/external/boringssl/src/crypto/pem/ |
H A D | pem_info.c | 306 unsigned iv_len = 0; local 309 iv_len = EVP_CIPHER_iv_length(enc); 346 assert(strlen(objstr) + 23 + 2 * iv_len + 13 <= sizeof buf); 349 PEM_dek_info(buf, objstr, iv_len, (char *)iv);
|
H A D | pem_lib.c | 290 const unsigned iv_len = EVP_CIPHER_iv_length(enc); local 303 assert(iv_len <= (int)sizeof(iv)); 304 if (!RAND_bytes(iv, iv_len)) /* Generate a salt */ 316 assert(strlen(objstr) + 23 + 2 * iv_len + 13 <= sizeof buf); 320 PEM_dek_info(buf, objstr, iv_len, (char *)iv);
|
/external/boringssl/src/crypto/cipher/ |
H A D | e_ssl3.c | 302 const size_t iv_len = EVP_CIPHER_CTX_iv_length(&ssl3_ctx->cipher_ctx); local 303 if (iv_len <= 1) { 308 *out_iv_len = iv_len;
|
H A D | e_tls.c | 419 const size_t iv_len = EVP_CIPHER_CTX_iv_length(&tls_ctx->cipher_ctx); local 420 if (iv_len <= 1) { 425 *out_iv_len = iv_len;
|
/external/boringssl/src/crypto/pkcs8/ |
H A D | p5_pbev2.c | 146 size_t iv_len, int enc) { 147 if (iv_len != EVP_CIPHER_iv_length(cipher)) { 142 pkcs5_pbe2_cipher_init(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, unsigned iterations, const char *pass, size_t pass_len, const uint8_t *salt, size_t salt_len, const uint8_t *iv, size_t iv_len, int enc) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-gcm.c | 192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) argument 196 if (iv_len == 12) { 198 os_memcpy(J0, iv, iv_len); 199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len); 207 ghash(H, iv, iv_len, J0); 209 WPA_PUT_BE64(len_buf + 8, iv_len * 8); 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 267 aes_gcm_prepare_j0(iv, iv_len, H, J0); 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sake_common.h | 76 size_t iv_len; member in struct:eap_sake_parse_attr
|
H A D | ikev2_common.c | 434 size_t iv_len; local 453 iv_len = encr_alg->block_size; 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 468 pos = iv + iv_len; 536 size_t iv_len, pad_len; local 552 iv_len = encr_alg->block_size; 574 iv = wpabuf_put(msg, iv_len); 575 if (random_get_bytes(iv, iv_len)) { 580 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len; [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-gcm.c | 192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) argument 196 if (iv_len == 12) { 198 os_memcpy(J0, iv, iv_len); 199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len); 207 ghash(H, iv, iv_len, J0); 209 WPA_PUT_BE64(len_buf + 8, iv_len * 8); 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 267 aes_gcm_prepare_j0(iv, iv_len, H, J0); 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sake_common.h | 76 size_t iv_len; member in struct:eap_sake_parse_attr
|
H A D | ikev2_common.c | 434 size_t iv_len; local 453 iv_len = encr_alg->block_size; 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 468 pos = iv + iv_len; 536 size_t iv_len, pad_len; local 552 iv_len = encr_alg->block_size; 574 iv = wpabuf_put(msg, iv_len); 575 if (random_get_bytes(iv, iv_len)) { 580 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-gcm.c | 192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) argument 196 if (iv_len == 12) { 198 os_memcpy(J0, iv, iv_len); 199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len); 207 ghash(H, iv, iv_len, J0); 209 WPA_PUT_BE64(len_buf + 8, iv_len * 8); 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 267 aes_gcm_prepare_j0(iv, iv_len, H, J0); 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.h | 76 size_t iv_len; member in struct:eap_sake_parse_attr
|
H A D | ikev2_common.c | 434 size_t iv_len; local 453 iv_len = encr_alg->block_size; 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 468 pos = iv + iv_len; 536 size_t iv_len, pad_len; local 552 iv_len = encr_alg->block_size; 574 iv = wpabuf_put(msg, iv_len); 575 if (random_get_bytes(iv, iv_len)) { 580 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len; [all...] |
/external/boringssl/src/ssl/ |
H A D | t1_enc.c | 402 size_t iv_len = ssl->s3->tmp.new_fixed_iv_len; local 403 assert((mac_secret_len + key_len + iv_len) * 2 == hs->key_block_len); 415 key_data += iv_len; 417 key_data += iv_len; 432 hs->new_cipher, key, key_len, mac_secret, mac_secret_len, iv, iv_len);
|
H A D | tls13_enc.c | 156 size_t iv_len = EVP_AEAD_nonce_length(aead); local 159 (const uint8_t *)"iv", 2, NULL, 0, iv_len)) { 164 direction, version, session->cipher, key, key_len, NULL, 0, iv, iv_len);
|
/external/openssh/ |
H A D | cipher.c | 65 u_int iv_len; /* defaults to block_size */ member in struct:sshcipher 186 * needs no IV. XXX make iv_len == -1 default? 188 return (c->iv_len != 0 || (c->flags & CFLAG_CHACHAPOLY) != 0) ? 189 c->iv_len : c->block_size;
|
H A D | kex.h | 106 u_int iv_len; member in struct:sshenc
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs5.c | 34 size_t iv_len; member in struct:pkcs5_params 270 params->iv_len = hdr.length; 271 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); 389 params->iv_len != 8) 402 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len);
|
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs5.c | 34 size_t iv_len; member in struct:pkcs5_params 270 params->iv_len = hdr.length; 271 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); 389 params->iv_len != 8) 402 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs5.c | 34 size_t iv_len; member in struct:pkcs5_params 270 params->iv_len = hdr.length; 271 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); 389 params->iv_len != 8) 402 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len);
|
/external/boringssl/include/openssl/ |
H A D | cipher.h | 514 /* iv_len contains the IV size, in bytes, or zero if inapplicable. */ 515 unsigned iv_len; member in struct:evp_cipher_st
|
/external/boringssl/src/include/openssl/ |
H A D | cipher.h | 514 /* iv_len contains the IV size, in bytes, or zero if inapplicable. */ 515 unsigned iv_len; member in struct:evp_cipher_st
|
/external/syslinux/gpxe/src/net/ |
H A D | tls.c | 1127 size_t iv_len = blocksize; local 1137 iv_len = 0; 1140 padding_len = ( ( blocksize - 1 ) & -( iv_len + len + mac_len + 1 ) ); 1141 *plaintext_len = ( iv_len + len + mac_len + padding_len + 1 ); 1148 content = ( iv + iv_len ); 1153 memset ( iv, 0, iv_len ); 1311 size_t iv_len; local 1326 iv_len = tls->rx_cipherspec.cipher->blocksize; 1329 iv_len = 0; 1333 if ( plaintext_len < ( iv_len [all...] |
/external/kernel-headers/original/uapi/linux/ |
H A D | virtio_crypto.h | 293 __le32 iv_len; member in struct:virtio_crypto_cipher_para 322 __le32 iv_len; member in struct:virtio_crypto_aead_para 350 __le32 iv_len; member in struct:virtio_crypto_alg_chain_data_para
|