/external/boringssl/src/crypto/modes/ |
gcm_test.c | 313 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, local 322 !decode_hex(&plaintext, &plaintext_len, test->plaintext, test_num, 333 if (plaintext_len != ciphertext_len) { 349 out = OPENSSL_malloc(plaintext_len); 360 memset(out, 0, plaintext_len); 365 CRYPTO_gcm128_encrypt(&ctx, plaintext, out, plaintext_len); 368 (ciphertext && memcmp(out, ciphertext, plaintext_len) != 0)) { 370 hexdump("got ", out, plaintext_len); 371 hexdump("want", ciphertext, plaintext_len); 376 memset(out, 0, plaintext_len); [all...] |
/external/boringssl/src/crypto/cipher/ |
e_chacha20poly1305.c | 154 size_t plaintext_len; local 180 plaintext_len = in_len - c20_ctx->tag_len; 182 if (max_out_len < plaintext_len) { 194 poly1305_update_with_length(&poly1305, in, plaintext_len); 197 if (CRYPTO_memcmp(mac, in + plaintext_len, c20_ctx->tag_len) != 0) { 202 CRYPTO_chacha_20(out, in, plaintext_len, c20_ctx->key, nonce, 1); 203 *out_len = plaintext_len;
|
e_rc4.c | 279 size_t plaintext_len; local 295 plaintext_len = in_len - rc4_ctx->tag_len; 317 ad_extra[0] = (uint8_t)(plaintext_len >> 8); 318 ad_extra[1] = (uint8_t)(plaintext_len & 0xff); 360 MD5_Update(&md, out + md5_off, plaintext_len - md5_off); 368 if (CRYPTO_memcmp(out + plaintext_len, digest, rc4_ctx->tag_len)) { 373 *out_len = plaintext_len;
|
e_aes.c | 1151 size_t plaintext_len; local 1703 size_t plaintext_len; local [all...] |
/external/boringssl/src/ssl/ |
ssl_aead_ctx.c | 127 size_t plaintext_len) { 136 out[len++] = (uint8_t)(plaintext_len >> 8); 137 out[len++] = (uint8_t)plaintext_len; 159 size_t plaintext_len = 0; local 167 plaintext_len = in_len - overhead; 171 plaintext_len);
|
d1_pkt.c | 216 size_t plaintext_len; local 217 if (!SSL_AEAD_CTX_open(s->aead_read_ctx, rr->data, &plaintext_len, rr->length, 227 if (plaintext_len > SSL3_RT_MAX_PLAIN_LENGTH) { 232 assert(plaintext_len < (1u << 16)); 233 rr->length = plaintext_len;
|
s3_pkt.c | 352 size_t plaintext_len; local 353 if (!SSL_AEAD_CTX_open(s->aead_read_ctx, rr->data, &plaintext_len, rr->length, 364 if (plaintext_len > SSL3_RT_MAX_PLAIN_LENGTH + extra) { 369 assert(plaintext_len <= (1u << 16)); 370 rr->length = plaintext_len; [all...] |
/external/srtp/crypto/cipher/ |
cipher.c | 272 int plaintext_len; local 314 plaintext_len = length; 347 if (length != plaintext_len) 350 for (i=0; i < plaintext_len; i++)
|
/external/boringssl/src/crypto/evp/ |
p_rsa.c | 308 size_t plaintext_len; local 312 !RSA_decrypt(rsa, &plaintext_len, rctx->tbuf, key_len, in, inlen, 318 out, key_len, rctx->tbuf, plaintext_len, rctx->oaep_label,
|