/external/iperf3/src/ |
D | iperf_auth.c | 257 int plaintext_len, rsa_buffer_len, keysize; in decrypt_rsa_message() local 267 plaintext_len = RSA_private_decrypt(rsa_buffer_len, rsa_buffer, *plaintext, rsa, pad); in decrypt_rsa_message() 273 if (plaintext_len < 0) { in decrypt_rsa_message() 278 return plaintext_len; in decrypt_rsa_message() 315 int plaintext_len; in decode_auth_setting() local 316 plaintext_len = decrypt_rsa_message(encrypted_b64, encrypted_len_b64, private_key, &plaintext); in decode_auth_setting() 318 if (plaintext_len < 0) { in decode_auth_setting() 321 plaintext[plaintext_len] = '\0'; in decode_auth_setting() 324 s_username = (char *) calloc(plaintext_len, sizeof(char)); in decode_auth_setting() 328 s_password = (char *) calloc(plaintext_len, sizeof(char)); in decode_auth_setting()
|
/external/boringssl/src/crypto/cipher_extra/ |
D | internal.h | 175 size_t plaintext_len, const uint8_t *ad, 186 size_t plaintext_len, const uint8_t *ad, 195 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_open() argument 203 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_seal() argument
|
D | e_aesgcmsiv.c | 435 const size_t plaintext_len = in_len - EVP_AEAD_AES_GCM_SIV_TAG_LEN; in aead_aes_gcm_siv_asm_open() local 436 const uint8_t *const given_tag = in + plaintext_len; in aead_aes_gcm_siv_asm_open() 438 if (max_out_len < plaintext_len) { in aead_aes_gcm_siv_asm_open() 476 plaintext_len); in aead_aes_gcm_siv_asm_open() 479 plaintext_len); in aead_aes_gcm_siv_asm_open() 482 if (plaintext_len & 15) { in aead_aes_gcm_siv_asm_open() 484 plaintext_len, given_tag, in aead_aes_gcm_siv_asm_open() 487 OPENSSL_memcpy(scratch, out + (plaintext_len & ~15), plaintext_len & 15); in aead_aes_gcm_siv_asm_open() 501 length_block.bitlens.in = plaintext_len * 8; in aead_aes_gcm_siv_asm_open()
|
D | e_aesccm.c | 96 size_t plaintext_len) { in ccm128_init_state() argument 102 if (plaintext_len > CRYPTO_ccm128_max_input(ctx) || in ccm128_init_state() 115 state->nonce.c[15 - i] = (uint8_t)(plaintext_len >> (8 * i)); in ccm128_init_state() 166 size_t remaining_blocks = 2 * ((plaintext_len + 15) / 16) + 1; in ccm128_init_state() 167 if (plaintext_len + 15 < plaintext_len || in ccm128_init_state()
|
D | aead_test.cc | 767 const uint8_t *plaintext, size_t plaintext_len, in aead_ctx_seal() argument 771 plaintext_len + EVP_AEAD_MAX_OVERHEAD, nonce, in aead_ctx_seal() 772 nonce_len, plaintext, plaintext_len, ad, ad_len); in aead_ctx_seal()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/cipher/ |
D | aead.c | 209 size_t plaintext_len = in_len - ctx->tag_len; in EVP_AEAD_CTX_open() local 210 if (max_out_len < plaintext_len) { in EVP_AEAD_CTX_open() 214 if (EVP_AEAD_CTX_open_gather(ctx, out, nonce, nonce_len, in, plaintext_len, in EVP_AEAD_CTX_open() 215 in + plaintext_len, ctx->tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open() 216 *out_len = plaintext_len; in EVP_AEAD_CTX_open()
|
/external/boringssl/src/crypto/fipsmodule/cipher/ |
D | aead.c | 209 size_t plaintext_len = in_len - ctx->tag_len; in EVP_AEAD_CTX_open() local 210 if (max_out_len < plaintext_len) { in EVP_AEAD_CTX_open() 214 if (EVP_AEAD_CTX_open_gather(ctx, out, nonce, nonce_len, in, plaintext_len, in EVP_AEAD_CTX_open() 215 in + plaintext_len, ctx->tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open() 216 *out_len = plaintext_len; in EVP_AEAD_CTX_open()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/cipher_extra/ |
D | e_aesgcmsiv.c | 435 const size_t plaintext_len = in_len - EVP_AEAD_AES_GCM_SIV_TAG_LEN; in aead_aes_gcm_siv_asm_open() local 436 const uint8_t *const given_tag = in + plaintext_len; in aead_aes_gcm_siv_asm_open() 438 if (max_out_len < plaintext_len) { in aead_aes_gcm_siv_asm_open() 476 plaintext_len); in aead_aes_gcm_siv_asm_open() 479 plaintext_len); in aead_aes_gcm_siv_asm_open() 482 if (plaintext_len & 15) { in aead_aes_gcm_siv_asm_open() 484 plaintext_len, given_tag, in aead_aes_gcm_siv_asm_open() 487 OPENSSL_memcpy(scratch, out + (plaintext_len & ~15), plaintext_len & 15); in aead_aes_gcm_siv_asm_open() 501 length_block.bitlens.in = plaintext_len * 8; in aead_aes_gcm_siv_asm_open()
|
D | e_aesccm.c | 96 size_t plaintext_len) { in ccm128_init_state() argument 102 if (plaintext_len > CRYPTO_ccm128_max_input(ctx) || in ccm128_init_state() 115 state->nonce.c[15 - i] = (uint8_t)(plaintext_len >> (8 * i)); in ccm128_init_state() 166 size_t remaining_blocks = 2 * ((plaintext_len + 15) / 16) + 1; in ccm128_init_state() 167 if (plaintext_len + 15 < plaintext_len || in ccm128_init_state()
|
D | e_chacha20poly1305.c | 92 size_t plaintext_len, const uint8_t *ad, 102 size_t plaintext_len, const uint8_t *ad, 110 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_open() argument 115 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_seal() argument
|
D | aead_test.cc | 688 const uint8_t *plaintext, size_t plaintext_len, in aead_ctx_seal() argument 692 plaintext_len + EVP_AEAD_MAX_OVERHEAD, nonce, in aead_ctx_seal() 693 nonce_len, plaintext, plaintext_len, ad, ad_len); in aead_ctx_seal()
|
/external/boringssl/src/ssl/ |
D | ssl_aead_ctx.cc | 224 const uint8_t seqnum[8], size_t plaintext_len, Span<const uint8_t> header) { in GetAdditionalData() argument 235 storage[len++] = static_cast<uint8_t>((plaintext_len >> 8)); in GetAdditionalData() 236 storage[len++] = static_cast<uint8_t>(plaintext_len); in GetAdditionalData() 252 size_t plaintext_len = 0; in Open() local 260 plaintext_len = in.size() - overhead; in Open() 265 seqnum, plaintext_len, header); in Open()
|
D | tls_record.cc | 648 size_t SealRecordSuffixLen(const SSL *ssl, const size_t plaintext_len) { in SealRecordSuffixLen() argument 649 assert(plaintext_len <= SSL3_RT_MAX_PLAIN_LENGTH); in SealRecordSuffixLen() 652 plaintext_len)) { in SealRecordSuffixLen()
|
D | t1_lib.cc | 4017 size_t plaintext_len; in ssl_decrypt_ticket_with_method() local 4020 hs->ssl, plaintext.data(), &plaintext_len, ticket.size(), in ssl_decrypt_ticket_with_method() 4026 plaintext.Shrink(plaintext_len); in ssl_decrypt_ticket_with_method()
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_aead_ctx.cc | 224 const uint8_t seqnum[8], size_t plaintext_len, Span<const uint8_t> header) { in GetAdditionalData() argument 235 storage[len++] = static_cast<uint8_t>((plaintext_len >> 8)); in GetAdditionalData() 236 storage[len++] = static_cast<uint8_t>(plaintext_len); in GetAdditionalData() 252 size_t plaintext_len = 0; in Open() local 260 plaintext_len = in.size() - overhead; in Open() 265 seqnum, plaintext_len, header); in Open()
|
D | tls_record.cc | 646 size_t SealRecordSuffixLen(const SSL *ssl, const size_t plaintext_len) { in SealRecordSuffixLen() argument 647 assert(plaintext_len <= SSL3_RT_MAX_PLAIN_LENGTH); in SealRecordSuffixLen() 650 plaintext_len)) { in SealRecordSuffixLen()
|
D | t1_lib.cc | 3489 size_t plaintext_len; in ssl_decrypt_ticket_with_method() local 3492 hs->ssl, plaintext.data(), &plaintext_len, ticket.size(), in ssl_decrypt_ticket_with_method() 3498 plaintext.Shrink(plaintext_len); in ssl_decrypt_ticket_with_method()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 416 size_t plaintext_len = 0; in TEST_P() local 417 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 420 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 429 plaintext_len = 0; in TEST_P() 430 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 433 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 436 plaintext_len = 0; in TEST_P() 437 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 440 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 448 key.get(), &plaintext_len, plaintext, sizeof(plaintext), ciphertext, in TEST_P() [all …]
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 416 size_t plaintext_len = 0; in TEST_P() local 417 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 420 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 429 plaintext_len = 0; in TEST_P() 430 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 433 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 436 plaintext_len = 0; in TEST_P() 437 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 440 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 448 key.get(), &plaintext_len, plaintext, sizeof(plaintext), ciphertext, in TEST_P() [all …]
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8.c | 452 size_t plaintext_len = 0; in PKCS8_marshal_encrypted_private_key() local 479 !CBB_finish(&plaintext_cbb, &plaintext, &plaintext_len)) { in PKCS8_marshal_encrypted_private_key() 505 size_t max_out = plaintext_len + EVP_CIPHER_CTX_block_size(&ctx); in PKCS8_marshal_encrypted_private_key() 506 if (max_out < plaintext_len) { in PKCS8_marshal_encrypted_private_key() 516 !EVP_CipherUpdate(&ctx, ptr, &n1, plaintext, plaintext_len) || in PKCS8_marshal_encrypted_private_key()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs8/ |
D | pkcs8.c | 452 size_t plaintext_len = 0; in PKCS8_marshal_encrypted_private_key() local 479 !CBB_finish(&plaintext_cbb, &plaintext, &plaintext_len)) { in PKCS8_marshal_encrypted_private_key() 505 size_t max_out = plaintext_len + EVP_CIPHER_CTX_block_size(&ctx); in PKCS8_marshal_encrypted_private_key() 506 if (max_out < plaintext_len) { in PKCS8_marshal_encrypted_private_key() 516 !EVP_CipherUpdate(&ctx, ptr, &n1, plaintext, plaintext_len) || in PKCS8_marshal_encrypted_private_key()
|
/external/libsrtp2/crypto/cipher/ |
D | cipher.c | 460 unsigned int plaintext_len; in srtp_cipher_type_test() local 519 plaintext_len = length; in srtp_cipher_type_test() 580 if (length != plaintext_len) { in srtp_cipher_type_test() 585 for (k = 0; k < plaintext_len; k++) { in srtp_cipher_type_test()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/evp/ |
D | evp_test.cc | 505 size_t plaintext_len; in TestEVP() local 512 !EVP_PKEY_decrypt(decrypt_ctx.get(), nullptr, &plaintext_len, in TestEVP() 516 output.resize(plaintext_len); in TestEVP() 517 if (!EVP_PKEY_decrypt(decrypt_ctx.get(), output.data(), &plaintext_len, in TestEVP() 522 output.resize(plaintext_len); in TestEVP()
|
/external/boringssl/src/crypto/evp/ |
D | evp_test.cc | 505 size_t plaintext_len; in TestEVP() local 512 !EVP_PKEY_decrypt(decrypt_ctx.get(), nullptr, &plaintext_len, in TestEVP() 516 output.resize(plaintext_len); in TestEVP() 517 if (!EVP_PKEY_decrypt(decrypt_ctx.get(), output.data(), &plaintext_len, in TestEVP() 522 output.resize(plaintext_len); in TestEVP()
|
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/ |
D | ssl.h | 4879 OPENSSL_EXPORT size_t SealRecordPrefixLen(const SSL *ssl, size_t plaintext_len); 4888 OPENSSL_EXPORT size_t SealRecordSuffixLen(const SSL *ssl, size_t plaintext_len);
|