/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/ |
ParametersWithIV.java | 22 int ivLen) 24 this.iv = new byte[ivLen]; 27 System.arraycopy(iv, ivOff, this.iv, 0, ivLen);
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_add_iv.c | 24 @param IVlen The length of the IV 28 const unsigned char *IV, unsigned long IVlen) 34 if (IVlen > 0) { 53 if (IVlen + gcm->buflen > 12) { 60 for (x = 0; x < (IVlen & ~15); x += 16) { 72 for (; x < IVlen; x++) {
|
gcm_memory.c | 26 @param IVlen The length of the initial vector 39 const unsigned char *IV, unsigned long IVlen, 58 IV, IVlen, 90 if ((err = gcm_add_iv(gcm, IV, IVlen)) != CRYPT_OK) {
|
gcm_test.c | 37 unsigned long IVlen; 343 tests[x].IV, tests[x].IVlen, 374 tests[x].IV, tests[x].IVlen,
|
/external/kernel-headers/original/linux/ |
if_alg.h | 27 __u32 ivlen; member in struct:af_alg_iv
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
e_aes.c | 80 int ivlen; /* IV length */ member in struct:__anon16363 324 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 333 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 335 memcpy(gctx->iv, iv, gctx->ivlen); 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 427 keylen/8,ivlen, \ 437 #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ 440 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ 449 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ [all...] |
/external/openssl/crypto/evp/ |
e_aes.c | 80 int ivlen; /* IV length */ member in struct:__anon26939 324 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 333 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 335 memcpy(gctx->iv, iv, gctx->ivlen); 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 427 keylen/8,ivlen, \ 437 #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ 440 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ 449 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ [all...] |
/bionic/libc/kernel/common/linux/ |
if_alg.h | 32 __u32 ivlen; member in struct:af_alg_iv
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_gnutls.c | 202 int ivlen; local 261 ivlen = gcry_cipher_get_algo_blklen(a); 262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
|
/external/openssh/ |
cipher.c | 207 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, 233 if (iv != NULL && ivlen < cipher->block_size) 235 ivlen, cipher->name); 326 int ivlen; local 329 ivlen = 24; 331 ivlen = EVP_CIPHER_CTX_iv_length(&cc->evp); 332 return (ivlen);
|
monitor_wrap.c | 498 fatal("%s: bad ivlen: expected %u != %u", __func__, 609 u_int ivlen, keylen; local 623 ivlen = packet_get_keyiv_len(MODE_OUT); 624 packet_get_keyiv(MODE_OUT, iv, ivlen); 625 buffer_put_string(&m, iv, ivlen); 626 ivlen = packet_get_keyiv_len(MODE_OUT); 627 packet_get_keyiv(MODE_IN, iv, ivlen); 628 buffer_put_string(&m, iv, ivlen); [all...] |
/external/tcpdump/ |
print-esp.c | 76 int ivlen; member in struct:sa_list 257 sa1.ivlen = 0; 263 sa1.ivlen = EVP_CIPHER_iv_length(evp); 357 int ivlen = 0; local 469 ivlen = sa->ivlen; 483 EVP_Cipher(&ctx, p + ivlen, p + ivlen, ep - (p + ivlen)); 484 advance = ivoff - (u_char *)esp + ivlen; [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
preenc.h | 46 unsigned char ivLen[2]; 55 unsigned char ivLen[2];
|
ssl3con.c | [all...] |
/external/chromium_org/net/third_party/nss/patches/ |
aesgcm.patch | [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pk7_doit.c | 329 int keylen,ivlen; local 339 ivlen=EVP_CIPHER_iv_length(evp_cipher); 341 if (ivlen > 0) 342 if (RAND_pseudo_bytes(iv,ivlen) <= 0) 351 if (ivlen > 0) { 508 int keylen,ivlen;
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 329 int keylen,ivlen; local 339 ivlen=EVP_CIPHER_iv_length(evp_cipher); 341 if (ivlen > 0) 342 if (RAND_pseudo_bytes(iv,ivlen) <= 0) 351 if (ivlen > 0) { 508 int keylen,ivlen;
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 267 const unsigned char *IV, unsigned long IVlen); 282 const unsigned char *IV, unsigned long IVlen,
|
tomcrypt_cipher.h | 471 @param IVlen The length of the initial vector 484 const unsigned char *IV, unsigned long IVlen,
|
/external/dropbear/libtomcrypt/src/prngs/ |
sober128.c | 436 int keylen, ivlen, len; 469 if ((err = sober128_add_entropy(tests[x].iv, tests[x].ivlen, &prng)) != CRYPT_OK) {
|
/external/chromium_org/net/quic/crypto/ |
aes_128_gcm_12_decrypter_test.cc | 18 // [IVlen = 96]
|
aes_128_gcm_12_encrypter_test.cc | 18 // [IVlen = 96]
|
/external/openssl/ssl/ |
t1_enc.c | 358 printf("\tevp_cipher: nid, blksz= %d, %d, keylen=%d, ivlen=%d\n", 700 int ivlen; local 705 ivlen = EVP_CIPHER_iv_length(enc); 707 ivlen = 0; 708 if (ivlen > 1) 717 else if (RAND_bytes(rec->input, ivlen) <= 0) [all...] |
/external/ipsec-tools/src/libipsec/ |
key_debug.c | 321 printf(" { id=%d ivlen=%d min=%d max=%d }\n", 675 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
t1_enc.c | 957 int ivlen; local 962 ivlen = EVP_CIPHER_iv_length(enc); 964 ivlen = 0; 965 if (ivlen > 1) 974 else if (RAND_bytes(rec->input, ivlen) <= 0) [all...] |