/external/chromium_org/net/quic/crypto/ |
aes_128_gcm_12_decrypter_openssl.cc | 66 const size_t plaintext_size = ciphertext.length() - kAuthTagSize; local 78 const_cast<char*>(ciphertext.data()) + plaintext_size) == 0) { 100 plaintext_size) == 0) { 110 *output_length = plaintext_size; 122 size_t plaintext_size; local 132 &plaintext_size)) { 135 return new QuicData(plaintext.release(), plaintext_size, true);
|
null_encrypter.cc | 55 size_t NullEncrypter::GetCiphertextSize(size_t plaintext_size) const { 56 return plaintext_size + GetHashLength();
|
aes_128_gcm_12_decrypter_test.cc | 259 size_t plaintext_size = ciphertext.length(); local 260 scoped_ptr<char[]> plaintext(new char[plaintext_size]); 264 &plaintext_size)) { 267 return new QuicData(plaintext.release(), plaintext_size, true);
|
aes_128_gcm_12_encrypter.h | 52 virtual size_t GetCiphertextSize(size_t plaintext_size) const OVERRIDE;
|
null_encrypter.h | 35 virtual size_t GetCiphertextSize(size_t plaintext_size) const OVERRIDE;
|
quic_encrypter.h | 77 // to plaintext of size |plaintext_size|. 78 virtual size_t GetCiphertextSize(size_t plaintext_size) const = 0;
|
aes_128_gcm_12_decrypter_nss.cc | 300 size_t plaintext_size = ciphertext.length() - kAuthTagSize; local 343 if (output_len != plaintext_size) { 358 size_t plaintext_size; local 368 &plaintext_size)) { 371 return new QuicData(plaintext.release(), plaintext_size, true);
|
aes_128_gcm_12_encrypter_openssl.cc | 165 size_t Aes128Gcm12Encrypter::GetCiphertextSize(size_t plaintext_size) const { 166 return plaintext_size + kAuthTagSize;
|
aes_128_gcm_12_encrypter_nss.cc | 372 size_t Aes128Gcm12Encrypter::GetCiphertextSize(size_t plaintext_size) const { 373 return plaintext_size + kAuthTagSize;
|
/external/chromium_org/crypto/ |
openpgp_symmetric_encryption.cc | 545 const size_t plaintext_size = reader->size(); local 546 if (plaintext_size < SHA1_LENGTH + 2) { 551 uint8* plaintext = reinterpret_cast<uint8*>(malloc(plaintext_size)); 554 for (size_t i = 0; i < plaintext_size; i++) { 571 if (plaintext[plaintext_size - SHA1_LENGTH - 2] != 0xd3 || 572 plaintext[plaintext_size - SHA1_LENGTH - 1] != 0x14) { 579 HASH_Update(hash_context, plaintext, plaintext_size - SHA1_LENGTH); 585 if (memcmp(digest, &plaintext[plaintext_size - SHA1_LENGTH], 591 plaintext_size - SHA1_LENGTH);
|
encryptor_unittest.cc | 186 const unsigned char* plaintext, size_t plaintext_size, 199 reinterpret_cast<const char*>(plaintext), plaintext_size); local 218 const unsigned char* plaintext, size_t plaintext_size,
|
/external/chromium_org/net/quic/ |
quic_connection_test.cc | 127 virtual size_t GetCiphertextSize(size_t plaintext_size) const OVERRIDE { 128 return plaintext_size + kTagSize; [all...] |
quic_framer_test.cc | 131 virtual size_t GetCiphertextSize(size_t plaintext_size) const OVERRIDE { 132 return plaintext_size; [all...] |