/external/boringssl/src/crypto/fipsmodule/modes/ |
D | ccm.c | 88 size_t plaintext_len) { in ccm128_init_state() argument 94 if (plaintext_len > CRYPTO_ccm128_max_input(ctx) || in ccm128_init_state() 107 state->nonce.c[15 - i] = (uint8_t)(plaintext_len >> (8 * i)); in ccm128_init_state() 158 size_t remaining_blocks = 2 * ((plaintext_len + 15) / 16) + 1; in ccm128_init_state() 159 if (plaintext_len + 15 < plaintext_len || in ccm128_init_state()
|
/external/iperf3/src/ |
D | iperf_auth.c | 233 int plaintext_len, rsa_buffer_len, keysize; in decrypt_rsa_message() local 243 plaintext_len = RSA_private_decrypt(rsa_buffer_len, rsa_buffer, *plaintext, rsa, pad); in decrypt_rsa_message() 249 return plaintext_len; in decrypt_rsa_message() 270 int plaintext_len; in decode_auth_setting() local 271 plaintext_len = decrypt_rsa_message(encrypted_b64, encrypted_len_b64, private_key, &plaintext); in decode_auth_setting() 272 plaintext[plaintext_len] = '\0'; in decode_auth_setting()
|
/external/boringssl/src/crypto/fipsmodule/cipher/ |
D | aead.c | 209 size_t plaintext_len = in_len - ctx->tag_len; in EVP_AEAD_CTX_open() local 210 if (max_out_len < plaintext_len) { in EVP_AEAD_CTX_open() 214 if (EVP_AEAD_CTX_open_gather(ctx, out, nonce, nonce_len, in, plaintext_len, in EVP_AEAD_CTX_open() 215 in + plaintext_len, ctx->tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open() 216 *out_len = plaintext_len; in EVP_AEAD_CTX_open()
|
/external/boringssl/src/crypto/cipher_extra/ |
D | e_aesgcmsiv.c | 430 const size_t plaintext_len = in_len - EVP_AEAD_AES_GCM_SIV_TAG_LEN; in aead_aes_gcm_siv_asm_open() local 431 const uint8_t *const given_tag = in + plaintext_len; in aead_aes_gcm_siv_asm_open() 433 if (max_out_len < plaintext_len) { in aead_aes_gcm_siv_asm_open() 471 plaintext_len); in aead_aes_gcm_siv_asm_open() 474 plaintext_len); in aead_aes_gcm_siv_asm_open() 477 if (plaintext_len & 15) { in aead_aes_gcm_siv_asm_open() 479 plaintext_len, given_tag, in aead_aes_gcm_siv_asm_open() 482 OPENSSL_memcpy(scratch, out + (plaintext_len & ~15), plaintext_len & 15); in aead_aes_gcm_siv_asm_open() 496 length_block.bitlens.in = plaintext_len * 8; in aead_aes_gcm_siv_asm_open()
|
D | e_chacha20poly1305.c | 92 size_t plaintext_len, const uint8_t *ad, 102 size_t plaintext_len, const uint8_t *ad, 110 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_open() argument 115 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_seal() argument
|
/external/boringssl/src/ssl/ |
D | ssl_aead_ctx.cc | 224 const uint8_t seqnum[8], size_t plaintext_len, Span<const uint8_t> header) { in GetAdditionalData() argument 235 storage[len++] = static_cast<uint8_t>((plaintext_len >> 8)); in GetAdditionalData() 236 storage[len++] = static_cast<uint8_t>(plaintext_len); in GetAdditionalData() 252 size_t plaintext_len = 0; in Open() local 260 plaintext_len = in.size() - overhead; in Open() 265 seqnum, plaintext_len, header); in Open()
|
D | tls_record.cc | 641 size_t SealRecordSuffixLen(const SSL *ssl, const size_t plaintext_len) { in SealRecordSuffixLen() argument 642 assert(plaintext_len <= SSL3_RT_MAX_PLAIN_LENGTH); in SealRecordSuffixLen() 645 plaintext_len)) { in SealRecordSuffixLen()
|
D | t1_lib.cc | 3561 size_t plaintext_len; in ssl_decrypt_ticket_with_method() local 3564 hs->ssl, plaintext.data(), &plaintext_len, ticket.size(), in ssl_decrypt_ticket_with_method() 3570 plaintext.Shrink(plaintext_len); in ssl_decrypt_ticket_with_method()
|
D | internal.h | 756 size_t plaintext_len,
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 416 size_t plaintext_len = 0; in TEST_P() local 417 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 420 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 429 plaintext_len = 0; in TEST_P() 430 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 433 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 436 plaintext_len = 0; in TEST_P() 437 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 440 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 448 key.get(), &plaintext_len, plaintext, sizeof(plaintext), ciphertext, in TEST_P() [all …]
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8.c | 452 size_t plaintext_len = 0; in PKCS8_marshal_encrypted_private_key() local 479 !CBB_finish(&plaintext_cbb, &plaintext, &plaintext_len)) { in PKCS8_marshal_encrypted_private_key() 501 size_t max_out = plaintext_len + EVP_CIPHER_CTX_block_size(&ctx); in PKCS8_marshal_encrypted_private_key() 502 if (max_out < plaintext_len) { in PKCS8_marshal_encrypted_private_key() 512 !EVP_CipherUpdate(&ctx, ptr, &n1, plaintext, plaintext_len) || in PKCS8_marshal_encrypted_private_key()
|
/external/boringssl/src/crypto/evp/ |
D | evp_test.cc | 352 size_t plaintext_len; in TestEVP() local 359 !EVP_PKEY_decrypt(ctx.get(), nullptr, &plaintext_len, actual.data(), in TestEVP() 363 output.resize(plaintext_len); in TestEVP() 364 if (!EVP_PKEY_decrypt(ctx.get(), output.data(), &plaintext_len, in TestEVP() 369 output.resize(plaintext_len); in TestEVP()
|
/external/boringssl/src/include/openssl/ |
D | ssl.h | 4681 OPENSSL_EXPORT size_t SealRecordPrefixLen(const SSL *ssl, size_t plaintext_len); 4690 OPENSSL_EXPORT size_t SealRecordSuffixLen(const SSL *ssl, size_t plaintext_len);
|