Home
last modified time | relevance | path

Searched refs:iv_size (Results 1 – 25 of 26) sorted by relevance

12

/third_party/ffmpeg/libavutil/
Dencryption_info.c39 …ionInfo *av_encryption_info_alloc(uint32_t subsample_count, uint32_t key_id_size, uint32_t iv_size) in av_encryption_info_alloc() argument
49 info->iv = av_mallocz(iv_size); in av_encryption_info_alloc()
50 info->iv_size = iv_size; in av_encryption_info_alloc()
67 ret = av_encryption_info_alloc(info->subsample_count, info->key_id_size, info->iv_size); in av_encryption_info_clone()
74 memcpy(ret->iv, info->iv, info->iv_size); in av_encryption_info_clone()
93 uint64_t key_id_size, iv_size, subsample_count, i; in av_encryption_info_get_side_data() local
99 iv_size = AV_RB32(buffer + 16); in av_encryption_info_get_side_data()
102 if (size < FF_ENCRYPTION_INFO_EXTRA + key_id_size + iv_size + subsample_count * 8) in av_encryption_info_get_side_data()
105 info = av_encryption_info_alloc(subsample_count, key_id_size, iv_size); in av_encryption_info_get_side_data()
113 memcpy(info->iv, buffer + key_id_size + 24, iv_size); in av_encryption_info_get_side_data()
[all …]
Dencryption_info.h126 uint32_t iv_size; member
190 …onInfo *av_encryption_info_alloc(uint32_t subsample_count, uint32_t key_id_size, uint32_t iv_size);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Dtlsv1_record.c60 rl->iv_size = data->block_size; in tlsv1_record_set_cipher_suite()
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send()
179 if (pos + rl->iv_size > buf + buf_size) in tlsv1_record_send()
187 if (os_get_random(pos, rl->iv_size)) in tlsv1_record_send()
189 pos += rl->iv_size; in tlsv1_record_send()
234 if (rl->iv_size) { in tlsv1_record_send()
237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send()
239 pad = rl->iv_size - pad; in tlsv1_record_send()
366 if (rl->iv_size) { in tlsv1_record_receive()
380 if (plen < rl->iv_size) { in tlsv1_record_receive()
[all …]
Dtlsv1_server.c86 conn->rl.iv_size); in tlsv1_server_derive_keys()
114 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys()
115 pos += conn->rl.iv_size; in tlsv1_server_derive_keys()
117 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys()
118 pos += conn->rl.iv_size; in tlsv1_server_derive_keys()
675 conn->rl.iv_size); in tlsv1_server_get_keyblock_size()
Dtlsv1_client.c81 key_block_len += 2 * conn->rl.iv_size; in tls_derive_keys()
110 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tls_derive_keys()
111 pos += conn->rl.iv_size; in tls_derive_keys()
113 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tls_derive_keys()
120 os_memset(conn->rl.write_iv, 0, conn->rl.iv_size); in tls_derive_keys()
775 conn->rl.iv_size); in tlsv1_client_get_keyblock_size()
Dtlsv1_record.h43 size_t iv_size; /* also block_size */ member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Dtlsv1_record.c60 rl->iv_size = data->block_size; in tlsv1_record_set_cipher_suite()
176 rl->iv_size && rl->tls_version >= TLS_VERSION_1_1; in tlsv1_record_send()
179 if (pos + rl->iv_size > buf + buf_size) in tlsv1_record_send()
187 if (os_get_random(pos, rl->iv_size)) in tlsv1_record_send()
189 pos += rl->iv_size; in tlsv1_record_send()
234 if (rl->iv_size) { in tlsv1_record_send()
237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send()
239 pad = rl->iv_size - pad; in tlsv1_record_send()
366 if (rl->iv_size) { in tlsv1_record_receive()
380 if (plen < rl->iv_size) { in tlsv1_record_receive()
[all …]
Dtlsv1_server.c86 conn->rl.iv_size); in tlsv1_server_derive_keys()
114 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys()
115 pos += conn->rl.iv_size; in tlsv1_server_derive_keys()
117 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tlsv1_server_derive_keys()
118 pos += conn->rl.iv_size; in tlsv1_server_derive_keys()
675 conn->rl.iv_size); in tlsv1_server_get_keyblock_size()
Dtlsv1_client.c105 key_block_len += 2 * conn->rl.iv_size; in tls_derive_keys()
134 os_memcpy(conn->rl.write_iv, pos, conn->rl.iv_size); in tls_derive_keys()
135 pos += conn->rl.iv_size; in tls_derive_keys()
137 os_memcpy(conn->rl.read_iv, pos, conn->rl.iv_size); in tls_derive_keys()
144 os_memset(conn->rl.write_iv, 0, conn->rl.iv_size); in tls_derive_keys()
799 conn->rl.iv_size); in tlsv1_client_get_keyblock_size()
Dtlsv1_record.h43 size_t iv_size; /* also block_size */ member
/third_party/mbedtls/include/mbedtls/
Dcipher.h296 unsigned int MBEDTLS_PRIVATE(iv_size);
346 size_t MBEDTLS_PRIVATE(iv_size);
524 return (size_t) info->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_info_get_iv_size()
726 if (ctx->MBEDTLS_PRIVATE(iv_size) != 0) { in mbedtls_cipher_get_iv_size()
727 return (int) ctx->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_get_iv_size()
730 return (int) ctx->MBEDTLS_PRIVATE(cipher_info)->MBEDTLS_PRIVATE(iv_size); in mbedtls_cipher_get_iv_size()
/third_party/ffmpeg/libavutil/tests/
Dencryption_info.c38 a->iv_size != b->iv_size || a->subsample_count != b->subsample_count) in compare_encryption_info()
42 memcmp(a->iv, b->iv, a->iv_size) != 0 || in compare_encryption_info()
85 av_assert0(info->iv_size == sizeof(test_iv)); in run_encryption_info_test()
/third_party/mbedtls/programs/psa/
Dcrypto_examples.c99 size_t iv_size, in cipher_encrypt() argument
115 status = psa_cipher_generate_iv(&operation, iv, iv_size, &iv_len); in cipher_encrypt()
130 size_t iv_size, in cipher_decrypt() argument
145 status = psa_cipher_set_iv(&operation, iv, iv_size); in cipher_decrypt()
/third_party/mbedtls/library/
Dpkcs12.c166 iv, cipher_info->iv_size)) != 0) { in mbedtls_pkcs12_pbe()
182 if ((ret = mbedtls_cipher_set_iv(&cipher_ctx, iv, cipher_info->iv_size)) != 0) { in mbedtls_pkcs12_pbe()
Dcipher.c378 actual_iv_size = ctx->cipher_info->iv_size; in mbedtls_cipher_set_iv()
445 ctx->iv_size = actual_iv_size; in mbedtls_cipher_set_iv()
1366 if ((iv_len != ctx->cipher_info->iv_size) || in mbedtls_cipher_aead_encrypt()
1462 if ((iv_len != ctx->cipher_info->iv_size) || in mbedtls_cipher_aead_decrypt()
Dpkcs5.c189 enc_scheme_params.len != cipher_info->iv_size) { in mbedtls_pkcs5_pbes2()
Dpsa_crypto.c4002 size_t iv_size, in psa_cipher_generate_iv() argument
4020 if (iv_size < default_iv_length) { in psa_cipher_generate_iv()
Dssl_tls.c8455 transform->ivlen = cipher_info->iv_size; in ssl_tls12_populate_transform()
/third_party/mbedtls/tests/suites/
Dtest_suite_cipher.function18 size_t key_bitlen, block_size, iv_size;
34 iv_size = mbedtls_cipher_info_get_iv_size(info);
38 TEST_ASSERT(iv_size == 0);
68 TEST_ASSERT(iv_size == 0);
72 TEST_ASSERT(iv_size == block_size);
75 TEST_ASSERT(iv_size == block_size - 4);
Dtest_suite_psa_crypto_driver_wrappers.function1034 size_t iv_size = PSA_CIPHER_IV_LENGTH(key_type, alg);
1070 PSA_ASSERT(psa_cipher_set_iv(&operation, output1, iv_size));
1095 ASSERT_COMPARE(output1 + iv_size, output1_length - iv_size,
Dtest_suite_psa_crypto.function3775 size_t iv_size = PSA_CIPHER_IV_MAX_SIZE;
3810 iv, iv_size,
4040 size_t iv_size = PSA_CIPHER_IV_LENGTH(key_type, alg);
4076 PSA_ASSERT(psa_cipher_set_iv(&operation, output1, iv_size));
4099 ASSERT_COMPARE(output1 + iv_size, output1_length - iv_size,
4534 size_t iv_size = 16;
4561 iv, iv_size,
/third_party/mbedtls/include/psa/
Dcrypto.h1880 size_t iv_size,
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/
Dpicotls.c166 return aead->iv_size; in crypto_aead_noncelen()
/third_party/mbedtls/tests/src/test_helpers/
Dssl_helpers.c1121 CHK(cipher_info->iv_size <= 16); in mbedtls_test_ssl_build_transforms()
1252 ivlen = cipher_info->iv_size; in mbedtls_test_ssl_build_transforms()
/third_party/ffmpeg/libavformat/
Dmov.c6885 unsigned int version, pattern, is_protected, iv_size; in mov_read_tenc() local
6937 iv_size = avio_r8(pb); in mov_read_tenc()
6938 if (iv_size != 8 && iv_size != 16) { in mov_read_tenc()
6943 if (avio_read(pb, sc->cenc.default_encrypted_sample->iv, iv_size) != iv_size) { in mov_read_tenc()

12