/third_party/openssl/test/recipes/ |
D | 70-test_sslcbcpadding.t | 95 my $plaintext_len = $block_size - ($mac_len % $block_size); 96 my $plaintext = "A" x $plaintext_len; 119 $plaintext_len,
|
/third_party/boringssl/src/crypto/fipsmodule/cipher/ |
D | aead.c | 209 size_t plaintext_len = in_len - ctx->tag_len; in EVP_AEAD_CTX_open() local 210 if (max_out_len < plaintext_len) { in EVP_AEAD_CTX_open() 214 if (EVP_AEAD_CTX_open_gather(ctx, out, nonce, nonce_len, in, plaintext_len, in EVP_AEAD_CTX_open() 215 in + plaintext_len, ctx->tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open() 216 *out_len = plaintext_len; in EVP_AEAD_CTX_open()
|
/third_party/boringssl/src/crypto/cipher_extra/ |
D | e_aesgcmsiv.c | 435 const size_t plaintext_len = in_len - EVP_AEAD_AES_GCM_SIV_TAG_LEN; in aead_aes_gcm_siv_asm_open() local 436 const uint8_t *const given_tag = in + plaintext_len; in aead_aes_gcm_siv_asm_open() 438 if (max_out_len < plaintext_len) { in aead_aes_gcm_siv_asm_open() 476 plaintext_len); in aead_aes_gcm_siv_asm_open() 479 plaintext_len); in aead_aes_gcm_siv_asm_open() 482 if (plaintext_len & 15) { in aead_aes_gcm_siv_asm_open() 484 plaintext_len, given_tag, in aead_aes_gcm_siv_asm_open() 487 OPENSSL_memcpy(scratch, out + (plaintext_len & ~15), plaintext_len & 15); in aead_aes_gcm_siv_asm_open() 501 length_block.bitlens.in = plaintext_len * 8; in aead_aes_gcm_siv_asm_open()
|
D | e_aesccm.c | 96 size_t plaintext_len) { in ccm128_init_state() argument 102 if (plaintext_len > CRYPTO_ccm128_max_input(ctx) || in ccm128_init_state() 115 state->nonce.c[15 - i] = (uint8_t)(plaintext_len >> (8 * i)); in ccm128_init_state() 166 size_t remaining_blocks = 2 * ((plaintext_len + 15) / 16) + 1; in ccm128_init_state() 167 if (plaintext_len + 15 < plaintext_len || in ccm128_init_state()
|
D | e_chacha20poly1305.c | 92 size_t plaintext_len, const uint8_t *ad, 102 size_t plaintext_len, const uint8_t *ad, 110 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_open() argument 115 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_seal() argument
|
/third_party/boringssl/src/ssl/ |
D | ssl_aead_ctx.cc | 224 const uint8_t seqnum[8], size_t plaintext_len, Span<const uint8_t> header) { in GetAdditionalData() argument 235 storage[len++] = static_cast<uint8_t>((plaintext_len >> 8)); in GetAdditionalData() 236 storage[len++] = static_cast<uint8_t>(plaintext_len); in GetAdditionalData() 252 size_t plaintext_len = 0; in Open() local 260 plaintext_len = in.size() - overhead; in Open() 265 seqnum, plaintext_len, header); in Open()
|
D | tls_record.cc | 641 size_t SealRecordSuffixLen(const SSL *ssl, const size_t plaintext_len) { in SealRecordSuffixLen() argument 642 assert(plaintext_len <= SSL3_RT_MAX_PLAIN_LENGTH); in SealRecordSuffixLen() 645 plaintext_len)) { in SealRecordSuffixLen()
|
D | t1_lib.cc | 3647 size_t plaintext_len; in ssl_decrypt_ticket_with_method() local 3650 hs->ssl, plaintext.data(), &plaintext_len, ticket.size(), in ssl_decrypt_ticket_with_method() 3656 plaintext.Shrink(plaintext_len); in ssl_decrypt_ticket_with_method()
|
D | internal.h | 858 size_t plaintext_len,
|
/third_party/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 416 size_t plaintext_len = 0; in TEST_P() local 417 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 420 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 429 plaintext_len = 0; in TEST_P() 430 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 433 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 436 plaintext_len = 0; in TEST_P() 437 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 440 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 448 key.get(), &plaintext_len, plaintext, sizeof(plaintext), ciphertext, in TEST_P() [all …]
|
/third_party/boringssl/src/crypto/pkcs8/ |
D | pkcs8.c | 452 size_t plaintext_len = 0; in PKCS8_marshal_encrypted_private_key() local 479 !CBB_finish(&plaintext_cbb, &plaintext, &plaintext_len)) { in PKCS8_marshal_encrypted_private_key() 505 size_t max_out = plaintext_len + EVP_CIPHER_CTX_block_size(&ctx); in PKCS8_marshal_encrypted_private_key() 506 if (max_out < plaintext_len) { in PKCS8_marshal_encrypted_private_key() 516 !EVP_CipherUpdate(&ctx, ptr, &n1, plaintext, plaintext_len) || in PKCS8_marshal_encrypted_private_key()
|
/third_party/boringssl/src/crypto/evp/ |
D | evp_test.cc | 506 size_t plaintext_len; in TestEVP() local 513 !EVP_PKEY_decrypt(decrypt_ctx.get(), nullptr, &plaintext_len, in TestEVP() 517 output.resize(plaintext_len); in TestEVP() 518 if (!EVP_PKEY_decrypt(decrypt_ctx.get(), output.data(), &plaintext_len, in TestEVP() 523 output.resize(plaintext_len); in TestEVP()
|
/third_party/openssl/test/ |
D | evp_extra_test.c | 385 int len, kek_len, ciphertext_len, plaintext_len; in test_EVP_Enveloped() local 403 || !TEST_true(EVP_OpenUpdate(ctx, plaintext, &plaintext_len, in test_EVP_Enveloped() 405 || !TEST_true(EVP_OpenFinal(ctx, plaintext + plaintext_len, &len))) in test_EVP_Enveloped() 408 plaintext_len += len; in test_EVP_Enveloped() 409 if (!TEST_mem_eq(msg, sizeof(msg), plaintext, plaintext_len)) in test_EVP_Enveloped()
|
D | evp_test.c | 479 size_t plaintext_len; member 543 return parse_bin(value, &cdat->plaintext, &cdat->plaintext_len); in cipher_test_parse() 589 in_len = expected->plaintext_len; in cipher_test_enc() 596 out_len = expected->plaintext_len; in cipher_test_enc()
|
/third_party/node/src/ |
D | node_crypto.h | 580 bool SetAAD(const char* data, unsigned int len, int plaintext_len);
|
D | node_crypto.cc | 3954 bool CipherBase::SetAAD(const char* data, unsigned int len, int plaintext_len) { in SetAAD() argument 3965 if (plaintext_len < 0) { in SetAAD() 3970 if (!CheckCCMMessageLength(plaintext_len)) in SetAAD() 3979 if (!EVP_CipherUpdate(ctx_.get(), nullptr, &outlen, nullptr, plaintext_len)) in SetAAD() 3997 int plaintext_len = args[1].As<Int32>()->Value(); in SetAAD() local 4000 bool b = cipher->SetAAD(buf.data(), buf.length(), plaintext_len); in SetAAD()
|
/third_party/boringssl/src/include/openssl/ |
D | ssl.h | 4781 OPENSSL_EXPORT size_t SealRecordPrefixLen(const SSL *ssl, size_t plaintext_len); 4790 OPENSSL_EXPORT size_t SealRecordSuffixLen(const SSL *ssl, size_t plaintext_len);
|