/external/boringssl/src/ssl/ |
D | ssl_aead_ctx.c | 36 const EVP_AEAD *aead; in SSL_AEAD_CTX_new() local 38 if (!ssl_cipher_get_evp_aead(&aead, &discard, &discard, cipher, version)) { in SSL_AEAD_CTX_new() 68 &aead_ctx->ctx, aead, enc_key, enc_key_len, in SSL_AEAD_CTX_new() 74 assert(EVP_AEAD_nonce_length(aead) <= EVP_AEAD_MAX_NONCE_LENGTH); in SSL_AEAD_CTX_new() 75 aead_ctx->variable_nonce_len = (uint8_t)EVP_AEAD_nonce_length(aead); in SSL_AEAD_CTX_new() 105 void SSL_AEAD_CTX_free(SSL_AEAD_CTX *aead) { in SSL_AEAD_CTX_free() argument 106 if (aead == NULL) { in SSL_AEAD_CTX_free() 109 EVP_AEAD_CTX_cleanup(&aead->ctx); in SSL_AEAD_CTX_free() 110 OPENSSL_free(aead); in SSL_AEAD_CTX_free() 113 size_t SSL_AEAD_CTX_explicit_nonce_len(SSL_AEAD_CTX *aead) { in SSL_AEAD_CTX_explicit_nonce_len() argument [all …]
|
D | t1_enc.c | 283 const EVP_AEAD *aead = ssl->s3->tmp.new_aead; in tls1_change_cipher_state() local 306 if (aead == NULL) { in tls1_change_cipher_state() 311 key_len = EVP_AEAD_key_length(aead); in tls1_change_cipher_state() 371 const EVP_AEAD *aead = NULL; in tls1_setup_key_block() local 384 if (!ssl_cipher_get_evp_aead(&aead, &mac_secret_len, &fixed_iv_len, in tls1_setup_key_block() 389 key_len = EVP_AEAD_key_length(aead); in tls1_setup_key_block() 390 variable_iv_len = EVP_AEAD_nonce_length(aead); in tls1_setup_key_block() 413 ssl->s3->tmp.new_aead = aead; in tls1_setup_key_block()
|
D | dtls_record.c | 253 SSL_AEAD_CTX *aead = ssl->aead_write_ctx; in dtls_seal_record() local 260 aead = NULL; in dtls_seal_record() 286 if (!SSL_AEAD_CTX_seal(aead, out + DTLS1_RT_HEADER_LENGTH, &ciphertext_len, in dtls_seal_record()
|
/external/boringssl/src/crypto/cipher/ |
D | aead.c | 25 size_t EVP_AEAD_key_length(const EVP_AEAD *aead) { return aead->key_len; } in EVP_AEAD_key_length() argument 27 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; } in EVP_AEAD_nonce_length() argument 29 size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead) { return aead->overhead; } in EVP_AEAD_max_overhead() argument 31 size_t EVP_AEAD_max_tag_len(const EVP_AEAD *aead) { return aead->max_tag_len; } in EVP_AEAD_max_tag_len() argument 37 int EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, in EVP_AEAD_CTX_init() argument 40 if (!aead->init) { in EVP_AEAD_CTX_init() 42 ctx->aead = NULL; in EVP_AEAD_CTX_init() 45 return EVP_AEAD_CTX_init_with_direction(ctx, aead, key, key_len, tag_len, in EVP_AEAD_CTX_init() 49 int EVP_AEAD_CTX_init_with_direction(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, in EVP_AEAD_CTX_init_with_direction() argument 53 if (key_len != aead->key_len) { in EVP_AEAD_CTX_init_with_direction() [all …]
|
D | aead_test.cc | 39 const EVP_AEAD *aead = reinterpret_cast<const EVP_AEAD*>(arg); in TestAEAD() local 52 if (!EVP_AEAD_CTX_init_with_direction(ctx.get(), aead, key.data(), key.size(), in TestAEAD() 58 std::vector<uint8_t> out(in.size() + EVP_AEAD_max_overhead(aead)); in TestAEAD() 88 if (!EVP_AEAD_CTX_init_with_direction(ctx.get(), aead, key.data(), key.size(), in TestAEAD() 120 if (!EVP_AEAD_CTX_init_with_direction(ctx.get(), aead, key.data(), key.size(), in TestAEAD() 140 if (!EVP_AEAD_CTX_init_with_direction(ctx.get(), aead, key.data(), key.size(), in TestAEAD() 161 static int TestCleanupAfterInitFailure(const EVP_AEAD *aead) { in TestCleanupAfterInitFailure() argument 166 const size_t key_len = EVP_AEAD_key_length(aead); in TestCleanupAfterInitFailure() 172 if (EVP_AEAD_CTX_init(&ctx, aead, key, key_len, in TestCleanupAfterInitFailure() 181 if (EVP_AEAD_CTX_init(&ctx, aead, key, key_len, in TestCleanupAfterInitFailure() [all …]
|
D | e_tls.c | 65 if (key_len != EVP_AEAD_key_length(ctx->aead)) { in aead_tls_init() 117 if (in_len + EVP_AEAD_max_overhead(ctx->aead) < in_len || in aead_tls_seal() 124 if (max_out_len < in_len + EVP_AEAD_max_overhead(ctx->aead)) { in aead_tls_seal() 129 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { in aead_tls_seal() 229 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { in aead_tls_open()
|
D | CMakeLists.txt | 10 aead.c
|
D | e_ssl3.c | 92 if (key_len != EVP_AEAD_key_length(ctx->aead)) { in aead_ssl3_init() 140 if (in_len + EVP_AEAD_max_overhead(ctx->aead) < in_len || in aead_ssl3_seal() 147 if (max_out_len < in_len + EVP_AEAD_max_overhead(ctx->aead)) { in aead_ssl3_seal()
|
/external/boringssl/src/ssl/test/runner/ |
D | chacha20_poly1305_test.go | 85 aead, err := newChaCha20Poly1305Old(key) 90 out, err := aead.Open(nil, nonce, output, ad) 97 out = aead.Seal(nil, nonce, input, ad) 103 _, err = aead.Open(nil, nonce, out, ad) 139 aead, err := newChaCha20Poly1305(key) 144 out, err := aead.Open(nil, nonce, output, ad) 151 out = aead.Seal(nil, nonce, input, ad) 157 _, err = aead.Open(nil, nonce, out, ad)
|
D | cipher_suites.go | 83 aead func(key, fixedNonce []byte) *tlsAead member 221 aead cipher.AEAD member 225 func (f *fixedNonceAEAD) Overhead() int { return f.aead.Overhead() } 229 return f.aead.Seal(out, f.sealNonce, plaintext, additionalData) 234 return f.aead.Open(out, f.openNonce, plaintext, additionalData) 242 aead, err := cipher.NewGCM(aes) 251 return &tlsAead{&fixedNonceAEAD{nonce1, nonce2, aead}, true} 255 aead, err := newChaCha20Poly1305Old(key) 259 return &tlsAead{aead, false} 275 aead cipher.AEAD member [all …]
|
D | chacha20_poly1305.go | 117 aead := new(chaCha20Poly1305) 118 copy(aead.key[:], key) 119 return aead, nil 126 aead := &chaCha20Poly1305{ 129 copy(aead.key[:], key) 130 return aead, nil
|
D | dtls.go | 283 } else if aead, ok := c.out.cipher.(*tlsAead); ok { 284 if aead.explicitNonce {
|
D | handshake_server.go | 772 if hs.suite.aead == nil { 778 clientCipher = hs.suite.aead(clientKey, clientIV) 779 serverCipher = hs.suite.aead(serverKey, serverIV)
|
D | handshake_client.go | 672 clientCipher = hs.suite.aead(clientKey, clientIV) 673 serverCipher = hs.suite.aead(serverKey, serverIV)
|
D | conn.go | 913 if aead, ok := c.out.cipher.(*tlsAead); ok && aead.explicitNonce {
|
/external/boringssl/src/include/openssl/ |
D | aead.h | 185 OPENSSL_EXPORT size_t EVP_AEAD_key_length(const EVP_AEAD *aead); 189 OPENSSL_EXPORT size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead); 193 OPENSSL_EXPORT size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead); 198 OPENSSL_EXPORT size_t EVP_AEAD_max_tag_len(const EVP_AEAD *aead); 206 const EVP_AEAD *aead; member 250 OPENSSL_EXPORT int EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, 258 EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, const uint8_t *key, size_t key_len,
|
/external/boringssl/src/tool/ |
D | speed.cc | 175 static bool SpeedAEADChunk(const EVP_AEAD *aead, const std::string &name, in SpeedAEADChunk() argument 180 const size_t key_len = EVP_AEAD_key_length(aead); in SpeedAEADChunk() 181 const size_t nonce_len = EVP_AEAD_nonce_length(aead); in SpeedAEADChunk() 182 const size_t overhead_len = EVP_AEAD_max_overhead(aead); in SpeedAEADChunk() 198 if (!EVP_AEAD_CTX_init_with_direction(&ctx, aead, key.get(), key_len, in SpeedAEADChunk() 227 static bool SpeedAEAD(const EVP_AEAD *aead, const std::string &name, in SpeedAEAD() argument 233 return SpeedAEADChunk(aead, name + " (16 bytes)", 16, ad_len) && in SpeedAEAD() 234 SpeedAEADChunk(aead, name + " (1350 bytes)", 1350, ad_len) && in SpeedAEAD() 235 SpeedAEADChunk(aead, name + " (8192 bytes)", 8192, ad_len); in SpeedAEAD()
|
/external/boringssl/src/util/ |
D | doc.config | 47 "include/openssl/aead.h",
|
/external/iproute2/ip/ |
D | xfrm_state.c | 422 struct xfrm_algo_aead aead; in xfrm_state_modify() member 488 alg.u.aead.alg_icv_len = icvlen; in xfrm_state_modify() 490 buf = alg.u.aead.alg_key; in xfrm_state_modify() 491 len = sizeof(alg.u.aead); in xfrm_state_modify()
|
/external/boringssl/ |
D | sources.mk | 95 src/crypto/cipher/aead.c\
|
/external/elfutils/tests/ |
D | testfile45.expect.bz2 |
|