/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
aead_test.c | 76 size_t ciphertext_len, plaintext_len; local 85 if (!EVP_AEAD_CTX_seal(&ctx, out, &ciphertext_len, sizeof(out), bufs[NONCE], 92 if (ciphertext_len != lengths[CT] + lengths[TAG]) { 94 (unsigned)ciphertext_len, (unsigned)(lengths[CT] + lengths[TAG])); 118 lengths[NONCE], out, ciphertext_len, bufs[AD], 126 (unsigned)ciphertext_len); 141 lengths[NONCE], out, ciphertext_len, bufs[AD],
|
/external/chromium_org/third_party/boringssl/src/crypto/modes/ |
gcm_test.c | 314 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, local 328 !decode_hex(&ciphertext, &ciphertext_len, test->ciphertext, test_num, 334 if (plaintext_len != ciphertext_len) {
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/ae_xfm/ |
xfm.c | 341 unsigned ciphertext_len; local 383 ciphertext_len = *opaque_len - TAG_LEN; 386 printf("ciphertext len: %d\n", ciphertext_len); 408 status = hmac_compute(&hmac_ctx, opaque, ciphertext_len, TAG_LEN, tmp_tag); 413 octet_string_hex_string(opaque, ciphertext_len)); 421 auth_tag += ciphertext_len; 446 status = aes_cbc_nist_decrypt(&aes_ctx, opaque, &ciphertext_len); 451 printf("plaintext len: %d\n", ciphertext_len); 453 octet_string_hex_string(opaque, ciphertext_len)); 457 *opaque_len = ciphertext_len; [all...] |
/external/srtp/crypto/ae_xfm/ |
xfm.c | 307 unsigned ciphertext_len; local 349 ciphertext_len = *opaque_len - TAG_LEN; 352 printf("ciphertext len: %d\n", ciphertext_len); 374 status = hmac_compute(&hmac_ctx, opaque, ciphertext_len, TAG_LEN, tmp_tag); 379 octet_string_hex_string(opaque, ciphertext_len)); 387 auth_tag += ciphertext_len; 412 status = aes_cbc_nist_decrypt(&aes_ctx, opaque, &ciphertext_len); 417 printf("plaintext len: %d\n", ciphertext_len); 419 octet_string_hex_string(opaque, ciphertext_len)); 423 *opaque_len = ciphertext_len; [all...] |