Lines Matching refs:params
38 const AESCipherConfig& params,
44 const int mode = EVP_CIPHER_mode(params.cipher);
55 params.cipher,
67 params.iv.size(),
80 params.iv.data<unsigned char>(),
90 // If in decrypt mode, the auth tag must be set in the params.tag.
91 CHECK(params.tag);
94 params.tag.size(),
95 const_cast<char*>(params.tag.data<char>()))) {
105 tag_len = params.length;
117 params.additional_data.size() &&
122 params.additional_data.data<unsigned char>(),
123 params.additional_data.size())) {
182 BignumPointer GetCounter(const AESCipherConfig& params) {
183 unsigned int remainder = (params.length % CHAR_BIT);
184 const unsigned char* data = params.iv.data<unsigned char>();
187 unsigned int byte_length = params.length / CHAR_BIT;
189 data + params.iv.size() - byte_length,
195 CeilDiv(params.length, static_cast<size_t>(CHAR_BIT));
198 data + params.iv.size() - byte_length,
199 data + params.iv.size());
206 const AESCipherConfig& params) {
207 unsigned int length_bytes = params.length / CHAR_BIT;
208 unsigned int remainder = params.length % CHAR_BIT;
210 const unsigned char* data = params.iv.data<unsigned char>();
212 std::vector<unsigned char> new_counter_block(data, data + params.iv.size());
226 const AESCipherConfig& params,
235 params.cipher,
269 const AESCipherConfig& params,
273 if (!BN_lshift(num_counters.get(), BN_value_one(), params.length))
276 BignumPointer current_counter = GetCounter(params);
304 params,
306 params.iv.data<unsigned char>(),
319 params,
321 params.iv.data<unsigned char>(),
328 std::vector<unsigned char> new_counter_block = BlockWithZeroedCounter(params);
334 params,
349 AESCipherConfig* params) {
355 params->iv = (mode == kCryptoJobAsync)
364 AESCipherConfig* params) {
366 params->length = value.As<Uint32>()->Value();
367 if (params->iv.size() != 16 ||
368 params->length == 0 ||
369 params->length > 128) {
381 AESCipherConfig* params) {
393 params->tag = mode == kCryptoJobAsync
403 params->length = value.As<Uint32>()->Value();
404 if (params->length > 128) {
420 AESCipherConfig* params) {
428 params->additional_data = mode == kCryptoJobAsync
435 void UseDefaultIV(AESCipherConfig* params) {
436 params->iv = ByteSource::Foreign(kDefaultWrapIV, strlen(kDefaultWrapIV));
470 AESCipherConfig* params) {
473 params->mode = mode;
476 params->variant =
481 switch (params->variant) {
483 if (!ValidateIV(env, mode, args[offset + 1], params) ||
484 !ValidateCounter(env, args[offset + 2], params)) {
490 if (!ValidateIV(env, mode, args[offset + 1], params) ||
491 !ValidateCounter(env, args[offset + 2], params)) {
497 if (!ValidateIV(env, mode, args[offset + 1], params) ||
498 !ValidateCounter(env, args[offset + 2], params)) {
504 if (!ValidateIV(env, mode, args[offset + 1], params))
509 if (!ValidateIV(env, mode, args[offset + 1], params))
514 if (!ValidateIV(env, mode, args[offset + 1], params))
519 UseDefaultIV(params);
523 UseDefaultIV(params);
527 UseDefaultIV(params);
531 if (!ValidateIV(env, mode, args[offset + 1], params) ||
532 !ValidateAuthTag(env, mode, cipher_mode, args[offset + 2], params) ||
533 !ValidateAdditionalData(env, mode, args[offset + 3], params)) {
539 if (!ValidateIV(env, mode, args[offset + 1], params) ||
540 !ValidateAuthTag(env, mode, cipher_mode, args[offset + 2], params) ||
541 !ValidateAdditionalData(env, mode, args[offset + 3], params)) {
547 if (!ValidateIV(env, mode, args[offset + 1], params) ||
548 !ValidateAuthTag(env, mode, cipher_mode, args[offset + 2], params) ||
549 !ValidateAdditionalData(env, mode, args[offset + 3], params)) {
558 params->cipher = EVP_get_cipherbynid(cipher_nid);
559 if (params->cipher == nullptr) {
564 if (params->iv.size() <
565 static_cast<size_t>(EVP_CIPHER_iv_length(params->cipher))) {
577 const AESCipherConfig& params,
582 return fn(env, key_data.get(), cipher_mode, params, in, out);
583 switch (params.variant) {