/third_party/node/deps/openssl/openssl/crypto/modes/ |
H A D | ccm128.c | 30 memset(ctx->nonce.c, 0, sizeof(ctx->nonce.c)); in CRYPTO_ccm128_init() 31 ctx->nonce.c[0] = ((u8)(L - 1) & 7) | (u8)(((M - 2) / 2) & 7) << 3; in CRYPTO_ccm128_init() 39 /* Then you setup per-message nonce and pass the length of the message */ 41 const unsigned char *nonce, size_t nlen, size_t mlen) in CRYPTO_ccm128_setiv() 43 unsigned int L = ctx->nonce.c[0] & 7; /* the L parameter */ in CRYPTO_ccm128_setiv() 46 return -1; /* nonce is too short */ in CRYPTO_ccm128_setiv() 49 ctx->nonce.c[8] = (u8)(mlen >> (56 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 50 ctx->nonce.c[9] = (u8)(mlen >> (48 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 51 ctx->nonce in CRYPTO_ccm128_setiv() 40 CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, const unsigned char *nonce, size_t nlen, size_t mlen) CRYPTO_ccm128_setiv() argument [all...] |
/third_party/openssl/crypto/modes/ |
H A D | ccm128.c | 30 memset(ctx->nonce.c, 0, sizeof(ctx->nonce.c)); in CRYPTO_ccm128_init() 31 ctx->nonce.c[0] = ((u8)(L - 1) & 7) | (u8)(((M - 2) / 2) & 7) << 3; in CRYPTO_ccm128_init() 39 /* Then you setup per-message nonce and pass the length of the message */ 41 const unsigned char *nonce, size_t nlen, size_t mlen) in CRYPTO_ccm128_setiv() 43 unsigned int L = ctx->nonce.c[0] & 7; /* the L parameter */ in CRYPTO_ccm128_setiv() 46 return -1; /* nonce is too short */ in CRYPTO_ccm128_setiv() 49 ctx->nonce.c[8] = (u8)(mlen >> (56 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 50 ctx->nonce.c[9] = (u8)(mlen >> (48 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 51 ctx->nonce in CRYPTO_ccm128_setiv() 40 CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, const unsigned char *nonce, size_t nlen, size_t mlen) CRYPTO_ccm128_setiv() argument [all...] |
/third_party/skia/third_party/externals/microhttpd/src/microhttpd/ |
H A D | digestauth.c | 94 * @param nonce A `char *' pointer to the nonce value 103 const char *nonce, in digest_calc_ha1() 122 MD5Update (&md5, nonce, strlen (nonce)); in digest_calc_ha1() 135 * @param nonce nonce from server 137 * @param cnonce client nonce 146 const char *nonce, in digest_calc_response() 180 MD5Update (&md5, nonce, strle in digest_calc_response() 99 digest_calc_ha1(const char *alg, const char *username, const char *realm, const char *password, const char *nonce, const char *cnonce, char *sessionkey) digest_calc_ha1() argument 145 digest_calc_response(const char *ha1, const char *nonce, const char *noncecount, const char *cnonce, const char *qop, const char *method, const char *uri, const char *hentity, char *response) digest_calc_response() argument 301 check_nonce_nc(struct MHD_Connection *connection, const char *nonce, unsigned long int nc) check_nonce_nc() argument 397 calculate_nonce(uint32_t nonce_time, const char *method, const char *rnd, size_t rnd_size, const char *uri, const char *realm, char *nonce) calculate_nonce() argument 571 char nonce[MAX_NONCE_LENGTH]; MHD_digest_auth_check() local 808 char nonce[HASH_MD5_HEX_LEN + 9]; MHD_queue_auth_fail_response() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | aes-ccm.c | 28 static void aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, in aes_ccm_auth_start() argument 40 os_memcpy(&b[1], nonce, 15 - L); in aes_ccm_auth_start() 84 static void aes_ccm_encr_start(size_t L, const u8 *nonce, u8 *a) in aes_ccm_encr_start() argument 88 os_memcpy(&a[1], nonce, 15 - L); in aes_ccm_encr_start() 148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, in aes_ccm_ae() argument 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); in aes_ccm_ae() 167 aes_ccm_encr_start(L, nonce, a); in aes_ccm_ae() 178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, in aes_ccm_ad() argument 195 aes_ccm_encr_start(L, nonce, a); in aes_ccm_ad() 201 aes_ccm_auth_start(aes, M, L, nonce, aa in aes_ccm_ad() [all...] |
H A D | aes-ctr.c | 20 * @nonce: Nonce for counter mode (16 bytes) 25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, in aes_ctr_encrypt() argument 37 os_memcpy(counter, nonce, AES_BLOCK_SIZE); in aes_ctr_encrypt() 62 * @nonce: Nonce for counter mode (16 bytes) 67 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, in aes_128_ctr_encrypt() argument 70 return aes_ctr_encrypt(key, 16, nonce, data, data_len); in aes_128_ctr_encrypt()
|
H A D | aes_wrap.h | 36 int __must_check aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, 38 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 41 const u8 *nonce, size_t nonce_len, 45 const u8 *nonce, size_t nonce_len, 65 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 68 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | aes-ccm.c | 28 static void aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, in aes_ccm_auth_start() argument 40 os_memcpy(&b[1], nonce, 15 - L); in aes_ccm_auth_start() 84 static void aes_ccm_encr_start(size_t L, const u8 *nonce, u8 *a) in aes_ccm_encr_start() argument 88 os_memcpy(&a[1], nonce, 15 - L); in aes_ccm_encr_start() 148 int aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, in aes_ccm_ae() argument 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); in aes_ccm_ae() 167 aes_ccm_encr_start(L, nonce, a); in aes_ccm_ae() 178 int aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, in aes_ccm_ad() argument 195 aes_ccm_encr_start(L, nonce, a); in aes_ccm_ad() 201 aes_ccm_auth_start(aes, M, L, nonce, aa in aes_ccm_ad() [all...] |
H A D | aes-ctr.c | 20 * @nonce: Nonce for counter mode (16 bytes) 25 int aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, in aes_ctr_encrypt() argument 37 os_memcpy(counter, nonce, AES_BLOCK_SIZE); in aes_ctr_encrypt() 62 * @nonce: Nonce for counter mode (16 bytes) 67 int aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, in aes_128_ctr_encrypt() argument 70 return aes_ctr_encrypt(key, 16, nonce, data, data_len); in aes_128_ctr_encrypt()
|
H A D | aes_wrap.h | 36 int __must_check aes_ctr_encrypt(const u8 *key, size_t key_len, const u8 *nonce, 38 int __must_check aes_128_ctr_encrypt(const u8 *key, const u8 *nonce, 41 const u8 *nonce, size_t nonce_len, 45 const u8 *nonce, size_t nonce_len, 65 int __must_check aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, 68 int __must_check aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce,
|
/third_party/mbedtls/tests/src/drivers/ |
H A D | test_driver_aead.c | 29 const uint8_t *nonce, size_t nonce_length, in mbedtls_test_transparent_aead_encrypt() 47 nonce, nonce_length, in mbedtls_test_transparent_aead_encrypt() 56 nonce, nonce_length, in mbedtls_test_transparent_aead_encrypt() 65 (void) nonce; in mbedtls_test_transparent_aead_encrypt() 85 const uint8_t *nonce, size_t nonce_length, in mbedtls_test_transparent_aead_decrypt() 103 nonce, nonce_length, in mbedtls_test_transparent_aead_decrypt() 112 nonce, nonce_length, in mbedtls_test_transparent_aead_decrypt() 121 (void) nonce; in mbedtls_test_transparent_aead_decrypt() 212 const uint8_t *nonce, in mbedtls_test_transparent_aead_set_nonce() 224 libtestdriver1_mbedtls_psa_aead_set_nonce(operation, nonce, nonce_lengt in mbedtls_test_transparent_aead_set_nonce() 25 mbedtls_test_transparent_aead_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *plaintext, size_t plaintext_length, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) mbedtls_test_transparent_aead_encrypt() argument 81 mbedtls_test_transparent_aead_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *ciphertext, size_t ciphertext_length, uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) mbedtls_test_transparent_aead_decrypt() argument 210 mbedtls_test_transparent_aead_set_nonce( mbedtls_transparent_test_driver_aead_operation_t *operation, const uint8_t *nonce, size_t nonce_length) mbedtls_test_transparent_aead_set_nonce() argument [all...] |
/third_party/curl/lib/vauth/ |
H A D | digest.c | 260 * nonce [in/out] - The buffer where the nonce will be stored. 261 * nlen [in] - The length of the nonce buffer. 272 char *nonce, size_t nlen, in auth_decode_digest_md5_message() 283 /* Retrieve nonce string from the challenge */ in auth_decode_digest_md5_message() 284 if(!auth_digest_get_key_value(chlg, "nonce=\"", nonce, nlen, '\"')) in auth_decode_digest_md5_message() 349 char nonce[64]; in Curl_auth_create_digest_md5_message() local 362 nonce, sizeof(nonce), in Curl_auth_create_digest_md5_message() 271 auth_decode_digest_md5_message(const struct bufref *chlgref, char *nonce, size_t nlen, char *realm, size_t rlen, char *alg, size_t alen, char *qop, size_t qlen) auth_decode_digest_md5_message() argument [all...] |
/third_party/libcoap/src/oscore/ |
H A D | oscore_cose.c | 242 /* return nonce length belonging to cose algorithm */ 411 cose_encrypt0_set_nonce(cose_encrypt0_t *ptr, coap_bin_const_t *nonce) { in cose_encrypt0_set_nonce() argument 412 if (nonce) { in cose_encrypt0_set_nonce() 413 ptr->nonce = *nonce; in cose_encrypt0_set_nonce() 415 ptr->nonce.length = 0; in cose_encrypt0_set_nonce() 416 ptr->nonce.s = NULL; in cose_encrypt0_set_nonce() 431 if (ptr->nonce.s == NULL || in cose_encrypt0_encrypt() 432 ptr->nonce.length != (size_t)cose_nonce_len(ptr->alg)) { in cose_encrypt0_encrypt() 446 params.params.aes.nonce in cose_encrypt0_encrypt() [all...] |
/third_party/node/deps/openssl/openssl/crypto/poly1305/ |
H A D | poly1305.c | 214 const u32 nonce[4]) in poly1305_emit() 239 /* mac = (h + nonce) % (2^128) */ in poly1305_emit() 240 h0 = (u64)(t = (u128)h0 + nonce[0] + ((u64)nonce[1]<<32)); in poly1305_emit() 241 h1 = (u64)(t = (u128)h1 + nonce[2] + ((u64)nonce[3]<<32) + (t >> 64)); in poly1305_emit() 380 const u32 nonce[4]) in poly1305_emit() 413 /* mac = (h + nonce) % (2^128) */ in poly1305_emit() 414 h0 = (u32)(t = (u64)h0 + nonce[0]); in poly1305_emit() 415 h1 = (u32)(t = (u64)h1 + (t >> 32) + nonce[ in poly1305_emit() 213 poly1305_emit(void *ctx, unsigned char mac[16], const u32 nonce[4]) poly1305_emit() argument 379 poly1305_emit(void *ctx, unsigned char mac[16], const u32 nonce[4]) poly1305_emit() argument [all...] |
/third_party/openssl/crypto/poly1305/ |
H A D | poly1305.c | 214 const u32 nonce[4]) in poly1305_emit() 239 /* mac = (h + nonce) % (2^128) */ in poly1305_emit() 240 h0 = (u64)(t = (u128)h0 + nonce[0] + ((u64)nonce[1]<<32)); in poly1305_emit() 241 h1 = (u64)(t = (u128)h1 + nonce[2] + ((u64)nonce[3]<<32) + (t >> 64)); in poly1305_emit() 380 const u32 nonce[4]) in poly1305_emit() 413 /* mac = (h + nonce) % (2^128) */ in poly1305_emit() 414 h0 = (u32)(t = (u64)h0 + nonce[0]); in poly1305_emit() 415 h1 = (u32)(t = (u64)h1 + (t >> 32) + nonce[ in poly1305_emit() 213 poly1305_emit(void *ctx, unsigned char mac[16], const u32 nonce[4]) poly1305_emit() argument 379 poly1305_emit(void *ctx, unsigned char mac[16], const u32 nonce[4]) poly1305_emit() argument [all...] |
/third_party/mbedtls/library/ |
H A D | psa_crypto_aead.c | 121 const uint8_t *nonce, size_t nonce_length, in mbedtls_psa_aead_encrypt() 150 nonce, nonce_length, in mbedtls_psa_aead_encrypt() 163 nonce, nonce_length, in mbedtls_psa_aead_encrypt() 178 nonce, in mbedtls_psa_aead_encrypt() 188 (void) nonce; in mbedtls_psa_aead_encrypt() 233 const uint8_t *nonce, size_t nonce_length, in mbedtls_psa_aead_decrypt() 261 nonce, nonce_length, in mbedtls_psa_aead_decrypt() 273 nonce, nonce_length, in mbedtls_psa_aead_decrypt() 289 nonce, in mbedtls_psa_aead_decrypt() 298 (void) nonce; in mbedtls_psa_aead_decrypt() 117 mbedtls_psa_aead_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *plaintext, size_t plaintext_length, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) mbedtls_psa_aead_encrypt() argument 229 mbedtls_psa_aead_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *ciphertext, size_t ciphertext_length, uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) mbedtls_psa_aead_decrypt() argument 362 mbedtls_psa_aead_set_nonce( mbedtls_psa_aead_operation_t *operation, const uint8_t *nonce, size_t nonce_length) mbedtls_psa_aead_set_nonce() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/ts/ |
H A D | ts_req_utils.c | 100 int TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce) in TS_REQ_set_nonce() argument 104 if (a->nonce == nonce) in TS_REQ_set_nonce() 106 new_nonce = ASN1_INTEGER_dup(nonce); in TS_REQ_set_nonce() 111 ASN1_INTEGER_free(a->nonce); in TS_REQ_set_nonce() 112 a->nonce = new_nonce; in TS_REQ_set_nonce() 118 return a->nonce; in TS_REQ_get_nonce()
|
H A D | ts_verify_ctx.c | 94 ASN1_INTEGER_free(ctx->nonce); in TS_VERIFY_CTX_cleanup() 108 const ASN1_INTEGER *nonce; in TS_REQ_to_TS_VERIFY_CTX() local 136 if ((nonce = req->nonce) != NULL) { in TS_REQ_to_TS_VERIFY_CTX() 137 if ((ret->nonce = ASN1_INTEGER_dup(nonce)) == NULL) in TS_REQ_to_TS_VERIFY_CTX()
|
H A D | ts_rsp_utils.c | 251 int TS_TST_INFO_set_nonce(TS_TST_INFO *a, const ASN1_INTEGER *nonce) in TS_TST_INFO_set_nonce() argument 255 if (a->nonce == nonce) in TS_TST_INFO_set_nonce() 257 new_nonce = ASN1_INTEGER_dup(nonce); in TS_TST_INFO_set_nonce() 262 ASN1_INTEGER_free(a->nonce); in TS_TST_INFO_set_nonce() 263 a->nonce = new_nonce; in TS_TST_INFO_set_nonce() 269 return a->nonce; in TS_TST_INFO_get_nonce()
|
/third_party/openssl/crypto/ts/ |
H A D | ts_req_utils.c | 100 int TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce) in TS_REQ_set_nonce() argument 104 if (a->nonce == nonce) in TS_REQ_set_nonce() 106 new_nonce = ASN1_INTEGER_dup(nonce); in TS_REQ_set_nonce() 111 ASN1_INTEGER_free(a->nonce); in TS_REQ_set_nonce() 112 a->nonce = new_nonce; in TS_REQ_set_nonce() 118 return a->nonce; in TS_REQ_get_nonce()
|
H A D | ts_verify_ctx.c | 94 ASN1_INTEGER_free(ctx->nonce); in TS_VERIFY_CTX_cleanup() 108 const ASN1_INTEGER *nonce; in TS_REQ_to_TS_VERIFY_CTX() local 136 if ((nonce = req->nonce) != NULL) { in TS_REQ_to_TS_VERIFY_CTX() 137 if ((ret->nonce = ASN1_INTEGER_dup(nonce)) == NULL) in TS_REQ_to_TS_VERIFY_CTX()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local 258 os_memset(nonce, 0, 12); in eap_psk_process_3() 259 os_memcpy(nonce + 12, pchannel, 4); in eap_psk_process_3() 269 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", in eap_psk_process_3() 270 nonce, sizeof(nonce)); in eap_psk_process_3() 282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_3() 326 /* nonce++ */ in eap_psk_process_3() 327 inc_byte_array(nonce, sizeo in eap_psk_process_3() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_psk.c | 184 u8 *buf, *rpchannel, nonce[16], *decrypted; in eap_psk_process_3() local 258 os_memset(nonce, 0, 12); in eap_psk_process_3() 259 os_memcpy(nonce + 12, pchannel, 4); in eap_psk_process_3() 269 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - nonce", in eap_psk_process_3() 270 nonce, sizeof(nonce)); in eap_psk_process_3() 282 if (aes_128_eax_decrypt(data->tek, nonce, sizeof(nonce), in eap_psk_process_3() 326 /* nonce++ */ in eap_psk_process_3() 327 inc_byte_array(nonce, sizeo in eap_psk_process_3() [all...] |
/third_party/ffmpeg/libavformat/ |
H A D | httpauth.c | 48 } else if (!strncmp(key, "nonce=", key_len)) { in handle_digest_params() 49 *dest = digest->nonce; in handle_digest_params() 50 *dest_len = sizeof(digest->nonce); in handle_digest_params() 72 *dest = digest->nonce; in handle_digest_update() 73 *dest_len = sizeof(digest->nonce); in handle_digest_update() 155 /* Generate a client nonce. */ in make_digest_auth() 172 update_md5_strings(md5ctx, A1hash, ":", digest->nonce, ":", cnonce, NULL); in make_digest_auth() 187 update_md5_strings(md5ctx, A1hash, ":", digest->nonce, NULL); in make_digest_auth() 206 len = strlen(username) + strlen(state->realm) + strlen(digest->nonce) + in make_digest_auth() 219 av_strlcatf(authstr, len, ", nonce in make_digest_auth() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_psk.c | 94 u8 *buf, *pchannel, nonce[16]; in eap_psk_build_3() local 133 os_memset(nonce, 0, sizeof(nonce)); in eap_psk_build_3() 135 os_memcpy(pchannel, nonce + 12, 4); in eap_psk_build_3() 140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), in eap_psk_build_3() 333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local 365 os_memset(nonce, 0, 12); in eap_psk_process_4() 366 os_memcpy(nonce + 12, pos, 4); in eap_psk_process_4() 377 if (aes_128_eax_decrypt(data->tek, nonce, sizeo in eap_psk_process_4() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_psk.c | 94 u8 *buf, *pchannel, nonce[16]; in eap_psk_build_3() local 133 os_memset(nonce, 0, sizeof(nonce)); in eap_psk_build_3() 135 os_memcpy(pchannel, nonce + 12, 4); in eap_psk_build_3() 140 if (aes_128_eax_encrypt(data->tek, nonce, sizeof(nonce), in eap_psk_build_3() 333 u8 *decrypted, nonce[16]; in eap_psk_process_4() local 365 os_memset(nonce, 0, 12); in eap_psk_process_4() 366 os_memcpy(nonce + 12, pos, 4); in eap_psk_process_4() 377 if (aes_128_eax_decrypt(data->tek, nonce, sizeo in eap_psk_process_4() [all...] |