/aosp_15_r20/external/iperf3/src/ |
H A D | iperf_auth.c | 257 int plaintext_len, rsa_buffer_len, keysize; in decrypt_rsa_message() local 267 plaintext_len = RSA_private_decrypt(rsa_buffer_len, rsa_buffer, *plaintext, rsa, pad); in decrypt_rsa_message() 273 if (plaintext_len < 0) { in decrypt_rsa_message() 278 return plaintext_len; in decrypt_rsa_message() 315 int plaintext_len; in decode_auth_setting() local 316 plaintext_len = decrypt_rsa_message(encrypted_b64, encrypted_len_b64, private_key, &plaintext); in decode_auth_setting() 318 if (plaintext_len < 0) { in decode_auth_setting() 321 plaintext[plaintext_len] = '\0'; in decode_auth_setting() 324 s_username = (char *) calloc(plaintext_len, sizeof(char)); in decode_auth_setting() 328 s_password = (char *) calloc(plaintext_len, sizeof(char)); in decode_auth_setting()
|
/aosp_15_r20/external/mbedtls/library/ |
H A D | ccm.c | 149 ctx->plaintext_len = 0; in ccm_calculate_first_block_if_ready() 171 for (i = 0, len_left = ctx->plaintext_len; i < ctx->q; i++, len_left >>= 8) { in ccm_calculate_first_block_if_ready() 229 size_t plaintext_len, in mbedtls_ccm_set_lengths() argument 247 ctx->plaintext_len = plaintext_len; in mbedtls_ccm_set_lengths() 336 if (ctx->tag_len != 0 && ctx->processed + input_len > ctx->plaintext_len) { in mbedtls_ccm_update() 362 if (use_len + offset == 16 || ctx->processed == ctx->plaintext_len) { in mbedtls_ccm_update() 393 if (use_len + offset == 16 || ctx->processed == ctx->plaintext_len) { in mbedtls_ccm_update() 402 if (use_len + offset == 16 || ctx->processed == ctx->plaintext_len) { in mbedtls_ccm_update() 435 if (ctx->plaintext_len > 0 && ctx->processed != ctx->plaintext_len) { in mbedtls_ccm_finish()
|
/aosp_15_r20/external/cronet/net/third_party/quiche/src/quiche/quic/load_balancer/ |
H A D | load_balancer_config.cc | 96 if (ciphertext.size() < plaintext_len()) { in FourPassDecrypt() 157 memcpy(plaintext.data() + half_len + 1, right, plaintext_len() - half_len); in FourPassEncrypt() 198 *half_len = plaintext_len() / 2; in InitializeFourPass() 200 if (plaintext_len() % 2 == 1) { in InitializeFourPass() 210 left[kLoadBalancerBlockSize - 2] = plaintext_len(); in InitializeFourPass() 211 right[kLoadBalancerBlockSize - 2] = plaintext_len(); in InitializeFourPass() 217 memcpy(right, input + (plaintext_len() / 2), *half_len); in InitializeFourPass()
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/library/ |
H A D | ccm.c | 177 ctx->plaintext_len = 0; in ccm_calculate_first_block_if_ready() 199 for (i = 0, len_left = ctx->plaintext_len; i < ctx->q; i++, len_left >>= 8) { in ccm_calculate_first_block_if_ready() 262 size_t plaintext_len, in mbedtls_ccm_set_lengths() argument 280 ctx->plaintext_len = plaintext_len; in mbedtls_ccm_set_lengths() 379 if (ctx->tag_len != 0 && ctx->processed + input_len > ctx->plaintext_len) { in mbedtls_ccm_update() 405 if (use_len + offset == 16 || ctx->processed == ctx->plaintext_len) { in mbedtls_ccm_update() 440 if (use_len + offset == 16 || ctx->processed == ctx->plaintext_len) { in mbedtls_ccm_update() 453 if (use_len + offset == 16 || ctx->processed == ctx->plaintext_len) { in mbedtls_ccm_update() 486 if (ctx->plaintext_len > 0 && ctx->processed != ctx->plaintext_len) { in mbedtls_ccm_finish()
|
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/crypto/cipher_extra/ |
D | e_aesgcmsiv.c | 435 const size_t plaintext_len = in_len - EVP_AEAD_AES_GCM_SIV_TAG_LEN; in aead_aes_gcm_siv_asm_open() local 436 const uint8_t *const given_tag = in + plaintext_len; in aead_aes_gcm_siv_asm_open() 438 if (max_out_len < plaintext_len) { in aead_aes_gcm_siv_asm_open() 476 plaintext_len); in aead_aes_gcm_siv_asm_open() 479 plaintext_len); in aead_aes_gcm_siv_asm_open() 482 if (plaintext_len & 15) { in aead_aes_gcm_siv_asm_open() 484 plaintext_len, given_tag, in aead_aes_gcm_siv_asm_open() 487 OPENSSL_memcpy(scratch, out + (plaintext_len & ~15), plaintext_len & 15); in aead_aes_gcm_siv_asm_open() 501 length_block.bitlens.in = plaintext_len * 8; in aead_aes_gcm_siv_asm_open()
|
D | internal.h | 186 size_t plaintext_len, const uint8_t *ad, 197 size_t plaintext_len, const uint8_t *ad, 206 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_open() argument 214 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_seal() argument
|
D | e_aesccm.c | 96 size_t plaintext_len) { in ccm128_init_state() argument 102 if (plaintext_len > CRYPTO_ccm128_max_input(ctx) || in ccm128_init_state() 115 state->nonce.c[15 - i] = (uint8_t)(plaintext_len >> (8 * i)); in ccm128_init_state() 166 size_t remaining_blocks = 2 * ((plaintext_len + 15) / 16) + 1; in ccm128_init_state() 167 if (plaintext_len + 15 < plaintext_len || in ccm128_init_state()
|
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/src/crypto/cipher_extra/ |
D | e_aesgcmsiv.c | 435 const size_t plaintext_len = in_len - EVP_AEAD_AES_GCM_SIV_TAG_LEN; in aead_aes_gcm_siv_asm_open() local 436 const uint8_t *const given_tag = in + plaintext_len; in aead_aes_gcm_siv_asm_open() 438 if (max_out_len < plaintext_len) { in aead_aes_gcm_siv_asm_open() 476 plaintext_len); in aead_aes_gcm_siv_asm_open() 479 plaintext_len); in aead_aes_gcm_siv_asm_open() 482 if (plaintext_len & 15) { in aead_aes_gcm_siv_asm_open() 484 plaintext_len, given_tag, in aead_aes_gcm_siv_asm_open() 487 OPENSSL_memcpy(scratch, out + (plaintext_len & ~15), plaintext_len & 15); in aead_aes_gcm_siv_asm_open() 501 length_block.bitlens.in = plaintext_len * 8; in aead_aes_gcm_siv_asm_open()
|
D | internal.h | 186 size_t plaintext_len, const uint8_t *ad, 197 size_t plaintext_len, const uint8_t *ad, 206 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_open() argument 214 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_seal() argument
|
D | e_aesccm.c | 96 size_t plaintext_len) { in ccm128_init_state() argument 102 if (plaintext_len > CRYPTO_ccm128_max_input(ctx) || in ccm128_init_state() 115 state->nonce.c[15 - i] = (uint8_t)(plaintext_len >> (8 * i)); in ccm128_init_state() 166 size_t remaining_blocks = 2 * ((plaintext_len + 15) / 16) + 1; in ccm128_init_state() 167 if (plaintext_len + 15 < plaintext_len || in ccm128_init_state()
|
/aosp_15_r20/external/cronet/third_party/boringssl/src/crypto/cipher_extra/ |
H A D | internal.h | 197 size_t plaintext_len, const uint8_t *ad, 208 size_t plaintext_len, const uint8_t *ad, 217 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_open() argument 225 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_seal() argument
|
/aosp_15_r20/external/boringssl/src/crypto/cipher_extra/ |
H A D | internal.h | 197 size_t plaintext_len, const uint8_t *ad, 208 size_t plaintext_len, const uint8_t *ad, 217 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_open() argument 225 size_t plaintext_len, const uint8_t *ad, in chacha20_poly1305_seal() argument
|
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 416 size_t plaintext_len = 0; in TEST_P() local 417 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 420 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 429 plaintext_len = 0; in TEST_P() 430 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 433 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 436 plaintext_len = 0; in TEST_P() 437 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 440 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 448 key.get(), &plaintext_len, plaintext, sizeof(plaintext), ciphertext, in TEST_P() [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 416 size_t plaintext_len = 0; in TEST_P() local 417 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 420 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 429 plaintext_len = 0; in TEST_P() 430 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 433 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 436 plaintext_len = 0; in TEST_P() 437 ASSERT_TRUE(RSA_decrypt(key.get(), &plaintext_len, plaintext, in TEST_P() 440 EXPECT_EQ(Bytes(kPlaintext, kPlaintextLen), Bytes(plaintext, plaintext_len)); in TEST_P() 448 key.get(), &plaintext_len, plaintext, sizeof(plaintext), ciphertext, in TEST_P() [all …]
|
/aosp_15_r20/external/boringssl/src/ssl/ |
H A D | ssl_aead_ctx.cc | 223 size_t plaintext_len, Span<const uint8_t> header) { in GetAdditionalData() argument 234 storage[len++] = static_cast<uint8_t>((plaintext_len >> 8)); in GetAdditionalData() 235 storage[len++] = static_cast<uint8_t>(plaintext_len); in GetAdditionalData() 251 size_t plaintext_len = 0; in Open() local 259 plaintext_len = in.size() - overhead; in Open() 264 seqnum, plaintext_len, header); in Open()
|
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_aead_ctx.cc | 224 const uint8_t seqnum[8], size_t plaintext_len, Span<const uint8_t> header) { in GetAdditionalData() argument 235 storage[len++] = static_cast<uint8_t>((plaintext_len >> 8)); in GetAdditionalData() 236 storage[len++] = static_cast<uint8_t>(plaintext_len); in GetAdditionalData() 252 size_t plaintext_len = 0; in Open() local 260 plaintext_len = in.size() - overhead; in Open() 265 seqnum, plaintext_len, header); in Open()
|
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_aead_ctx.cc | 224 const uint8_t seqnum[8], size_t plaintext_len, Span<const uint8_t> header) { in GetAdditionalData() argument 235 storage[len++] = static_cast<uint8_t>((plaintext_len >> 8)); in GetAdditionalData() 236 storage[len++] = static_cast<uint8_t>(plaintext_len); in GetAdditionalData() 252 size_t plaintext_len = 0; in Open() local 260 plaintext_len = in.size() - overhead; in Open() 265 seqnum, plaintext_len, header); in Open()
|
/aosp_15_r20/external/rust/beto-rust/nearby/presence/ldt/benches/ |
D | ldt_scan.rs | 121 plaintext_len: usize, in build_bench_state() 126 .map(|_| random_ldt_scenario::<RustCrypto, _, D>(&factory, &mut rng, plaintext_len)) in build_bench_state() 131 unfindable_ciphertext: random_vec::<RustCrypto>(&mut rng, plaintext_len), in build_bench_state() 132 decrypt_buf: Vec::with_capacity(plaintext_len), in build_bench_state() 144 plaintext_len: usize, in random_ldt_scenario() 147 let plaintext = random_vec::<C>(rng, plaintext_len); in random_ldt_scenario()
|
/aosp_15_r20/external/cronet/third_party/boringssl/src/ssl/ |
H A D | ssl_aead_ctx.cc | 223 size_t plaintext_len, Span<const uint8_t> header) { in GetAdditionalData() argument 234 storage[len++] = static_cast<uint8_t>((plaintext_len >> 8)); in GetAdditionalData() 235 storage[len++] = static_cast<uint8_t>(plaintext_len); in GetAdditionalData() 251 size_t plaintext_len = 0; in Open() local 259 plaintext_len = in.size() - overhead; in Open() 264 seqnum, plaintext_len, header); in Open()
|
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/cipher/ |
D | aead.c | 209 size_t plaintext_len = in_len - ctx->tag_len; in EVP_AEAD_CTX_open() local 210 if (max_out_len < plaintext_len) { in EVP_AEAD_CTX_open() 214 if (EVP_AEAD_CTX_open_gather(ctx, out, nonce, nonce_len, in, plaintext_len, in EVP_AEAD_CTX_open() 215 in + plaintext_len, ctx->tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open() 216 *out_len = plaintext_len; in EVP_AEAD_CTX_open()
|
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/crypto/fipsmodule/cipher/ |
D | aead.c | 209 size_t plaintext_len = in_len - ctx->tag_len; in EVP_AEAD_CTX_open() local 210 if (max_out_len < plaintext_len) { in EVP_AEAD_CTX_open() 214 if (EVP_AEAD_CTX_open_gather(ctx, out, nonce, nonce_len, in, plaintext_len, in EVP_AEAD_CTX_open() 215 in + plaintext_len, ctx->tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open() 216 *out_len = plaintext_len; in EVP_AEAD_CTX_open()
|
/aosp_15_r20/external/boringssl/src/crypto/fipsmodule/cipher/ |
H A D | aead.c | 212 size_t plaintext_len = in_len - ctx->tag_len; in EVP_AEAD_CTX_open() local 213 if (max_out_len < plaintext_len) { in EVP_AEAD_CTX_open() 217 if (EVP_AEAD_CTX_open_gather(ctx, out, nonce, nonce_len, in, plaintext_len, in EVP_AEAD_CTX_open() 218 in + plaintext_len, ctx->tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open() 219 *out_len = plaintext_len; in EVP_AEAD_CTX_open()
|
H A D | e_aesccm.c | 96 size_t plaintext_len) { in ccm128_init_state() argument 102 if (plaintext_len > CRYPTO_ccm128_max_input(ctx) || in ccm128_init_state() 115 state->nonce[15 - i] = (uint8_t)(plaintext_len >> (8 * i)); in ccm128_init_state() 166 size_t remaining_blocks = 2 * ((plaintext_len + 15) / 16) + 1; in ccm128_init_state() 167 if (plaintext_len + 15 < plaintext_len || in ccm128_init_state()
|
/aosp_15_r20/external/cronet/third_party/boringssl/src/crypto/fipsmodule/cipher/ |
H A D | aead.c | 212 size_t plaintext_len = in_len - ctx->tag_len; in EVP_AEAD_CTX_open() local 213 if (max_out_len < plaintext_len) { in EVP_AEAD_CTX_open() 217 if (EVP_AEAD_CTX_open_gather(ctx, out, nonce, nonce_len, in, plaintext_len, in EVP_AEAD_CTX_open() 218 in + plaintext_len, ctx->tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open() 219 *out_len = plaintext_len; in EVP_AEAD_CTX_open()
|
H A D | e_aesccm.c | 96 size_t plaintext_len) { in ccm128_init_state() argument 102 if (plaintext_len > CRYPTO_ccm128_max_input(ctx) || in ccm128_init_state() 115 state->nonce[15 - i] = (uint8_t)(plaintext_len >> (8 * i)); in ccm128_init_state() 166 size_t remaining_blocks = 2 * ((plaintext_len + 15) / 16) + 1; in ccm128_init_state() 167 if (plaintext_len + 15 < plaintext_len || in ccm128_init_state()
|