Lines Matching refs:data_length
353 if (block_mode_ != KM_MODE_GCM && iv_blob.data_length != AES_BLOCK_SIZE) { in GetIv()
355 iv_blob.data_length); in GetIv()
358 if (block_mode_ == KM_MODE_GCM && iv_blob.data_length != GCM_NONCE_SIZE) { in GetIv()
360 iv_blob.data_length); in GetIv()
363 iv_.reset(dup_array(iv_blob.data, iv_blob.data_length)); in GetIv()
366 iv_length_ = iv_blob.data_length; in GetIv()
395 size_t blocks_to_process = aad.data_length / AES_BLOCK_SIZE; in HandleAad()
399 aad.data_length -= blocks_to_process * AES_BLOCK_SIZE; in HandleAad()
402 assert(aad.data_length == 0); in HandleAad()
440 size_t to_buffer = min(AES_BLOCK_SIZE - aad_block_buf_length_, aad->data_length); in FillBufferedAadBlock()
443 aad->data_length -= to_buffer; in FillBufferedAadBlock()
623 void AesEvpDecryptOperation::BufferCandidateTagData(const uint8_t* data, size_t data_length) { in BufferCandidateTagData() argument
624 assert(data_length <= tag_length_ - tag_buf_length_); in BufferCandidateTagData()
625 memcpy(tag_buf_.get() + tag_buf_length_, data, data_length); in BufferCandidateTagData()
626 tag_buf_length_ += data_length; in BufferCandidateTagData()