HomeSort by relevance Sort by last modified time
    Searched refs:nonce_len (Results 1 - 25 of 26) sorted by null

1 2

  /external/wpa_supplicant_8/src/crypto/
aes-eax.c 20 * @nonce_len: Nonce length in bytes
28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
38 if (nonce_len > data_len)
39 buf_len = nonce_len;
53 os_memcpy(buf + 16, nonce, nonce_len);
54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac))
84 * @nonce_len: Nonce length in bytes
92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
102 if (nonce_len > data_len)
103 buf_len = nonce_len;
    [all...]
aes_wrap.h 34 const u8 *nonce, size_t nonce_len,
38 const u8 *nonce, size_t nonce_len,
  /external/chromium_org/third_party/boringssl/src/crypto/cipher/
internal.h 114 uint8_t nonce_len; member in struct:evp_aead_st
124 size_t nonce_len, const uint8_t *in, size_t in_len,
129 size_t nonce_len, const uint8_t *in, size_t in_len,
aead.c 27 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; }
71 size_t nonce_len, const uint8_t *in, size_t in_len,
85 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
100 size_t nonce_len, const uint8_t *in, size_t in_len,
107 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
e_chacha20poly1305.c 92 const uint8_t *nonce, size_t nonce_len,
123 if (nonce_len != CHACHA20_NONCE_LEN) {
152 const uint8_t *nonce, size_t nonce_len,
179 if (nonce_len != CHACHA20_NONCE_LEN) {
e_rc4.c 172 const uint8_t *nonce, size_t nonce_len,
191 if (nonce_len != 0) {
201 if (nonce_len != 0) {
266 const uint8_t *nonce, size_t nonce_len,
289 if (nonce_len != 0) {
e_aes.c 896 const uint8_t *nonce, size_t nonce_len,
914 CRYPTO_gcm128_setiv(&gcm, nonce, nonce_len);
938 const uint8_t *nonce, size_t nonce_len,
960 CRYPTO_gcm128_setiv(&gcm, nonce, nonce_len);
    [all...]
  /system/keymaster/
ae.h 75 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len);
84 * nonce_len - Length of nonces to be used for this key, in bytes
102 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce.
132 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce.
ocb.c 702 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len) {
706 if (nonce_len != 12)
    [all...]
  /external/chromium_org/third_party/boringssl/src/include/openssl/
aead.h 200 * The length of |nonce|, |nonce_len|, must be equal to the result of
210 const uint8_t *nonce, size_t nonce_len,
225 * The length of |nonce|, |nonce_len|, must be equal to the result of
235 const uint8_t *nonce, size_t nonce_len,
  /external/chromium_org/third_party/boringssl/src/tool/
speed.cc 169 const size_t nonce_len = EVP_AEAD_nonce_length(aead); local
174 std::unique_ptr<uint8_t[]> nonce(new uint8_t[nonce_len]);
175 memset(nonce.get(), 0, nonce_len);
189 if (!TimeFunction(&results, [chunk_len, overhead_len, nonce_len, &in, &out,
195 nonce_len, in.get(), chunk_len, NULL, 0);
  /external/chromium_org/third_party/boringssl/src/crypto/modes/
gcm_test.c 314 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, local
327 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") ||
357 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len);
373 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len);
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.h 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
peerkey_auth.c 270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) {
wpa_auth_ie.c 790 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.h 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
wpa_ie.c 414 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.c 524 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len;
535 os_memcpy(pos, nonce_p, sess->nonce_len);
536 pos += sess->nonce_len;
537 os_memcpy(pos, nonce_s, sess->nonce_len);
569 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len;
580 os_memcpy(pos, nonce_p, sess->nonce_len);
581 pos += sess->nonce_len;
582 os_memcpy(pos, nonce_s, sess->nonce_len);
742 sess->nonce_len = eap_eke_nonce_len(prf);
743 if (sess->nonce_len < 0
    [all...]
eap_eke_common.h 74 int nonce_len; member in struct:eap_eke_session
ikev2_common.h 290 const u8 *nonce, size_t nonce_len,
309 size_t nonce_len; member in struct:ikev2_payloads
ikev2_common.c 315 payloads->nonce_len = pdatalen;
370 const u8 *nonce, size_t nonce_len,
399 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len;
406 os_memcpy(pos, nonce, nonce_len);
407 pos += nonce_len;
  /external/wpa_supplicant_8/src/eap_server/
eap_server_eke.c 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) {
326 data->nonce_s, data->sess.nonce_len);
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len);
329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s,
330 data->sess.nonce_len);
332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len,
570 if (decrypt_len < (size_t) data->sess.nonce_len) {
576 data->nonce_p, data->sess.nonce_len);
619 if (decrypt_len < (size_t) data->sess.nonce_len) {
625 nonce, data->sess.nonce_len);
    [all...]
ikev2.c 487 ikev2_process_nr(data, pl->nonce, pl->nonce_len) < 0)
  /external/wpa_supplicant_8/src/eap_peer/
eap_eke.c 464 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) {
470 data->nonce_p, data->sess.nonce_len);
472 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len,
538 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) {
544 nonces, 2 * data->sess.nonce_len);
545 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) {
551 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
552 data->sess.nonce_len);
554 data->nonce_s, data->sess.nonce_len);
587 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len,
    [all...]
ikev2.c 448 ikev2_process_ni(data, pl->nonce, pl->nonce_len) < 0)

Completed in 799 milliseconds

1 2