/external/wpa_supplicant_8/src/crypto/ |
D | aes-eax.c | 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, in aes_128_eax_encrypt() argument 38 if (nonce_len > data_len) in aes_128_eax_encrypt() 39 buf_len = nonce_len; in aes_128_eax_encrypt() 53 os_memcpy(buf + 16, nonce, nonce_len); in aes_128_eax_encrypt() 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) in aes_128_eax_encrypt() 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, in aes_128_eax_decrypt() argument 102 if (nonce_len > data_len) in aes_128_eax_decrypt() 103 buf_len = nonce_len; in aes_128_eax_decrypt() 117 os_memcpy(buf + 16, nonce, nonce_len); in aes_128_eax_decrypt() 118 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) { in aes_128_eax_decrypt()
|
D | aes_wrap.h | 34 const u8 *nonce, size_t nonce_len, 38 const u8 *nonce, size_t nonce_len,
|
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
D | aead.c | 27 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; } in EVP_AEAD_nonce_length() 71 size_t nonce_len, const uint8_t *in, size_t in_len, in EVP_AEAD_CTX_seal() argument 85 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in, in EVP_AEAD_CTX_seal() 100 size_t nonce_len, const uint8_t *in, size_t in_len, in EVP_AEAD_CTX_open() argument 107 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in, in EVP_AEAD_CTX_open()
|
D | internal.h | 114 uint8_t nonce_len; member 124 size_t nonce_len, const uint8_t *in, size_t in_len, 129 size_t nonce_len, const uint8_t *in, size_t in_len,
|
D | e_chacha20poly1305.c | 92 const uint8_t *nonce, size_t nonce_len, in aead_chacha20_poly1305_seal() argument 123 if (nonce_len != CHACHA20_NONCE_LEN) { in aead_chacha20_poly1305_seal() 152 const uint8_t *nonce, size_t nonce_len, in aead_chacha20_poly1305_open() argument 179 if (nonce_len != CHACHA20_NONCE_LEN) { in aead_chacha20_poly1305_open()
|
D | e_rc4.c | 172 const uint8_t *nonce, size_t nonce_len, in aead_rc4_md5_tls_seal() argument 191 if (nonce_len != 0) { in aead_rc4_md5_tls_seal() 201 if (nonce_len != 0) { in aead_rc4_md5_tls_seal() 266 const uint8_t *nonce, size_t nonce_len, in aead_rc4_md5_tls_open() argument 289 if (nonce_len != 0) { in aead_rc4_md5_tls_open()
|
D | e_aes.c | 896 const uint8_t *nonce, size_t nonce_len, in aead_aes_gcm_seal() argument 914 CRYPTO_gcm128_setiv(&gcm, nonce, nonce_len); in aead_aes_gcm_seal() 938 const uint8_t *nonce, size_t nonce_len, in aead_aes_gcm_open() argument 960 CRYPTO_gcm128_setiv(&gcm, nonce, nonce_len); in aead_aes_gcm_open() 1067 const uint8_t *nonce, size_t nonce_len, in aead_aes_key_wrap_seal() argument 1086 if (nonce_len == 0) { in aead_aes_key_wrap_seal() 1088 nonce_len = sizeof(kDefaultAESKeyWrapNonce); in aead_aes_key_wrap_seal() 1091 if (nonce_len != 8) { in aead_aes_key_wrap_seal() 1162 const uint8_t *nonce, size_t nonce_len, in aead_aes_key_wrap_open() argument 1181 if (nonce_len == 0) { in aead_aes_key_wrap_open() [all …]
|
/external/chromium_org/third_party/boringssl/src/tool/ |
D | speed.cc | 169 const size_t nonce_len = EVP_AEAD_nonce_length(aead); in SpeedAEADChunk() local 174 std::unique_ptr<uint8_t[]> nonce(new uint8_t[nonce_len]); in SpeedAEADChunk() 175 memset(nonce.get(), 0, nonce_len); in SpeedAEADChunk() 189 if (!TimeFunction(&results, [chunk_len, overhead_len, nonce_len, &in, &out, in SpeedAEADChunk() 195 nonce_len, in.get(), chunk_len, NULL, 0); in SpeedAEADChunk()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_eke.c | 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm() 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 330 data->sess.nonce_len); in eap_eke_build_confirm() 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, in eap_eke_build_confirm() 570 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_commit() 576 data->nonce_p, data->sess.nonce_len); in eap_eke_process_commit() 619 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_confirm() 625 nonce, data->sess.nonce_len); in eap_eke_process_confirm() [all …]
|
D | ikev2.c | 487 ikev2_process_nr(data, pl->nonce, pl->nonce_len) < 0) in ikev2_process_sa_init()
|
/external/chromium_org/third_party/boringssl/src/crypto/modes/ |
D | gcm_test.c | 314 size_t key_len, plaintext_len, additional_data_len, nonce_len, ciphertext_len, in run_test_case() local 327 !decode_hex(&nonce, &nonce_len, test->nonce, test_num, "nonce") || in run_test_case() 357 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len); in run_test_case() 373 CRYPTO_gcm128_setiv(&ctx, nonce, nonce_len); in run_test_case()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_eke_common.c | 524 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; in eap_eke_derive_ka() 535 os_memcpy(pos, nonce_p, sess->nonce_len); in eap_eke_derive_ka() 536 pos += sess->nonce_len; in eap_eke_derive_ka() 537 os_memcpy(pos, nonce_s, sess->nonce_len); in eap_eke_derive_ka() 569 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; in eap_eke_derive_msk() 580 os_memcpy(pos, nonce_p, sess->nonce_len); in eap_eke_derive_msk() 581 pos += sess->nonce_len; in eap_eke_derive_msk() 582 os_memcpy(pos, nonce_s, sess->nonce_len); in eap_eke_derive_msk() 742 sess->nonce_len = eap_eke_nonce_len(prf); in eap_eke_session_init() 743 if (sess->nonce_len < 0) in eap_eke_session_init()
|
D | ikev2_common.c | 315 payloads->nonce_len = pdatalen; in ikev2_parse_payloads() 370 const u8 *nonce, size_t nonce_len, in ikev2_derive_auth_data() argument 399 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data() 406 os_memcpy(pos, nonce, nonce_len); in ikev2_derive_auth_data() 407 pos += nonce_len; in ikev2_derive_auth_data()
|
D | ikev2_common.h | 290 const u8 *nonce, size_t nonce_len, 309 size_t nonce_len; member
|
D | eap_eke_common.h | 74 int nonce_len; member
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_eke.c | 464 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) { in eap_eke_process_commit() 470 data->nonce_p, data->sess.nonce_len); in eap_eke_process_commit() 472 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len, in eap_eke_process_commit() 538 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) { in eap_eke_process_confirm() 544 nonces, 2 * data->sess.nonce_len); in eap_eke_process_confirm() 545 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { in eap_eke_process_confirm() 551 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm() 552 data->sess.nonce_len); in eap_eke_process_confirm() 554 data->nonce_s, data->sess.nonce_len); in eap_eke_process_confirm() 587 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len, in eap_eke_process_confirm()
|
D | ikev2.c | 448 ikev2_process_ni(data, pl->nonce, pl->nonce_len) < 0) in ikev2_process_sa_init()
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
D | aead.h | 210 const uint8_t *nonce, size_t nonce_len, 235 const uint8_t *nonce, size_t nonce_len,
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ie.h | 26 size_t nonce_len; member
|
D | peerkey_auth.c | 270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) { in wpa_smk_m3()
|
D | wpa_auth_ie.c | 790 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa_ie.h | 28 size_t nonce_len; member
|
D | wpa_ie.c | 414 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN; in wpa_parse_generic()
|
D | peerkey.c | 533 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN || in wpa_supplicant_process_smk_m45()
|