HomeSort by relevance Sort by last modified time
    Searched full:nonce_len (Results 1 - 25 of 30) sorted by null

1 2

  /external/wpa_supplicant_8/src/crypto/
aes-eax.c 20 * @nonce_len: Nonce length in bytes
28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
38 if (nonce_len > data_len)
39 buf_len = nonce_len;
53 os_memcpy(buf + 16, nonce, nonce_len);
54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac))
84 * @nonce_len: Nonce length in bytes
92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len,
102 if (nonce_len > data_len)
103 buf_len = nonce_len;
    [all...]
aes_wrap.h 39 const u8 *nonce, size_t nonce_len,
43 const u8 *nonce, size_t nonce_len,
  /external/boringssl/src/ssl/
ssl_aead_ctx.c 181 size_t nonce_len = 0; local
185 nonce_len = aead->fixed_nonce_len - aead->variable_nonce_len;
186 memset(nonce, 0, nonce_len);
189 nonce_len += aead->fixed_nonce_len;
199 memcpy(nonce + nonce_len, in, aead->variable_nonce_len);
204 memcpy(nonce + nonce_len, seqnum, aead->variable_nonce_len);
206 nonce_len += aead->variable_nonce_len;
210 assert(nonce_len == aead->fixed_nonce_len);
217 return EVP_AEAD_CTX_open(&aead->ctx, out, out_len, max_out, nonce, nonce_len,
242 size_t nonce_len = 0 local
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.h 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
peerkey_auth.c 270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) {
wpa_auth_ie.c 829 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
  /external/boringssl/src/crypto/cipher/
e_chacha20poly1305.c 210 const uint8_t *nonce, size_t nonce_len,
213 if (nonce_len != 12) {
223 const uint8_t *nonce, size_t nonce_len,
226 if (nonce_len != 12) {
267 const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len,
269 if (nonce_len != 8) {
282 const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len,
284 if (nonce_len != 8) {
aead.c 27 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; }
102 size_t nonce_len, const uint8_t *in, size_t in_len,
116 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
131 size_t nonce_len, const uint8_t *in, size_t in_len,
138 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
internal.h 76 uint8_t nonce_len; member in struct:evp_aead_st
89 size_t max_out_len, const uint8_t *nonce, size_t nonce_len,
94 size_t max_out_len, const uint8_t *nonce, size_t nonce_len,
e_aes.c     [all...]
e_ssl3.c 128 const uint8_t *nonce, size_t nonce_len,
152 if (nonce_len != 0) {
213 const uint8_t *nonce, size_t nonce_len,
237 if (nonce_len != 0) {
e_tls.c 105 const uint8_t *nonce, size_t nonce_len,
129 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) {
206 const uint8_t *nonce, size_t nonce_len,
229 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) {
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.h 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
wpa_ie.c 421 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
  /external/wpa_supplicant_8/src/eap_server/
eap_server_eke.c 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) {
326 data->nonce_s, data->sess.nonce_len);
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len);
329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s,
330 data->sess.nonce_len);
332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len,
570 if (decrypt_len < (size_t) data->sess.nonce_len) {
576 data->nonce_p, data->sess.nonce_len);
619 if (decrypt_len < (size_t) data->sess.nonce_len) {
625 nonce, data->sess.nonce_len);
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_eke.c 466 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) {
472 data->nonce_p, data->sess.nonce_len);
474 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len,
541 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) {
547 nonces, 2 * data->sess.nonce_len);
548 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) {
554 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
555 data->sess.nonce_len);
557 data->nonce_s, data->sess.nonce_len);
590 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len,
    [all...]
  /external/boringssl/src/crypto/modes/
gcm_test.c 302 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, local
315 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") ||
348 CRYPTO_gcm128_setiv(&ctx, &aes_key, nonce, nonce_len);
364 CRYPTO_gcm128_setiv(&ctx, &aes_key, nonce, nonce_len);
  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.c 516 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len;
527 os_memcpy(pos, nonce_p, sess->nonce_len);
528 pos += sess->nonce_len;
529 os_memcpy(pos, nonce_s, sess->nonce_len);
561 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len;
572 os_memcpy(pos, nonce_p, sess->nonce_len);
573 pos += sess->nonce_len;
574 os_memcpy(pos, nonce_s, sess->nonce_len);
730 sess->nonce_len = eap_eke_nonce_len(prf);
735 if (sess->prf_len < 0 || sess->nonce_len < 0 || sess->auth_len < 0 |
    [all...]
eap_eke_common.h 74 int nonce_len; member in struct:eap_eke_session
ikev2_common.c 318 payloads->nonce_len = pdatalen;
373 const u8 *nonce, size_t nonce_len,
402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len;
409 os_memcpy(pos, nonce, nonce_len);
410 pos += nonce_len;
ikev2_common.h 290 const u8 *nonce, size_t nonce_len,
309 size_t nonce_len; member in struct:ikev2_payloads
  /external/wpa_supplicant_8/wpa_supplicant/
mesh_rsn.c 385 size_t nonce_len = sizeof(sta->my_nonce); local
393 if (os_memcmp(sta->my_nonce, sta->peer_nonce, nonce_len) < 0) {
400 os_memcpy(ptr, min, nonce_len);
401 os_memcpy(ptr + nonce_len, max, nonce_len);
402 ptr += 2 * nonce_len;
  /external/boringssl/src/tool/
speed.cc 181 const size_t nonce_len = EVP_AEAD_nonce_length(aead); local
186 std::unique_ptr<uint8_t[]> nonce(new uint8_t[nonce_len]);
187 memset(nonce.get(), 0, nonce_len);
207 if (!TimeFunction(&results, [chunk_len, overhead_len, nonce_len, ad_len, in,
213 nonce_len, in, chunk_len, ad.get(), ad_len);
  /external/boringssl/src/include/openssl/
aead.h 278 * The length of |nonce|, |nonce_len|, must be equal to the result of
288 const uint8_t *nonce, size_t nonce_len,
303 * The length of |nonce|, |nonce_len|, must be equal to the result of
313 const uint8_t *nonce, size_t nonce_len,
  /system/keymaster/
ae.h 75 int ae_init(ae_ctx* ctx, const void* key, int key_len, int nonce_len, int tag_len);
84 * nonce_len - Length of nonces to be used for this key, in bytes
102 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce.
132 * nonce - Pointer to a nonce_len (defined in ae_init) byte nonce.

Completed in 497 milliseconds

1 2