/third_party/ffmpeg/libavutil/ |
D | encryption_info.c | 39 …ionInfo *av_encryption_info_alloc(uint32_t subsample_count, uint32_t key_id_size, uint32_t iv_size) in av_encryption_info_alloc() argument 49 info->iv = av_mallocz(iv_size); in av_encryption_info_alloc() 50 info->iv_size = iv_size; in av_encryption_info_alloc() 67 ret = av_encryption_info_alloc(info->subsample_count, info->key_id_size, info->iv_size); in av_encryption_info_clone() 74 memcpy(ret->iv, info->iv, info->iv_size); in av_encryption_info_clone() 93 uint64_t key_id_size, iv_size, subsample_count, i; in av_encryption_info_get_side_data() local 99 iv_size = AV_RB32(buffer + 16); in av_encryption_info_get_side_data() 102 if (size < FF_ENCRYPTION_INFO_EXTRA + key_id_size + iv_size + subsample_count * 8) in av_encryption_info_get_side_data() 105 info = av_encryption_info_alloc(subsample_count, key_id_size, iv_size); in av_encryption_info_get_side_data() 113 memcpy(info->iv, buffer + key_id_size + 24, iv_size); in av_encryption_info_get_side_data() [all …]
|
D | encryption_info.h | 72 uint32_t iv_size; member 136 …onInfo *av_encryption_info_alloc(uint32_t subsample_count, uint32_t key_id_size, uint32_t iv_size);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | tlsv1_record.c | 60 rl->iv_size = data->block_size; in tlsv1_record_set_cipher_suite() 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send() 179 if (pos + rl->iv_size > buf + buf_size) in tlsv1_record_send() 187 if (os_get_random(pos, rl->iv_size)) in tlsv1_record_send() 189 pos += rl->iv_size; in tlsv1_record_send() 234 if (rl->iv_size) { in tlsv1_record_send() 237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send() 239 pad = rl->iv_size - pad; in tlsv1_record_send() 366 if (rl->iv_size) { in tlsv1_record_receive() 380 if (plen < rl->iv_size) { in tlsv1_record_receive() [all …]
|
D | tlsv1_server.c | 86 conn->rl.iv_size); in tlsv1_server_derive_keys() 114 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys() 115 pos += conn->rl.iv_size; in tlsv1_server_derive_keys() 117 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys() 118 pos += conn->rl.iv_size; in tlsv1_server_derive_keys() 675 conn->rl.iv_size); in tlsv1_server_get_keyblock_size()
|
D | tlsv1_client.c | 105 key_block_len += 2 * conn->rl.iv_size; in tls_derive_keys() 134 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tls_derive_keys() 135 pos += conn->rl.iv_size; in tls_derive_keys() 137 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tls_derive_keys() 144 os_memset(conn->rl.write_iv, 0, conn->rl.iv_size); in tls_derive_keys() 799 conn->rl.iv_size); in tlsv1_client_get_keyblock_size()
|
D | tlsv1_record.h | 43 size_t iv_size; /* also block_size */ member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | tlsv1_record.c | 60 rl->iv_size = data->block_size; in tlsv1_record_set_cipher_suite() 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send() 179 if (pos + rl->iv_size > buf + buf_size) in tlsv1_record_send() 187 if (os_get_random(pos, rl->iv_size)) in tlsv1_record_send() 189 pos += rl->iv_size; in tlsv1_record_send() 234 if (rl->iv_size) { in tlsv1_record_send() 237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send() 239 pad = rl->iv_size - pad; in tlsv1_record_send() 366 if (rl->iv_size) { in tlsv1_record_receive() 380 if (plen < rl->iv_size) { in tlsv1_record_receive() [all …]
|
D | tlsv1_server.c | 86 conn->rl.iv_size); in tlsv1_server_derive_keys() 114 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys() 115 pos += conn->rl.iv_size; in tlsv1_server_derive_keys() 117 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys() 118 pos += conn->rl.iv_size; in tlsv1_server_derive_keys() 675 conn->rl.iv_size); in tlsv1_server_get_keyblock_size()
|
D | tlsv1_client.c | 81 key_block_len += 2 * conn->rl.iv_size; in tls_derive_keys() 110 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tls_derive_keys() 111 pos += conn->rl.iv_size; in tls_derive_keys() 113 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tls_derive_keys() 120 os_memset(conn->rl.write_iv, 0, conn->rl.iv_size); in tls_derive_keys() 775 conn->rl.iv_size); in tlsv1_client_get_keyblock_size()
|
D | tlsv1_record.h | 43 size_t iv_size; /* also block_size */ member
|
/third_party/mbedtls/include/mbedtls/ |
D | cipher.h | 296 unsigned int MBEDTLS_PRIVATE(iv_size); 346 size_t MBEDTLS_PRIVATE(iv_size); 524 return (size_t) info->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_info_get_iv_size() 726 if (ctx->MBEDTLS_PRIVATE(iv_size) != 0) { in mbedtls_cipher_get_iv_size() 727 return (int) ctx->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_get_iv_size() 730 return (int) ctx->MBEDTLS_PRIVATE(cipher_info)->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_get_iv_size()
|
/third_party/ffmpeg/libavutil/tests/ |
D | encryption_info.c | 37 a->iv_size != b->iv_size || a->subsample_count != b->subsample_count) in compare_encryption_info() 41 memcmp(a->iv, b->iv, a->iv_size) != 0 || in compare_encryption_info() 84 av_assert0(info->iv_size == sizeof(test_iv)); in run_encryption_info_test()
|
/third_party/gstreamer/gstplugins_bad/gst/drmdec/ |
D | gstdrmdec.c | 444 guint iv_size; in gst_drm_decrypt_get_iv() local 446 if (!gst_structure_get_uint (prot_meta->info, "iv_size", &iv_size)) { in gst_drm_decrypt_get_iv() 450 if (iv_size > *iv_data_size) { in gst_drm_decrypt_get_iv() 610 guint iv_size = DRM_IV_SIZE; in gst_drm_decrypt_transform_ip() local 630 gst_drm_decrypt_get_iv (prot_meta, iv_data, &iv_size); in gst_drm_decrypt_transform_ip() 634 if (iv_size == 0 || algo == 0) { in gst_drm_decrypt_transform_ip() 642 keyid_data, keyid_size, iv_data, iv_size, subsample_count, subsample_info, algo, 0, in gst_drm_decrypt_transform_ip()
|
/third_party/mbedtls/programs/psa/ |
D | crypto_examples.c | 99 size_t iv_size, in cipher_encrypt() argument 115 status = psa_cipher_generate_iv(&operation, iv, iv_size, &iv_len); in cipher_encrypt() 130 size_t iv_size, in cipher_decrypt() argument 145 status = psa_cipher_set_iv(&operation, iv, iv_size); in cipher_decrypt()
|
/third_party/mbedtls/library/ |
D | pkcs12.c | 166 iv, cipher_info->iv_size)) != 0) { in mbedtls_pkcs12_pbe() 182 if ((ret = mbedtls_cipher_set_iv(&cipher_ctx, iv, cipher_info->iv_size)) != 0) { in mbedtls_pkcs12_pbe()
|
D | cipher.c | 378 actual_iv_size = ctx->cipher_info->iv_size; in mbedtls_cipher_set_iv() 445 ctx->iv_size = actual_iv_size; in mbedtls_cipher_set_iv() 1366 if ((iv_len != ctx->cipher_info->iv_size) || in mbedtls_cipher_aead_encrypt() 1462 if ((iv_len != ctx->cipher_info->iv_size) || in mbedtls_cipher_aead_decrypt()
|
D | pkcs5.c | 189 enc_scheme_params.len != cipher_info->iv_size) { in mbedtls_pkcs5_pbes2()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_cipher.function | 18 size_t key_bitlen, block_size, iv_size; 34 iv_size = mbedtls_cipher_info_get_iv_size(info); 38 TEST_ASSERT(iv_size == 0); 68 TEST_ASSERT(iv_size == 0); 72 TEST_ASSERT(iv_size == block_size); 75 TEST_ASSERT(iv_size == block_size - 4);
|
D | test_suite_psa_crypto_driver_wrappers.function | 1034 size_t iv_size = PSA_CIPHER_IV_LENGTH(key_type, alg); 1070 PSA_ASSERT(psa_cipher_set_iv(&operation, output1, iv_size)); 1095 ASSERT_COMPARE(output1 + iv_size, output1_length - iv_size,
|
D | test_suite_psa_crypto.function | 3775 size_t iv_size = PSA_CIPHER_IV_MAX_SIZE; 3810 iv, iv_size, 4040 size_t iv_size = PSA_CIPHER_IV_LENGTH(key_type, alg); 4076 PSA_ASSERT(psa_cipher_set_iv(&operation, output1, iv_size)); 4099 ASSERT_COMPARE(output1 + iv_size, output1_length - iv_size, 4534 size_t iv_size = 16; 4561 iv, iv_size,
|
/third_party/mbedtls/include/psa/ |
D | crypto.h | 1880 size_t iv_size,
|
/third_party/gstreamer/gstplugins_good/gst/isomp4/ |
D | qtdemux.c | 2739 guint32 protection_scheme_type, guint8 iv_size, const guint8 * kid, in qtdemux_update_default_sample_cenc_settings() argument 2749 "iv_size", G_TYPE_UINT, iv_size, in qtdemux_update_default_sample_cenc_settings() 2753 "is_encrypted=%u, iv_size=%u", is_encrypted, iv_size); in qtdemux_update_default_sample_cenc_settings() 2785 guint8 iv_size = 8; in qtdemux_update_default_piff_encryption_settings() local 2801 if (!gst_byte_reader_get_uint8 (br, &iv_size)) in qtdemux_update_default_piff_encryption_settings() 2808 is_encrypted, FOURCC_cenc, iv_size, kid, 0, 0, 0, NULL); in qtdemux_update_default_piff_encryption_settings() 2823 guint iv_size = 8; in qtdemux_parse_piff() local 2857 "iv_size", G_TYPE_UINT, iv_size, "encrypted", G_TYPE_BOOLEAN, TRUE, in qtdemux_parse_piff() 2890 &iv_size)) { in qtdemux_parse_piff() 2916 if (!gst_byte_reader_dup_data (&br, iv_size, &data)) { in qtdemux_parse_piff() [all …]
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/ |
D | picotls.c | 166 return aead->iv_size; in crypto_aead_noncelen()
|
/third_party/mbedtls/tests/src/test_helpers/ |
D | ssl_helpers.c | 1121 CHK(cipher_info->iv_size <= 16); in mbedtls_test_ssl_build_transforms() 1252 ivlen = cipher_info->iv_size; in mbedtls_test_ssl_build_transforms()
|
/third_party/ffmpeg/libavformat/ |
D | mov.c | 6552 unsigned int version, pattern, is_protected, iv_size; in mov_read_tenc() local 6604 iv_size = avio_r8(pb); in mov_read_tenc() 6605 if (iv_size != 8 && iv_size != 16) { in mov_read_tenc() 6610 if (avio_read(pb, sc->cenc.default_encrypted_sample->iv, iv_size) != iv_size) { in mov_read_tenc()
|