/external/wpa_supplicant_8/src/crypto/ |
D | aes-gcm.c | 192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) in aes_gcm_prepare_j0() argument 196 if (iv_len == 12) { in aes_gcm_prepare_j0() 198 os_memcpy(J0, iv, iv_len); in aes_gcm_prepare_j0() 199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len); in aes_gcm_prepare_j0() 207 ghash(H, iv, iv_len, J0); in aes_gcm_prepare_j0() 209 WPA_PUT_BE64(len_buf + 8, iv_len * 8); in aes_gcm_prepare_j0() 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gcm_ae() argument 267 aes_gcm_prepare_j0(iv, iv_len, H, J0); in aes_gcm_ae() 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gcm_ad() argument 301 aes_gcm_prepare_j0(iv, iv_len, H, J0); in aes_gcm_ad() [all …]
|
D | crypto_linux.c | 686 size_t iv_len = AES_BLOCK_SIZE; in aes_128_cbc_oper() local 698 CMSG_SPACE(sizeof(*alg_iv) + iv_len); in aes_128_cbc_oper() 712 hdr->cmsg_len = CMSG_SPACE(sizeof(*alg_iv) + iv_len); in aes_128_cbc_oper() 714 alg_iv->ivlen = iv_len; in aes_128_cbc_oper() 715 os_memcpy(alg_iv->iv, iv, iv_len); in aes_128_cbc_oper() 795 size_t iv_len = 8; in aes_unwrap() local 801 io[0].iov_base = (void *) (cipher + iv_len); in aes_unwrap() 807 CMSG_SPACE(sizeof(*alg_iv) + iv_len); in aes_unwrap() 821 hdr->cmsg_len = CMSG_SPACE(sizeof(*alg_iv) + iv_len); in aes_unwrap() 823 alg_iv->ivlen = iv_len; in aes_unwrap() [all …]
|
D | aes_wrap.h | 53 const u8 *iv, size_t iv_len, 58 const u8 *iv, size_t iv_len, 63 const u8 *iv, size_t iv_len,
|
/external/boringssl/src/ssl/ |
D | t1_enc.cc | 196 size_t mac_secret_len, key_len, iv_len; in tls1_configure_aead() local 197 if (!get_key_block_lengths(ssl, &mac_secret_len, &key_len, &iv_len, cipher)) { in tls1_configure_aead() 202 const size_t key_block_size = 2 * (mac_secret_len + key_len + iv_len); in tls1_configure_aead() 217 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len, iv_len); in tls1_configure_aead() 222 iv = key_block.subspan(2 * mac_secret_len + 2 * key_len + iv_len, iv_len); in tls1_configure_aead() 226 if (iv_override.size() != iv_len) { in tls1_configure_aead()
|
D | tls13_enc.cc | 167 size_t iv_len = EVP_AEAD_nonce_length(aead); in tls13_set_traffic_key() local 170 2, NULL, 0, iv_len)) { in tls13_set_traffic_key() 178 MakeConstSpan(iv, iv_len)); in tls13_set_traffic_key()
|
/external/boringssl/src/crypto/fipsmodule/cipher/ |
D | e_des.c | 96 out->iv_len = 8; in DEFINE_METHOD_FUNCTION() 123 out->iv_len = 0; in DEFINE_METHOD_FUNCTION() 164 out->iv_len = 8; in DEFINE_METHOD_FUNCTION() 188 out->iv_len = 8; in DEFINE_METHOD_FUNCTION() 216 out->iv_len = 0; in DEFINE_METHOD_FUNCTION() 228 out->iv_len = 0; in DEFINE_METHOD_FUNCTION()
|
D | e_aes.c | 371 gctx->ivlen = c->cipher->iv_len; in aes_gcm_ctrl() 540 out->iv_len = 16; in DEFINE_LOCAL_DATA() 553 out->iv_len = 16; in DEFINE_LOCAL_DATA() 578 out->iv_len = 16; in DEFINE_LOCAL_DATA() 591 out->iv_len = 12; in DEFINE_LOCAL_DATA() 608 out->iv_len = 16; in DEFINE_LOCAL_DATA() 621 out->iv_len = 16; in DEFINE_LOCAL_DATA() 646 out->iv_len = 16; in DEFINE_LOCAL_DATA() 659 out->iv_len = 12; in DEFINE_LOCAL_DATA() 676 out->iv_len = 16; in DEFINE_LOCAL_DATA() [all …]
|
D | cipher.c | 512 return ctx->cipher->iv_len; in EVP_CIPHER_CTX_iv_length() 586 return cipher->iv_len; in EVP_CIPHER_iv_length()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 434 size_t iv_len; in ikev2_decrypt_payload() local 453 iv_len = encr_alg->block_size; in ikev2_decrypt_payload() 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { in ikev2_decrypt_payload() 468 pos = iv + iv_len; in ikev2_decrypt_payload() 536 size_t iv_len, pad_len; in ikev2_build_encrypted() local 552 iv_len = encr_alg->block_size; in ikev2_build_encrypted() 574 iv = wpabuf_put(msg, iv_len); in ikev2_build_encrypted() 575 if (random_get_bytes(iv, iv_len)) { in ikev2_build_encrypted() 580 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len; in ikev2_build_encrypted() 581 if (pad_len == iv_len) in ikev2_build_encrypted()
|
D | eap_sake_common.h | 76 size_t iv_len; member
|
D | eap_sake_common.c | 106 attr->iv_len = len; in eap_sake_parse_add_attr()
|
/external/boringssl/src/crypto/pem/ |
D | pem_info.c | 287 unsigned iv_len = 0; in PEM_X509_INFO_write_bio() local 290 iv_len = EVP_CIPHER_iv_length(enc); in PEM_X509_INFO_write_bio() 327 assert(strlen(objstr) + 23 + 2 * iv_len + 13 <= sizeof buf); in PEM_X509_INFO_write_bio() 330 PEM_dek_info(buf, objstr, iv_len, (char *)iv); in PEM_X509_INFO_write_bio()
|
D | pem_lib.c | 309 const unsigned iv_len = EVP_CIPHER_iv_length(enc); in PEM_ASN1_write_bio() local 322 assert(iv_len <= (int)sizeof(iv)); in PEM_ASN1_write_bio() 323 if (!RAND_bytes(iv, iv_len)) /* Generate a salt */ in PEM_ASN1_write_bio() 335 assert(strlen(objstr) + 23 + 2 * iv_len + 13 <= sizeof buf); in PEM_ASN1_write_bio() 339 PEM_dek_info(buf, objstr, iv_len, (char *)iv); in PEM_ASN1_write_bio()
|
/external/boringssl/src/fipstools/ |
D | cavp_aes_gcm_test.cc | 87 std::string key_len, iv_len, pt_len_str, aad_len_str, tag_len; in TestAEADDecrypt() local 89 !t->GetInstruction(&iv_len, "IVlen") || in TestAEADDecrypt() 108 iv.size() * 8 != strtoul(iv_len.c_str(), nullptr, 0) || in TestAEADDecrypt()
|
/external/kernel-headers/original/uapi/linux/ |
D | virtio_crypto.h | 293 __le32 iv_len; member 322 __le32 iv_len; member 350 __le32 iv_len; member
|
/external/wpa_supplicant_8/src/tls/ |
D | pkcs5.c | 34 size_t iv_len; member 270 params->iv_len = hdr.length; in pkcs5_get_params_pbes2() 271 wpa_hexdump(MSG_DEBUG, "PKCS #5: IV", params->iv, params->iv_len); in pkcs5_get_params_pbes2() 389 params->iv_len != 8) in pkcs5_crypto_init_pbes2() 402 wpa_hexdump(MSG_DEBUG, "PKCS #5: DES IV", params->iv, params->iv_len); in pkcs5_crypto_init_pbes2()
|
/external/boringssl/src/crypto/pkcs8/ |
D | p5_pbev2.c | 146 size_t iv_len, int enc) { in pkcs5_pbe2_cipher_init() argument 147 if (iv_len != EVP_CIPHER_iv_length(cipher)) { in pkcs5_pbe2_cipher_init()
|
/external/boringssl/src/crypto/cipher_extra/ |
D | derive_key.c | 77 niv = type->iv_len; in EVP_BytesToKey()
|
D | e_tls.c | 465 const size_t iv_len = EVP_CIPHER_CTX_iv_length(&tls_ctx->cipher_ctx); in aead_tls_get_iv() local 466 if (iv_len <= 1) { in aead_tls_get_iv() 471 *out_iv_len = iv_len; in aead_tls_get_iv()
|
/external/openssh/ |
D | cipher.c | 74 u_int iv_len; /* defaults to block_size */ member 205 return (c->iv_len != 0 || (c->flags & CFLAG_CHACHAPOLY) != 0) ? in cipher_ivlen() 206 c->iv_len : c->block_size; in cipher_ivlen()
|
D | cipher-ctr.c | 134 aes_ctr.iv_len = AES_BLOCK_SIZE; in evp_aes_128_ctr()
|
D | cipher-3des1.c | 150 ssh1_3des.iv_len = 0; in evp_ssh1_3des()
|
D | cipher-aes.c | 150 rijndal_cbc.iv_len = RIJNDAEL_BLOCKSIZE; in evp_rijndael()
|
D | kex.c | 568 explicit_bzero(newkeys->enc.iv, newkeys->enc.iv_len); in kex_free_newkeys() 664 enc->iv_len = cipher_ivlen(enc->cipher); in choose_enc() 861 need = MAXIMUM(need, newkeys->enc.iv_len); in kex_choose_conf() 865 dh_need = MAXIMUM(dh_need, newkeys->enc.iv_len); in kex_choose_conf()
|
D | kex.h | 112 u_int iv_len; member
|