/external/oss-fuzz/projects/libsodium/ |
D | secretbox_easy_fuzzer.cc | 34 size_t ciphertext_len = crypto_secretbox_MACBYTES + size; in LLVMFuzzerTestOneInput() local 35 unsigned char *ciphertext = (unsigned char *) malloc(ciphertext_len); in LLVMFuzzerTestOneInput() 40 int err = crypto_secretbox_open_easy(decrypted, ciphertext, ciphertext_len, nonce, key); in LLVMFuzzerTestOneInput()
|
/external/boringssl/src/ssl/ |
D | dtls_record.cc | 330 size_t ciphertext_len; in dtls_seal_record() local 331 if (!aead->CiphertextLen(&ciphertext_len, in_len, 0)) { in dtls_seal_record() 335 out[11] = ciphertext_len >> 8; in dtls_seal_record() 336 out[12] = ciphertext_len & 0xff; in dtls_seal_record() 346 assert(ciphertext_len == len_copy); in dtls_seal_record() 348 *out_len = DTLS1_RT_HEADER_LENGTH + ciphertext_len; in dtls_seal_record()
|
D | tls_record.cc | 224 uint16_t version, ciphertext_len; in tls_open_record() local 227 !CBS_get_u16(&cbs, &ciphertext_len)) { in tls_open_record() 248 if (ciphertext_len > SSL3_RT_MAX_ENCRYPTED_LENGTH) { in tls_open_record() 256 if (!CBS_get_bytes(&cbs, &body, ciphertext_len)) { in tls_open_record() 257 *out_consumed = SSL3_RT_HEADER_LENGTH + (size_t)ciphertext_len; in tls_open_record() 270 ciphertext_len == 1 && in tls_open_record() 389 size_t suffix_len, ciphertext_len; in do_seal_record() local 391 !aead->CiphertextLen(&ciphertext_len, in_len, extra_in_len)) { in do_seal_record() 410 out_prefix[3] = ciphertext_len >> 8; in do_seal_record() 411 out_prefix[4] = ciphertext_len & 0xff; in do_seal_record()
|
D | d1_pkt.cc | 235 size_t ciphertext_len; in dtls1_write_record() local 238 !dtls_seal_record(ssl, buf->remaining().data(), &ciphertext_len, in dtls1_write_record() 243 buf->DidWrite(ciphertext_len); in dtls1_write_record()
|
D | s3_pkt.cc | 278 size_t ciphertext_len; in do_tls_write() local 279 if (!tls_seal_record(ssl, buf->remaining().data(), &ciphertext_len, in do_tls_write() 283 buf->DidWrite(ciphertext_len); in do_tls_write()
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | dtls_record.cc | 330 size_t ciphertext_len; in dtls_seal_record() local 331 if (!aead->CiphertextLen(&ciphertext_len, in_len, 0)) { in dtls_seal_record() 335 out[11] = ciphertext_len >> 8; in dtls_seal_record() 336 out[12] = ciphertext_len & 0xff; in dtls_seal_record() 346 assert(ciphertext_len == len_copy); in dtls_seal_record() 348 *out_len = DTLS1_RT_HEADER_LENGTH + ciphertext_len; in dtls_seal_record()
|
D | tls_record.cc | 224 uint16_t version, ciphertext_len; in tls_open_record() local 227 !CBS_get_u16(&cbs, &ciphertext_len)) { in tls_open_record() 248 if (ciphertext_len > SSL3_RT_MAX_ENCRYPTED_LENGTH) { in tls_open_record() 256 if (!CBS_get_bytes(&cbs, &body, ciphertext_len)) { in tls_open_record() 257 *out_consumed = SSL3_RT_HEADER_LENGTH + (size_t)ciphertext_len; in tls_open_record() 270 ciphertext_len == 1 && in tls_open_record() 389 size_t suffix_len, ciphertext_len; in do_seal_record() local 391 !aead->CiphertextLen(&ciphertext_len, in_len, extra_in_len)) { in do_seal_record() 410 out_prefix[3] = ciphertext_len >> 8; in do_seal_record() 411 out_prefix[4] = ciphertext_len & 0xff; in do_seal_record()
|
D | d1_pkt.cc | 235 size_t ciphertext_len; in dtls1_write_record() local 238 !dtls_seal_record(ssl, buf->remaining().data(), &ciphertext_len, in dtls1_write_record() 243 buf->DidWrite(ciphertext_len); in dtls1_write_record()
|
D | s3_pkt.cc | 278 size_t ciphertext_len; in do_tls_write() local 279 if (!tls_seal_record(ssl, buf->remaining().data(), &ciphertext_len, in do_tls_write() 283 buf->DidWrite(ciphertext_len); in do_tls_write()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/cipher_extra/ |
D | aead_test.cc | 433 size_t ciphertext_len; in TEST_P() local 437 ASSERT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), ciphertext, &ciphertext_len, in TEST_P() 441 for (size_t i = ciphertext_len; i < sizeof(ciphertext); i++) { in TEST_P() 447 const size_t overhead_used = ciphertext_len - sizeof(plaintext); in TEST_P() 459 nonce_len, ciphertext, ciphertext_len, nullptr /* ad */, 0)) in TEST_P() 568 size_t ciphertext_len; in TEST_P() local 569 ASSERT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), ciphertext + 1, &ciphertext_len, in TEST_P() 583 ciphertext_len, ad + 1, ad_len)); in TEST_P() 600 size_t ciphertext_len; in TEST_P() local 603 ctx.get(), ciphertext, &ciphertext_len, sizeof(ciphertext), nullptr, 0, in TEST_P() [all …]
|
D | e_aesctrhmac.c | 124 size_t ciphertext_len) { in hmac_calculate() argument 128 hmac_update_uint64(&sha256, ciphertext_len); in hmac_calculate() 142 SHA256_Update(&sha256, ciphertext, ciphertext_len); in hmac_calculate()
|
D | e_chacha20poly1305.c | 159 const uint8_t *ciphertext, size_t ciphertext_len, in calc_tag() argument 174 CRYPTO_poly1305_update(&ctx, ciphertext, ciphertext_len); in calc_tag() 176 const size_t ciphertext_total = ciphertext_len + ciphertext_extra_len; in calc_tag()
|
/external/boringssl/src/crypto/cipher_extra/ |
D | aead_test.cc | 506 size_t ciphertext_len; in TEST_P() local 510 ASSERT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), ciphertext, &ciphertext_len, in TEST_P() 514 for (size_t i = ciphertext_len; i < sizeof(ciphertext); i++) { in TEST_P() 520 const size_t overhead_used = ciphertext_len - sizeof(plaintext); in TEST_P() 532 nonce_len, ciphertext, ciphertext_len, nullptr /* ad */, 0)) in TEST_P() 645 size_t ciphertext_len; in TEST_P() local 646 ASSERT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), ciphertext + 1, &ciphertext_len, in TEST_P() 660 ciphertext_len, ad + 1, ad_len)); in TEST_P() 677 size_t ciphertext_len; in TEST_P() local 680 ctx.get(), ciphertext, &ciphertext_len, sizeof(ciphertext), nullptr, 0, in TEST_P() [all …]
|
D | e_aesctrhmac.c | 124 size_t ciphertext_len) { in hmac_calculate() argument 128 hmac_update_uint64(&sha256, ciphertext_len); in hmac_calculate() 142 SHA256_Update(&sha256, ciphertext, ciphertext_len); in hmac_calculate()
|
D | e_chacha20poly1305.c | 84 const uint8_t *ciphertext, size_t ciphertext_len, in calc_tag() argument 99 CRYPTO_poly1305_update(&ctx, ciphertext, ciphertext_len); in calc_tag() 101 const size_t ciphertext_total = ciphertext_len + ciphertext_extra_len; in calc_tag()
|
/external/boringssl/src/crypto/ |
D | impl_dispatch_test.cc | 106 size_t ciphertext_len; in TEST_F() local 112 ctx.get(), ciphertext, &ciphertext_len, sizeof(ciphertext), kZeros, in TEST_F()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/ |
D | impl_dispatch_test.cc | 106 size_t ciphertext_len; in TEST_F() local 112 ctx.get(), ciphertext, &ciphertext_len, sizeof(ciphertext), kZeros, in TEST_F()
|
/external/rust/crates/ring/src/ |
D | aead.rs | 202 let ciphertext_len = ciphertext_and_tag_len in open_within_() localVariable 205 check_per_nonce_max_bytes(key.algorithm, ciphertext_len)?; in open_within_() 206 let (in_out, received_tag) = in_out.split_at_mut(in_prefix_len + ciphertext_len); in open_within_() 220 for b in &mut in_out[..ciphertext_len] { in open_within_() 226 Ok(&mut in_out[..ciphertext_len]) in open_within_()
|
/external/boringssl/src/crypto/hpke/ |
D | hpke_test.cc | 300 size_t ciphertext_len; in TEST() local 302 sender_ctx.get(), ciphertext.data(), &ciphertext_len, in TEST() 312 ciphertext.data(), ciphertext_len, in TEST() 379 size_t ciphertext_len; in TEST() local 382 receiver_ctx.get(), ciphertext, &ciphertext_len, sizeof(ciphertext), in TEST()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 409 size_t ciphertext_len = 0; in TEST_P() local 410 ASSERT_TRUE(RSA_encrypt(key.get(), &ciphertext_len, ciphertext, in TEST_P() 413 EXPECT_EQ(RSA_size(key.get()), ciphertext_len); in TEST_P() 418 sizeof(plaintext), ciphertext, ciphertext_len, in TEST_P() 423 ciphertext_len = 0; in TEST_P() 424 ASSERT_TRUE(RSA_encrypt(key.get(), &ciphertext_len, ciphertext, in TEST_P() 427 EXPECT_EQ(RSA_size(key.get()), ciphertext_len); in TEST_P() 431 sizeof(plaintext), ciphertext, ciphertext_len, in TEST_P()
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 409 size_t ciphertext_len = 0; in TEST_P() local 410 ASSERT_TRUE(RSA_encrypt(key.get(), &ciphertext_len, ciphertext, in TEST_P() 413 EXPECT_EQ(RSA_size(key.get()), ciphertext_len); in TEST_P() 418 sizeof(plaintext), ciphertext, ciphertext_len, in TEST_P() 423 ciphertext_len = 0; in TEST_P() 424 ASSERT_TRUE(RSA_encrypt(key.get(), &ciphertext_len, ciphertext, in TEST_P() 427 EXPECT_EQ(RSA_size(key.get()), ciphertext_len); in TEST_P() 431 sizeof(plaintext), ciphertext, ciphertext_len, in TEST_P()
|
/external/boringssl/src/include/openssl/ |
D | hrss.h | 84 size_t ciphertext_len);
|
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/ |
D | hrss.h | 84 size_t ciphertext_len);
|
/external/boringssl/src/crypto/hrss/ |
D | hrss.c | 1966 const uint8_t *ciphertext, size_t ciphertext_len) { in HRSS_decap() argument 1985 SHA256_Update(&hash_ctx, ciphertext, ciphertext_len); in HRSS_decap() 2006 if (ciphertext_len != HRSS_CIPHERTEXT_BYTES || in HRSS_decap() 2060 assert(ciphertext_len == sizeof(expected_ciphertext)); in HRSS_decap()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/hrss/ |
D | hrss.c | 1966 const uint8_t *ciphertext, size_t ciphertext_len) { in HRSS_decap() argument 1985 SHA256_Update(&hash_ctx, ciphertext, ciphertext_len); in HRSS_decap() 2006 if (ciphertext_len != HRSS_CIPHERTEXT_BYTES || in HRSS_decap() 2060 assert(ciphertext_len == sizeof(expected_ciphertext)); in HRSS_decap()
|