElements(ivObj, &isCopy);
674 (const uint8_t *)key, (const uint8_t *)iv,
681 if (iv != NULL) {
682 env->ReleaseByteArrayElements(ivObj, iv, 0);
683 iv = NULL;
909 gFields.cryptoInfoIVID = env->GetFieldID(clazz.get(), "iv", "[B");
  /frameworks/rs/driver/runtime/
rs_cl.c 1029 int32_t iv; member in union:__anon32453
1054 int32_t iv = (int)v; local
1068 int2 iv = convert_int2(v); local
1083 int4 iv = convert_int4(v); local
    [all...]
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
eapol.h 78 unsigned char iv[EAPOL_KEY_IV_LEN]; /* Key IV */ member in struct:__anon32662
111 unsigned char iv[EAPOL_WPA_KEY_IV_LEN]; /* Key IV */ member in struct:__anon32663
  /libcore/crypto/src/main/java/org/conscrypt/
OpenSSLCipher.java 87 * The Initial Vector (IV) used for the current cipher.
89 private byte[] iv; field in class:OpenSSLCipher
218 return iv;
223 if (iv != null && iv.length > 0) {
226 params.init(iv);
237 private void engineInitInternal(int opmode, Key key, byte[] iv, SecureRandom random)
266 if (iv == null && ivLength != 0) {
267 iv = new byte[ivLength];
272 random.nextBytes(iv);
284 NativeCrypto.EVP_CipherInit_ex(cipherCtx.getContext(), 0, encodedKey, iv, encrypting); local
286 NativeCrypto.EVP_CipherInit_ex(cipherCtx.getContext(), cipherType, encodedKey, iv, local
    [all...]
  /packages/apps/Music/src/com/android/music/
QueryBrowserActivity.java 381 ImageView iv = (ImageView) view.findViewById(R.id.icon); local
382 ViewGroup.LayoutParams p = iv.getLayoutParams();
398 iv.setImageResource(R.drawable.ic_mp_artist_list);
418 iv.setImageResource(R.drawable.albumart_mp_unknown_list);
438 iv.setImageResource(R.drawable.ic_mp_song_list);
  /external/chromium_org/net/third_party/nss/ssl/
ssl3ext.c 983 unsigned char iv[AES_BLOCK_SIZE]; local
1000 /* Get IV and encryption keys */
1001 ivItem.data = iv;
1002 ivItem.len = sizeof(iv);
1003 rv = PK11_GenerateRandom(iv, sizeof(iv));
    [all...]

Completed in 3645 milliseconds

1 2 3 4 5 67 8 910