/external/boringssl/src/crypto/cipher/ |
H A D | internal.h | 76 uint8_t nonce_len; member in struct:evp_aead_st 89 size_t max_out_len, const uint8_t *nonce, size_t nonce_len, 94 size_t max_out_len, const uint8_t *nonce, size_t nonce_len,
|
H A D | aead.c | 28 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; } 97 size_t nonce_len, const uint8_t *in, size_t in_len, 111 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in, 126 size_t nonce_len, const uint8_t *in, size_t in_len, 133 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in, 95 EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 124 EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
|
H A D | aead_test.cc | 209 const size_t nonce_len = EVP_AEAD_nonce_length(aead); local 210 assert(sizeof(nonce) >= nonce_len); 227 sizeof(ciphertext), nonce, nonce_len, plaintext, 252 sizeof(plaintext2), nonce, nonce_len, ciphertext, 277 const size_t nonce_len = EVP_AEAD_nonce_length(aead); local 297 std::vector<uint8_t> nonce(nonce_len, 'b'); 302 sizeof(kPlaintext) + max_overhead, nonce.data(), nonce_len, 318 nonce_len, in, sizeof(kPlaintext), nullptr, 0) || 321 nonce_len, in, sizeof(kPlaintext), nullptr, 0)) { 329 nonce.data(), nonce_len, i [all...] |
H A D | e_chacha20poly1305.c | 160 const uint8_t *nonce, size_t nonce_len, 166 if (nonce_len != 12) { 211 const uint8_t *nonce, size_t nonce_len, 218 if (nonce_len != 12) { 158 aead_chacha20_poly1305_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 209 aead_chacha20_poly1305_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
|
H A D | e_ssl3.c | 127 const uint8_t *nonce, size_t nonce_len, 151 if (nonce_len != 0) { 212 const uint8_t *nonce, size_t nonce_len, 236 if (nonce_len != 0) { 125 aead_ssl3_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 210 aead_ssl3_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
|
H A D | e_tls.c | 103 const uint8_t *nonce, size_t nonce_len, 127 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { 204 const uint8_t *nonce, size_t nonce_len, 227 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { 101 aead_tls_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 202 aead_tls_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
|
H A D | e_aes.c | 1058 const uint8_t *nonce, size_t nonce_len, 1077 CRYPTO_gcm128_setiv(&gcm, key, nonce, nonce_len); 1101 const uint8_t *nonce, size_t nonce_len, 1124 CRYPTO_gcm128_setiv(&gcm, key, nonce, nonce_len); 1339 const uint8_t *nonce, size_t nonce_len, 1357 if (nonce_len != EVP_AEAD_AES_CTR_HMAC_SHA256_NONCE_LEN) { 1375 const uint8_t *nonce, size_t nonce_len, 1393 if (nonce_len != EVP_AEAD_AES_CTR_HMAC_SHA256_NONCE_LEN) { 1634 const uint8_t *nonce, size_t nonce_len, 1653 if (nonce_len ! 1056 aead_aes_gcm_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 1099 aead_aes_gcm_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 1337 aead_aes_ctr_hmac_sha256_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 1373 aead_aes_ctr_hmac_sha256_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 1632 aead_aes_gcm_siv_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 1673 aead_aes_gcm_siv_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
/external/boringssl/src/crypto/modes/ |
H A D | gcm_test.cc | 306 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, local 319 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") || 352 CRYPTO_gcm128_setiv(&ctx, &aes_key, nonce, nonce_len); 368 CRYPTO_gcm128_setiv(&ctx, &aes_key, nonce, nonce_len);
|
/external/boringssl/src/ssl/ |
H A D | ssl_aead_ctx.c | 208 size_t nonce_len = 0; local 212 nonce_len = aead->fixed_nonce_len - aead->variable_nonce_len; 213 OPENSSL_memset(nonce, 0, nonce_len); 216 nonce_len += aead->fixed_nonce_len; 226 OPENSSL_memcpy(nonce + nonce_len, in, aead->variable_nonce_len); 231 OPENSSL_memcpy(nonce + nonce_len, seqnum, aead->variable_nonce_len); 233 nonce_len += aead->variable_nonce_len; 237 assert(nonce_len == aead->fixed_nonce_len); 245 if (!EVP_AEAD_CTX_open(&aead->ctx, in, &len, in_len, nonce, nonce_len, 278 size_t nonce_len local [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.h | 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.h | 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.h | 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.h | 74 int nonce_len; member in struct:eap_eke_session
|
H A D | ikev2_common.c | 318 payloads->nonce_len = pdatalen; 373 const u8 *nonce, size_t nonce_len, 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 409 os_memcpy(pos, nonce, nonce_len); 410 pos += nonce_len; 369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ie.h | 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.h | 74 int nonce_len; member in struct:eap_eke_session
|
H A D | ikev2_common.c | 318 payloads->nonce_len = pdatalen; 373 const u8 *nonce, size_t nonce_len, 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 409 os_memcpy(pos, nonce, nonce_len); 410 pos += nonce_len; 369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ie.h | 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.h | 74 int nonce_len; member in struct:eap_eke_session
|
H A D | ikev2_common.c | 318 payloads->nonce_len = pdatalen; 373 const u8 *nonce, size_t nonce_len, 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 409 os_memcpy(pos, nonce, nonce_len); 410 pos += nonce_len; 369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ie.h | 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/boringssl/src/tool/ |
H A D | speed.cc | 209 const size_t nonce_len = EVP_AEAD_nonce_length(aead); local 214 std::unique_ptr<uint8_t[]> nonce(new uint8_t[nonce_len]); 215 OPENSSL_memset(nonce.get(), 0, nonce_len); 238 if (!TimeFunction(&results, [chunk_len, overhead_len, nonce_len, ad_len, in, 243 nonce_len, in, chunk_len, ad.get(), ad_len); 252 nonce.get(), nonce_len, in, chunk_len, ad.get(), ad_len); 254 if (!TimeFunction(&results, [chunk_len, nonce_len, ad_len, in2, out, &ctx, 258 nonce.get(), nonce_len, out, out_len,
|