/bionic/libc/kernel/common/linux/ |
if_alg.h | 32 __u32 ivlen; member in struct:af_alg_iv
|
/external/kernel-headers/original/linux/ |
if_alg.h | 27 __u32 ivlen; member in struct:af_alg_iv
|
/external/tcpdump/ |
print-esp.c | 76 int ivlen; member in struct:sa_list 257 sa1.ivlen = 0; 263 sa1.ivlen = EVP_CIPHER_iv_length(evp); 357 int ivlen = 0; local 469 ivlen = sa->ivlen; 483 EVP_Cipher(&ctx, p + ivlen, p + ivlen, ep - (p + ivlen)); 484 advance = ivoff - (u_char *)esp + ivlen; [all...] |
/external/openssl/crypto/evp/ |
e_aes.c | 80 int ivlen; /* IV length */ member in struct:__anon26939 324 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 333 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 335 memcpy(gctx->iv, iv, gctx->ivlen); 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 427 keylen/8,ivlen, \ 437 #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ 440 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ 449 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ [all...] |
/external/openssh/ |
cipher.c | 207 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, 233 if (iv != NULL && ivlen < cipher->block_size) 235 ivlen, cipher->name); 326 int ivlen; local 329 ivlen = 24; 331 ivlen = EVP_CIPHER_CTX_iv_length(&cc->evp); 332 return (ivlen);
|
monitor_wrap.c | 498 fatal("%s: bad ivlen: expected %u != %u", __func__, 609 u_int ivlen, keylen; local 623 ivlen = packet_get_keyiv_len(MODE_OUT); 624 packet_get_keyiv(MODE_OUT, iv, ivlen); 625 buffer_put_string(&m, iv, ivlen); 626 ivlen = packet_get_keyiv_len(MODE_OUT); 627 packet_get_keyiv(MODE_IN, iv, ivlen); 628 buffer_put_string(&m, iv, ivlen); [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
e_aes.c | 80 int ivlen; /* IV length */ member in struct:__anon16363 324 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 333 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 335 memcpy(gctx->iv, iv, gctx->ivlen); 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 427 keylen/8,ivlen, \ 437 #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ 440 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ 449 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_gnutls.c | 202 int ivlen; local 261 ivlen = gcry_cipher_get_algo_blklen(a); 262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
|
/external/dropbear/libtomcrypt/src/prngs/ |
sober128.c | 436 int keylen, ivlen, len; 469 if ((err = sober128_add_entropy(tests[x].iv, tests[x].ivlen, &prng)) != CRYPT_OK) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pk7_doit.c | 329 int keylen,ivlen; local 339 ivlen=EVP_CIPHER_iv_length(evp_cipher); 341 if (ivlen > 0) 342 if (RAND_pseudo_bytes(iv,ivlen) <= 0) 351 if (ivlen > 0) { 508 int keylen,ivlen;
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 329 int keylen,ivlen; local 339 ivlen=EVP_CIPHER_iv_length(evp_cipher); 341 if (ivlen > 0) 342 if (RAND_pseudo_bytes(iv,ivlen) <= 0) 351 if (ivlen > 0) { 508 int keylen,ivlen;
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
t1_enc.c | 957 int ivlen; local 962 ivlen = EVP_CIPHER_iv_length(enc); 964 ivlen = 0; 965 if (ivlen > 1) 974 else if (RAND_bytes(rec->input, ivlen) <= 0) [all...] |
/external/openssl/ssl/ |
t1_enc.c | 358 printf("\tevp_cipher: nid, blksz= %d, %d, keylen=%d, ivlen=%d\n", 700 int ivlen; local 705 ivlen = EVP_CIPHER_iv_length(enc); 707 ivlen = 0; 708 if (ivlen > 1) 717 else if (RAND_bytes(rec->input, ivlen) <= 0) [all...] |
/external/ipsec-tools/src/libipsec/ |
key_debug.c | 321 printf(" { id=%d ivlen=%d min=%d max=%d }\n", 675 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
|
/external/dropbear/libtomcrypt/ |
crypt.tex | [all...] |