Home
last modified time | relevance | path

Searched refs:nonce (Results 1 - 25 of 294) sorted by relevance

12345678910>>...12

/third_party/node/deps/openssl/openssl/crypto/modes/
H A Dccm128.c30 memset(ctx->nonce.c, 0, sizeof(ctx->nonce.c)); in CRYPTO_ccm128_init()
31 ctx->nonce.c[0] = ((u8)(L - 1) & 7) | (u8)(((M - 2) / 2) & 7) << 3; in CRYPTO_ccm128_init()
39 /* Then you setup per-message nonce and pass the length of the message */
41 const unsigned char *nonce, size_t nlen, size_t mlen) in CRYPTO_ccm128_setiv()
43 unsigned int L = ctx->nonce.c[0] & 7; /* the L parameter */ in CRYPTO_ccm128_setiv()
46 return -1; /* nonce is too short */ in CRYPTO_ccm128_setiv()
49 ctx->nonce.c[8] = (u8)(mlen >> (56 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv()
50 ctx->nonce.c[9] = (u8)(mlen >> (48 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv()
51 ctx->nonce in CRYPTO_ccm128_setiv()
40 CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, const unsigned char *nonce, size_t nlen, size_t mlen) CRYPTO_ccm128_setiv() argument
[all...]
/third_party/openssl/crypto/modes/
H A Dccm128.c30 memset(ctx->nonce.c, 0, sizeof(ctx->nonce.c)); in CRYPTO_ccm128_init()
31 ctx->nonce.c[0] = ((u8)(L - 1) & 7) | (u8)(((M - 2) / 2) & 7) << 3; in CRYPTO_ccm128_init()
39 /* Then you setup per-message nonce and pass the length of the message */
41 const unsigned char *nonce, size_t nlen, size_t mlen) in CRYPTO_ccm128_setiv()
43 unsigned int L = ctx->nonce.c[0] & 7; /* the L parameter */ in CRYPTO_ccm128_setiv()
46 return -1; /* nonce is too short */ in CRYPTO_ccm128_setiv()
49 ctx->nonce.c[8] = (u8)(mlen >> (56 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv()
50 ctx->nonce.c[9] = (u8)(mlen >> (48 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv()
51 ctx->nonce in CRYPTO_ccm128_setiv()
40 CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, const unsigned char *nonce, size_t nlen, size_t mlen) CRYPTO_ccm128_setiv() argument
[all...]
/third_party/skia/third_party/externals/microhttpd/src/microhttpd/
H A Ddigestauth.c94 * @param nonce A `char *' pointer to the nonce value
103 const char *nonce, in digest_calc_ha1()
122 MD5Update (&md5, nonce, strlen (nonce)); in digest_calc_ha1()
135 * @param nonce nonce from server
137 * @param cnonce client nonce
146 const char *nonce, in digest_calc_response()
180 MD5Update (&md5, nonce, strle in digest_calc_response()
99 digest_calc_ha1(const char *alg, const char *username, const char *realm, const char *password, const char *nonce, const char *cnonce, char *sessionkey) digest_calc_ha1() argument
145 digest_calc_response(const char *ha1, const char *nonce, const char *noncecount, const char *cnonce, const char *qop, const char *method, const char *uri, const char *hentity, char *response) digest_calc_response() argument
301 check_nonce_nc(struct MHD_Connection *connection, const char *nonce, unsigned long int nc) check_nonce_nc() argument
397 calculate_nonce(uint32_t nonce_time, const char *method, const char *rnd, size_t rnd_size, const char *uri, const char *realm, char *nonce) calculate_nonce() argument
571 char nonce[MAX_NONCE_LENGTH]; MHD_digest_auth_check() local
808 char nonce[HASH_MD5_HEX_LEN + 9]; MHD_queue_auth_fail_response() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Daes-ccm.c28 static void aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, in aes_ccm_auth_start() argument
40 os_memcpy(&b[1], nonce, 15 - L); in aes_ccm_auth_start()
84 static void aes_ccm_encr_start(size_t L, const u8 *nonce, u8 *a) in aes_ccm_encr_start() argument
88 os_memcpy(&a[1], nonce, 15 - L); in aes_ccm_encr_start()
148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, in aes_ccm_ae() argument
163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); in aes_ccm_ae()
167 aes_ccm_encr_start(L, nonce, a); in aes_ccm_ae()
178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, in aes_ccm_ad() argument
195 aes_ccm_encr_start(L, nonce, a); in aes_ccm_ad()
201 aes_ccm_auth_start(aes, M, L, nonce, aa in aes_ccm_ad()
[all...]
H A Daes-ctr.c20 * @nonce: Nonce for counter mode (16 bytes)
25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, in aes_ctr_encrypt() argument
37 os_memcpy(counter, nonce, AES_BLOCK_SIZE); in aes_ctr_encrypt()
62 * @nonce: Nonce for counter mode (16 bytes)
67 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, in aes_128_ctr_encrypt() argument
70 return aes_ctr_encrypt(key, 16, nonce, data, data_len); in aes_128_ctr_encrypt()
H A Daes_wrap.h36 int __must_check aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce,
38 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce,
41 const u8 *nonce, size_t nonce_len,
45 const u8 *nonce, size_t nonce_len,
65 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce,
68 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Daes-ccm.c28 static void aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, in aes_ccm_auth_start() argument
40 os_memcpy(&b[1], nonce, 15 - L); in aes_ccm_auth_start()
84 static void aes_ccm_encr_start(size_t L, const u8 *nonce, u8 *a) in aes_ccm_encr_start() argument
88 os_memcpy(&a[1], nonce, 15 - L); in aes_ccm_encr_start()
148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, in aes_ccm_ae() argument
163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); in aes_ccm_ae()
167 aes_ccm_encr_start(L, nonce, a); in aes_ccm_ae()
178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, in aes_ccm_ad() argument
195 aes_ccm_encr_start(L, nonce, a); in aes_ccm_ad()
201 aes_ccm_auth_start(aes, M, L, nonce, aa in aes_ccm_ad()
[all...]
H A Daes-ctr.c20 * @nonce: Nonce for counter mode (16 bytes)
25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, in aes_ctr_encrypt() argument
37 os_memcpy(counter, nonce, AES_BLOCK_SIZE); in aes_ctr_encrypt()
62 * @nonce: Nonce for counter mode (16 bytes)
67 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, in aes_128_ctr_encrypt() argument
70 return aes_ctr_encrypt(key, 16, nonce, data, data_len); in aes_128_ctr_encrypt()
H A Daes_wrap.h36 int __must_check aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce,
38 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce,
41 const u8 *nonce, size_t nonce_len,
45 const u8 *nonce, size_t nonce_len,
65 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce,
68 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
/third_party/mbedtls/tests/src/drivers/
H A Dtest_driver_aead.c29 const uint8_t *nonce, size_t nonce_length, in mbedtls_test_transparent_aead_encrypt()
47 nonce, nonce_length, in mbedtls_test_transparent_aead_encrypt()
56 nonce, nonce_length, in mbedtls_test_transparent_aead_encrypt()
65 (void) nonce; in mbedtls_test_transparent_aead_encrypt()
85 const uint8_t *nonce, size_t nonce_length, in mbedtls_test_transparent_aead_decrypt()
103 nonce, nonce_length, in mbedtls_test_transparent_aead_decrypt()
112 nonce, nonce_length, in mbedtls_test_transparent_aead_decrypt()
121 (void) nonce; in mbedtls_test_transparent_aead_decrypt()
212 const uint8_t *nonce, in mbedtls_test_transparent_aead_set_nonce()
224 libtestdriver1_mbedtls_psa_aead_set_nonce(operation, nonce, nonce_lengt in mbedtls_test_transparent_aead_set_nonce()
25 mbedtls_test_transparent_aead_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *plaintext, size_t plaintext_length, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) mbedtls_test_transparent_aead_encrypt() argument
81 mbedtls_test_transparent_aead_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *ciphertext, size_t ciphertext_length, uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) mbedtls_test_transparent_aead_decrypt() argument
210 mbedtls_test_transparent_aead_set_nonce( mbedtls_transparent_test_driver_aead_operation_t *operation, const uint8_t *nonce, size_t nonce_length) mbedtls_test_transparent_aead_set_nonce() argument
[all...]
/third_party/curl/lib/vauth/
H A Ddigest.c260 * nonce [in/out] - The buffer where the nonce will be stored.
261 * nlen [in] - The length of the nonce buffer.
272 char *nonce, size_t nlen, in auth_decode_digest_md5_message()
283 /* Retrieve nonce string from the challenge */ in auth_decode_digest_md5_message()
284 if(!auth_digest_get_key_value(chlg, "nonce=\"", nonce, nlen, '\"')) in auth_decode_digest_md5_message()
349 char nonce[64]; in Curl_auth_create_digest_md5_message() local
362 nonce, sizeof(nonce), in Curl_auth_create_digest_md5_message()
271 auth_decode_digest_md5_message(const struct bufref *chlgref, char *nonce, size_t nlen, char *realm, size_t rlen, char *alg, size_t alen, char *qop, size_t qlen) auth_decode_digest_md5_message() argument
[all...]
/third_party/libcoap/src/oscore/
H A Doscore_cose.c242 /* return nonce length belonging to cose algorithm */
411 cose_encrypt0_set_nonce(cose_encrypt0_t *ptr, coap_bin_const_t *nonce) { in cose_encrypt0_set_nonce() argument
412 if (nonce) { in cose_encrypt0_set_nonce()
413 ptr->nonce = *nonce; in cose_encrypt0_set_nonce()
415 ptr->nonce.length = 0; in cose_encrypt0_set_nonce()
416 ptr->nonce.s = NULL; in cose_encrypt0_set_nonce()
431 if (ptr->nonce.s == NULL || in cose_encrypt0_encrypt()
432 ptr->nonce.length != (size_t)cose_nonce_len(ptr->alg)) { in cose_encrypt0_encrypt()
446 params.params.aes.nonce in cose_encrypt0_encrypt()
[all...]
/third_party/node/deps/openssl/openssl/crypto/poly1305/
H A Dpoly1305.c214 const u32 nonce[4]) in poly1305_emit()
239 /* mac = (h + nonce) % (2^128) */ in poly1305_emit()
240 h0 = (u64)(t = (u128)h0 + nonce[0] + ((u64)nonce[1]<<32)); in poly1305_emit()
241 h1 = (u64)(t = (u128)h1 + nonce[2] + ((u64)nonce[3]<<32) + (t >> 64)); in poly1305_emit()
380 const u32 nonce[4]) in poly1305_emit()
413 /* mac = (h + nonce) % (2^128) */ in poly1305_emit()
414 h0 = (u32)(t = (u64)h0 + nonce[0]); in poly1305_emit()
415 h1 = (u32)(t = (u64)h1 + (t >> 32) + nonce[ in poly1305_emit()
213 poly1305_emit(void *ctx, unsigned char mac[16], const u32 nonce[4]) poly1305_emit() argument
379 poly1305_emit(void *ctx, unsigned char mac[16], const u32 nonce[4]) poly1305_emit() argument
[all...]
/third_party/openssl/crypto/poly1305/
H A Dpoly1305.c214 const u32 nonce[4]) in poly1305_emit()
239 /* mac = (h + nonce) % (2^128) */ in poly1305_emit()
240 h0 = (u64)(t = (u128)h0 + nonce[0] + ((u64)nonce[1]<<32)); in poly1305_emit()
241 h1 = (u64)(t = (u128)h1 + nonce[2] + ((u64)nonce[3]<<32) + (t >> 64)); in poly1305_emit()
380 const u32 nonce[4]) in poly1305_emit()
413 /* mac = (h + nonce) % (2^128) */ in poly1305_emit()
414 h0 = (u32)(t = (u64)h0 + nonce[0]); in poly1305_emit()
415 h1 = (u32)(t = (u64)h1 + (t >> 32) + nonce[ in poly1305_emit()
213 poly1305_emit(void *ctx, unsigned char mac[16], const u32 nonce[4]) poly1305_emit() argument
379 poly1305_emit(void *ctx, unsigned char mac[16], const u32 nonce[4]) poly1305_emit() argument
[all...]
/third_party/mbedtls/library/
H A Dpsa_crypto_aead.c121 const uint8_t *nonce, size_t nonce_length, in mbedtls_psa_aead_encrypt()
150 nonce, nonce_length, in mbedtls_psa_aead_encrypt()
163 nonce, nonce_length, in mbedtls_psa_aead_encrypt()
178 nonce, in mbedtls_psa_aead_encrypt()
188 (void) nonce; in mbedtls_psa_aead_encrypt()
233 const uint8_t *nonce, size_t nonce_length, in mbedtls_psa_aead_decrypt()
261 nonce, nonce_length, in mbedtls_psa_aead_decrypt()
273 nonce, nonce_length, in mbedtls_psa_aead_decrypt()
289 nonce, in mbedtls_psa_aead_decrypt()
298 (void) nonce; in mbedtls_psa_aead_decrypt()
117 mbedtls_psa_aead_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *plaintext, size_t plaintext_length, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) mbedtls_psa_aead_encrypt() argument
229 mbedtls_psa_aead_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *ciphertext, size_t ciphertext_length, uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) mbedtls_psa_aead_decrypt() argument
362 mbedtls_psa_aead_set_nonce( mbedtls_psa_aead_operation_t *operation, const uint8_t *nonce, size_t nonce_length) mbedtls_psa_aead_set_nonce() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/ts/
H A Dts_req_utils.c100 int TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce) in TS_REQ_set_nonce() argument
104 if (a->nonce == nonce) in TS_REQ_set_nonce()
106 new_nonce = ASN1_INTEGER_dup(nonce); in TS_REQ_set_nonce()
111 ASN1_INTEGER_free(a->nonce); in TS_REQ_set_nonce()
112 a->nonce = new_nonce; in TS_REQ_set_nonce()
118 return a->nonce; in TS_REQ_get_nonce()
H A Dts_verify_ctx.c94 ASN1_INTEGER_free(ctx->nonce); in TS_VERIFY_CTX_cleanup()
108 const ASN1_INTEGER *nonce; in TS_REQ_to_TS_VERIFY_CTX() local
136 if ((nonce = req->nonce) != NULL) { in TS_REQ_to_TS_VERIFY_CTX()
137 if ((ret->nonce = ASN1_INTEGER_dup(nonce)) == NULL) in TS_REQ_to_TS_VERIFY_CTX()
H A Dts_rsp_utils.c251 int TS_TST_INFO_set_nonce(TS_TST_INFO *a, const ASN1_INTEGER *nonce) in TS_TST_INFO_set_nonce() argument
255 if (a->nonce == nonce) in TS_TST_INFO_set_nonce()
257 new_nonce = ASN1_INTEGER_dup(nonce); in TS_TST_INFO_set_nonce()
262 ASN1_INTEGER_free(a->nonce); in TS_TST_INFO_set_nonce()
263 a->nonce = new_nonce; in TS_TST_INFO_set_nonce()
269 return a->nonce; in TS_TST_INFO_get_nonce()
/third_party/openssl/crypto/ts/
H A Dts_req_utils.c100 int TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce) in TS_REQ_set_nonce() argument
104 if (a->nonce == nonce) in TS_REQ_set_nonce()
106 new_nonce = ASN1_INTEGER_dup(nonce); in TS_REQ_set_nonce()
111 ASN1_INTEGER_free(a->nonce); in TS_REQ_set_nonce()
112 a->nonce = new_nonce; in TS_REQ_set_nonce()
118 return a->nonce; in TS_REQ_get_nonce()
H A Dts_verify_ctx.c94 ASN1_INTEGER_free(ctx->nonce); in TS_VERIFY_CTX_cleanup()
108 const ASN1_INTEGER *nonce; in TS_REQ_to_TS_VERIFY_CTX() local
136 if ((nonce = req->nonce) != NULL) { in TS_REQ_to_TS_VERIFY_CTX()
137 if ((ret->nonce = ASN1_INTEGER_dup(nonce)) == NULL) in TS_REQ_to_TS_VERIFY_CTX()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_psk.c184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local
258 os_memset(nonce, 0, 12); in eap_psk_process_3()
259 os_memcpy(nonce + 12, pchannel, 4); in eap_psk_process_3()
269 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", in eap_psk_process_3()
270 nonce, sizeof(nonce)); in eap_psk_process_3()
282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_3()
326 /* nonce++ */ in eap_psk_process_3()
327 inc_byte_array(nonce, sizeo in eap_psk_process_3()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_psk.c184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local
258 os_memset(nonce, 0, 12); in eap_psk_process_3()
259 os_memcpy(nonce + 12, pchannel, 4); in eap_psk_process_3()
269 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", in eap_psk_process_3()
270 nonce, sizeof(nonce)); in eap_psk_process_3()
282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_3()
326 /* nonce++ */ in eap_psk_process_3()
327 inc_byte_array(nonce, sizeo in eap_psk_process_3()
[all...]
/third_party/ffmpeg/libavformat/
H A Dhttpauth.c48 } else if (!strncmp(key, "nonce=", key_len)) { in handle_digest_params()
49 *dest = digest->nonce; in handle_digest_params()
50 *dest_len = sizeof(digest->nonce); in handle_digest_params()
72 *dest = digest->nonce; in handle_digest_update()
73 *dest_len = sizeof(digest->nonce); in handle_digest_update()
155 /* Generate a client nonce. */ in make_digest_auth()
172 update_md5_strings(md5ctx, A1hash, ":", digest->nonce, ":", cnonce, NULL); in make_digest_auth()
187 update_md5_strings(md5ctx, A1hash, ":", digest->nonce, NULL); in make_digest_auth()
206 len = strlen(username) + strlen(state->realm) + strlen(digest->nonce) + in make_digest_auth()
219 av_strlcatf(authstr, len, ", nonce in make_digest_auth()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_psk.c94 u8 *buf, *pchannel, nonce[16]; in eap_psk_build_3() local
133 os_memset(nonce, 0, sizeof(nonce)); in eap_psk_build_3()
135 os_memcpy(pchannel, nonce + 12, 4); in eap_psk_build_3()
140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), in eap_psk_build_3()
333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local
365 os_memset(nonce, 0, 12); in eap_psk_process_4()
366 os_memcpy(nonce + 12, pos, 4); in eap_psk_process_4()
377 if (aes_128_eax_decrypt(data->tek, nonce, sizeo in eap_psk_process_4()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_psk.c94 u8 *buf, *pchannel, nonce[16]; in eap_psk_build_3() local
133 os_memset(nonce, 0, sizeof(nonce)); in eap_psk_build_3()
135 os_memcpy(pchannel, nonce + 12, 4); in eap_psk_build_3()
140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), in eap_psk_build_3()
333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local
365 os_memset(nonce, 0, 12); in eap_psk_process_4()
366 os_memcpy(nonce + 12, pos, 4); in eap_psk_process_4()
377 if (aes_128_eax_decrypt(data->tek, nonce, sizeo in eap_psk_process_4()
[all...]

Completed in 13 milliseconds

12345678910>>...12