/third_party/ffmpeg/libavutil/ |
D | encryption_info.c | 39 …ionInfo *av_encryption_info_alloc(uint32_t subsample_count, uint32_t key_id_size, uint32_t iv_size) in av_encryption_info_alloc() argument 49 info->iv = av_mallocz(iv_size); in av_encryption_info_alloc() 50 info->iv_size = iv_size; in av_encryption_info_alloc() 67 ret = av_encryption_info_alloc(info->subsample_count, info->key_id_size, info->iv_size); in av_encryption_info_clone() 74 memcpy(ret->iv, info->iv, info->iv_size); in av_encryption_info_clone() 93 uint64_t key_id_size, iv_size, subsample_count, i; in av_encryption_info_get_side_data() local 99 iv_size = AV_RB32(buffer + 16); in av_encryption_info_get_side_data() 102 if (size < FF_ENCRYPTION_INFO_EXTRA + key_id_size + iv_size + subsample_count * 8) in av_encryption_info_get_side_data() 105 info = av_encryption_info_alloc(subsample_count, key_id_size, iv_size); in av_encryption_info_get_side_data() 113 memcpy(info->iv, buffer + key_id_size + 24, iv_size); in av_encryption_info_get_side_data() [all …]
|
D | encryption_info.h | 126 uint32_t iv_size; member 190 …onInfo *av_encryption_info_alloc(uint32_t subsample_count, uint32_t key_id_size, uint32_t iv_size);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | tlsv1_record.c | 60 rl->iv_size = data->block_size; in tlsv1_record_set_cipher_suite() 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send() 179 if (pos + rl->iv_size > buf + buf_size) in tlsv1_record_send() 187 if (os_get_random(pos, rl->iv_size)) in tlsv1_record_send() 189 pos += rl->iv_size; in tlsv1_record_send() 234 if (rl->iv_size) { in tlsv1_record_send() 237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send() 239 pad = rl->iv_size - pad; in tlsv1_record_send() 366 if (rl->iv_size) { in tlsv1_record_receive() 380 if (plen < rl->iv_size) { in tlsv1_record_receive() [all …]
|
D | tlsv1_server.c | 86 conn->rl.iv_size); in tlsv1_server_derive_keys() 114 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys() 115 pos += conn->rl.iv_size; in tlsv1_server_derive_keys() 117 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys() 118 pos += conn->rl.iv_size; in tlsv1_server_derive_keys() 675 conn->rl.iv_size); in tlsv1_server_get_keyblock_size()
|
D | tlsv1_client.c | 81 key_block_len += 2 * conn->rl.iv_size; in tls_derive_keys() 110 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tls_derive_keys() 111 pos += conn->rl.iv_size; in tls_derive_keys() 113 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tls_derive_keys() 120 os_memset(conn->rl.write_iv, 0, conn->rl.iv_size); in tls_derive_keys() 775 conn->rl.iv_size); in tlsv1_client_get_keyblock_size()
|
D | tlsv1_record.h | 43 size_t iv_size; /* also block_size */ member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | tlsv1_record.c | 60 rl->iv_size = data->block_size; in tlsv1_record_set_cipher_suite() 176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send() 179 if (pos + rl->iv_size > buf + buf_size) in tlsv1_record_send() 187 if (os_get_random(pos, rl->iv_size)) in tlsv1_record_send() 189 pos += rl->iv_size; in tlsv1_record_send() 234 if (rl->iv_size) { in tlsv1_record_send() 237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send() 239 pad = rl->iv_size - pad; in tlsv1_record_send() 366 if (rl->iv_size) { in tlsv1_record_receive() 380 if (plen < rl->iv_size) { in tlsv1_record_receive() [all …]
|
D | tlsv1_server.c | 86 conn->rl.iv_size); in tlsv1_server_derive_keys() 114 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys() 115 pos += conn->rl.iv_size; in tlsv1_server_derive_keys() 117 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys() 118 pos += conn->rl.iv_size; in tlsv1_server_derive_keys() 675 conn->rl.iv_size); in tlsv1_server_get_keyblock_size()
|
D | tlsv1_client.c | 105 key_block_len += 2 * conn->rl.iv_size; in tls_derive_keys() 134 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tls_derive_keys() 135 pos += conn->rl.iv_size; in tls_derive_keys() 137 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tls_derive_keys() 144 os_memset(conn->rl.write_iv, 0, conn->rl.iv_size); in tls_derive_keys() 799 conn->rl.iv_size); in tlsv1_client_get_keyblock_size()
|
D | tlsv1_record.h | 43 size_t iv_size; /* also block_size */ member
|
/third_party/mbedtls/include/mbedtls/ |
D | cipher.h | 296 unsigned int MBEDTLS_PRIVATE(iv_size); 346 size_t MBEDTLS_PRIVATE(iv_size); 524 return (size_t) info->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_info_get_iv_size() 726 if (ctx->MBEDTLS_PRIVATE(iv_size) != 0) { in mbedtls_cipher_get_iv_size() 727 return (int) ctx->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_get_iv_size() 730 return (int) ctx->MBEDTLS_PRIVATE(cipher_info)->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_get_iv_size()
|
/third_party/ffmpeg/libavutil/tests/ |
D | encryption_info.c | 38 a->iv_size != b->iv_size || a->subsample_count != b->subsample_count) in compare_encryption_info() 42 memcmp(a->iv, b->iv, a->iv_size) != 0 || in compare_encryption_info() 85 av_assert0(info->iv_size == sizeof(test_iv)); in run_encryption_info_test()
|
/third_party/mbedtls/programs/psa/ |
D | crypto_examples.c | 99 size_t iv_size, in cipher_encrypt() argument 115 status = psa_cipher_generate_iv(&operation, iv, iv_size, &iv_len); in cipher_encrypt() 130 size_t iv_size, in cipher_decrypt() argument 145 status = psa_cipher_set_iv(&operation, iv, iv_size); in cipher_decrypt()
|
/third_party/mbedtls/library/ |
D | pkcs12.c | 166 iv, cipher_info->iv_size)) != 0) { in mbedtls_pkcs12_pbe() 182 if ((ret = mbedtls_cipher_set_iv(&cipher_ctx, iv, cipher_info->iv_size)) != 0) { in mbedtls_pkcs12_pbe()
|
D | cipher.c | 378 actual_iv_size = ctx->cipher_info->iv_size; in mbedtls_cipher_set_iv() 445 ctx->iv_size = actual_iv_size; in mbedtls_cipher_set_iv() 1366 if ((iv_len != ctx->cipher_info->iv_size) || in mbedtls_cipher_aead_encrypt() 1462 if ((iv_len != ctx->cipher_info->iv_size) || in mbedtls_cipher_aead_decrypt()
|
D | pkcs5.c | 189 enc_scheme_params.len != cipher_info->iv_size) { in mbedtls_pkcs5_pbes2()
|
D | psa_crypto.c | 4002 size_t iv_size, in psa_cipher_generate_iv() argument 4020 if (iv_size < default_iv_length) { in psa_cipher_generate_iv()
|
D | ssl_tls.c | 8455 transform->ivlen = cipher_info->iv_size; in ssl_tls12_populate_transform()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_cipher.function | 18 size_t key_bitlen, block_size, iv_size; 34 iv_size = mbedtls_cipher_info_get_iv_size(info); 38 TEST_ASSERT(iv_size == 0); 68 TEST_ASSERT(iv_size == 0); 72 TEST_ASSERT(iv_size == block_size); 75 TEST_ASSERT(iv_size == block_size - 4);
|
D | test_suite_psa_crypto_driver_wrappers.function | 1034 size_t iv_size = PSA_CIPHER_IV_LENGTH(key_type, alg); 1070 PSA_ASSERT(psa_cipher_set_iv(&operation, output1, iv_size)); 1095 ASSERT_COMPARE(output1 + iv_size, output1_length - iv_size,
|
D | test_suite_psa_crypto.function | 3775 size_t iv_size = PSA_CIPHER_IV_MAX_SIZE; 3810 iv, iv_size, 4040 size_t iv_size = PSA_CIPHER_IV_LENGTH(key_type, alg); 4076 PSA_ASSERT(psa_cipher_set_iv(&operation, output1, iv_size)); 4099 ASSERT_COMPARE(output1 + iv_size, output1_length - iv_size, 4534 size_t iv_size = 16; 4561 iv, iv_size,
|
/third_party/mbedtls/include/psa/ |
D | crypto.h | 1880 size_t iv_size,
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/ |
D | picotls.c | 166 return aead->iv_size; in crypto_aead_noncelen()
|
/third_party/mbedtls/tests/src/test_helpers/ |
D | ssl_helpers.c | 1121 CHK(cipher_info->iv_size <= 16); in mbedtls_test_ssl_build_transforms() 1252 ivlen = cipher_info->iv_size; in mbedtls_test_ssl_build_transforms()
|
/third_party/ffmpeg/libavformat/ |
D | mov.c | 6885 unsigned int version, pattern, is_protected, iv_size; in mov_read_tenc() local 6937 iv_size = avio_r8(pb); in mov_read_tenc() 6938 if (iv_size != 8 && iv_size != 16) { in mov_read_tenc() 6943 if (avio_read(pb, sc->cenc.default_encrypted_sample->iv, iv_size) != iv_size) { in mov_read_tenc()
|