/external/openssh/ |
H A D | cipher-ctr.c | 85 ssh_aes_ctr_init(EVP_CIPHER_CTX *ctx, const u_char *key, const u_char *iv, argument 97 if (iv != NULL) 98 memcpy(c->aes_counter, iv, AES_BLOCK_SIZE); 116 ssh_aes_ctr_iv(EVP_CIPHER_CTX *evp, int doset, u_char * iv, size_t len) argument 123 memcpy(c->aes_counter, iv, len); 125 memcpy(iv, c->aes_counter, len);
|
H A D | cipher.c | 207 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, 233 if (iv != NULL && ivlen < cipher->block_size) 234 fatal("cipher_init: iv length %d is insufficient for %s.", 247 EVP_CipherInit(&cc->evp, type, (u_char *)key, (u_char *)iv, 250 if (EVP_CipherInit(&cc->evp, type, NULL, (u_char *)iv, 336 cipher_get_keyiv(CipherContext *cc, u_char *iv, u_int len) argument 349 fatal("%s: wrong iv length %d != %d", __func__, 353 ssh_rijndael_iv(&cc->evp, 0, iv, len); 357 ssh_aes_ctr_iv(&cc->evp, 0, iv, len); 359 memcpy(iv, c 206 cipher_init(CipherContext *cc, Cipher *cipher, const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, int do_encrypt) argument 370 cipher_set_keyiv(CipherContext *cc, u_char *iv) argument [all...] |
H A D | cipher-aes.c | 53 ssh_rijndael_init(EVP_CIPHER_CTX *ctx, const u_char *key, const u_char *iv, argument 68 if (iv != NULL) 69 memcpy(c->r_iv, iv, RIJNDAEL_BLOCKSIZE); 133 ssh_rijndael_iv(EVP_CIPHER_CTX *evp, int doset, u_char * iv, u_int len) argument 140 memcpy(c->r_iv, iv, len); 142 memcpy(iv, c->r_iv, len);
|
/external/chromium/crypto/ |
H A D | encryptor_unittest.cc | 22 std::string iv("the iv: 16 bytes"); 23 EXPECT_EQ(16U, iv.size()); 24 EXPECT_TRUE(encryptor.Init(key.get(), crypto::Encryptor::CBC, iv)); 96 std::string iv(reinterpret_cast<const char*>(raw_iv), sizeof(raw_iv)); 97 EXPECT_EQ(16U, iv.size()); 98 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); 117 std::string iv = "Sweet Sixteen IV"; local 129 EXPECT_EQ(16U, iv.size()); 130 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); 145 std::string iv = "Sweet Sixteen IV"; local 173 std::string iv = "Sweet Sixteen IV"; local 187 std::string iv = "OnlyForteen :("; local 198 std::string iv = "Sweet Sixteen IV"; local 219 std::string iv = "Sweet Sixteen IV"; local [all...] |
H A D | encryptor_mac.cc | 23 bool Encryptor::Init(SymmetricKey* key, Mode mode, const std::string& iv) { argument 31 if (iv.size() != kCCBlockSizeAES128) 36 iv_ = iv;
|
/external/srtp/doc/ |
H A D | crypto_kernel.txt | 46 cipher_set_iv(cipher_t *cipher, void *iv);
|
/external/chromium/chrome/browser/password_manager/ |
H A D | encryptor_linux.cc | 88 std::string iv(kIVBlockSizeAES128, ' '); 90 if (!encryptor.Init(encryption_key.get(), crypto::Encryptor::CBC, iv)) 130 std::string iv(kIVBlockSizeAES128, ' '); 132 if (!encryptor.Init(encryption_key.get(), crypto::Encryptor::CBC, iv))
|
/external/openssl/crypto/des/ |
H A D | enc_writ.c | 81 DES_key_schedule *sched, DES_cblock *iv) 118 ((len-i) > MAXWRITE)?MAXWRITE:(len-i),sched,iv); 146 DES_pcbc_encrypt(cp,&(outbuf[HDRSIZE]),(len<8)?8:len,sched,iv, 149 DES_cbc_encrypt(cp,&(outbuf[HDRSIZE]),(len<8)?8:len,sched,iv, 80 DES_enc_write(int fd, const void *_buf, int len, DES_key_schedule *sched, DES_cblock *iv) argument
|
H A D | cbc_cksm.c | 69 const unsigned char *iv = &(*ivec)[0]; local 71 c2l(iv,tout0); 72 c2l(iv,tout1);
|
H A D | des_enc.c | 299 unsigned char *iv; local 303 iv = &(*ivec)[0]; 307 c2l(iv,tout0); 308 c2l(iv,tout1); 340 iv = &(*ivec)[0]; 341 l2c(tout0,iv); 342 l2c(tout1,iv); 348 c2l(iv,xor0); 349 c2l(iv,xor1); 392 iv [all...] |
H A D | xcbc_enc.c | 123 unsigned char *iv; local 132 iv = &(*ivec)[0]; 136 c2l(iv,tout0); 137 c2l(iv,tout1); 157 iv = &(*ivec)[0]; 158 l2c(tout0,iv); 159 l2c(tout1,iv); 163 c2l(iv,xor0); 164 c2l(iv,xor1); 189 iv [all...] |
/external/openssl/crypto/evp/ |
H A D | e_aes_cbc_hmac_sha1.c | 108 const AES_KEY *key, unsigned char iv[16], 115 const unsigned char *iv, int enc) 178 iv = 0, /* explicit IV in TLS 1.1 and later */ local 195 iv = AES_BLOCK_SIZE; 198 if (plen>(sha_off+iv) && (blocks=(plen-(sha_off+iv))/SHA_CBLOCK)) { 199 SHA1_Update(&key->md,in+iv,sha_off); 202 ctx->iv,&key->md,in+iv+sha_off); 213 sha_off += iv; 113 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument [all...] |
H A D | e_xcbc_d.c | 70 const unsigned char *iv,int enc); 105 const unsigned char *iv, int enc) 122 (DES_cblock *)&(ctx->iv[0]), 132 (DES_cblock *)&(ctx->iv[0]), 104 desx_cbc_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) argument
|
H A D | p_seal.c | 70 int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) 84 RAND_pseudo_bytes(iv,EVP_CIPHER_CTX_iv_length(ctx)); 86 if(!EVP_EncryptInit_ex(ctx,NULL,NULL,key,iv)) return 0; 69 EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) argument
|
H A D | e_des3.c | 71 const unsigned char *iv,int enc); 74 const unsigned char *iv,int enc); 108 (DES_cblock *)ctx->iv, &ctx->num); 116 (DES_cblock *)ctx->iv, &ctx->num); 129 printf("\t iv= "); 131 printf("%02X",ctx->iv[i]); 139 (DES_cblock *)ctx->iv, ctx->encrypt); 147 (DES_cblock *)ctx->iv, ctx->encrypt); 158 (DES_cblock *)ctx->iv, &ctx->num, ctx->encrypt); 166 (DES_cblock *)ctx->iv, 239 des_ede_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) argument 256 des_ede3_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) argument [all...] |
H A D | e_rc2.c | 70 const unsigned char *iv,int enc); 138 const unsigned char *iv, int enc) 174 unsigned char iv[EVP_MAX_IV_LENGTH]; local 179 OPENSSL_assert(l <= sizeof(iv)); 180 i=ASN1_TYPE_get_int_octetstring(type,&num,iv,l); 186 if(i > 0 && !EVP_CipherInit_ex(c, NULL, NULL, NULL, iv, -1)) 137 rc2_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes_wrap.h | 39 int __must_check aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, 41 int __must_check aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, 44 const u8 *iv, size_t iv_len, 49 const u8 *iv, size_t iv_len, 54 const u8 *iv, size_t iv_len,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes_wrap.h | 39 int __must_check aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, 41 int __must_check aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, 44 const u8 *iv, size_t iv_len, 49 const u8 *iv, size_t iv_len, 54 const u8 *iv, size_t iv_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes_wrap.h | 39 int __must_check aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, 41 int __must_check aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, 44 const u8 *iv, size_t iv_len, 49 const u8 *iv, size_t iv_len, 54 const u8 *iv, size_t iv_len,
|
/external/openssl/crypto/rc2/ |
H A D | rc2_cbc.c | 63 RC2_KEY *ks, unsigned char *iv, int encrypt) 72 c2l(iv,tout0); 73 c2l(iv,tout1); 74 iv-=8; 98 l2c(tout0,iv); 99 l2c(tout1,iv); 103 c2l(iv,xor0); 104 c2l(iv,xor1); 105 iv-=8; 129 l2c(xor0,iv); 62 RC2_cbc_encrypt(const unsigned char *in, unsigned char *out, long length, RC2_KEY *ks, unsigned char *iv, int encrypt) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
H A D | CFBBlockCipher.java | 72 byte[] iv = ivParam.getIV(); 74 if (iv.length < IV.length) 77 System.arraycopy(iv, 0, IV, IV.length - iv.length, iv.length); 78 for (int i = 0; i < IV.length - iv.length; i++) 85 System.arraycopy(iv, 0, IV, 0, IV.length);
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/boxes/ |
H A D | AbstractSampleEncryptionBox.java | 66 e.iv = new byte[useThisIvSize < 0 ? 8 : useThisIvSize]; // default to 8 67 content.get(e.iv); 155 System.arraycopy(entry.iv, 0, ivFull, ivSize - entry.iv.length, entry.iv.length); 158 // just put the iv - i don't know any better 159 byteBuffer.put(entry.iv); 195 public byte[] iv; field in class:AbstractSampleEncryptionBox.Entry 203 size = iv.length; 276 if (!new BigInteger(iv) [all...] |
/external/clang/test/SemaCXX/ |
H A D | overload-call.cpp | 6 void test_f(int iv, float fv) { argument 8 int* ip = f(iv); 17 void test_g(int iv, float fv) { argument 18 int* ip1 = g(iv, fv, 0); 19 float* fp1 = g(iv, iv, 0); 20 double* dp1 = g(iv, fv, fv); 22 char* cp2 = g(0, 0, 0, iv, fv); 38 void test_i(short sv, int iv, long lv, unsigned char ucv) { argument 40 int* ip2 = i(iv); 133 test_multiparm(long lv, short sv, int iv) argument [all...] |
/external/qemu/ |
H A D | bt-host.c | 51 struct iovec iv[2]; local 53 iv[0].iov_base = (void *)&pkt; 54 iv[0].iov_len = 1; 55 iv[1].iov_base = (void *) data; 56 iv[1].iov_len = len; 58 while (writev(s->fd, iv, 2) < 0) {
|
H A D | bt-vhci.c | 97 struct iovec iv[2]; 99 iv[0].iov_base = &pkt; 100 iv[0].iov_len = 1; 101 iv[1].iov_base = (void *) data; 102 iv[1].iov_len = len; 104 while (writev(s->fd, iv, 2) < 0)
|