/external/boringssl/src/ssl/ |
H A D | tls_record.c | 181 uint16_t version, ciphertext_len; local 184 !CBS_get_u16(&cbs, &ciphertext_len)) { 198 if (ciphertext_len > SSL3_RT_MAX_ENCRYPTED_LENGTH) { 206 if (!CBS_get_bytes(&cbs, &body, ciphertext_len)) { 207 *out_consumed = SSL3_RT_HEADER_LENGTH + (size_t)ciphertext_len; 282 size_t ciphertext_len; local 284 &ciphertext_len, max_out - SSL3_RT_HEADER_LENGTH, 291 if (ciphertext_len >= 1 << 16) { 295 out[3] = ciphertext_len >> 8; 296 out[4] = ciphertext_len [all...] |
H A D | dtls_record.c | 285 size_t ciphertext_len; local 286 if (!SSL_AEAD_CTX_seal(aead, out + DTLS1_RT_HEADER_LENGTH, &ciphertext_len, 293 if (ciphertext_len >= 1 << 16) { 297 out[11] = ciphertext_len >> 8; 298 out[12] = ciphertext_len & 0xff; 300 *out_len = DTLS1_RT_HEADER_LENGTH + ciphertext_len;
|
H A D | d1_pkt.c | 523 size_t ciphertext_len; local 525 !dtls_seal_record(ssl, out, &ciphertext_len, max_out, type, buf, len, 530 ssl_write_buffer_set_len(ssl, ciphertext_len);
|
H A D | s3_pkt.c | 299 size_t ciphertext_len; local 301 !tls_seal_record(ssl, out, &ciphertext_len, max_out, type, buf, len)) { 304 ssl_write_buffer_set_len(ssl, ciphertext_len);
|
H A D | t1_lib.c | 2567 size_t ciphertext_len = ticket_len - SSL_TICKET_KEY_NAME_LEN - iv_len - local 2569 plaintext = OPENSSL_malloc(ciphertext_len); 2574 if (ciphertext_len >= INT_MAX) { 2579 (int)ciphertext_len) ||
|
/external/boringssl/src/crypto/cipher/ |
H A D | e_chacha20poly1305.c | 90 size_t ciphertext_len); 100 size_t ciphertext_len) { 107 update(&ctx, ad, ad_len, ciphertext, ciphertext_len); 201 size_t ciphertext_len) { 203 poly1305_update_padded_16(ctx, ciphertext, ciphertext_len); 205 poly1305_update_length(ctx, ciphertext_len); 258 size_t ciphertext_len) { 261 CRYPTO_poly1305_update(ctx, ciphertext, ciphertext_len); 262 poly1305_update_length(ctx, ciphertext_len); 95 aead_poly1305(aead_poly1305_update update, uint8_t tag[POLY1305_TAG_LEN], const struct aead_chacha20_poly1305_ctx *c20_ctx, const uint8_t nonce[12], const uint8_t *ad, size_t ad_len, const uint8_t *ciphertext, size_t ciphertext_len) argument 199 poly1305_update(poly1305_state *ctx, const uint8_t *ad, size_t ad_len, const uint8_t *ciphertext, size_t ciphertext_len) argument 256 poly1305_update_old(poly1305_state *ctx, const uint8_t *ad, size_t ad_len, const uint8_t *ciphertext, size_t ciphertext_len) argument
|
H A D | e_aes.c | 1593 size_t ciphertext_len) { 1597 hmac_update_uint64(&sha256, ciphertext_len); 1611 SHA256_Update(&sha256, ciphertext, ciphertext_len); 1588 hmac_calculate(uint8_t out[SHA256_DIGEST_LENGTH], const SHA256_CTX *inner_init_state, const SHA256_CTX *outer_init_state, const uint8_t *ad, size_t ad_len, const uint8_t *nonce, const uint8_t *ciphertext, size_t ciphertext_len) argument
|
/external/srtp/crypto/ae_xfm/ |
H A D | xfm.c | 307 unsigned ciphertext_len; local 349 ciphertext_len = *opaque_len - TAG_LEN; 352 printf("ciphertext len: %d\n", ciphertext_len); 374 status = hmac_compute(&hmac_ctx, opaque, ciphertext_len, TAG_LEN, tmp_tag); 379 octet_string_hex_string(opaque, ciphertext_len)); 387 auth_tag += ciphertext_len; 412 status = aes_cbc_nist_decrypt(&aes_ctx, opaque, &ciphertext_len); 417 printf("plaintext len: %d\n", ciphertext_len); 419 octet_string_hex_string(opaque, ciphertext_len)); 423 *opaque_len = ciphertext_len; [all...] |
/external/boringssl/src/crypto/modes/ |
H A D | gcm_test.c | 302 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, local 316 !decode_hex(&ciphertext, &ciphertext_len, test->ciphertext, test_num, 322 if (plaintext_len != ciphertext_len) {
|
/external/boringssl/src/crypto/rsa/ |
H A D | rsa_test.cc | 541 size_t ciphertext_len = 0; local 542 if (!RSA_encrypt(key.get(), &ciphertext_len, ciphertext, sizeof(ciphertext), 544 ciphertext_len != RSA_size(key.get())) { 552 ciphertext, ciphertext_len, RSA_PKCS1_PADDING) || 559 ciphertext_len = 0; 560 if (!RSA_encrypt(key.get(), &ciphertext_len, ciphertext, sizeof(ciphertext), 562 ciphertext_len != RSA_size(key.get())) { 569 ciphertext, ciphertext_len, RSA_PKCS1_OAEP_PADDING) ||
|
/external/conscrypt/src/main/native/ |
H A D | org_conscrypt_NativeCrypto.cpp | 1506 // rsaDecryptWithPrivateKey uses privateKey to decrypt |ciphertext_len| bytes 1511 const char* ciphertext, size_t ciphertext_len) { 1512 ScopedLocalRef<jbyteArray> ciphertextArray(env, env->NewByteArray(ciphertext_len)); 1525 memcpy(ciphertextBytes.get(), ciphertext, ciphertext_len); 1510 rsaDecryptWithPrivateKey(JNIEnv* env, jobject privateKey, jint padding, const char* ciphertext, size_t ciphertext_len) argument
|