Searched refs:iv (Results 151 - 175 of 282) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dikev2_common.c189 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument
228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
248 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument
291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
497 const u8 *pos, *end, *iv, *integ; local
529 iv = encrypted;
530 pos = iv + iv_len;
561 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos,
599 u8 *icv, *iv; local
636 iv
[all...]
H A Deap_sim_common.c738 attr->iv = apos + 2;
936 size_t encr_data_len, const u8 *iv,
941 if (!iv) {
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg
1118 msg->iv = (pos - wpabuf_head_u8(msg->buf)) + 4;
1119 if (random_get_bytes(wpabuf_mhead_u8(msg->buf) + msg->iv,
1121 msg->iv = 0;
1127 msg->iv = 0;
1140 if (msg == NULL || k_encr == NULL || msg->iv
935 eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, size_t encr_data_len, const u8 *iv, struct eap_sim_attrs *attr, int aka) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Dikev2_common.c189 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument
228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
248 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument
291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
497 const u8 *pos, *end, *iv, *integ; local
529 iv = encrypted;
530 pos = iv + iv_len;
561 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos,
599 u8 *icv, *iv; local
636 iv
[all...]
H A Deap_sim_common.c738 attr->iv = apos + 2;
936 size_t encr_data_len, const u8 *iv,
941 if (!iv) {
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg
1118 msg->iv = (pos - wpabuf_head_u8(msg->buf)) + 4;
1119 if (random_get_bytes(wpabuf_mhead_u8(msg->buf) + msg->iv,
1121 msg->iv = 0;
1127 msg->iv = 0;
1140 if (msg == NULL || k_encr == NULL || msg->iv
935 eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, size_t encr_data_len, const u8 *iv, struct eap_sim_attrs *attr, int aka) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dikev2_common.c189 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument
228 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
248 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, argument
291 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
497 const u8 *pos, *end, *iv, *integ; local
529 iv = encrypted;
530 pos = iv + iv_len;
561 if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos,
599 u8 *icv, *iv; local
636 iv
[all...]
H A Deap_sim_common.c738 attr->iv = apos + 2;
936 size_t encr_data_len, const u8 *iv,
941 if (!iv) {
951 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
974 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg
1118 msg->iv = (pos - wpabuf_head_u8(msg->buf)) + 4;
1119 if (random_get_bytes(wpabuf_mhead_u8(msg->buf) + msg->iv,
1121 msg->iv = 0;
1127 msg->iv = 0;
1140 if (msg == NULL || k_encr == NULL || msg->iv
935 eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, size_t encr_data_len, const u8 *iv, struct eap_sim_attrs *attr, int aka) argument
[all...]
/external/openssl/crypto/evp/
H A Devp_locl.h85 cprefix##_ofb##cbits##_encrypt(in, out, (long)EVP_MAXCHUNK, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, &ctx->num);\
91 cprefix##_ofb##cbits##_encrypt(in, out, (long)inl, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, &ctx->num);\
100 cprefix##_cbc_encrypt(in, out, (long)EVP_MAXCHUNK, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, ctx->encrypt);\
106 cprefix##_cbc_encrypt(in, out, (long)inl, &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, ctx->encrypt);\
118 cprefix##_cfb##cbits##_encrypt(in, out, (long)((cbits==1) && !(ctx->flags & EVP_CIPH_FLAG_LENGTH_BITS) ?inl*8:inl), &((kstruct *)ctx->cipher_data)->ksched, ctx->iv, &ctx->num, ctx->encrypt);\
H A Devp.h311 const unsigned char *iv, int enc); /* init key */
338 /* Set if the iv handling should be done by the cipher itself */
352 /* Allow use default ASN1 get/set iv */
409 unsigned char iv[EVP_MAX_IV_LENGTH]; member in struct:evp_cipher_info_st
419 unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */
420 unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ member in struct:evp_cipher_ctx_st
575 int datal, int count, unsigned char *key,unsigned char *iv);
582 const unsigned char *key, const unsigned char *iv);
584 const unsigned char *key, const unsigned char *iv);
[all...]
/external/openssl/crypto/pem/
H A Dpem_lib.c343 unsigned char iv[EVP_MAX_IV_LENGTH]; local
392 OPENSSL_assert(enc->iv_len <= (int)sizeof(iv));
393 if (RAND_pseudo_bytes(iv,enc->iv_len) < 0) /* Generate a salt */
395 /* The 'iv' is used as the iv and as a salt. It is
397 EVP_BytesToKey(enc,EVP_md5(),iv,kstr,klen,1,key,NULL);
405 PEM_dek_info(buf,objstr,enc->iv_len,(char *)iv);
409 EVP_EncryptInit_ex(&ctx,enc,NULL,key,iv);
425 OPENSSL_cleanse(iv,sizeof(iv));
[all...]
/external/oprofile/gui/
H A Doprof_start.cpp176 QIntValidator * iv; local
177 iv = new QIntValidator(OP_MIN_BUF_SIZE, OP_MAX_BUF_SIZE, buffer_size_edit);
178 buffer_size_edit->setValidator(iv);
179 iv = new QIntValidator(OP_MIN_NOTE_TABLE_SIZE, OP_MAX_NOTE_TABLE_SIZE, note_table_size_edit);
180 note_table_size_edit->setValidator(iv);
181 iv = new QIntValidator(0, INT_MAX, callgraph_depth_edit);
182 callgraph_depth_edit->setValidator(iv);
183 iv = new QIntValidator(0, INT_MAX, buffer_watershed_edit);
184 buffer_watershed_edit->setValidator(iv);
185 iv
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c743 attr->iv = apos + 2;
941 size_t encr_data_len, const u8 *iv,
946 if (!iv) {
956 if (aes_128_cbc_decrypt(k_encr, iv, decrypted, encr_data_len)) {
979 size_t mac, iv, encr; /* index from buf */ member in struct:eap_sim_msg
1123 msg->iv = (pos - wpabuf_head_u8(msg->buf)) + 4;
1124 if (os_get_random(wpabuf_mhead_u8(msg->buf) + msg->iv,
1126 msg->iv = 0;
1132 msg->iv = 0;
1145 if (msg == NULL || k_encr == NULL || msg->iv
940 eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data, size_t encr_data_len, const u8 *iv, struct eap_sim_attrs *attr, int aka) argument
[all...]
/external/opencv/cv/src/
H A Dcvgeometry.cpp243 CvPoint iv; local
251 CV_READ_SEQ_ELEM( iv, reader );
252 v = cvPointTo32f( iv );
267 CV_READ_SEQ_ELEM( iv, reader );
268 v = cvPointTo32f( iv );
304 CV_READ_SEQ_ELEM( iv, reader );
305 v = cvPointTo32f( iv );
/external/ipsec-tools/src/racoon/
H A Dalgorithm.c523 alg_oakley_encdef_decrypt(doi, buf, key, iv)
525 vchar_t *buf, *key, *iv;
541 res = (f->decrypt)(buf, key, iv);
552 alg_oakley_encdef_encrypt(doi, buf, key, iv)
554 vchar_t *buf, *key, *iv;
570 res = (f->encrypt)(buf, key, iv);
/external/openssl/apps/
H A Denc.c111 unsigned char key[EVP_MAX_KEY_LENGTH],iv[EVP_MAX_IV_LENGTH]; local
275 else if (strcmp(*argv,"-iv") == 0)
310 BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv");
311 BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]");
557 strlen(str),1,key,iv);
567 if ((hiv != NULL) && !set_hex(hiv,iv,sizeof iv))
569 BIO_printf(bio_err,"invalid hex iv value\n");
578 BIO_printf(bio_err, "iv undefine
[all...]
/external/openssl/include/openssl/
H A Devp.h311 const unsigned char *iv, int enc); /* init key */
338 /* Set if the iv handling should be done by the cipher itself */
352 /* Allow use default ASN1 get/set iv */
409 unsigned char iv[EVP_MAX_IV_LENGTH]; member in struct:evp_cipher_info_st
419 unsigned char oiv[EVP_MAX_IV_LENGTH]; /* original iv */
420 unsigned char iv[EVP_MAX_IV_LENGTH]; /* working iv */ member in struct:evp_cipher_ctx_st
575 int datal, int count, unsigned char *key,unsigned char *iv);
582 const unsigned char *key, const unsigned char *iv);
584 const unsigned char *key, const unsigned char *iv);
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dcrypto_gnutls.c208 const u8 *iv, const u8 *key,
274 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR ||
275 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
207 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
H A Dcrypto_openssl.c257 const u8 *iv, const u8 *key,
313 !EVP_EncryptInit_ex(&ctx->enc, cipher, NULL, key, iv)) {
323 !EVP_DecryptInit_ex(&ctx->dec, cipher, NULL, key, iv)) {
256 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
H A Daes_wrap.c470 * @iv: Encryption IV for CBC mode (16 bytes)
475 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
485 os_memcpy(cbc, iv, BLOCK_SIZE);
503 * @iv: Decryption IV for CBC mode (16 bytes)
508 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) argument
518 os_memcpy(cbc, iv, BLOCK_SIZE);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_gnutls.c196 const u8 *iv, const u8 *key,
262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR ||
263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
195 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_gnutls.c196 const u8 *iv, const u8 *key,
262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR ||
263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
195 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_gnutls.c196 const u8 *iv, const u8 *key,
262 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR ||
263 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) {
195 crypto_cipher_init(enum crypto_cipher_alg alg, const u8 *iv, const u8 *key, size_t key_len) argument
/external/openssh/
H A Dkex.h94 u_char *iv; member in struct:Enc
/external/srtp/crypto/include/
H A Dcipher.h116 (cipher_pointer_t cp, void *iv);
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_attr_build.c326 u8 *iv, *data; local
337 iv = wpabuf_put(msg, block_size);
338 if (random_get_bytes(iv, block_size) < 0)
343 if (aes_128_cbc_encrypt(wps->keywrapkey, iv, data, wpabuf_len(plain)))
/external/wpa_supplicant_8/src/wps/
H A Dwps_attr_build.c326 u8 *iv, *data; local
337 iv = wpabuf_put(msg, block_size);
338 if (random_get_bytes(iv, block_size) < 0)
343 if (aes_128_cbc_encrypt(wps->keywrapkey, iv, data, wpabuf_len(plain)))

Completed in 421 milliseconds

1234567891011>>