/third_party/openssl/providers/implementations/ciphers/ |
D | cipher_aes_cbc_hmac_sha1_hw.c | 140 u8 *IVs; in tls1_multi_block_encrypt() local 146 if (RAND_bytes_ex(ctx->base.libctx, (IVs = blocks[0].c), 16 * x4, 0) <= 0) in tls1_multi_block_encrypt() 165 memcpy(ciph_d[0].out - 16, IVs, 16); in tls1_multi_block_encrypt() 166 memcpy(ciph_d[0].iv, IVs, 16); in tls1_multi_block_encrypt() 167 IVs += 16; in tls1_multi_block_encrypt() 172 memcpy(ciph_d[i].out - 16, IVs, 16); in tls1_multi_block_encrypt() 173 memcpy(ciph_d[i].iv, IVs, 16); in tls1_multi_block_encrypt() 174 IVs += 16; in tls1_multi_block_encrypt()
|
D | cipher_aes_cbc_hmac_sha256_hw.c | 144 u8 *IVs; in tls1_multi_block_encrypt() local 150 if (RAND_bytes_ex(ctx->base.libctx, (IVs = blocks[0].c), 16 * x4, 0) <= 0) in tls1_multi_block_encrypt() 169 memcpy(ciph_d[0].out - 16, IVs, 16); in tls1_multi_block_encrypt() 170 memcpy(ciph_d[0].iv, IVs, 16); in tls1_multi_block_encrypt() 171 IVs += 16; in tls1_multi_block_encrypt() 176 memcpy(ciph_d[i].out - 16, IVs, 16); in tls1_multi_block_encrypt() 177 memcpy(ciph_d[i].iv, IVs, 16); in tls1_multi_block_encrypt() 178 IVs += 16; in tls1_multi_block_encrypt()
|
/third_party/openssl/crypto/evp/ |
D | e_aes_cbc_hmac_sha1.c | 177 u8 *IVs; in tls1_1_multi_block_encrypt() local 183 if (RAND_bytes((IVs = blocks[0].c), 16 * x4) <= 0) in tls1_1_multi_block_encrypt() 202 memcpy(ciph_d[0].out - 16, IVs, 16); in tls1_1_multi_block_encrypt() 203 memcpy(ciph_d[0].iv, IVs, 16); in tls1_1_multi_block_encrypt() 204 IVs += 16; in tls1_1_multi_block_encrypt() 209 memcpy(ciph_d[i].out - 16, IVs, 16); in tls1_1_multi_block_encrypt() 210 memcpy(ciph_d[i].iv, IVs, 16); in tls1_1_multi_block_encrypt() 211 IVs += 16; in tls1_1_multi_block_encrypt()
|
D | e_aes_cbc_hmac_sha256.c | 172 u8 *IVs; in tls1_1_multi_block_encrypt() local 178 if (RAND_bytes((IVs = blocks[0].c), 16 * x4) <= 0) in tls1_1_multi_block_encrypt() 198 memcpy(ciph_d[0].out - 16, IVs, 16); in tls1_1_multi_block_encrypt() 199 memcpy(ciph_d[0].iv, IVs, 16); in tls1_1_multi_block_encrypt() 200 IVs += 16; in tls1_1_multi_block_encrypt() 205 memcpy(ciph_d[i].out - 16, IVs, 16); in tls1_1_multi_block_encrypt() 206 memcpy(ciph_d[i].iv, IVs, 16); in tls1_1_multi_block_encrypt() 207 IVs += 16; in tls1_1_multi_block_encrypt()
|
/third_party/openssl/doc/man7/ |
D | EVP_KDF-SSHKDF.pod | 12 It is defined in RFC 4253, section 7.2 and is used by SSH to derive IVs,
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Transforms/Scalar/ |
D | SCCP.cpp | 1756 std::vector<LatticeVal> IVs = Solver.getStructLatticeValueFor(V); in tryToReplaceWithConstant() local 1757 if (llvm::any_of(IVs, in tryToReplaceWithConstant() 1763 LatticeVal V = IVs[i]; in tryToReplaceWithConstant()
|
/third_party/node/doc/api/ |
D | crypto.md | 1747 cryptographically random. They do not have to be secret: IVs are typically just 1843 cryptographically random. They do not have to be secret: IVs are typically just
|
/third_party/openssl/doc/man3/ |
D | EVP_EncryptInit.pod | 918 AEAD IVs in TLSv1.2 consist of an implicit "fixed" part and an explicit part
|
/third_party/mbedtls/ |
D | ChangeLog | 313 Raw keys and IVs are no longer passed to the callback. 882 MBEDTLS_MODE_ECB to 0, since ECB mode ciphers don't use IVs.
|
/third_party/openssl/ |
D | CHANGES.md | 14576 before application data chunks to avoid the use of known IVs 16057 all individual ciphers. If the cipher wants to handle IVs or keys 16328 instead of RAND_bytes for encryption IVs and salts.
|
/third_party/node/doc/changelogs/ |
D | CHANGELOG_V11.md | 454 …node/commit/b9787fd5f3)] - **crypto**: check for invalid chacha20-poly1305 IVs (Sam Roberts) [#265…
|
/third_party/chromium/patch/ |
D | 0001-cve.patch | 70280 zYDa)IVs=VkyMjV1v_v3_rVBD2aynhMrCs+2o?gQ&$_~jBsBbG70clpLpDxa7fi2%N
|