/external/wpa_supplicant_8/src/crypto/ |
aes-gcm.c | 192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) 196 if (iv_len == 12) { 198 os_memcpy(J0, iv, iv_len); 199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len); 207 ghash(H, iv, iv_len, J0); 209 WPA_PUT_BE64(len_buf + 8, iv_len * 8); 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, 267 aes_gcm_prepare_j0(iv, iv_len, H, J0); 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, [all...] |
crypto_linux.c | 683 size_t iv_len = AES_BLOCK_SIZE; local 695 CMSG_SPACE(sizeof(*alg_iv) + iv_len); 709 hdr->cmsg_len = CMSG_SPACE(sizeof(*alg_iv) + iv_len); 711 alg_iv->ivlen = iv_len; 712 os_memcpy(alg_iv->iv, iv, iv_len); 792 size_t iv_len = 8; local 798 io[0].iov_base = (void *) (cipher + iv_len); 804 CMSG_SPACE(sizeof(*alg_iv) + iv_len); 818 hdr->cmsg_len = CMSG_SPACE(sizeof(*alg_iv) + iv_len); 820 alg_iv->ivlen = iv_len; 862 size_t iv_len = 0; local [all...] |
aes_wrap.h | 53 const u8 *iv, size_t iv_len, 58 const u8 *iv, size_t iv_len, 63 const u8 *iv, size_t iv_len,
|
/external/boringssl/src/crypto/fipsmodule/cipher/ |
e_des.c | 96 out->iv_len = 8; 123 out->iv_len = 0; 164 out->iv_len = 8; 188 out->iv_len = 8; 216 out->iv_len = 0; 228 out->iv_len = 0;
|
e_aes.c | 459 gctx->ivlen = c->cipher->iv_len; 628 out->iv_len = 16; 641 out->iv_len = 16; 666 out->iv_len = 16; 679 out->iv_len = 12; 696 out->iv_len = 16; 709 out->iv_len = 16; 734 out->iv_len = 12; 751 out->iv_len = 16; 764 out->iv_len = 16 [all...] |
cipher.c | 508 return ctx->cipher->iv_len; 582 return cipher->iv_len;
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 434 size_t iv_len; local 453 iv_len = encr_alg->block_size; 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 468 pos = iv + iv_len; 536 size_t iv_len, pad_len; local 552 iv_len = encr_alg->block_size; 574 iv = wpabuf_put(msg, iv_len); 575 if (random_get_bytes(iv, iv_len)) { 580 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len; [all...] |
eap_sake_common.h | 76 size_t iv_len; member in struct:eap_sake_parse_attr
|
eap_sake_common.c | 106 attr->iv_len = len;
|
/external/boringssl/src/ssl/ |
t1_enc.cc | 246 size_t mac_secret_len, key_len, iv_len; local 247 if (!get_key_block_lengths(ssl, &mac_secret_len, &key_len, &iv_len, cipher)) { 252 const size_t key_block_size = 2 * (mac_secret_len + key_len + iv_len); 267 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len, iv_len); 272 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len + iv_len, iv_len); 276 if (iv_override.size() != iv_len) {
|
handoff.cc | 116 size_t iv_len = 0; local 120 (!s3->aead_read_ctx->GetIV(&read_iv, &iv_len) || 121 !s3->aead_write_ctx->GetIV(&write_iv, &iv_len))) { 140 !CBB_add_asn1_octet_string(&seq, read_iv, iv_len) || 141 !CBB_add_asn1_octet_string(&seq, write_iv, iv_len) ||
|
tls13_enc.cc | 166 size_t iv_len = EVP_AEAD_nonce_length(aead); local 169 2, NULL, 0, iv_len)) { 176 Span<const uint8_t>(), MakeConstSpan(iv, iv_len));
|
/external/boringssl/src/crypto/cipher_extra/ |
derive_key.c | 77 niv = type->iv_len;
|
e_ssl3.c | 342 const size_t iv_len = EVP_CIPHER_CTX_iv_length(&ssl3_ctx->cipher_ctx); local 343 if (iv_len <= 1) { 348 *out_iv_len = iv_len;
|
e_tls.c | 457 const size_t iv_len = EVP_CIPHER_CTX_iv_length(&tls_ctx->cipher_ctx); local 458 if (iv_len <= 1) { 463 *out_iv_len = iv_len;
|
/external/boringssl/src/crypto/pem/ |
pem_info.c | 305 unsigned iv_len = 0; local 308 iv_len = EVP_CIPHER_iv_length(enc); 345 assert(strlen(objstr) + 23 + 2 * iv_len + 13 <= sizeof buf); 348 PEM_dek_info(buf, objstr, iv_len, (char *)iv);
|
pem_lib.c | 290 const unsigned iv_len = EVP_CIPHER_iv_length(enc); local 303 assert(iv_len <= (int)sizeof(iv)); 304 if (!RAND_bytes(iv, iv_len)) /* Generate a salt */ 316 assert(strlen(objstr) + 23 + 2 * iv_len + 13 <= sizeof buf); 320 PEM_dek_info(buf, objstr, iv_len, (char *)iv);
|
/bionic/libc/kernel/uapi/linux/ |
virtio_crypto.h | 201 __le32 iv_len; member in struct:virtio_crypto_cipher_para 214 __le32 iv_len; member in struct:virtio_crypto_aead_para 232 __le32 iv_len; member in struct:virtio_crypto_alg_chain_data_para
|
/external/boringssl/src/fipstools/ |
cavp_aes_gcm_test.cc | 87 std::string key_len, iv_len, pt_len_str, aad_len_str, tag_len; local 89 !t->GetInstruction(&iv_len, "IVlen") || 108 iv.size() * 8 != strtoul(iv_len.c_str(), nullptr, 0) ||
|
/external/kernel-headers/original/uapi/linux/ |
virtio_crypto.h | 293 __le32 iv_len; member in struct:virtio_crypto_cipher_para 322 __le32 iv_len; member in struct:virtio_crypto_aead_para 350 __le32 iv_len; member in struct:virtio_crypto_alg_chain_data_para
|
/external/syslinux/gpxe/src/net/ |
tls.c | 1127 size_t iv_len = blocksize; local 1137 iv_len = 0; 1140 padding_len = ( ( blocksize - 1 ) & -( iv_len + len + mac_len + 1 ) ); 1141 *plaintext_len = ( iv_len + len + mac_len + padding_len + 1 ); 1148 content = ( iv + iv_len ); 1153 memset ( iv, 0, iv_len ); 1311 size_t iv_len; local [all...] |
/external/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 146 size_t iv_len, int enc) { 147 if (iv_len != EVP_CIPHER_iv_length(cipher)) {
|
/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 34 size_t iv_len; member in struct:pkcs5_params 270 params->iv_len = hdr.length; 271 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); 389 params->iv_len != 8) 402 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len);
|
/external/boringssl/src/crypto/fipsmodule/modes/ |
internal.h | 199 const uint8_t *iv, size_t iv_len);
|
/external/boringssl/src/include/openssl/ |
cipher.h | 532 // iv_len contains the IV size, in bytes, or zero if inapplicable. 533 unsigned iv_len; member in struct:evp_cipher_st
|