/external/wpa_supplicant_8/src/crypto/ |
aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
aes_wrap.h | 39 const u8 *nonce, size_t nonce_len, 43 const u8 *nonce, size_t nonce_len,
|
/external/boringssl/src/ssl/ |
ssl_aead_ctx.c | 181 size_t nonce_len = 0; local 185 nonce_len = aead->fixed_nonce_len - aead->variable_nonce_len; 186 memset(nonce, 0, nonce_len); 189 nonce_len += aead->fixed_nonce_len; 199 memcpy(nonce + nonce_len, in, aead->variable_nonce_len); 204 memcpy(nonce + nonce_len, seqnum, aead->variable_nonce_len); 206 nonce_len += aead->variable_nonce_len; 210 assert(nonce_len == aead->fixed_nonce_len); 217 return EVP_AEAD_CTX_open(&aead->ctx, out, out_len, max_out, nonce, nonce_len, 242 size_t nonce_len = 0 local [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.h | 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
peerkey_auth.c | 270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) {
|
wpa_auth_ie.c | 829 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
|
/external/boringssl/src/crypto/cipher/ |
e_chacha20poly1305.c | 210 const uint8_t *nonce, size_t nonce_len, 213 if (nonce_len != 12) { 223 const uint8_t *nonce, size_t nonce_len, 226 if (nonce_len != 12) { 267 const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, 269 if (nonce_len != 8) { 282 const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, 284 if (nonce_len != 8) {
|
aead.c | 27 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; } 102 size_t nonce_len, const uint8_t *in, size_t in_len, 116 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in, 131 size_t nonce_len, const uint8_t *in, size_t in_len, 138 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
|
internal.h | 76 uint8_t nonce_len; member in struct:evp_aead_st 89 size_t max_out_len, const uint8_t *nonce, size_t nonce_len, 94 size_t max_out_len, const uint8_t *nonce, size_t nonce_len,
|
e_aes.c | [all...] |
e_ssl3.c | 128 const uint8_t *nonce, size_t nonce_len, 152 if (nonce_len != 0) { 213 const uint8_t *nonce, size_t nonce_len, 237 if (nonce_len != 0) {
|
e_tls.c | 105 const uint8_t *nonce, size_t nonce_len, 129 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { 206 const uint8_t *nonce, size_t nonce_len, 229 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.h | 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
wpa_ie.c | 421 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_eke.c | 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { 326 data->nonce_s, data->sess.nonce_len); 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, 330 data->sess.nonce_len); 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, 570 if (decrypt_len < (size_t) data->sess.nonce_len) { 576 data->nonce_p, data->sess.nonce_len); 619 if (decrypt_len < (size_t) data->sess.nonce_len) { 625 nonce, data->sess.nonce_len); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_eke.c | 466 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) { 472 data->nonce_p, data->sess.nonce_len); 474 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len, 541 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) { 547 nonces, 2 * data->sess.nonce_len); 548 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { 554 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, 555 data->sess.nonce_len); 557 data->nonce_s, data->sess.nonce_len); 590 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len, [all...] |
/external/boringssl/src/crypto/modes/ |
gcm_test.c | 302 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, local 315 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") || 348 CRYPTO_gcm128_setiv(&ctx, &aes_key, nonce, nonce_len); 364 CRYPTO_gcm128_setiv(&ctx, &aes_key, nonce, nonce_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.c | 516 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; 527 os_memcpy(pos, nonce_p, sess->nonce_len); 528 pos += sess->nonce_len; 529 os_memcpy(pos, nonce_s, sess->nonce_len); 561 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; 572 os_memcpy(pos, nonce_p, sess->nonce_len); 573 pos += sess->nonce_len; 574 os_memcpy(pos, nonce_s, sess->nonce_len); 730 sess->nonce_len = eap_eke_nonce_len(prf); 735 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 | [all...] |
eap_eke_common.h | 74 int nonce_len; member in struct:eap_eke_session
|
ikev2_common.c | 318 payloads->nonce_len = pdatalen; 373 const u8 *nonce, size_t nonce_len, 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 409 os_memcpy(pos, nonce, nonce_len); 410 pos += nonce_len;
|
ikev2_common.h | 290 const u8 *nonce, size_t nonce_len, 309 size_t nonce_len; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/wpa_supplicant/ |
mesh_rsn.c | 385 size_t nonce_len = sizeof(sta->my_nonce); local 393 if (os_memcmp(sta->my_nonce, sta->peer_nonce, nonce_len) < 0) { 400 os_memcpy(ptr, min, nonce_len); 401 os_memcpy(ptr + nonce_len, max, nonce_len); 402 ptr += 2 * nonce_len;
|
/external/boringssl/src/tool/ |
speed.cc | 181 const size_t nonce_len = EVP_AEAD_nonce_length(aead); local 186 std::unique_ptr<uint8_t[]> nonce(new uint8_t[nonce_len]); 187 memset(nonce.get(), 0, nonce_len); 207 if (!TimeFunction(&results, [chunk_len, overhead_len, nonce_len, ad_len, in, 213 nonce_len, in, chunk_len, ad.get(), ad_len);
|
/external/boringssl/src/include/openssl/ |
aead.h | 278 * The length of |nonce|, |nonce_len|, must be equal to the result of 288 const uint8_t *nonce, size_t nonce_len, 303 * The length of |nonce|, |nonce_len|, must be equal to the result of 313 const uint8_t *nonce, size_t nonce_len,
|
/system/keymaster/ |
ae.h | 75 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len); 84 * nonce_len - Length of nonces to be used for this key, in bytes 102 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce. 132 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce.
|