HomeSort by relevance Sort by last modified time
    Searched full:nonce_len (Results 1 - 25 of 31) sorted by null

1 2

  /external/wpa_supplicant_8/src/crypto/
aes-eax.c 20 * @nonce_len: Nonce length in bytes
28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
38 if (nonce_len > data_len)
39 buf_len = nonce_len;
53 os_memcpy(buf + 16, nonce, nonce_len);
54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac))
84 * @nonce_len: Nonce length in bytes
92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
102 if (nonce_len > data_len)
103 buf_len = nonce_len;
    [all...]
aes_wrap.h 39 const u8 *nonce, size_t nonce_len,
43 const u8 *nonce, size_t nonce_len,
  /external/boringssl/src/ssl/
ssl_aead_ctx.c 175 size_t nonce_len = 0; local
177 nonce_len += aead->fixed_nonce_len;
184 memcpy(nonce + nonce_len, in, aead->variable_nonce_len);
189 memcpy(nonce + nonce_len, seqnum, aead->variable_nonce_len);
191 nonce_len += aead->variable_nonce_len;
193 return EVP_AEAD_CTX_open(&aead->ctx, out, out_len, max_out, nonce, nonce_len,
218 size_t nonce_len = 0; local
220 nonce_len += aead->fixed_nonce_len;
223 if (!RAND_bytes(nonce + nonce_len, aead->variable_nonce_len)) {
230 memcpy(nonce + nonce_len, ad, aead->variable_nonce_len)
    [all...]
  /external/boringssl/src/crypto/cipher/
aead.c 27 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; }
99 size_t nonce_len, const uint8_t *in, size_t in_len,
113 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
128 size_t nonce_len, const uint8_t *in, size_t in_len,
135 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
e_chacha20poly1305.c 94 const uint8_t *nonce, size_t nonce_len,
125 if (nonce_len != CHACHA20_NONCE_LEN) {
148 const uint8_t *nonce, size_t nonce_len,
175 if (nonce_len != CHACHA20_NONCE_LEN) {
internal.h 76 uint8_t nonce_len; member in struct:evp_aead_st
89 size_t max_out_len, const uint8_t *nonce, size_t nonce_len,
94 size_t max_out_len, const uint8_t *nonce, size_t nonce_len,
e_aes.c     [all...]
e_ssl3.c 128 const uint8_t *nonce, size_t nonce_len,
152 if (nonce_len != 0) {
213 const uint8_t *nonce, size_t nonce_len,
237 if (nonce_len != 0) {
e_rc4.c 174 const uint8_t *nonce, size_t nonce_len,
192 if (nonce_len != 0) {
202 if (nonce_len != 0) {
274 const uint8_t *nonce, size_t nonce_len,
297 if (nonce_len != 0) {
e_tls.c 104 const uint8_t *nonce, size_t nonce_len,
129 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) {
210 const uint8_t *nonce, size_t nonce_len,
234 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) {
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.h 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
peerkey_auth.c 270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) {
wpa_auth_ie.c 808 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.h 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
  /external/wpa_supplicant_8/src/eap_server/
eap_server_eke.c 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) {
326 data->nonce_s, data->sess.nonce_len);
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len);
329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s,
330 data->sess.nonce_len);
332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len,
570 if (decrypt_len < (size_t) data->sess.nonce_len) {
576 data->nonce_p, data->sess.nonce_len);
619 if (decrypt_len < (size_t) data->sess.nonce_len) {
625 nonce, data->sess.nonce_len);
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_eke.c 465 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) {
471 data->nonce_p, data->sess.nonce_len);
473 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len,
540 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) {
546 nonces, 2 * data->sess.nonce_len);
547 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) {
553 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
554 data->sess.nonce_len);
556 data->nonce_s, data->sess.nonce_len);
589 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len,
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.c 524 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len;
535 os_memcpy(pos, nonce_p, sess->nonce_len);
536 pos += sess->nonce_len;
537 os_memcpy(pos, nonce_s, sess->nonce_len);
569 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len;
580 os_memcpy(pos, nonce_p, sess->nonce_len);
581 pos += sess->nonce_len;
582 os_memcpy(pos, nonce_s, sess->nonce_len);
742 sess->nonce_len = eap_eke_nonce_len(prf);
743 if (sess->nonce_len < 0
    [all...]
eap_eke_common.h 74 int nonce_len; member in struct:eap_eke_session
ikev2_common.c 319 payloads->nonce_len = pdatalen;
374 const u8 *nonce, size_t nonce_len,
403 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len;
410 os_memcpy(pos, nonce, nonce_len);
411 pos += nonce_len;
ikev2_common.h 290 const u8 *nonce, size_t nonce_len,
309 size_t nonce_len; member in struct:ikev2_payloads
  /external/wpa_supplicant_8/wpa_supplicant/
mesh_rsn.c 365 size_t nonce_len = sizeof(sta->my_nonce); local
373 if (os_memcmp(sta->my_nonce, sta->peer_nonce, nonce_len) < 0) {
380 os_memcpy(ptr, min, nonce_len);
381 os_memcpy(ptr + nonce_len, max, nonce_len);
382 ptr += 2 * nonce_len;
  /external/boringssl/src/crypto/modes/
gcm_test.c 313 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, local
326 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") ||
359 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len);
375 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len);
  /external/boringssl/src/tool/
speed.cc 187 const size_t nonce_len = EVP_AEAD_nonce_length(aead); local
192 std::unique_ptr<uint8_t[]> nonce(new uint8_t[nonce_len]);
193 memset(nonce.get(), 0, nonce_len);
213 if (!TimeFunction(&results, [chunk_len, overhead_len, nonce_len, ad_len, in,
219 nonce_len, in, chunk_len, ad.get(), ad_len);
  /external/boringssl/src/include/openssl/
aead.h 263 * The length of |nonce|, |nonce_len|, must be equal to the result of
273 const uint8_t *nonce, size_t nonce_len,
288 * The length of |nonce|, |nonce_len|, must be equal to the result of
298 const uint8_t *nonce, size_t nonce_len,
  /system/keymaster/
ae.h 75 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len);
84 * nonce_len - Length of nonces to be used for this key, in bytes
102 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce.
132 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce.

Completed in 969 milliseconds

1 2