/external/boringssl/src/ssl/ |
D | ssl_aead_ctx.c | 34 const EVP_AEAD *aead; in SSL_AEAD_CTX_new() local 36 if (!ssl_cipher_get_evp_aead(&aead, &discard, &discard, cipher, version)) { in SSL_AEAD_CTX_new() 66 &aead_ctx->ctx, aead, enc_key, enc_key_len, in SSL_AEAD_CTX_new() 72 assert(EVP_AEAD_nonce_length(aead) <= EVP_AEAD_MAX_NONCE_LENGTH); in SSL_AEAD_CTX_new() 73 aead_ctx->variable_nonce_len = (uint8_t)EVP_AEAD_nonce_length(aead); in SSL_AEAD_CTX_new() 99 void SSL_AEAD_CTX_free(SSL_AEAD_CTX *aead) { in SSL_AEAD_CTX_free() argument 100 if (aead == NULL) { in SSL_AEAD_CTX_free() 103 EVP_AEAD_CTX_cleanup(&aead->ctx); in SSL_AEAD_CTX_free() 104 OPENSSL_free(aead); in SSL_AEAD_CTX_free() 107 size_t SSL_AEAD_CTX_explicit_nonce_len(SSL_AEAD_CTX *aead) { in SSL_AEAD_CTX_explicit_nonce_len() argument [all …]
|
D | t1_enc.c | 307 const EVP_AEAD *aead = s->s3->tmp.new_aead; in tls1_change_cipher_state() local 319 if (aead == NULL) { in tls1_change_cipher_state() 324 key_len = EVP_AEAD_key_length(aead); in tls1_change_cipher_state() 384 const EVP_AEAD *aead = NULL; in tls1_setup_key_block() local 397 if (!ssl_cipher_get_evp_aead(&aead, &mac_secret_len, &fixed_iv_len, in tls1_setup_key_block() 402 key_len = EVP_AEAD_key_length(aead); in tls1_setup_key_block() 403 variable_iv_len = EVP_AEAD_nonce_length(aead); in tls1_setup_key_block() 426 s->s3->tmp.new_aead = aead; in tls1_setup_key_block()
|
D | d1_pkt.c | 730 SSL_AEAD_CTX *aead = s->aead_write_ctx; in dtls1_seal_record() local 737 aead = NULL; in dtls1_seal_record() 752 if (!SSL_AEAD_CTX_seal(aead, out + DTLS1_RT_HEADER_LENGTH, &ciphertext_len, in dtls1_seal_record()
|
/external/boringssl/src/crypto/cipher/ |
D | aead.c | 25 size_t EVP_AEAD_key_length(const EVP_AEAD *aead) { return aead->key_len; } in EVP_AEAD_key_length() argument 27 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; } in EVP_AEAD_nonce_length() argument 29 size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead) { return aead->overhead; } in EVP_AEAD_max_overhead() argument 31 size_t EVP_AEAD_max_tag_len(const EVP_AEAD *aead) { return aead->max_tag_len; } in EVP_AEAD_max_tag_len() argument 33 int EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, in EVP_AEAD_CTX_init() argument 36 if (!aead->init) { in EVP_AEAD_CTX_init() 38 ctx->aead = NULL; in EVP_AEAD_CTX_init() 41 return EVP_AEAD_CTX_init_with_direction(ctx, aead, key, key_len, tag_len, in EVP_AEAD_CTX_init() 45 int EVP_AEAD_CTX_init_with_direction(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, in EVP_AEAD_CTX_init_with_direction() argument 49 if (key_len != aead->key_len) { in EVP_AEAD_CTX_init_with_direction() [all …]
|
D | aead_test.cc | 51 const EVP_AEAD *aead = reinterpret_cast<const EVP_AEAD*>(arg); in TestAEAD() local 64 if (!EVP_AEAD_CTX_init_with_direction(&ctx, aead, bssl::vector_data(&key), in TestAEAD() 72 std::vector<uint8_t> out(in.size() + EVP_AEAD_max_overhead(aead)); in TestAEAD() 105 if (!EVP_AEAD_CTX_init_with_direction(&ctx, aead, bssl::vector_data(&key), in TestAEAD() 141 if (!EVP_AEAD_CTX_init_with_direction(&ctx, aead, bssl::vector_data(&key), in TestAEAD() 163 if (!EVP_AEAD_CTX_init_with_direction(&ctx, aead, bssl::vector_data(&key), in TestAEAD() 186 static int TestCleanupAfterInitFailure(const EVP_AEAD *aead) { in TestCleanupAfterInitFailure() argument 191 const size_t key_len = EVP_AEAD_key_length(aead); in TestCleanupAfterInitFailure() 197 if (EVP_AEAD_CTX_init(&ctx, aead, key, key_len, in TestCleanupAfterInitFailure() 205 if (EVP_AEAD_CTX_init(&ctx, aead, key, key_len, in TestCleanupAfterInitFailure() [all …]
|
D | e_tls.c | 64 if (key_len != EVP_AEAD_key_length(ctx->aead)) { in aead_tls_init() 117 if (in_len + EVP_AEAD_max_overhead(ctx->aead) < in_len || in aead_tls_seal() 124 if (max_out_len < in_len + EVP_AEAD_max_overhead(ctx->aead)) { in aead_tls_seal() 129 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { in aead_tls_seal() 234 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { in aead_tls_open()
|
D | CMakeLists.txt | 10 aead.c
|
D | e_ssl3.c | 92 if (key_len != EVP_AEAD_key_length(ctx->aead)) { in aead_ssl3_init() 140 if (in_len + EVP_AEAD_max_overhead(ctx->aead) < in_len || in aead_ssl3_seal() 147 if (max_out_len < in_len + EVP_AEAD_max_overhead(ctx->aead)) { in aead_ssl3_seal()
|
/external/boringssl/src/include/openssl/ |
D | aead.h | 176 OPENSSL_EXPORT size_t EVP_AEAD_key_length(const EVP_AEAD *aead); 180 OPENSSL_EXPORT size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead); 184 OPENSSL_EXPORT size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead); 189 OPENSSL_EXPORT size_t EVP_AEAD_max_tag_len(const EVP_AEAD *aead); 197 const EVP_AEAD *aead; member 235 OPENSSL_EXPORT int EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, 243 EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, const uint8_t *key, size_t key_len,
|
/external/boringssl/src/ssl/test/runner/ |
D | chacha20_poly1305_test.go | 77 aead, err := newChaCha20Poly1305(key) 82 out, err := aead.Open(nil, nonce, output, ad) 89 out = aead.Seal(nil, nonce, input, ad) 95 _, err = aead.Open(nil, nonce, out, ad)
|
D | cipher_suites.go | 83 aead func(key, fixedNonce []byte) *tlsAead member 213 aead cipher.AEAD member 217 func (f *fixedNonceAEAD) Overhead() int { return f.aead.Overhead() } 221 return f.aead.Seal(out, f.sealNonce, plaintext, additionalData) 226 return f.aead.Open(out, f.openNonce, plaintext, additionalData) 234 aead, err := cipher.NewGCM(aes) 243 return &tlsAead{&fixedNonceAEAD{nonce1, nonce2, aead}, true} 247 aead, err := newChaCha20Poly1305(key) 251 return &tlsAead{aead, false}
|
D | chacha20_poly1305.go | 73 aead := new(chaCha20Poly1305) 74 copy(aead.key[:], key) 75 return aead, nil
|
D | dtls.go | 280 } else if aead, ok := c.out.cipher.(*tlsAead); ok { 281 if aead.explicitNonce {
|
D | handshake_server.go | 741 if hs.suite.aead == nil { 747 clientCipher = hs.suite.aead(clientKey, clientIV) 748 serverCipher = hs.suite.aead(serverKey, serverIV)
|
D | handshake_client.go | 652 clientCipher = hs.suite.aead(clientKey, clientIV) 653 serverCipher = hs.suite.aead(serverKey, serverIV)
|
D | conn.go | 885 if aead, ok := c.out.cipher.(*tlsAead); ok && aead.explicitNonce {
|
/external/boringssl/src/tool/ |
D | speed.cc | 181 static bool SpeedAEADChunk(const EVP_AEAD *aead, const std::string &name, in SpeedAEADChunk() argument 186 const size_t key_len = EVP_AEAD_key_length(aead); in SpeedAEADChunk() 187 const size_t nonce_len = EVP_AEAD_nonce_length(aead); in SpeedAEADChunk() 188 const size_t overhead_len = EVP_AEAD_max_overhead(aead); in SpeedAEADChunk() 204 if (!EVP_AEAD_CTX_init_with_direction(&ctx, aead, key.get(), key_len, in SpeedAEADChunk() 233 static bool SpeedAEAD(const EVP_AEAD *aead, const std::string &name, in SpeedAEAD() argument 239 return SpeedAEADChunk(aead, name + " (16 bytes)", 16, ad_len) && in SpeedAEAD() 240 SpeedAEADChunk(aead, name + " (1350 bytes)", 1350, ad_len) && in SpeedAEAD() 241 SpeedAEADChunk(aead, name + " (8192 bytes)", 8192, ad_len); in SpeedAEAD()
|
/external/boringssl/src/util/ |
D | doc.config | 48 "include/openssl/aead.h",
|
/external/iproute2/ip/ |
D | xfrm_state.c | 371 struct xfrm_algo_aead aead; in xfrm_state_modify() member 430 alg.u.aead.alg_icv_len = icvlen; in xfrm_state_modify() 432 buf = alg.u.aead.alg_key; in xfrm_state_modify() 433 len = sizeof(alg.u.aead); in xfrm_state_modify()
|
/external/boringssl/ |
D | sources.mk | 94 src/crypto/cipher/aead.c\
|
/external/elfutils/src/tests/ |
D | testfile45.expect.bz2 | 1testfile45.o: elf64-elf_x86_64
2
3Disassembly of section .text:
4
5 0 ... |