/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/pubkey/mceies/ |
H A D | mceies.cpp | 52 const size_t nonce_len = aead->default_nonce_length(); in mceies_encrypt() local 57 const secure_vector<uint8_t> nonce = rng.random_vec(nonce_len); in mceies_encrypt() 84 const size_t nonce_len = aead->default_nonce_length(); in mceies_decrypt() local 86 if(ct_len < mce_code_bytes + nonce_len + aead->tag_size()) in mceies_decrypt() 94 secure_vector<uint8_t> pt(ct + mce_code_bytes + nonce_len, ct + ct_len); in mceies_decrypt() 96 aead->start(&ct[mce_code_bytes], nonce_len); in mceies_decrypt()
|
/dports/security/botan2/Botan-2.18.2/src/lib/pubkey/mceies/ |
H A D | mceies.cpp | 52 const size_t nonce_len = aead->default_nonce_length(); in mceies_encrypt() local 57 const secure_vector<uint8_t> nonce = rng.random_vec(nonce_len); in mceies_encrypt() 84 const size_t nonce_len = aead->default_nonce_length(); in mceies_decrypt() local 86 if(ct_len < mce_code_bytes + nonce_len + aead->tag_size()) in mceies_decrypt() 94 secure_vector<uint8_t> pt(ct + mce_code_bytes + nonce_len, ct + ct_len); in mceies_decrypt() 96 aead->start(&ct[mce_code_bytes], nonce_len); in mceies_decrypt()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/pubkey/mceies/ |
H A D | mceies.cpp | 52 const size_t nonce_len = aead->default_nonce_length(); in mceies_encrypt() local 57 const secure_vector<uint8_t> nonce = rng.random_vec(nonce_len); in mceies_encrypt() 84 const size_t nonce_len = aead->default_nonce_length(); in mceies_decrypt() local 86 if(ct_len < mce_code_bytes + nonce_len + aead->tag_size()) in mceies_decrypt() 94 secure_vector<uint8_t> pt(ct + mce_code_bytes + nonce_len, ct + ct_len); in mceies_decrypt() 96 aead->start(&ct[mce_code_bytes], nonce_len); in mceies_decrypt()
|
/dports/www/trafficserver/trafficserver-9.1.1/iocore/net/quic/ |
H A D | QUICPacketPayloadProtector_boringssl.cc | 38 size_t nonce_len = 0; in _protect() local 40 this->_gen_nonce(nonce, nonce_len, pkt_num, iv, iv_len); in _protect() 49 if (!EVP_CIPHER_CTX_ctrl(aead_ctx, EVP_CTRL_AEAD_SET_IVLEN, nonce_len, nullptr)) { in _protect() 102 size_t nonce_len = 0; in _unprotect() local 104 this->_gen_nonce(nonce, nonce_len, pkt_num, iv, iv_len); in _unprotect() 113 if (!EVP_CIPHER_CTX_ctrl(aead_ctx, EVP_CTRL_AEAD_SET_IVLEN, nonce_len, nullptr)) { in _unprotect()
|
H A D | QUICPacketPayloadProtector_openssl.cc | 38 size_t nonce_len = 0; in _protect() local 40 this->_gen_nonce(nonce, nonce_len, pkt_num, iv, iv_len); in _protect() 49 if (!EVP_CIPHER_CTX_ctrl(aead_ctx, EVP_CTRL_AEAD_SET_IVLEN, nonce_len, nullptr)) { in _protect() 102 size_t nonce_len = 0; in _unprotect() local 104 this->_gen_nonce(nonce, nonce_len, pkt_num, iv, iv_len); in _unprotect() 113 if (!EVP_CIPHER_CTX_ctrl(aead_ctx, EVP_CTRL_AEAD_SET_IVLEN, nonce_len, nullptr)) { in _unprotect()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/crypto/cipher_extra/ |
H A D | e_aesccm.c | 94 const uint8_t *nonce, size_t nonce_len, in ccm128_init_state() argument 103 nonce_len != 15 - L) { in ccm128_init_state() 113 OPENSSL_memcpy(&state->nonce.c[1], nonce, nonce_len); in ccm128_init_state() 245 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_encrypt() argument 249 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_encrypt() 258 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_decrypt() argument 262 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_decrypt() 341 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { in aead_aes_ccm_seal_scatter() 347 ctx->tag_len, nonce, nonce_len, in, in_len, ad, in aead_aes_ccm_seal_scatter() 358 const uint8_t *nonce, size_t nonce_len, in aead_aes_ccm_open_gather() argument [all …]
|
H A D | e_chacha20poly1305.c | 189 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, in chacha20_poly1305_seal_scatter() argument 199 if (nonce_len != 12) { in chacha20_poly1305_seal_scatter() 263 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, in aead_chacha20_poly1305_seal_scatter() argument 270 nonce_len, in, in_len, extra_in, extra_in_len, ad, ad_len, ctx->tag_len); in aead_chacha20_poly1305_seal_scatter() 281 if (nonce_len != 24) { in aead_xchacha20_poly1305_seal_scatter() 300 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, in chacha20_poly1305_open_gather() argument 302 if (nonce_len != 12) { in chacha20_poly1305_open_gather() 345 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, in aead_chacha20_poly1305_open_gather() argument 350 return chacha20_poly1305_open_gather(c20_ctx->key, out, nonce, nonce_len, in, in aead_chacha20_poly1305_open_gather() 357 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, in aead_xchacha20_poly1305_open_gather() argument [all …]
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/boringssl/src/crypto/cipher_extra/ |
H A D | e_aesccm.c | 94 const uint8_t *nonce, size_t nonce_len, in ccm128_init_state() argument 103 nonce_len != 15 - L) { in ccm128_init_state() 113 OPENSSL_memcpy(&state->nonce.c[1], nonce, nonce_len); in ccm128_init_state() 245 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_encrypt() argument 249 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_encrypt() 258 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_decrypt() argument 262 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_decrypt() 341 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { in aead_aes_ccm_seal_scatter() 347 ctx->tag_len, nonce, nonce_len, in, in_len, ad, in aead_aes_ccm_seal_scatter() 358 const uint8_t *nonce, size_t nonce_len, in aead_aes_ccm_open_gather() argument [all …]
|
H A D | e_chacha20poly1305.c | 189 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, in chacha20_poly1305_seal_scatter() argument 199 if (nonce_len != 12) { in chacha20_poly1305_seal_scatter() 263 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, in aead_chacha20_poly1305_seal_scatter() argument 270 nonce_len, in, in_len, extra_in, extra_in_len, ad, ad_len, ctx->tag_len); in aead_chacha20_poly1305_seal_scatter() 281 if (nonce_len != 24) { in aead_xchacha20_poly1305_seal_scatter() 300 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, in chacha20_poly1305_open_gather() argument 302 if (nonce_len != 12) { in chacha20_poly1305_open_gather() 345 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, in aead_chacha20_poly1305_open_gather() argument 350 return chacha20_poly1305_open_gather(c20_ctx->key, out, nonce, nonce_len, in, in aead_chacha20_poly1305_open_gather() 357 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, in aead_xchacha20_poly1305_open_gather() argument [all …]
|
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/crypto/cipher_extra/ |
H A D | e_aesccm.c | 94 const uint8_t *nonce, size_t nonce_len, in ccm128_init_state() argument 103 nonce_len != 15 - L) { in ccm128_init_state() 113 OPENSSL_memcpy(&state->nonce.c[1], nonce, nonce_len); in ccm128_init_state() 245 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_encrypt() argument 249 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_encrypt() 258 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_decrypt() argument 262 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_decrypt() 341 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { in aead_aes_ccm_seal_scatter() 347 ctx->tag_len, nonce, nonce_len, in, in_len, ad, in aead_aes_ccm_seal_scatter() 358 const uint8_t *nonce, size_t nonce_len, in aead_aes_ccm_open_gather() argument [all …]
|
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/crypto/cipher_extra/ |
H A D | e_aesccm.c | 94 const uint8_t *nonce, size_t nonce_len, in ccm128_init_state() argument 103 nonce_len != 15 - L) { in ccm128_init_state() 113 OPENSSL_memcpy(&state->nonce.c[1], nonce, nonce_len); in ccm128_init_state() 245 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_encrypt() argument 249 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_encrypt() 258 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_decrypt() argument 262 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_decrypt() 341 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { in aead_aes_ccm_seal_scatter() 347 ctx->tag_len, nonce, nonce_len, in, in_len, ad, in aead_aes_ccm_seal_scatter() 358 const uint8_t *nonce, size_t nonce_len, in aead_aes_ccm_open_gather() argument [all …]
|
/dports/security/boringssl/boringssl-6a71840/crypto/cipher_extra/ |
H A D | e_aesccm.c | 94 const uint8_t *nonce, size_t nonce_len, in ccm128_init_state() argument 103 nonce_len != 15 - L) { in ccm128_init_state() 113 OPENSSL_memcpy(&state->nonce.c[1], nonce, nonce_len); in ccm128_init_state() 245 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_encrypt() argument 249 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_encrypt() 258 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_decrypt() argument 262 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_decrypt() 341 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { in aead_aes_ccm_seal_scatter() 347 ctx->tag_len, nonce, nonce_len, in, in_len, ad, in aead_aes_ccm_seal_scatter() 358 const uint8_t *nonce, size_t nonce_len, in aead_aes_ccm_open_gather() argument [all …]
|
H A D | e_chacha20poly1305.c | 189 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, in chacha20_poly1305_seal_scatter() argument 199 if (nonce_len != 12) { in chacha20_poly1305_seal_scatter() 263 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *extra_in, in aead_chacha20_poly1305_seal_scatter() argument 270 nonce_len, in, in_len, extra_in, extra_in_len, ad, ad_len, ctx->tag_len); in aead_chacha20_poly1305_seal_scatter() 281 if (nonce_len != 24) { in aead_xchacha20_poly1305_seal_scatter() 300 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, in chacha20_poly1305_open_gather() argument 302 if (nonce_len != 12) { in chacha20_poly1305_open_gather() 345 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, in aead_chacha20_poly1305_open_gather() argument 350 return chacha20_poly1305_open_gather(c20_ctx->key, out, nonce, nonce_len, in, in aead_chacha20_poly1305_open_gather() 357 size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *in_tag, in aead_xchacha20_poly1305_open_gather() argument [all …]
|
/dports/devel/pecl-grpc/grpc-1.42.0/third_party/boringssl-with-bazel/src/crypto/cipher_extra/ |
H A D | e_aesccm.c | 94 const uint8_t *nonce, size_t nonce_len, in ccm128_init_state() argument 103 nonce_len != 15 - L) { in ccm128_init_state() 113 OPENSSL_memcpy(&state->nonce.c[1], nonce, nonce_len); in ccm128_init_state() 245 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_encrypt() argument 249 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_encrypt() 258 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_decrypt() argument 262 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_decrypt() 341 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { in aead_aes_ccm_seal_scatter() 347 ctx->tag_len, nonce, nonce_len, in, in_len, ad, in aead_aes_ccm_seal_scatter() 358 const uint8_t *nonce, size_t nonce_len, in aead_aes_ccm_open_gather() argument [all …]
|
/dports/devel/py-grpcio/grpcio-1.43.0/third_party/boringssl-with-bazel/src/crypto/cipher_extra/ |
H A D | e_aesccm.c | 94 const uint8_t *nonce, size_t nonce_len, in ccm128_init_state() argument 103 nonce_len != 15 - L) { in ccm128_init_state() 113 OPENSSL_memcpy(&state->nonce.c[1], nonce, nonce_len); in ccm128_init_state() 245 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_encrypt() argument 249 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_encrypt() 258 const uint8_t *nonce, size_t nonce_len, in CRYPTO_ccm128_decrypt() argument 262 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_decrypt() 341 if (nonce_len != EVP_AEAD_nonce_length(ctx->aead)) { in aead_aes_ccm_seal_scatter() 347 ctx->tag_len, nonce, nonce_len, in, in_len, ad, in aead_aes_ccm_seal_scatter() 358 const uint8_t *nonce, size_t nonce_len, in aead_aes_ccm_open_gather() argument [all …]
|
/dports/net/quiche/quiche-0.9.0/src/ |
H A D | crypto.rs | 107 pub fn nonce_len(self) -> usize { in nonce_len() method 108 self.get_ring_aead().nonce_len() in nonce_len() 146 let nonce_len = aead.nonce_len(); in from_secret() localVariable 149 let mut iv = vec![0; nonce_len]; in from_secret() 230 let nonce_len = aead.nonce_len(); in from_secret() localVariable 233 let mut iv = vec![0; nonce_len]; in from_secret() 298 let nonce_len = aead.nonce_len(); in derive_initial_key_material() localVariable 304 let mut client_iv = vec![0; nonce_len]; in derive_initial_key_material() 314 let mut server_iv = vec![0; nonce_len]; in derive_initial_key_material() 411 let nonce_len = aead.nonce_len(); in derive_pkt_iv() localVariable [all …]
|
/dports/net/kamailio/kamailio-5.4.5/src/modules/auth/ |
H A D | challenge.c | 95 int calc_new_nonce(char* nonce, int *nonce_len, int cfg, struct sip_msg* msg) in calc_new_nonce() argument 127 return calc_nonce(nonce, nonce_len, cfg, t, t + nonce_expire, n_id, in calc_new_nonce() 131 return calc_nonce(nonce, nonce_len, cfg, t, t + nonce_expire, in calc_new_nonce() 155 int nonce_len, l, cfg; in get_challenge_hf() local 185 nonce_len = get_nonce_len(cfg, nc_enabled || otn_enabled); in get_challenge_hf() 200 hf.len += nonce_len in get_challenge_hf() 237 l=nonce_len; in get_challenge_hf() 240 LM_ERR("calc_nonce failed (len %d, needed %d)\n", nonce_len, l); in get_challenge_hf()
|
/dports/security/libressl-static/libressl-3.3.5/crypto/evp/ |
H A D | evp_aead.c | 35 return aead->nonce_len; in EVP_AEAD_nonce_length() 91 size_t max_out_len, const unsigned char *nonce, size_t nonce_len, in EVP_AEAD_CTX_seal() argument 108 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in EVP_AEAD_CTX_seal() 123 size_t max_out_len, const unsigned char *nonce, size_t nonce_len, in EVP_AEAD_CTX_open() argument 132 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in EVP_AEAD_CTX_open()
|
/dports/security/libressl/libressl-3.4.3/crypto/evp/ |
H A D | evp_aead.c | 35 return aead->nonce_len; in EVP_AEAD_nonce_length() 91 size_t max_out_len, const unsigned char *nonce, size_t nonce_len, in EVP_AEAD_CTX_seal() argument 108 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in EVP_AEAD_CTX_seal() 123 size_t max_out_len, const unsigned char *nonce, size_t nonce_len, in EVP_AEAD_CTX_open() argument 132 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in EVP_AEAD_CTX_open()
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/mac/gmac/ |
H A D | gmac.cpp | 90 void GMAC::start_msg(const uint8_t nonce[], size_t nonce_len) in start_msg() argument 94 if(nonce_len == 12) in start_msg() 96 copy_mem(y0.data(), nonce, nonce_len); in start_msg() 101 m_ghash->ghash_update(y0, nonce, nonce_len); in start_msg() 102 m_ghash->add_final_block(y0, 0, nonce_len); in start_msg()
|
/dports/emulators/citra/citra-ac98458e0/externals/libressl/crypto/evp/ |
H A D | evp_aead.c | 35 return aead->nonce_len; in EVP_AEAD_nonce_length() 91 size_t max_out_len, const unsigned char *nonce, size_t nonce_len, in EVP_AEAD_CTX_seal() argument 108 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in EVP_AEAD_CTX_seal() 123 size_t max_out_len, const unsigned char *nonce, size_t nonce_len, in EVP_AEAD_CTX_open() argument 132 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in EVP_AEAD_CTX_open()
|
/dports/emulators/citra-qt5/citra-ac98458e0/externals/libressl/crypto/evp/ |
H A D | evp_aead.c | 35 return aead->nonce_len; in EVP_AEAD_nonce_length() 91 size_t max_out_len, const unsigned char *nonce, size_t nonce_len, in EVP_AEAD_CTX_seal() argument 108 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in EVP_AEAD_CTX_seal() 123 size_t max_out_len, const unsigned char *nonce, size_t nonce_len, in EVP_AEAD_CTX_open() argument 132 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in EVP_AEAD_CTX_open()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/mac/gmac/ |
H A D | gmac.cpp | 90 void GMAC::start_msg(const uint8_t nonce[], size_t nonce_len) in start_msg() argument 94 if(nonce_len == 12) in start_msg() 96 copy_mem(y0.data(), nonce, nonce_len); in start_msg() 101 m_ghash->ghash_update(y0, nonce, nonce_len); in start_msg() 102 m_ghash->add_final_block(y0, 0, nonce_len); in start_msg()
|
/dports/www/obhttpd/libressl-3.4.1/crypto/evp/ |
H A D | evp_aead.c | 35 return aead->nonce_len; in EVP_AEAD_nonce_length() 91 size_t max_out_len, const unsigned char *nonce, size_t nonce_len, in EVP_AEAD_CTX_seal() argument 108 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in EVP_AEAD_CTX_seal() 123 size_t max_out_len, const unsigned char *nonce, size_t nonce_len, in EVP_AEAD_CTX_open() argument 132 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in EVP_AEAD_CTX_open()
|
/dports/security/botan2/Botan-2.18.2/src/lib/mac/gmac/ |
H A D | gmac.cpp | 90 void GMAC::start_msg(const uint8_t nonce[], size_t nonce_len) in start_msg() argument 94 if(nonce_len == 12) in start_msg() 96 copy_mem(y0.data(), nonce, nonce_len); in start_msg() 101 m_ghash->ghash_update(y0, nonce, nonce_len); in start_msg() 102 m_ghash->add_final_block(y0, 0, nonce_len); in start_msg()
|