/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
H A D | aes_wrap.h | 34 const u8 *nonce, size_t nonce_len, 38 const u8 *nonce, size_t nonce_len,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
H A D | aes_wrap.h | 34 const u8 *nonce, size_t nonce_len, 38 const u8 *nonce, size_t nonce_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
H A D | aes_wrap.h | 34 const u8 *nonce, size_t nonce_len, 38 const u8 *nonce, size_t nonce_len,
|
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
H A D | internal.h | 114 uint8_t nonce_len; member in struct:evp_aead_st 124 size_t nonce_len, const uint8_t *in, size_t in_len, 129 size_t nonce_len, const uint8_t *in, size_t in_len,
|
H A D | aead.c | 27 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; } 71 size_t nonce_len, const uint8_t *in, size_t in_len, 85 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in, 100 size_t nonce_len, const uint8_t *in, size_t in_len, 107 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in, 69 EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 98 EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
|
H A D | e_chacha20poly1305.c | 92 const uint8_t *nonce, size_t nonce_len, 123 if (nonce_len != CHACHA20_NONCE_LEN) { 152 const uint8_t *nonce, size_t nonce_len, 179 if (nonce_len != CHACHA20_NONCE_LEN) { 90 aead_chacha20_poly1305_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 150 aead_chacha20_poly1305_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
|
H A D | e_rc4.c | 172 const uint8_t *nonce, size_t nonce_len, 191 if (nonce_len != 0) { 201 if (nonce_len != 0) { 266 const uint8_t *nonce, size_t nonce_len, 289 if (nonce_len != 0) { 170 aead_rc4_md5_tls_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 264 aead_rc4_md5_tls_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | aead.h | 200 * The length of |nonce|, |nonce_len|, must be equal to the result of 210 const uint8_t *nonce, size_t nonce_len, 225 * The length of |nonce|, |nonce_len|, must be equal to the result of 235 const uint8_t *nonce, size_t nonce_len,
|
/external/chromium_org/third_party/boringssl/src/tool/ |
H A D | speed.cc | 169 const size_t nonce_len = EVP_AEAD_nonce_length(aead); local 174 std::unique_ptr<uint8_t[]> nonce(new uint8_t[nonce_len]); 175 memset(nonce.get(), 0, nonce_len); 189 if (!TimeFunction(&results, [chunk_len, overhead_len, nonce_len, &in, &out, 195 nonce_len, in.get(), chunk_len, NULL, 0);
|
/external/chromium_org/third_party/boringssl/src/crypto/modes/ |
H A D | gcm_test.c | 314 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, local 327 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") || 357 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len); 373 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.h | 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ie.h | 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.h | 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ie.h | 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.h | 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ie.h | 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 524 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; 535 os_memcpy(pos, nonce_p, sess->nonce_len); 536 pos += sess->nonce_len; 537 os_memcpy(pos, nonce_s, sess->nonce_len); 569 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; 580 os_memcpy(pos, nonce_p, sess->nonce_len); 581 pos += sess->nonce_len; 582 os_memcpy(pos, nonce_s, sess->nonce_len); 742 sess->nonce_len = eap_eke_nonce_len(prf); 743 if (sess->nonce_len < [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.c | 524 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; 535 os_memcpy(pos, nonce_p, sess->nonce_len); 536 pos += sess->nonce_len; 537 os_memcpy(pos, nonce_s, sess->nonce_len); 569 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; 580 os_memcpy(pos, nonce_p, sess->nonce_len); 581 pos += sess->nonce_len; 582 os_memcpy(pos, nonce_s, sess->nonce_len); 742 sess->nonce_len = eap_eke_nonce_len(prf); 743 if (sess->nonce_len < [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.c | 524 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; 535 os_memcpy(pos, nonce_p, sess->nonce_len); 536 pos += sess->nonce_len; 537 os_memcpy(pos, nonce_s, sess->nonce_len); 569 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; 580 os_memcpy(pos, nonce_p, sess->nonce_len); 581 pos += sess->nonce_len; 582 os_memcpy(pos, nonce_s, sess->nonce_len); 742 sess->nonce_len = eap_eke_nonce_len(prf); 743 if (sess->nonce_len < [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_eke.c | 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { 326 data->nonce_s, data->sess.nonce_len); 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, 330 data->sess.nonce_len); 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, 570 if (decrypt_len < (size_t) data->sess.nonce_len) { 576 data->nonce_p, data->sess.nonce_len); 619 if (decrypt_len < (size_t) data->sess.nonce_len) { 625 nonce, data->sess.nonce_len); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_eke.c | 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { 326 data->nonce_s, data->sess.nonce_len); 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, 330 data->sess.nonce_len); 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, 570 if (decrypt_len < (size_t) data->sess.nonce_len) { 576 data->nonce_p, data->sess.nonce_len); 619 if (decrypt_len < (size_t) data->sess.nonce_len) { 625 nonce, data->sess.nonce_len); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_eke.c | 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { 326 data->nonce_s, data->sess.nonce_len); 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, 330 data->sess.nonce_len); 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, 570 if (decrypt_len < (size_t) data->sess.nonce_len) { 576 data->nonce_p, data->sess.nonce_len); 619 if (decrypt_len < (size_t) data->sess.nonce_len) { 625 nonce, data->sess.nonce_len); [all...] |