/external/boringssl/src/crypto/fipsmodule/cipher/ |
H A D | internal.h | 79 uint8_t nonce_len; member in struct:evp_aead_st 93 size_t max_out_len, const uint8_t *nonce, size_t nonce_len, 99 const uint8_t *nonce, size_t nonce_len, const uint8_t *in, 104 const uint8_t *nonce, size_t nonce_len, const uint8_t *in,
|
H A D | aead.c | 30 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; } 117 size_t nonce_len, const uint8_t *in, size_t in_len, 136 max_out_len - in_len, nonce, nonce_len, in, 153 nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, 169 nonce, nonce_len, in, in_len, extra_in, 185 size_t nonce_len, const uint8_t *in, size_t in_len, 193 if (!ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in, 214 if (EVP_AEAD_CTX_open_gather(ctx, out, nonce, nonce_len, in, plaintext_len, 230 const uint8_t *nonce, size_t nonce_len, 244 if (ctx->aead->open_gather(ctx, out, nonce, nonce_len, i 115 EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 150 EVP_AEAD_CTX_seal_scatter( const EVP_AEAD_CTX *ctx, uint8_t *out, uint8_t *out_tag, size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, size_t extra_in_len, const uint8_t *ad, size_t ad_len) argument 183 EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 229 EVP_AEAD_CTX_open_gather(const EVP_AEAD_CTX *ctx, uint8_t *out, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, size_t in_tag_len, const uint8_t *ad, size_t ad_len) argument [all...] |
H A D | e_aes.c | 1208 const uint8_t *nonce, size_t nonce_len, 1224 if (nonce_len == 0) { 1237 CRYPTO_gcm128_setiv(&gcm, key, nonce, nonce_len); 1274 const uint8_t *nonce, size_t nonce_len, 1282 if (nonce_len == 0) { 1295 CRYPTO_gcm128_setiv(&gcm, key, nonce, nonce_len); 1325 out->nonce_len = 12; 1340 out->nonce_len = 12; 1382 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, 1390 if (nonce_len ! 1205 aead_aes_gcm_seal_scatter(const EVP_AEAD_CTX *ctx, uint8_t *out, uint8_t *out_tag, size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, size_t extra_in_len, const uint8_t *ad, size_t ad_len) argument 1273 aead_aes_gcm_open_gather(const EVP_AEAD_CTX *ctx, uint8_t *out, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, size_t in_tag_len, const uint8_t *ad, size_t ad_len) argument 1379 aead_aes_gcm_tls12_seal_scatter( const EVP_AEAD_CTX *ctx, uint8_t *out, uint8_t *out_tag, size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, size_t extra_in_len, const uint8_t *ad, size_t ad_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
/external/boringssl/src/fipstools/ |
H A D | cavp_ctr_drbg_test.cc | 28 std::string test_type, prediction_resistance, entropy_input_len, nonce_len, local 33 !t->GetInstruction(&nonce_len, "NonceLen") || 42 nonce_len != "0") {
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.h | 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.h | 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.h | 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/boringssl/src/crypto/cipher_extra/ |
H A D | aead_test.cc | 419 const size_t nonce_len = EVP_AEAD_nonce_length(aead()); local 420 ASSERT_GE(sizeof(nonce), nonce_len); local 434 sizeof(ciphertext), nonce, nonce_len, plaintext, 455 nonce_len, ciphertext, ciphertext_len, nullptr /* ad */, 0)) 473 const size_t nonce_len = EVP_AEAD_nonce_length(aead()); local 491 std::vector<uint8_t> nonce(nonce_len, 'b'); 496 sizeof(kPlaintext) + max_overhead, nonce.data(), nonce_len, kPlaintext, 510 nonce.data(), nonce_len, in, sizeof(kPlaintext), nullptr, 0)); 513 nonce.data(), nonce_len, in, sizeof(kPlaintext), nullptr, 0)); 518 valid_encryption_len, nonce.data(), nonce_len, 552 const size_t nonce_len = EVP_AEAD_nonce_length(aead()); local [all...] |
H A D | e_aesctrhmac.c | 181 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, 197 if (nonce_len != EVP_AEAD_AES_CTR_HMAC_SHA256_NONCE_LEN) { 215 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, 224 if (nonce_len != EVP_AEAD_AES_CTR_HMAC_SHA256_NONCE_LEN) { 178 aead_aes_ctr_hmac_sha256_seal_scatter( const EVP_AEAD_CTX *ctx, uint8_t *out, uint8_t *out_tag, size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, size_t extra_in_len, const uint8_t *ad, size_t ad_len) argument 213 aead_aes_ctr_hmac_sha256_open_gather( const EVP_AEAD_CTX *ctx, uint8_t *out, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, size_t in_tag_len, const uint8_t *ad, size_t ad_len) argument
|
H A D | e_chacha20poly1305.c | 161 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, 173 if (nonce_len != 12) { 237 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, 241 if (nonce_len != 12) { 158 aead_chacha20_poly1305_seal_scatter( const EVP_AEAD_CTX *ctx, uint8_t *out, uint8_t *out_tag, size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, size_t extra_in_len, const uint8_t *ad, size_t ad_len) argument 235 aead_chacha20_poly1305_open_gather( const EVP_AEAD_CTX *ctx, uint8_t *out, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, size_t in_tag_len, const uint8_t *ad, size_t ad_len) argument
|
H A D | e_ssl3.c | 129 size_t nonce_len, const uint8_t *in, 153 if (nonce_len != 0) { 233 const uint8_t *nonce, size_t nonce_len, 257 if (nonce_len != 0) { 126 aead_ssl3_seal_scatter(const EVP_AEAD_CTX *ctx, uint8_t *out, uint8_t *out_tag, size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, size_t extra_in_len, const uint8_t *ad, size_t ad_len) argument 231 aead_ssl3_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
|
H A D | e_aesgcmsiv.c | 331 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, 348 if (nonce_len != EVP_AEAD_AES_GCM_SIV_NONCE_LEN) { 400 const uint8_t *nonce, size_t nonce_len, 712 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, 730 if (nonce_len != EVP_AEAD_AES_GCM_SIV_NONCE_LEN) { 751 const uint8_t *nonce, size_t nonce_len, 769 if (nonce_len != EVP_AEAD_AES_GCM_SIV_NONCE_LEN) { 328 aead_aes_gcm_siv_asm_seal_scatter( const EVP_AEAD_CTX *ctx, uint8_t *out, uint8_t *out_tag, size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, size_t extra_in_len, const uint8_t *ad, size_t ad_len) argument 398 aead_aes_gcm_siv_asm_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 709 aead_aes_gcm_siv_seal_scatter( const EVP_AEAD_CTX *ctx, uint8_t *out, uint8_t *out_tag, size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, size_t extra_in_len, const uint8_t *ad, size_t ad_len) argument 750 aead_aes_gcm_siv_open_gather(const EVP_AEAD_CTX *ctx, uint8_t *out, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, size_t in_tag_len, const uint8_t *ad, size_t ad_len) argument
|
H A D | e_tls.c | 105 size_t nonce_len, const uint8_t *in, 129 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { 224 size_t nonce_len, const uint8_t *in, size_t in_len, 246 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { 102 aead_tls_seal_scatter(const EVP_AEAD_CTX *ctx, uint8_t *out, uint8_t *out_tag, size_t *out_tag_len, size_t max_out_tag_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, size_t extra_in_len, const uint8_t *ad, size_t ad_len) argument 222 aead_tls_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.h | 74 int nonce_len; member in struct:eap_eke_session
|
H A D | ikev2_common.c | 318 payloads->nonce_len = pdatalen; 373 const u8 *nonce, size_t nonce_len, 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 409 os_memcpy(pos, nonce, nonce_len); 410 pos += nonce_len; 369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ie.h | 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.h | 74 int nonce_len; member in struct:eap_eke_session
|
H A D | ikev2_common.c | 318 payloads->nonce_len = pdatalen; 373 const u8 *nonce, size_t nonce_len, 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 409 os_memcpy(pos, nonce, nonce_len); 410 pos += nonce_len; 369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ie.h | 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.h | 74 int nonce_len; member in struct:eap_eke_session
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ie.h | 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
/external/boringssl/src/tool/ |
H A D | speed.cc | 210 const size_t nonce_len = EVP_AEAD_nonce_length(aead); local 215 std::unique_ptr<uint8_t[]> nonce(new uint8_t[nonce_len]); 216 OPENSSL_memset(nonce.get(), 0, nonce_len); 239 if (!TimeFunction(&results, [chunk_len, overhead_len, nonce_len, ad_len, in, 244 nonce_len, in, chunk_len, ad.get(), ad_len); 253 nonce.get(), nonce_len, in, chunk_len, ad.get(), ad_len); 255 if (!TimeFunction(&results, [chunk_len, nonce_len, ad_len, in2, out, &ctx, 259 nonce.get(), nonce_len, out, out_len,
|