Home
last modified time | relevance | path

Searched refs:iv_size (Results 1 – 25 of 28) sorted by relevance

12

/third_party/ffmpeg/libavutil/
Dencryption_info.c39 …ionInfo *av_encryption_info_alloc(uint32_t subsample_count, uint32_t key_id_size, uint32_t iv_size) in av_encryption_info_alloc() argument
49 info->iv = av_mallocz(iv_size); in av_encryption_info_alloc()
50 info->iv_size = iv_size; in av_encryption_info_alloc()
67 ret = av_encryption_info_alloc(info->subsample_count, info->key_id_size, info->iv_size); in av_encryption_info_clone()
74 memcpy(ret->iv, info->iv, info->iv_size); in av_encryption_info_clone()
93 uint64_t key_id_size, iv_size, subsample_count, i; in av_encryption_info_get_side_data() local
99 iv_size = AV_RB32(buffer + 16); in av_encryption_info_get_side_data()
102 if (size < FF_ENCRYPTION_INFO_EXTRA + key_id_size + iv_size + subsample_count * 8) in av_encryption_info_get_side_data()
105 info = av_encryption_info_alloc(subsample_count, key_id_size, iv_size); in av_encryption_info_get_side_data()
113 memcpy(info->iv, buffer + key_id_size + 24, iv_size); in av_encryption_info_get_side_data()
[all …]
Dencryption_info.h72 uint32_t iv_size; member
136 …onInfo *av_encryption_info_alloc(uint32_t subsample_count, uint32_t key_id_size, uint32_t iv_size);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Dtlsv1_record.c60 rl->iv_size = data->block_size; in tlsv1_record_set_cipher_suite()
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send()
179 if (pos + rl->iv_size > buf + buf_size) in tlsv1_record_send()
187 if (os_get_random(pos, rl->iv_size)) in tlsv1_record_send()
189 pos += rl->iv_size; in tlsv1_record_send()
234 if (rl->iv_size) { in tlsv1_record_send()
237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send()
239 pad = rl->iv_size - pad; in tlsv1_record_send()
366 if (rl->iv_size) { in tlsv1_record_receive()
380 if (plen < rl->iv_size) { in tlsv1_record_receive()
[all …]
Dtlsv1_server.c86 conn->rl.iv_size); in tlsv1_server_derive_keys()
114 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys()
115 pos += conn->rl.iv_size; in tlsv1_server_derive_keys()
117 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys()
118 pos += conn->rl.iv_size; in tlsv1_server_derive_keys()
675 conn->rl.iv_size); in tlsv1_server_get_keyblock_size()
Dtlsv1_client.c105 key_block_len += 2 * conn->rl.iv_size; in tls_derive_keys()
134 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tls_derive_keys()
135 pos += conn->rl.iv_size; in tls_derive_keys()
137 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tls_derive_keys()
144 os_memset(conn->rl.write_iv, 0, conn->rl.iv_size); in tls_derive_keys()
799 conn->rl.iv_size); in tlsv1_client_get_keyblock_size()
Dtlsv1_record.h43 size_t iv_size; /* also block_size */ member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Dtlsv1_record.c60 rl->iv_size = data->block_size; in tlsv1_record_set_cipher_suite()
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send()
179 if (pos + rl->iv_size > buf + buf_size) in tlsv1_record_send()
187 if (os_get_random(pos, rl->iv_size)) in tlsv1_record_send()
189 pos += rl->iv_size; in tlsv1_record_send()
234 if (rl->iv_size) { in tlsv1_record_send()
237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send()
239 pad = rl->iv_size - pad; in tlsv1_record_send()
366 if (rl->iv_size) { in tlsv1_record_receive()
380 if (plen < rl->iv_size) { in tlsv1_record_receive()
[all …]
Dtlsv1_server.c86 conn->rl.iv_size); in tlsv1_server_derive_keys()
114 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys()
115 pos += conn->rl.iv_size; in tlsv1_server_derive_keys()
117 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys()
118 pos += conn->rl.iv_size; in tlsv1_server_derive_keys()
675 conn->rl.iv_size); in tlsv1_server_get_keyblock_size()
Dtlsv1_client.c81 key_block_len += 2 * conn->rl.iv_size; in tls_derive_keys()
110 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tls_derive_keys()
111 pos += conn->rl.iv_size; in tls_derive_keys()
113 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tls_derive_keys()
120 os_memset(conn->rl.write_iv, 0, conn->rl.iv_size); in tls_derive_keys()
775 conn->rl.iv_size); in tlsv1_client_get_keyblock_size()
Dtlsv1_record.h43 size_t iv_size; /* also block_size */ member
/third_party/mbedtls/include/mbedtls/
Dcipher.h296 unsigned int MBEDTLS_PRIVATE(iv_size);
346 size_t MBEDTLS_PRIVATE(iv_size);
524 return (size_t) info->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_info_get_iv_size()
726 if (ctx->MBEDTLS_PRIVATE(iv_size) != 0) { in mbedtls_cipher_get_iv_size()
727 return (int) ctx->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_get_iv_size()
730 return (int) ctx->MBEDTLS_PRIVATE(cipher_info)->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_get_iv_size()
/third_party/ffmpeg/libavutil/tests/
Dencryption_info.c37 a->iv_size != b->iv_size || a->subsample_count != b->subsample_count) in compare_encryption_info()
41 memcmp(a->iv, b->iv, a->iv_size) != 0 || in compare_encryption_info()
84 av_assert0(info->iv_size == sizeof(test_iv)); in run_encryption_info_test()
/third_party/gstreamer/gstplugins_bad/gst/drmdec/
Dgstdrmdec.c444 guint iv_size; in gst_drm_decrypt_get_iv() local
446 if (!gst_structure_get_uint (prot_meta->info, "iv_size", &iv_size)) { in gst_drm_decrypt_get_iv()
450 if (iv_size > *iv_data_size) { in gst_drm_decrypt_get_iv()
610 guint iv_size = DRM_IV_SIZE; in gst_drm_decrypt_transform_ip() local
630 gst_drm_decrypt_get_iv (prot_meta, iv_data, &iv_size); in gst_drm_decrypt_transform_ip()
634 if (iv_size == 0 || algo == 0) { in gst_drm_decrypt_transform_ip()
642 keyid_data, keyid_size, iv_data, iv_size, subsample_count, subsample_info, algo, 0, in gst_drm_decrypt_transform_ip()
/third_party/mbedtls/programs/psa/
Dcrypto_examples.c99 size_t iv_size, in cipher_encrypt() argument
115 status = psa_cipher_generate_iv(&operation, iv, iv_size, &iv_len); in cipher_encrypt()
130 size_t iv_size, in cipher_decrypt() argument
145 status = psa_cipher_set_iv(&operation, iv, iv_size); in cipher_decrypt()
/third_party/mbedtls/library/
Dpkcs12.c166 iv, cipher_info->iv_size)) != 0) { in mbedtls_pkcs12_pbe()
182 if ((ret = mbedtls_cipher_set_iv(&cipher_ctx, iv, cipher_info->iv_size)) != 0) { in mbedtls_pkcs12_pbe()
Dcipher.c378 actual_iv_size = ctx->cipher_info->iv_size; in mbedtls_cipher_set_iv()
445 ctx->iv_size = actual_iv_size; in mbedtls_cipher_set_iv()
1366 if ((iv_len != ctx->cipher_info->iv_size) || in mbedtls_cipher_aead_encrypt()
1462 if ((iv_len != ctx->cipher_info->iv_size) || in mbedtls_cipher_aead_decrypt()
Dpkcs5.c189 enc_scheme_params.len != cipher_info->iv_size) { in mbedtls_pkcs5_pbes2()
/third_party/mbedtls/tests/suites/
Dtest_suite_cipher.function18 size_t key_bitlen, block_size, iv_size;
34 iv_size = mbedtls_cipher_info_get_iv_size(info);
38 TEST_ASSERT(iv_size == 0);
68 TEST_ASSERT(iv_size == 0);
72 TEST_ASSERT(iv_size == block_size);
75 TEST_ASSERT(iv_size == block_size - 4);
Dtest_suite_psa_crypto_driver_wrappers.function1034 size_t iv_size = PSA_CIPHER_IV_LENGTH(key_type, alg);
1070 PSA_ASSERT(psa_cipher_set_iv(&operation, output1, iv_size));
1095 ASSERT_COMPARE(output1 + iv_size, output1_length - iv_size,
Dtest_suite_psa_crypto.function3775 size_t iv_size = PSA_CIPHER_IV_MAX_SIZE;
3810 iv, iv_size,
4040 size_t iv_size = PSA_CIPHER_IV_LENGTH(key_type, alg);
4076 PSA_ASSERT(psa_cipher_set_iv(&operation, output1, iv_size));
4099 ASSERT_COMPARE(output1 + iv_size, output1_length - iv_size,
4534 size_t iv_size = 16;
4561 iv, iv_size,
/third_party/mbedtls/include/psa/
Dcrypto.h1880 size_t iv_size,
/third_party/gstreamer/gstplugins_good/gst/isomp4/
Dqtdemux.c2739 guint32 protection_scheme_type, guint8 iv_size, const guint8 * kid, in qtdemux_update_default_sample_cenc_settings() argument
2749 "iv_size", G_TYPE_UINT, iv_size, in qtdemux_update_default_sample_cenc_settings()
2753 "is_encrypted=%u, iv_size=%u", is_encrypted, iv_size); in qtdemux_update_default_sample_cenc_settings()
2785 guint8 iv_size = 8; in qtdemux_update_default_piff_encryption_settings() local
2801 if (!gst_byte_reader_get_uint8 (br, &iv_size)) in qtdemux_update_default_piff_encryption_settings()
2808 is_encrypted, FOURCC_cenc, iv_size, kid, 0, 0, 0, NULL); in qtdemux_update_default_piff_encryption_settings()
2823 guint iv_size = 8; in qtdemux_parse_piff() local
2857 "iv_size", G_TYPE_UINT, iv_size, "encrypted", G_TYPE_BOOLEAN, TRUE, in qtdemux_parse_piff()
2890 &iv_size)) { in qtdemux_parse_piff()
2916 if (!gst_byte_reader_dup_data (&br, iv_size, &data)) { in qtdemux_parse_piff()
[all …]
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/
Dpicotls.c166 return aead->iv_size; in crypto_aead_noncelen()
/third_party/mbedtls/tests/src/test_helpers/
Dssl_helpers.c1121 CHK(cipher_info->iv_size <= 16); in mbedtls_test_ssl_build_transforms()
1252 ivlen = cipher_info->iv_size; in mbedtls_test_ssl_build_transforms()
/third_party/ffmpeg/libavformat/
Dmov.c6552 unsigned int version, pattern, is_protected, iv_size; in mov_read_tenc() local
6604 iv_size = avio_r8(pb); in mov_read_tenc()
6605 if (iv_size != 8 && iv_size != 16) { in mov_read_tenc()
6610 if (avio_read(pb, sc->cenc.default_encrypted_sample->iv, iv_size) != iv_size) { in mov_read_tenc()

12