Home
last modified time | relevance | path

Searched refs:plaintext_len (Results 1 – 13 of 13) sorted by relevance

/external/boringssl/src/crypto/fipsmodule/modes/
Dccm.c88 size_t plaintext_len) { in ccm128_init_state() argument
94 if (plaintext_len > CRYPTO_ccm128_max_input(ctx) || in ccm128_init_state()
107 state->nonce.c[15 - i] = (uint8_t)(plaintext_len >> (8 * i)); in ccm128_init_state()
158 size_t remaining_blocks = 2 * ((plaintext_len + 15) / 16) + 1; in ccm128_init_state()
159 if (plaintext_len + 15 < plaintext_len || in ccm128_init_state()
/external/iperf3/src/
Diperf_auth.c233 int plaintext_len, rsa_buffer_len, keysize; in decrypt_rsa_message() local
243 plaintext_len = RSA_private_decrypt(rsa_buffer_len, rsa_buffer, *plaintext, rsa, pad); in decrypt_rsa_message()
249 return plaintext_len; in decrypt_rsa_message()
270 int plaintext_len; in decode_auth_setting() local
271 plaintext_len = decrypt_rsa_message(encrypted_b64, encrypted_len_b64, private_key, &plaintext); in decode_auth_setting()
272 plaintext[plaintext_len] = '\0'; in decode_auth_setting()
/external/boringssl/src/crypto/fipsmodule/cipher/
Daead.c209 size_t plaintext_len = in_len - ctx->tag_len; in EVP_AEAD_CTX_open() local
210 if (max_out_len < plaintext_len) { in EVP_AEAD_CTX_open()
214 if (EVP_AEAD_CTX_open_gather(ctx, out, nonce, nonce_len, in, plaintext_len, in EVP_AEAD_CTX_open()
215 in + plaintext_len, ctx->tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open()
216 *out_len = plaintext_len; in EVP_AEAD_CTX_open()
/external/boringssl/src/crypto/cipher_extra/
De_aesgcmsiv.c430 const size_t plaintext_len = in_len - EVP_AEAD_AES_GCM_SIV_TAG_LEN; in aead_aes_gcm_siv_asm_open() local
431 const uint8_t *const given_tag = in + plaintext_len; in aead_aes_gcm_siv_asm_open()
433 if (max_out_len < plaintext_len) { in aead_aes_gcm_siv_asm_open()
471 plaintext_len); in aead_aes_gcm_siv_asm_open()
474 plaintext_len); in aead_aes_gcm_siv_asm_open()
477 if (plaintext_len & 15) { in aead_aes_gcm_siv_asm_open()
479 plaintext_len, given_tag, in aead_aes_gcm_siv_asm_open()
482 OPENSSL_memcpy(scratch, out + (plaintext_len & ~15), plaintext_len & 15); in aead_aes_gcm_siv_asm_open()
496 length_block.bitlens.in = plaintext_len * 8; in aead_aes_gcm_siv_asm_open()
De_chacha20poly1305.c92 size_t plaintext_len, const uint8_t *ad,
102 size_t plaintext_len, const uint8_t *ad,
110 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_open() argument
115 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_seal() argument
/external/boringssl/src/ssl/
Dssl_aead_ctx.cc224 const uint8_t seqnum[8], size_t plaintext_len, Span<const uint8_t> header) { in GetAdditionalData() argument
235 storage[len++] = static_cast<uint8_t>((plaintext_len >> 8)); in GetAdditionalData()
236 storage[len++] = static_cast<uint8_t>(plaintext_len); in GetAdditionalData()
252 size_t plaintext_len = 0; in Open() local
260 plaintext_len = in.size() - overhead; in Open()
265 seqnum, plaintext_len, header); in Open()
Dtls_record.cc641 size_t SealRecordSuffixLen(const SSL *ssl, const size_t plaintext_len) { in SealRecordSuffixLen() argument
642 assert(plaintext_len <= SSL3_RT_MAX_PLAIN_LENGTH); in SealRecordSuffixLen()
645 plaintext_len)) { in SealRecordSuffixLen()
Dt1_lib.cc3561 size_t plaintext_len; in ssl_decrypt_ticket_with_method() local
3564 hs->ssl, plaintext.data(), &plaintext_len, ticket.size(), in ssl_decrypt_ticket_with_method()
3570 plaintext.Shrink(plaintext_len); in ssl_decrypt_ticket_with_method()
Dinternal.h756 size_t plaintext_len,
/external/boringssl/src/crypto/rsa_extra/
Drsa_test.cc416 size_t plaintext_len = 0; in TEST_P() local
417 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P()
420 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P()
429 plaintext_len = 0; in TEST_P()
430 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P()
433 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P()
436 plaintext_len = 0; in TEST_P()
437 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P()
440 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P()
448 key.get(), &plaintext_len, plaintext, sizeof(plaintext), ciphertext, in TEST_P()
[all …]
/external/boringssl/src/crypto/pkcs8/
Dpkcs8.c452 size_t plaintext_len = 0; in PKCS8_marshal_encrypted_private_key() local
479 !CBB_finish(&plaintext_cbb, &plaintext, &plaintext_len)) { in PKCS8_marshal_encrypted_private_key()
501 size_t max_out = plaintext_len + EVP_CIPHER_CTX_block_size(&ctx); in PKCS8_marshal_encrypted_private_key()
502 if (max_out < plaintext_len) { in PKCS8_marshal_encrypted_private_key()
512 !EVP_CipherUpdate(&ctx, ptr, &n1, plaintext, plaintext_len) || in PKCS8_marshal_encrypted_private_key()
/external/boringssl/src/crypto/evp/
Devp_test.cc352 size_t plaintext_len; in TestEVP() local
359 !EVP_PKEY_decrypt(ctx.get(), nullptr, &plaintext_len, actual.data(), in TestEVP()
363 output.resize(plaintext_len); in TestEVP()
364 if (!EVP_PKEY_decrypt(ctx.get(), output.data(), &plaintext_len, in TestEVP()
369 output.resize(plaintext_len); in TestEVP()
/external/boringssl/src/include/openssl/
Dssl.h4681 OPENSSL_EXPORT size_t SealRecordPrefixLen(const SSL *ssl, size_t plaintext_len);
4690 OPENSSL_EXPORT size_t SealRecordSuffixLen(const SSL *ssl, size_t plaintext_len);