Searched refs:ivlen (Results 1 - 14 of 14) sorted by relevance

/external/kernel-headers/original/linux/
H A Dif_alg.h27 __u32 ivlen; member in struct:af_alg_iv
/external/tcpdump/
H A Dprint-esp.c76 int ivlen; member in struct:sa_list
257 sa1.ivlen = 0;
263 sa1.ivlen = EVP_CIPHER_iv_length(evp);
357 int ivlen = 0; local
469 ivlen = sa->ivlen;
483 EVP_Cipher(&ctx, p + ivlen, p + ivlen, ep - (p + ivlen));
484 advance = ivoff - (u_char *)esp + ivlen;
[all...]
/external/openssl/crypto/evp/
H A De_aes.c80 int ivlen; /* IV length */ member in struct:__anon8468
324 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen);
333 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen);
335 memcpy(gctx->iv, iv, gctx->ivlen);
416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \
418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \
427 keylen/8,ivlen, \
437 #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \
440 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \
449 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \
[all...]
/external/openssh/
H A Dcipher.c207 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen,
233 if (iv != NULL && ivlen < cipher->block_size)
235 ivlen, cipher->name);
326 int ivlen; local
329 ivlen = 24;
331 ivlen = EVP_CIPHER_CTX_iv_length(&cc->evp);
332 return (ivlen);
206 cipher_init(CipherContext *cc, Cipher *cipher, const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, int do_encrypt) argument
H A Dmonitor_wrap.c498 fatal("%s: bad ivlen: expected %u != %u", __func__,
609 u_int ivlen, keylen; local
623 ivlen = packet_get_keyiv_len(MODE_OUT);
624 packet_get_keyiv(MODE_OUT, iv, ivlen);
625 buffer_put_string(&m, iv, ivlen);
626 ivlen = packet_get_keyiv_len(MODE_OUT);
627 packet_get_keyiv(MODE_IN, iv, ivlen);
628 buffer_put_string(&m, iv, ivlen);
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dcrypto_gnutls.c214 int ivlen; local
273 ivlen = gcry_cipher_get_algo_blklen(a);
274 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR ||
275 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_gnutls.c202 int ivlen; local
261 ivlen = gcry_cipher_get_algo_blklen(a);
262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR ||
263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_gnutls.c202 int ivlen; local
261 ivlen = gcry_cipher_get_algo_blklen(a);
262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR ||
263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_gnutls.c202 int ivlen; local
261 ivlen = gcry_cipher_get_algo_blklen(a);
262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR ||
263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
/external/dropbear/libtomcrypt/src/prngs/
H A Dsober128.c436 int keylen, ivlen, len;
469 if ((err = sober128_add_entropy(tests[x].iv, tests[x].ivlen, &prng)) != CRYPT_OK) {
/external/openssl/crypto/pkcs7/
H A Dpk7_doit.c329 int keylen,ivlen; local
339 ivlen=EVP_CIPHER_iv_length(evp_cipher);
341 if (ivlen > 0)
342 if (RAND_pseudo_bytes(iv,ivlen) <= 0)
351 if (ivlen > 0) {
508 int keylen,ivlen;
/external/openssl/ssl/
H A Dt1_enc.c358 printf("\tevp_cipher: nid, blksz= %d, %d, keylen=%d, ivlen=%d\n",
691 int ivlen; local
696 ivlen = EVP_CIPHER_iv_length(enc);
698 ivlen = 0;
699 if (ivlen > 1)
708 else if (RAND_bytes(rec->input, ivlen) <= 0)
/external/ipsec-tools/src/libipsec/
H A Dkey_debug.c321 printf(" { id=%d ivlen=%d min=%d max=%d }\n",
675 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
/external/dropbear/libtomcrypt/
H A Dcrypt.tex1657 const unsigned char *iv, unsigned long ivlen,
1671 if ((err = gcm_add_iv(gcm, iv, ivlen)) != CRYPT_OK) {
1696 send(socket, iv, ivlen, 0);

Completed in 492 milliseconds