/third_party/ffmpeg/libavutil/ |
H A D | encryption_info.c | 30 // u32be iv_size 33 // u8[iv_size] iv 39 AVEncryptionInfo *av_encryption_info_alloc(uint32_t subsample_count, uint32_t key_id_size, uint32_t iv_size) in av_encryption_info_alloc() argument 49 info->iv = av_mallocz(iv_size); in av_encryption_info_alloc() 50 info->iv_size = iv_size; in av_encryption_info_alloc() 67 ret = av_encryption_info_alloc(info->subsample_count, info->key_id_size, info->iv_size); in av_encryption_info_clone() 74 memcpy(ret->iv, info->iv, info->iv_size); in av_encryption_info_clone() 93 uint64_t key_id_size, iv_size, subsample_count, i; in av_encryption_info_get_side_data() local 99 iv_size in av_encryption_info_get_side_data() [all...] |
H A D | encryption_info.h | 126 uint32_t iv_size; member 186 * @param iv_size The number of bytes in the IV, should be 16. 190 AVEncryptionInfo *av_encryption_info_alloc(uint32_t subsample_count, uint32_t key_id_size, uint32_t iv_size);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_record.c | 60 rl->iv_size = data->block_size; in tlsv1_record_set_cipher_suite() 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send() 179 if (pos + rl->iv_size > buf + buf_size) in tlsv1_record_send() 187 if (os_get_random(pos, rl->iv_size)) in tlsv1_record_send() 189 pos += rl->iv_size; in tlsv1_record_send() 234 if (rl->iv_size) { in tlsv1_record_send() 237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send() 239 pad = rl->iv_size - pad; in tlsv1_record_send() 366 if (rl->iv_size) { in tlsv1_record_receive() 380 if (plen < rl->iv_size) { in tlsv1_record_receive() [all...] |
H A D | tlsv1_client.c | 81 key_block_len += 2 * conn->rl.iv_size; in tls_derive_keys() 110 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tls_derive_keys() 111 pos += conn->rl.iv_size; in tls_derive_keys() 113 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tls_derive_keys() 120 os_memset(conn->rl.write_iv, 0, conn->rl.iv_size); in tls_derive_keys() 775 conn->rl.iv_size); in tlsv1_client_get_keyblock_size()
|
H A D | tlsv1_server.c | 86 conn->rl.iv_size); in tlsv1_server_derive_keys() 114 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys() 115 pos += conn->rl.iv_size; in tlsv1_server_derive_keys() 117 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys() 118 pos += conn->rl.iv_size; in tlsv1_server_derive_keys() 675 conn->rl.iv_size); in tlsv1_server_get_keyblock_size()
|
H A D | tlsv1_record.h | 43 size_t iv_size; /* also block_size */ member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_record.c | 60 rl->iv_size = data->block_size; in tlsv1_record_set_cipher_suite() 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send() 179 if (pos + rl->iv_size > buf + buf_size) in tlsv1_record_send() 187 if (os_get_random(pos, rl->iv_size)) in tlsv1_record_send() 189 pos += rl->iv_size; in tlsv1_record_send() 234 if (rl->iv_size) { in tlsv1_record_send() 237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send() 239 pad = rl->iv_size - pad; in tlsv1_record_send() 366 if (rl->iv_size) { in tlsv1_record_receive() 380 if (plen < rl->iv_size) { in tlsv1_record_receive() [all...] |
H A D | tlsv1_client.c | 105 key_block_len += 2 * conn->rl.iv_size; in tls_derive_keys() 134 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tls_derive_keys() 135 pos += conn->rl.iv_size; in tls_derive_keys() 137 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tls_derive_keys() 144 os_memset(conn->rl.write_iv, 0, conn->rl.iv_size); in tls_derive_keys() 799 conn->rl.iv_size); in tlsv1_client_get_keyblock_size()
|
H A D | tlsv1_server.c | 86 conn->rl.iv_size); in tlsv1_server_derive_keys() 114 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys() 115 pos += conn->rl.iv_size; in tlsv1_server_derive_keys() 117 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys() 118 pos += conn->rl.iv_size; in tlsv1_server_derive_keys() 675 conn->rl.iv_size); in tlsv1_server_get_keyblock_size()
|
H A D | tlsv1_record.h | 43 size_t iv_size; /* also block_size */ member
|
/third_party/mbedtls/include/mbedtls/ |
H A D | cipher.h | 277 unsigned int MBEDTLS_PRIVATE(iv_size) : 3; 347 size_t MBEDTLS_PRIVATE(iv_size); 525 return ((size_t) info->MBEDTLS_PRIVATE(iv_size)) << MBEDTLS_IV_SIZE_SHIFT; in mbedtls_cipher_info_get_iv_size() 724 if (ctx->MBEDTLS_PRIVATE(iv_size) != 0) { in mbedtls_cipher_get_iv_size() 725 return (int) ctx->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_get_iv_size() 728 return (int) (((int) ctx->MBEDTLS_PRIVATE(cipher_info)->MBEDTLS_PRIVATE(iv_size)) << in mbedtls_cipher_get_iv_size()
|
/third_party/ffmpeg/libavutil/tests/ |
H A D | encryption_info.c | 38 a->iv_size != b->iv_size || a->subsample_count != b->subsample_count) in compare_encryption_info() 42 memcmp(a->iv, b->iv, a->iv_size) != 0 || in compare_encryption_info() 85 av_assert0(info->iv_size == sizeof(test_iv)); in run_encryption_info_test()
|
/third_party/mbedtls/programs/psa/ |
H A D | crypto_examples.c | 99 size_t iv_size, in cipher_encrypt() 115 status = psa_cipher_generate_iv(&operation, iv, iv_size, &iv_len); in cipher_encrypt() 130 size_t iv_size, in cipher_decrypt() 145 status = psa_cipher_set_iv(&operation, iv, iv_size); in cipher_decrypt() 96 cipher_encrypt(psa_key_id_t key, psa_algorithm_t alg, uint8_t *iv, size_t iv_size, const uint8_t *input, size_t input_size, size_t part_size, uint8_t *output, size_t output_size, size_t *output_len) cipher_encrypt() argument 127 cipher_decrypt(psa_key_id_t key, psa_algorithm_t alg, const uint8_t *iv, size_t iv_size, const uint8_t *input, size_t input_size, size_t part_size, uint8_t *output, size_t output_size, size_t *output_len) cipher_decrypt() argument
|
/third_party/mbedtls/include/psa/ |
H A D | crypto.h | 1853 * \param iv_size Size of the \p iv buffer in bytes. 1875 size_t iv_size,
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/ |
H A D | picotls.c | 166 return aead->iv_size; in crypto_aead_noncelen()
|
/third_party/mbedtls/library/ |
H A D | cipher.c | 505 ctx->iv_size = actual_iv_size; in mbedtls_cipher_set_iv()
|
H A D | psa_crypto.c | 4327 size_t iv_size, in psa_cipher_generate_iv() 4346 if (iv_size < default_iv_length) { in psa_cipher_generate_iv() 4325 psa_cipher_generate_iv(psa_cipher_operation_t *operation, uint8_t *iv_external, size_t iv_size, size_t *iv_length) psa_cipher_generate_iv() argument
|
/third_party/ffmpeg/libavformat/ |
H A D | mov.c | 7021 unsigned int version, pattern, is_protected, iv_size; 7073 iv_size = avio_r8(pb); 7074 if (iv_size != 8 && iv_size != 16) { 7079 if (avio_read(pb, sc->cenc.default_encrypted_sample->iv, iv_size) != iv_size) {
|