/external/tcpdump/ |
D | print-esp.c | 114 int ivlen; member 218 buf = buf + sa->ivlen; in esp_print_decrypt_buffer_by_ikev2() 369 sa->ivlen = 0; in espprint_decode_encalgo() 375 sa->ivlen = EVP_CIPHER_iv_length(evp); in espprint_decode_encalgo() 659 int ivlen = 0; in esp_print() local 765 ivlen = sa->ivlen; in esp_print() 777 len = ep - (p + ivlen); in esp_print() 794 EVP_Cipher(ctx, output_buffer, p + ivlen, len); in esp_print() 801 memcpy(p + ivlen, output_buffer, len); in esp_print() 803 advance = ivoff - (const u_char *)esp + ivlen; in esp_print()
|
/external/boringssl/src/crypto/fipsmodule/cipher/ |
D | e_aes.c | 92 int ivlen; // IV length member 324 CRYPTO_gcm128_setiv(&gctx->gcm, &gctx->ks.ks, iv, gctx->ivlen); in aes_gcm_init_key() 331 CRYPTO_gcm128_setiv(&gctx->gcm, &gctx->ks.ks, iv, gctx->ivlen); in aes_gcm_init_key() 333 OPENSSL_memcpy(gctx->iv, iv, gctx->ivlen); in aes_gcm_init_key() 371 gctx->ivlen = c->cipher->iv_len; in aes_gcm_ctrl() 383 if (arg > EVP_MAX_IV_LENGTH && arg > gctx->ivlen) { in aes_gcm_ctrl() 392 gctx->ivlen = arg; in aes_gcm_ctrl() 413 OPENSSL_memcpy(gctx->iv, ptr, gctx->ivlen); in aes_gcm_ctrl() 419 if (arg < 4 || (gctx->ivlen - arg) < 8) { in aes_gcm_ctrl() 425 if (c->encrypt && !RAND_bytes(gctx->iv + arg, gctx->ivlen - arg)) { in aes_gcm_ctrl() [all …]
|
/external/openssh/ |
D | cipher.c | 326 const u_char *key, u_int keylen, const u_char *iv, u_int ivlen, in cipher_init() argument 350 (iv != NULL && ivlen < cipher_ivlen(cipher))) { in cipher_init() 362 aesctr_keysetup(&cc->ac_ctx, key, 8 * keylen, 8 * ivlen); in cipher_init() 573 int ivlen = 0; in cipher_get_keyiv_len() local 576 ivlen = 24; in cipher_get_keyiv_len() 578 ivlen = 0; in cipher_get_keyiv_len() 580 ivlen = sizeof(cc->ac_ctx.ctr); in cipher_get_keyiv_len() 583 ivlen = EVP_CIPHER_CTX_iv_length(cc->evp); in cipher_get_keyiv_len() 585 return (ivlen); in cipher_get_keyiv_len()
|
D | sshkey.c | 3045 size_t i, pubkeylen, keylen, ivlen, blocksize, authlen; in sshkey_private_to_blob2() local 3077 ivlen = cipher_ivlen(cipher); in sshkey_private_to_blob2() 3079 if ((key = calloc(1, keylen + ivlen)) == NULL) { in sshkey_private_to_blob2() 3086 salt, SALT_LEN, key, keylen + ivlen, rounds) < 0) { in sshkey_private_to_blob2() 3099 key + keylen, ivlen, 1)) != 0) in sshkey_private_to_blob2() 3174 explicit_bzero(key, keylen + ivlen); in sshkey_private_to_blob2() 3197 size_t i, keylen = 0, ivlen = 0, authlen = 0, slen = 0; in sshkey_parse_private2() local 3305 ivlen = cipher_ivlen(cipher); in sshkey_parse_private2() 3307 if ((key = calloc(1, keylen + ivlen)) == NULL) { in sshkey_parse_private2() 3316 key, keylen + ivlen, rounds) < 0) { in sshkey_parse_private2() [all …]
|
D | packet.c | 2622 size_t keylen, ivlen, maclen; in newkeys_from_blob() local 2643 (r = sshbuf_get_string(b, &enc->iv, &ivlen)) != 0) in newkeys_from_blob() 2672 enc->iv_len = ivlen; in newkeys_from_blob()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_gnutls.c | 409 int ivlen; in crypto_cipher_init() local 468 ivlen = gcry_cipher_get_algo_blklen(a); in crypto_cipher_init() 469 if (gcry_cipher_setiv(ctx->enc, iv, ivlen) != GPG_ERR_NO_ERROR || in crypto_cipher_init() 470 gcry_cipher_setiv(ctx->dec, iv, ivlen) != GPG_ERR_NO_ERROR) { in crypto_cipher_init()
|
D | crypto_linux.c | 714 alg_iv->ivlen = iv_len; in aes_128_cbc_oper() 823 alg_iv->ivlen = iv_len; in aes_unwrap() 912 alg_iv->ivlen = iv_len; in crypto_cipher_init()
|
/external/kernel-headers/original/uapi/linux/ |
D | if_alg.h | 28 __u32 ivlen; member
|
/external/iproute2/include/uapi/linux/ |
D | if_alg.h | 28 __u32 ivlen; member
|
/external/syzkaller/sys/linux/ |
D | socket_alg.txt | 79 ivlen len[iv, int32]
|
/external/ipsec-tools/src/libipsec/ |
D | key_debug.c | 675 ipsec_hexdump(sav->iv, sav->ivlen ? sav->ivlen : 8);
|
/external/python/cpython3/Modules/ |
D | socketmodule.c | 4530 alg_iv->ivlen = iv.len;
|