/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 189 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 248 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument 291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 497 const u8 *pos, *end, *iv, *integ; local 529 iv = encrypted; 530 pos = iv + iv_len; 561 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, 599 u8 *icv, *iv; local 636 iv [all...] |
H A D | eap_sim_common.c | 738 attr->iv = apos + 2; 936 size_t encr_data_len, const u8 *iv, 941 if (!iv) { 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg 1118 msg->iv = (pos - wpabuf_head_u8(msg->buf)) + 4; 1119 if (random_get_bytes(wpabuf_mhead_u8(msg->buf) + msg->iv, 1121 msg->iv = 0; 1127 msg->iv = 0; 1140 if (msg == NULL || k_encr == NULL || msg->iv 935 eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, size_t encr_data_len, const u8 *iv, struct eap_sim_attrs *attr, int aka) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.c | 189 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 248 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument 291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 497 const u8 *pos, *end, *iv, *integ; local 529 iv = encrypted; 530 pos = iv + iv_len; 561 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, 599 u8 *icv, *iv; local 636 iv [all...] |
H A D | eap_sim_common.c | 738 attr->iv = apos + 2; 936 size_t encr_data_len, const u8 *iv, 941 if (!iv) { 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg 1118 msg->iv = (pos - wpabuf_head_u8(msg->buf)) + 4; 1119 if (random_get_bytes(wpabuf_mhead_u8(msg->buf) + msg->iv, 1121 msg->iv = 0; 1127 msg->iv = 0; 1140 if (msg == NULL || k_encr == NULL || msg->iv 935 eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, size_t encr_data_len, const u8 *iv, struct eap_sim_attrs *attr, int aka) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 189 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument 228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 248 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument 291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 497 const u8 *pos, *end, *iv, *integ; local 529 iv = encrypted; 530 pos = iv + iv_len; 561 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos, 599 u8 *icv, *iv; local 636 iv [all...] |
H A D | eap_sim_common.c | 738 attr->iv = apos + 2; 936 size_t encr_data_len, const u8 *iv, 941 if (!iv) { 951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg 1118 msg->iv = (pos - wpabuf_head_u8(msg->buf)) + 4; 1119 if (random_get_bytes(wpabuf_mhead_u8(msg->buf) + msg->iv, 1121 msg->iv = 0; 1127 msg->iv = 0; 1140 if (msg == NULL || k_encr == NULL || msg->iv 935 eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, size_t encr_data_len, const u8 *iv, struct eap_sim_attrs *attr, int aka) argument [all...] |
/external/openssl/crypto/evp/ |
H A D | evp_locl.h | 85 cprefix##_ofb##cbits##_encrypt(in, out, (long)EVP_MAXCHUNK, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, &ctx->num);\ 91 cprefix##_ofb##cbits##_encrypt(in, out, (long)inl, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, &ctx->num);\ 100 cprefix##_cbc_encrypt(in, out, (long)EVP_MAXCHUNK, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, ctx->encrypt);\ 106 cprefix##_cbc_encrypt(in, out, (long)inl, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, ctx->encrypt);\ 118 cprefix##_cfb##cbits##_encrypt(in, out, (long)((cbits==1) && !(ctx->flags & EVP_CIPH_FLAG_LENGTH_BITS) ?inl*8:inl), &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, &ctx->num, ctx->encrypt);\
|
H A D | evp.h | 311 const unsigned char *iv, int enc); /* init key */ 338 /* Set if the iv handling should be done by the cipher itself */ 352 /* Allow use default ASN1 get/set iv */ 409 unsigned char iv[EVP_MAX_IV_LENGTH]; member in struct:evp_cipher_info_st 419 unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ 420 unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ member in struct:evp_cipher_ctx_st 575 int datal, int count, unsigned char *key,unsigned char *iv); 582 const unsigned char *key, const unsigned char *iv); 584 const unsigned char *key, const unsigned char *iv); [all...] |
/external/openssl/crypto/pem/ |
H A D | pem_lib.c | 343 unsigned char iv[EVP_MAX_IV_LENGTH]; local 392 OPENSSL_assert(enc->iv_len <= (int)sizeof(iv)); 393 if (RAND_pseudo_bytes(iv,enc->iv_len) < 0) /* Generate a salt */ 395 /* The 'iv' is used as the iv and as a salt. It is 397 EVP_BytesToKey(enc,EVP_md5(),iv,kstr,klen,1,key,NULL); 405 PEM_dek_info(buf,objstr,enc->iv_len,(char *)iv); 409 EVP_EncryptInit_ex(&ctx,enc,NULL,key,iv); 425 OPENSSL_cleanse(iv,sizeof(iv)); [all...] |
/external/oprofile/gui/ |
H A D | oprof_start.cpp | 176 QIntValidator * iv; local 177 iv = new QIntValidator(OP_MIN_BUF_SIZE, OP_MAX_BUF_SIZE, buffer_size_edit); 178 buffer_size_edit->setValidator(iv); 179 iv = new QIntValidator(OP_MIN_NOTE_TABLE_SIZE, OP_MAX_NOTE_TABLE_SIZE, note_table_size_edit); 180 note_table_size_edit->setValidator(iv); 181 iv = new QIntValidator(0, INT_MAX, callgraph_depth_edit); 182 callgraph_depth_edit->setValidator(iv); 183 iv = new QIntValidator(0, INT_MAX, buffer_watershed_edit); 184 buffer_watershed_edit->setValidator(iv); 185 iv [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 743 attr->iv = apos + 2; 941 size_t encr_data_len, const u8 *iv, 946 if (!iv) { 956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) { 979 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg 1123 msg->iv = (pos - wpabuf_head_u8(msg->buf)) + 4; 1124 if (os_get_random(wpabuf_mhead_u8(msg->buf) + msg->iv, 1126 msg->iv = 0; 1132 msg->iv = 0; 1145 if (msg == NULL || k_encr == NULL || msg->iv 940 eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, size_t encr_data_len, const u8 *iv, struct eap_sim_attrs *attr, int aka) argument [all...] |
/external/opencv/cv/src/ |
H A D | cvgeometry.cpp | 243 CvPoint iv; local 251 CV_READ_SEQ_ELEM( iv, reader ); 252 v = cvPointTo32f( iv ); 267 CV_READ_SEQ_ELEM( iv, reader ); 268 v = cvPointTo32f( iv ); 304 CV_READ_SEQ_ELEM( iv, reader ); 305 v = cvPointTo32f( iv );
|
/external/ipsec-tools/src/racoon/ |
H A D | algorithm.c | 523 alg_oakley_encdef_decrypt(doi, buf, key, iv) 525 vchar_t *buf, *key, *iv; 541 res = (f->decrypt)(buf, key, iv); 552 alg_oakley_encdef_encrypt(doi, buf, key, iv) 554 vchar_t *buf, *key, *iv; 570 res = (f->encrypt)(buf, key, iv);
|
/external/openssl/apps/ |
H A D | enc.c | 111 unsigned char key[EVP_MAX_KEY_LENGTH],iv[EVP_MAX_IV_LENGTH]; local 275 else if (strcmp(*argv,"-iv") == 0) 310 BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv"); 311 BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]"); 557 strlen(str),1,key,iv); 567 if ((hiv != NULL) && !set_hex(hiv,iv,sizeof iv)) 569 BIO_printf(bio_err,"invalid hex iv value\n"); 578 BIO_printf(bio_err, "iv undefine [all...] |
/external/openssl/include/openssl/ |
H A D | evp.h | 311 const unsigned char *iv, int enc); /* init key */ 338 /* Set if the iv handling should be done by the cipher itself */ 352 /* Allow use default ASN1 get/set iv */ 409 unsigned char iv[EVP_MAX_IV_LENGTH]; member in struct:evp_cipher_info_st 419 unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */ 420 unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ member in struct:evp_cipher_ctx_st 575 int datal, int count, unsigned char *key,unsigned char *iv); 582 const unsigned char *key, const unsigned char *iv); 584 const unsigned char *key, const unsigned char *iv); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | crypto_gnutls.c | 208 const u8 *iv, const u8 *key, 274 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 275 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) { 207 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
|
H A D | crypto_openssl.c | 257 const u8 *iv, const u8 *key, 313 !EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, key, iv)) { 323 !EVP_DecryptInit_ex(&ctx->dec, cipher, NULL, key, iv)) { 256 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
|
H A D | aes_wrap.c | 470 * @iv: Encryption IV for CBC mode (16 bytes) 475 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 485 os_memcpy(cbc, iv, BLOCK_SIZE); 503 * @iv: Decryption IV for CBC mode (16 bytes) 508 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument 518 os_memcpy(cbc, iv, BLOCK_SIZE);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_gnutls.c | 196 const u8 *iv, const u8 *key, 262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) { 195 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_gnutls.c | 196 const u8 *iv, const u8 *key, 262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) { 195 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_gnutls.c | 196 const u8 *iv, const u8 *key, 262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || 263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) { 195 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
|
/external/openssh/ |
H A D | kex.h | 94 u_char *iv; member in struct:Enc
|
/external/srtp/crypto/include/ |
H A D | cipher.h | 116 (cipher_pointer_t cp, void *iv);
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_attr_build.c | 326 u8 *iv, *data; local 337 iv = wpabuf_put(msg, block_size); 338 if (random_get_bytes(iv, block_size) < 0) 343 if (aes_128_cbc_encrypt(wps->keywrapkey, iv, data, wpabuf_len(plain)))
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_attr_build.c | 326 u8 *iv, *data; local 337 iv = wpabuf_put(msg, block_size); 338 if (random_get_bytes(iv, block_size) < 0) 343 if (aes_128_cbc_encrypt(wps->keywrapkey, iv, data, wpabuf_len(plain)))
|