/external/chromium_org/crypto/ |
encryptor.cc | 60 bool Encryptor::GenerateCounterMask(size_t plaintext_len, 68 size_t blocks = (plaintext_len + kBlockLength - 1) / kBlockLength; 85 size_t plaintext_len, 93 for (size_t i = 0; i < plaintext_len; ++i)
|
encryptor.h | 94 // Reserve at least |plaintext_len| + 16 bytes for |mask|. 96 // The generated mask will always have at least |plaintext_len| bytes and 102 bool GenerateCounterMask(size_t plaintext_len, 107 // |ciphertext|. |ciphertext| must have at least |plaintext_len| bytes. 109 size_t plaintext_len,
|
/external/chromium_org/third_party/boringssl/src/crypto/modes/ |
gcm_test.c | 314 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, local 323 !decode_hex(&plaintext, &plaintext_len, test->plaintext, test_num, 334 if (plaintext_len != ciphertext_len) { 350 out = OPENSSL_malloc(plaintext_len); 358 memset(out, 0, plaintext_len); 363 CRYPTO_gcm128_encrypt(&ctx, plaintext, out, plaintext_len); 366 (ciphertext && memcmp(out, ciphertext, plaintext_len) != 0)) { 368 hexdump("got ", out, plaintext_len); 369 hexdump("want", ciphertext, plaintext_len); 374 memset(out, 0, plaintext_len); [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
e_chacha20poly1305.c | 158 size_t plaintext_len; local 184 plaintext_len = in_len - c20_ctx->tag_len; 186 if (max_out_len < plaintext_len) { 198 poly1305_update_with_length(&poly1305, in, plaintext_len); 201 if (CRYPTO_memcmp(mac, in + plaintext_len, c20_ctx->tag_len) != 0) { 206 CRYPTO_chacha_20(out, in, plaintext_len, c20_ctx->key, nonce, 1); 207 *out_len = plaintext_len;
|
e_rc4.c | 271 size_t plaintext_len; local 287 plaintext_len = in_len - rc4_ctx->tag_len; 294 if (max_out_len < plaintext_len) { 343 MD5_Update(&md, out + md5_off, plaintext_len - md5_off); 351 if (CRYPTO_memcmp(out + plaintext_len, digest, rc4_ctx->tag_len)) { 356 *out_len = plaintext_len;
|
aead_test.c | 76 size_t ciphertext_len, plaintext_len; local 117 if (!EVP_AEAD_CTX_open(&ctx, out2, &plaintext_len, lengths[IN], bufs[NONCE], 124 if (plaintext_len != lengths[IN]) { 140 if (EVP_AEAD_CTX_open(&ctx, out2, &plaintext_len, lengths[IN], bufs[NONCE],
|
e_aes.c | 944 size_t plaintext_len; local 952 plaintext_len = in_len - gcm_ctx->tag_len; 954 if (max_out_len < plaintext_len) { 980 if (CRYPTO_memcmp(tag, in + plaintext_len, gcm_ctx->tag_len) != 0) { 985 *out_len = plaintext_len; [all...] |
/external/chromium_org/third_party/libsrtp/srtp/crypto/cipher/ |
cipher.c | 272 int plaintext_len; local 314 plaintext_len = length; 347 if (length != plaintext_len) 350 for (i=0; i < plaintext_len; i++)
|
/external/srtp/crypto/cipher/ |
cipher.c | 272 int plaintext_len; local 314 plaintext_len = length; 347 if (length != plaintext_len) 350 for (i=0; i < plaintext_len; i++)
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
p_rsa.c | 312 size_t plaintext_len; local 316 !RSA_decrypt(rsa, &plaintext_len, rctx->tbuf, key_len, in, inlen, 322 out, key_len, rctx->tbuf, plaintext_len, rctx->oaep_label,
|