/external/boringssl/src/ssl/ |
D | dtls_record.cc | 330 size_t ciphertext_len; in dtls_seal_record() local 331 if (!aead->CiphertextLen(&ciphertext_len, in_len, 0)) { in dtls_seal_record() 335 out[11] = ciphertext_len >> 8; in dtls_seal_record() 336 out[12] = ciphertext_len & 0xff; in dtls_seal_record() 346 assert(ciphertext_len == len_copy); in dtls_seal_record() 348 *out_len = DTLS1_RT_HEADER_LENGTH + ciphertext_len; in dtls_seal_record()
|
D | tls_record.cc | 224 uint16_t version, ciphertext_len; in tls_open_record() local 227 !CBS_get_u16(&cbs, &ciphertext_len)) { in tls_open_record() 248 if (ciphertext_len > SSL3_RT_MAX_ENCRYPTED_LENGTH) { in tls_open_record() 256 if (!CBS_get_bytes(&cbs, &body, ciphertext_len)) { in tls_open_record() 257 *out_consumed = SSL3_RT_HEADER_LENGTH + (size_t)ciphertext_len; in tls_open_record() 270 ciphertext_len == 1 && in tls_open_record() 389 size_t suffix_len, ciphertext_len; in do_seal_record() local 391 !aead->CiphertextLen(&ciphertext_len, in_len, extra_in_len)) { in do_seal_record() 410 out_prefix[3] = ciphertext_len >> 8; in do_seal_record() 411 out_prefix[4] = ciphertext_len & 0xff; in do_seal_record()
|
D | d1_pkt.cc | 236 size_t ciphertext_len; in dtls1_write_record() local 239 !dtls_seal_record(ssl, buf->remaining().data(), &ciphertext_len, in dtls1_write_record() 244 buf->DidWrite(ciphertext_len); in dtls1_write_record()
|
D | s3_pkt.cc | 278 size_t ciphertext_len; in do_ssl3_write() local 279 if (!tls_seal_record(ssl, buf->remaining().data(), &ciphertext_len, in do_ssl3_write() 283 buf->DidWrite(ciphertext_len); in do_ssl3_write()
|
/external/boringssl/src/crypto/cipher_extra/ |
D | aead_test.cc | 430 size_t ciphertext_len; in TEST_P() local 434 ASSERT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), ciphertext, &ciphertext_len, in TEST_P() 438 for (size_t i = ciphertext_len; i < sizeof(ciphertext); i++) { in TEST_P() 444 const size_t overhead_used = ciphertext_len - sizeof(plaintext); in TEST_P() 456 nonce_len, ciphertext, ciphertext_len, nullptr /* ad */, 0)) in TEST_P() 565 size_t ciphertext_len; in TEST_P() local 566 ASSERT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), ciphertext + 1, &ciphertext_len, in TEST_P() 580 ciphertext_len, ad + 1, ad_len)); in TEST_P() 597 size_t ciphertext_len; in TEST_P() local 600 ctx.get(), ciphertext, &ciphertext_len, sizeof(ciphertext), nullptr, 0, in TEST_P()
|
D | e_aesctrhmac.c | 124 size_t ciphertext_len) { in hmac_calculate() argument 128 hmac_update_uint64(&sha256, ciphertext_len); in hmac_calculate() 142 SHA256_Update(&sha256, ciphertext, ciphertext_len); in hmac_calculate()
|
D | e_chacha20poly1305.c | 159 const uint8_t *ciphertext, size_t ciphertext_len, in calc_tag() argument 174 CRYPTO_poly1305_update(&ctx, ciphertext, ciphertext_len); in calc_tag() 176 const size_t ciphertext_total = ciphertext_len + ciphertext_extra_len; in calc_tag()
|
/external/boringssl/src/crypto/ |
D | impl_dispatch_test.cc | 107 size_t ciphertext_len; in TEST_F() local 113 &ctx, ciphertext, &ciphertext_len, sizeof(ciphertext), kZeros, in TEST_F()
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 409 size_t ciphertext_len = 0; in TEST_P() local 410 ASSERT_TRUE(RSA_encrypt(key.get(), &ciphertext_len, ciphertext, in TEST_P() 413 EXPECT_EQ(RSA_size(key.get()), ciphertext_len); in TEST_P() 418 sizeof(plaintext), ciphertext, ciphertext_len, in TEST_P() 423 ciphertext_len = 0; in TEST_P() 424 ASSERT_TRUE(RSA_encrypt(key.get(), &ciphertext_len, ciphertext, in TEST_P() 427 EXPECT_EQ(RSA_size(key.get()), ciphertext_len); in TEST_P() 431 sizeof(plaintext), ciphertext, ciphertext_len, in TEST_P()
|
/external/boringssl/src/include/openssl/ |
D | hrss.h | 84 size_t ciphertext_len);
|
/external/boringssl/src/crypto/hrss/ |
D | hrss.c | 2067 const uint8_t *ciphertext, size_t ciphertext_len) { in HRSS_decap() argument 2086 SHA256_Update(&hash_ctx, ciphertext, ciphertext_len); in HRSS_decap() 2107 if (ciphertext_len != HRSS_CIPHERTEXT_BYTES || in HRSS_decap() 2161 assert(ciphertext_len == sizeof(expected_ciphertext)); in HRSS_decap()
|
/external/conscrypt/common/src/jni/main/cpp/conscrypt/ |
D | native_crypto.cc | 611 const char* ciphertext, size_t ciphertext_len) { in rsaDecryptWithPrivateKey() argument 612 if (ciphertext_len > std::numeric_limits<jsize>::max()) { in rsaDecryptWithPrivateKey() 617 … env->NewByteArray(static_cast<jsize>(ciphertext_len))); in rsaDecryptWithPrivateKey() 630 memcpy(ciphertextBytes.get(), ciphertext, ciphertext_len); in rsaDecryptWithPrivateKey()
|