/external/wpa_supplicant_8/src/crypto/ |
D | aes-gcm.c | 192 static void aes_gcm_prepare_j0(const u8 *iv, size_t iv_len, const u8 *H, u8 *J0) in aes_gcm_prepare_j0() argument 196 if (iv_len == 12) { in aes_gcm_prepare_j0() 198 os_memcpy(J0, iv, iv_len); in aes_gcm_prepare_j0() 199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len); in aes_gcm_prepare_j0() 207 ghash(H, iv, iv_len, J0); in aes_gcm_prepare_j0() 209 WPA_PUT_BE64(len_buf + 8, iv_len * 8); in aes_gcm_prepare_j0() 254 int aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gcm_ae() argument 267 aes_gcm_prepare_j0(iv, iv_len, H, J0); in aes_gcm_ae() 288 int aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, in aes_gcm_ad() argument 301 aes_gcm_prepare_j0(iv, iv_len, H, J0); in aes_gcm_ad() [all …]
|
D | aes_wrap.h | 51 const u8 *iv, size_t iv_len, 56 const u8 *iv, size_t iv_len, 61 const u8 *iv, size_t iv_len,
|
/external/srtp/crypto/include/ |
D | xfm.h | 78 unsigned iv_len; member 86 #define xfm_get_iv_len(xfm) ((xfm)->iv_len) 118 unsigned iv_len; member 127 #define cryptoalg_get_iv_len(cryptoalg) ((cryptoalg)->iv_len)
|
D | cryptoalg.h | 107 unsigned iv_len; member 116 #define cryptoalg_get_iv_len(cryptoalg) ((cryptoalg)->iv_len)
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 435 size_t iv_len; in ikev2_decrypt_payload() local 454 iv_len = encr_alg->block_size; in ikev2_decrypt_payload() 462 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { in ikev2_decrypt_payload() 469 pos = iv + iv_len; in ikev2_decrypt_payload() 537 size_t iv_len, pad_len; in ikev2_build_encrypted() local 553 iv_len = encr_alg->block_size; in ikev2_build_encrypted() 575 iv = wpabuf_put(msg, iv_len); in ikev2_build_encrypted() 576 if (random_get_bytes(iv, iv_len)) { in ikev2_build_encrypted() 581 pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len; in ikev2_build_encrypted() 582 if (pad_len == iv_len) in ikev2_build_encrypted()
|
D | eap_sake_common.h | 76 size_t iv_len; member
|
D | eap_sake_common.c | 106 attr->iv_len = len; in eap_sake_parse_add_attr()
|
/external/boringssl/src/ssl/ |
D | t1_enc.c | 308 size_t key_len, iv_len, mac_secret_len; in tls1_change_cipher_state() local 317 iv_len = s->s3->tmp.new_fixed_iv_len; in tls1_change_cipher_state() 329 if (key_len < mac_secret_len + iv_len) { in tls1_change_cipher_state() 333 key_len -= mac_secret_len + iv_len; in tls1_change_cipher_state() 346 key_data += iv_len; in tls1_change_cipher_state() 348 key_data += iv_len; in tls1_change_cipher_state() 370 iv_len); in tls1_change_cipher_state() 377 iv_len); in tls1_change_cipher_state()
|
/external/boringssl/src/crypto/pem/ |
D | pem_info.c | 321 unsigned iv_len = 0; in PEM_X509_INFO_write_bio() local 325 iv_len = EVP_CIPHER_iv_length(enc); in PEM_X509_INFO_write_bio() 368 assert(strlen(objstr)+23+2*iv_len+13 <= sizeof buf); in PEM_X509_INFO_write_bio() 371 PEM_dek_info(buf,objstr,iv_len,(char *)iv); in PEM_X509_INFO_write_bio()
|
D | pem_lib.c | 329 const unsigned iv_len = EVP_CIPHER_iv_length(enc); in PEM_ASN1_write_bio() local 344 assert(iv_len <= (int)sizeof(iv)); in PEM_ASN1_write_bio() 345 if (!RAND_bytes(iv, iv_len)) /* Generate a salt */ in PEM_ASN1_write_bio() 354 assert(strlen(objstr)+23+2*iv_len+13 <= sizeof buf); in PEM_ASN1_write_bio() 358 PEM_dek_info(buf,objstr,iv_len,(char *)iv); in PEM_ASN1_write_bio()
|
/external/boringssl/src/crypto/pkcs8/ |
D | p5_pbev2.c | 103 unsigned iv_len; in param_to_asn1() local 105 iv_len = EVP_CIPHER_CTX_iv_length(c); in param_to_asn1() 106 return ASN1_TYPE_set_octetstring(type, c->oiv, iv_len); in param_to_asn1()
|
/external/boringssl/src/crypto/cipher/ |
D | derive_key.c | 79 niv = type->iv_len; in EVP_BytesToKey()
|
D | cipher.c | 519 return ctx->cipher->iv_len; in EVP_CIPHER_CTX_iv_length() 595 return cipher->iv_len; in EVP_CIPHER_iv_length()
|
D | e_aes.c | 525 gctx->ivlen = c->cipher->iv_len; in aes_gcm_ctrl()
|
/external/openssh/ |
D | cipher.c | 65 u_int iv_len; /* defaults to block_size */ member 188 return (c->iv_len != 0 || (c->flags & CFLAG_CHACHAPOLY) != 0) ? in cipher_ivlen() 189 c->iv_len : c->block_size; in cipher_ivlen()
|
D | cipher-ctr.c | 134 aes_ctr.iv_len = AES_BLOCK_SIZE; in evp_aes_128_ctr()
|
D | cipher-3des1.c | 148 ssh1_3des.iv_len = 0; in evp_ssh1_3des()
|
D | cipher-aes.c | 150 rijndal_cbc.iv_len = RIJNDAEL_BLOCKSIZE; in evp_rijndael()
|
D | kex.h | 106 u_int iv_len; member
|
D | kex.c | 480 enc->iv_len = cipher_ivlen(enc->cipher); in choose_enc() 655 need = MAX(need, newkeys->enc.iv_len); in kex_choose_conf() 659 dh_need = MAX(dh_need, newkeys->enc.iv_len); in kex_choose_conf()
|
D | packet.c | 948 explicit_bzero(enc->iv, enc->iv_len); in ssh_set_newkeys() 973 enc->iv, enc->iv_len, crypt_type)) != 0) in ssh_set_newkeys() 2379 if ((r = cipher_get_keyiv(cc, enc->iv, enc->iv_len)) != 0) in newkeys_to_blob() 2389 (r = sshbuf_put_string(b, enc->iv, enc->iv_len)) != 0) in newkeys_to_blob() 2534 enc->iv_len = ivlen; in newkeys_from_blob()
|
/external/boringssl/src/include/openssl/ |
D | cipher.h | 505 unsigned iv_len; member
|
/external/libvncserver/x11vnc/ |
D | enc.h | 880 if (ivec_size < Cipher->iv_len && !securevnc) { in enc_xfer() 882 prog, encstr, ivec_size, Cipher->iv_len); in enc_xfer()
|