/external/kernel-headers/original/linux/ |
H A D | if_alg.h | 27 __u32 ivlen; member in struct:af_alg_iv
|
/external/tcpdump/ |
H A D | print-esp.c | 76 int ivlen; member in struct:sa_list 257 sa1.ivlen = 0; 263 sa1.ivlen = EVP_CIPHER_iv_length(evp); 357 int ivlen = 0; local 469 ivlen = sa->ivlen; 483 EVP_Cipher(&ctx, p + ivlen, p + ivlen, ep - (p + ivlen)); 484 advance = ivoff - (u_char *)esp + ivlen; [all...] |
/external/openssl/crypto/evp/ |
H A D | e_aes.c | 80 int ivlen; /* IV length */ member in struct:__anon8468 324 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 333 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 335 memcpy(gctx->iv, iv, gctx->ivlen); 416 #define BLOCK_CIPHER_generic(nid,keylen,blocksize,ivlen,nmode,mode,MODE,flags) \ 418 nid##_##keylen##_##nmode,blocksize,keylen/8,ivlen, \ 427 keylen/8,ivlen, \ 437 #define BLOCK_CIPHER_custom(nid,keylen,blocksize,ivlen,mode,MODE,flags) \ 440 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ 449 (EVP_CIPH_##MODE##_MODE==EVP_CIPH_XTS_MODE?2:1)*keylen/8, ivlen, \ [all...] |
/external/openssh/ |
H A D | cipher.c | 207 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, 233 if (iv != NULL && ivlen < cipher->block_size) 235 ivlen, cipher->name); 326 int ivlen; local 329 ivlen = 24; 331 ivlen = EVP_CIPHER_CTX_iv_length(&cc->evp); 332 return (ivlen); 206 cipher_init(CipherContext *cc, Cipher *cipher, const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, int do_encrypt) argument
|
H A D | monitor_wrap.c | 498 fatal("%s: bad ivlen: expected %u != %u", __func__, 609 u_int ivlen, keylen; local 623 ivlen = packet_get_keyiv_len(MODE_OUT); 624 packet_get_keyiv(MODE_OUT, iv, ivlen); 625 buffer_put_string(&m, iv, ivlen); 626 ivlen = packet_get_keyiv_len(MODE_OUT); 627 packet_get_keyiv(MODE_IN, iv, ivlen); 628 buffer_put_string(&m, iv, ivlen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | crypto_gnutls.c | 214 int ivlen; local 273 ivlen = gcry_cipher_get_algo_blklen(a); 274 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 275 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_gnutls.c | 202 int ivlen; local 261 ivlen = gcry_cipher_get_algo_blklen(a); 262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_gnutls.c | 202 int ivlen; local 261 ivlen = gcry_cipher_get_algo_blklen(a); 262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_gnutls.c | 202 int ivlen; local 261 ivlen = gcry_cipher_get_algo_blklen(a); 262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
|
/external/dropbear/libtomcrypt/src/prngs/ |
H A D | sober128.c | 436 int keylen, ivlen, len; 469 if ((err = sober128_add_entropy(tests[x].iv, tests[x].ivlen, &prng)) != CRYPT_OK) {
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 329 int keylen,ivlen; local 339 ivlen=EVP_CIPHER_iv_length(evp_cipher); 341 if (ivlen > 0) 342 if (RAND_pseudo_bytes(iv,ivlen) <= 0) 351 if (ivlen > 0) { 508 int keylen,ivlen;
|
/external/openssl/ssl/ |
H A D | t1_enc.c | 358 printf("\tevp_cipher: nid, blksz= %d, %d, keylen=%d, ivlen=%d\n", 691 int ivlen; local 696 ivlen = EVP_CIPHER_iv_length(enc); 698 ivlen = 0; 699 if (ivlen > 1) 708 else if (RAND_bytes(rec->input, ivlen) <= 0)
|
/external/ipsec-tools/src/libipsec/ |
H A D | key_debug.c | 321 printf(" { id=%d ivlen=%d min=%d max=%d }\n", 675 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
|
/external/dropbear/libtomcrypt/ |
H A D | crypt.tex | 1657 const unsigned char *iv, unsigned long ivlen, 1671 if ((err = gcm_add_iv(gcm, iv, ivlen)) != CRYPT_OK) { 1696 send(socket, iv, ivlen, 0);
|