Searched refs:iv_len (Results 1 - 25 of 40) sorted by relevance

12

/external/srtp/crypto/include/
H A Dcryptoalg.h107 unsigned iv_len; member in struct:cryptoalg_ctx_t
116 #define cryptoalg_get_iv_len(cryptoalg) ((cryptoalg)->iv_len)
H A Dxfm.h78 unsigned iv_len; member in struct:xfm_ctx_t
86 #define xfm_get_iv_len(xfm) ((xfm)->iv_len)
118 unsigned iv_len; member in struct:cryptoalg_ctx_t
127 #define cryptoalg_get_iv_len(cryptoalg) ((cryptoalg)->iv_len)
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-gcm.c192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) argument
196 if (iv_len == 12) {
198 os_memcpy(J0, iv, iv_len);
199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len);
207 ghash(H, iv, iv_len, J0);
209 WPA_PUT_BE64(len_buf + 8, iv_len * 8);
254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
267 aes_gcm_prepare_j0(iv, iv_len, H, J0);
288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
[all...]
H A Daes_wrap.h51 const u8 *iv, size_t iv_len,
56 const u8 *iv, size_t iv_len,
61 const u8 *iv, size_t iv_len,
/external/wpa_supplicant_8/src/crypto/
H A Daes-gcm.c192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) argument
196 if (iv_len == 12) {
198 os_memcpy(J0, iv, iv_len);
199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len);
207 ghash(H, iv, iv_len, J0);
209 WPA_PUT_BE64(len_buf + 8, iv_len * 8);
254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
267 aes_gcm_prepare_j0(iv, iv_len, H, J0);
288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
[all...]
H A Daes_wrap.h51 const u8 *iv, size_t iv_len,
56 const u8 *iv, size_t iv_len,
61 const u8 *iv, size_t iv_len,
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-gcm.c192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) argument
196 if (iv_len == 12) {
198 os_memcpy(J0, iv, iv_len);
199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len);
207 ghash(H, iv, iv_len, J0);
209 WPA_PUT_BE64(len_buf + 8, iv_len * 8);
254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
267 aes_gcm_prepare_j0(iv, iv_len, H, J0);
288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
[all...]
H A Daes_wrap.h51 const u8 *iv, size_t iv_len,
56 const u8 *iv, size_t iv_len,
61 const u8 *iv, size_t iv_len,
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Dikev2_common.c434 size_t iv_len; local
453 iv_len = encr_alg->block_size;
461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) {
468 pos = iv + iv_len;
536 size_t iv_len, pad_len; local
552 iv_len = encr_alg->block_size;
574 iv = wpabuf_put(msg, iv_len);
575 if (random_get_bytes(iv, iv_len)) {
580 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len;
[all...]
H A Deap_sake_common.h76 size_t iv_len; member in struct:eap_sake_parse_attr
/external/wpa_supplicant_8/src/eap_common/
H A Dikev2_common.c434 size_t iv_len; local
453 iv_len = encr_alg->block_size;
461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) {
468 pos = iv + iv_len;
536 size_t iv_len, pad_len; local
552 iv_len = encr_alg->block_size;
574 iv = wpabuf_put(msg, iv_len);
575 if (random_get_bytes(iv, iv_len)) {
580 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len;
[all...]
H A Deap_sake_common.h76 size_t iv_len; member in struct:eap_sake_parse_attr
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dikev2_common.c434 size_t iv_len; local
453 iv_len = encr_alg->block_size;
461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) {
468 pos = iv + iv_len;
536 size_t iv_len, pad_len; local
552 iv_len = encr_alg->block_size;
574 iv = wpabuf_put(msg, iv_len);
575 if (random_get_bytes(iv, iv_len)) {
580 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len;
[all...]
H A Deap_sake_common.h76 size_t iv_len; member in struct:eap_sake_parse_attr
/external/boringssl/src/ssl/
H A Dt1_enc.c284 size_t key_len, iv_len, mac_secret_len; local
304 iv_len = ssl->s3->tmp.new_fixed_iv_len;
316 if (key_len < mac_secret_len + iv_len) {
320 key_len -= mac_secret_len + iv_len;
333 key_data += iv_len;
335 key_data += iv_len;
357 iv_len);
365 iv_len);
/external/boringssl/src/crypto/cipher/
H A Dderive_key.c79 niv = type->iv_len;
H A De_ssl3.c313 const size_t iv_len = EVP_CIPHER_CTX_iv_length(&ssl3_ctx->cipher_ctx); local
314 if (iv_len <= 1) {
319 *out_iv_len = iv_len;
/external/boringssl/src/crypto/pem/
H A Dpem_info.c321 unsigned iv_len = 0; local
325 iv_len = EVP_CIPHER_iv_length(enc);
368 assert(strlen(objstr)+23+2*iv_len+13 <= sizeof buf);
371 PEM_dek_info(buf,objstr,iv_len,(char *)iv);
H A Dpem_lib.c325 const unsigned iv_len = EVP_CIPHER_iv_length(enc); local
340 assert(iv_len <= (int)sizeof(iv));
341 if (!RAND_bytes(iv, iv_len)) /* Generate a salt */
350 assert(strlen(objstr)+23+2*iv_len+13 <= sizeof buf);
354 PEM_dek_info(buf,objstr,iv_len,(char *)iv);
/external/boringssl/src/crypto/pkcs8/
H A Dp5_pbev2.c105 unsigned iv_len; local
107 iv_len = EVP_CIPHER_CTX_iv_length(c);
108 return ASN1_TYPE_set_octetstring(type, c->oiv, iv_len);
370 const size_t iv_len = EVP_CIPHER_CTX_iv_length(ctx); local
371 if ((size_t) iv->value.octet_string->length != iv_len) {
/external/openssh/
H A Dcipher-ctr.c134 aes_ctr.iv_len = AES_BLOCK_SIZE;
H A Dcipher-3des1.c148 ssh1_3des.iv_len = 0;
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dpkcs5.c34 size_t iv_len; member in struct:pkcs5_params
270 params->iv_len = hdr.length;
271 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len);
389 params->iv_len != 8)
402 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len);
/external/wpa_supplicant_8/src/tls/
H A Dpkcs5.c34 size_t iv_len; member in struct:pkcs5_params
270 params->iv_len = hdr.length;
271 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len);
389 params->iv_len != 8)
402 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len);
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dpkcs5.c34 size_t iv_len; member in struct:pkcs5_params
270 params->iv_len = hdr.length;
271 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len);
389 params->iv_len != 8)
402 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len);

Completed in 1257 milliseconds

12