/third_party/node/deps/ngtcp2/ngtcp2/crypto/wolfssl/ |
H A D | wolfssl.c | 46 ngtcp2_crypto_aead *ngtcp2_crypto_aead_aes_128_gcm(ngtcp2_crypto_aead *aead) { in ngtcp2_crypto_aead_aes_128_gcm() argument 47 return ngtcp2_crypto_aead_init(aead, (void *)wolfSSL_EVP_aes_128_gcm()); in ngtcp2_crypto_aead_aes_128_gcm() 56 ngtcp2_crypto_aead_init(&ctx->aead, (void *)wolfSSL_EVP_aes_128_gcm()); in ngtcp2_crypto_ctx_initial() 64 ngtcp2_crypto_aead *ngtcp2_crypto_aead_init(ngtcp2_crypto_aead *aead, in ngtcp2_crypto_aead_init() argument 66 aead->native_handle = aead_native_handle; in ngtcp2_crypto_aead_init() 67 aead->max_overhead = wolfSSL_quic_get_aead_tag_len( in ngtcp2_crypto_aead_init() 69 return aead; in ngtcp2_crypto_aead_init() 72 ngtcp2_crypto_aead *ngtcp2_crypto_aead_retry(ngtcp2_crypto_aead *aead) { in ngtcp2_crypto_aead_retry() argument 73 return ngtcp2_crypto_aead_init(aead, (void *)wolfSSL_EVP_aes_128_gcm()); in ngtcp2_crypto_aead_retry() 77 const WOLFSSL_EVP_CIPHER *aead in crypto_wolfssl_get_aead_max_encryption() local 92 const WOLFSSL_EVP_CIPHER *aead = wolfSSL_quic_get_aead(ssl); crypto_wolfssl_get_aead_max_decryption_failure() local 132 crypto_aead_keylen(const WOLFSSL_EVP_CIPHER *aead) crypto_aead_keylen() argument 136 ngtcp2_crypto_aead_keylen(const ngtcp2_crypto_aead *aead) ngtcp2_crypto_aead_keylen() argument 140 crypto_aead_noncelen(const WOLFSSL_EVP_CIPHER *aead) crypto_aead_noncelen() argument 144 ngtcp2_crypto_aead_noncelen(const ngtcp2_crypto_aead *aead) ngtcp2_crypto_aead_noncelen() argument 148 ngtcp2_crypto_aead_ctx_encrypt_init(ngtcp2_crypto_aead_ctx *aead_ctx, const ngtcp2_crypto_aead *aead, const uint8_t *key, size_t noncelen) ngtcp2_crypto_aead_ctx_encrypt_init() argument 165 ngtcp2_crypto_aead_ctx_decrypt_init(ngtcp2_crypto_aead_ctx *aead_ctx, const ngtcp2_crypto_aead *aead, const uint8_t *key, size_t noncelen) ngtcp2_crypto_aead_ctx_decrypt_init() argument 241 ngtcp2_crypto_encrypt(uint8_t *dest, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *plaintext, size_t plaintextlen, const uint8_t *nonce, size_t noncelen, const uint8_t *aad, size_t aadlen) ngtcp2_crypto_encrypt() argument 257 ngtcp2_crypto_decrypt(uint8_t *dest, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *ciphertext, size_t ciphertextlen, const uint8_t *nonce, size_t noncelen, const uint8_t *aad, size_t aadlen) ngtcp2_crypto_decrypt() argument [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/crypto/ |
H A D | shared.c | 130 size_t ngtcp2_crypto_packet_protection_ivlen(const ngtcp2_crypto_aead *aead) { in ngtcp2_crypto_packet_protection_ivlen() argument 131 size_t noncelen = ngtcp2_crypto_aead_noncelen(aead); in ngtcp2_crypto_packet_protection_ivlen() 137 const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_md *md, in ngtcp2_crypto_derive_packet_protection_key() 145 size_t keylen = ngtcp2_crypto_aead_keylen(aead); in ngtcp2_crypto_derive_packet_protection_key() 146 size_t ivlen = ngtcp2_crypto_packet_protection_ivlen(aead); in ngtcp2_crypto_derive_packet_protection_key() 211 const ngtcp2_crypto_aead *aead; in ngtcp2_crypto_derive_and_install_rx_key() local 257 if (!ctx->aead.native_handle) { in ngtcp2_crypto_derive_and_install_rx_key() 264 aead = &ctx->aead; in ngtcp2_crypto_derive_and_install_rx_key() 267 ivlen = ngtcp2_crypto_packet_protection_ivlen(aead); in ngtcp2_crypto_derive_and_install_rx_key() 135 ngtcp2_crypto_derive_packet_protection_key( uint8_t *key, uint8_t *iv, uint8_t *hp_key, uint32_t version, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_md *md, const uint8_t *secret, size_t secretlen) ngtcp2_crypto_derive_packet_protection_key() argument 352 const ngtcp2_crypto_aead *aead; ngtcp2_crypto_derive_and_install_tx_key() local 723 const ngtcp2_crypto_aead *aead = &ctx->aead; ngtcp2_crypto_update_key() local 763 ngtcp2_crypto_encrypt_cb(uint8_t *dest, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *plaintext, size_t plaintextlen, const uint8_t *nonce, size_t noncelen, const uint8_t *aad, size_t aadlen) ngtcp2_crypto_encrypt_cb() argument 775 ngtcp2_crypto_decrypt_cb(uint8_t *dest, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *ciphertext, size_t ciphertextlen, const uint8_t *nonce, size_t noncelen, const uint8_t *aad, size_t aadlen) ngtcp2_crypto_decrypt_cb() argument 906 ngtcp2_crypto_aead aead; ngtcp2_crypto_generate_retry_token() local 985 ngtcp2_crypto_aead aead; ngtcp2_crypto_verify_retry_token() local 1089 ngtcp2_crypto_aead aead; ngtcp2_crypto_generate_regular_token() local 1162 ngtcp2_crypto_aead aead; ngtcp2_crypto_verify_regular_token() local 1280 ngtcp2_crypto_aead aead; ngtcp2_crypto_write_retry() local [all...] |
H A D | shared.h | 86 * `ngtcp2_crypto_aead_init` initializes |aead| with the provided 98 ngtcp2_crypto_aead *ngtcp2_crypto_aead_init(ngtcp2_crypto_aead *aead, 104 * `ngtcp2_crypto_aead_retry` initializes |aead| with the AEAD cipher 107 ngtcp2_crypto_aead *ngtcp2_crypto_aead_retry(ngtcp2_crypto_aead *aead); 137 * `ngtcp2_crypto_aead_keylen(aead) <ngtcp2_crypto_aead_keylen>` 140 * derived IV is `ngtcp2_crypto_packet_protection_ivlen(aead) 146 * The length of derived key is `ngtcp2_crypto_aead_keylen(aead) 154 const ngtcp2_crypto_aead *aead, 340 ngtcp2_crypto_aead *ngtcp2_crypto_aead_aes_128_gcm(ngtcp2_crypto_aead *aead);
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/picotls/ |
H A D | picotls.c | 40 ngtcp2_crypto_aead *ngtcp2_crypto_aead_aes_128_gcm(ngtcp2_crypto_aead *aead) { in ngtcp2_crypto_aead_aes_128_gcm() argument 41 return ngtcp2_crypto_aead_init(aead, (void *)&ptls_openssl_aes128gcm); in ngtcp2_crypto_aead_aes_128_gcm() 50 ngtcp2_crypto_aead_init(&ctx->aead, (void *)&ptls_openssl_aes128gcm); in ngtcp2_crypto_ctx_initial() 58 ngtcp2_crypto_aead *ngtcp2_crypto_aead_init(ngtcp2_crypto_aead *aead, in ngtcp2_crypto_aead_init() argument 62 aead->native_handle = aead_native_handle; in ngtcp2_crypto_aead_init() 63 aead->max_overhead = alg->tag_size; in ngtcp2_crypto_aead_init() 64 return aead; in ngtcp2_crypto_aead_init() 67 ngtcp2_crypto_aead *ngtcp2_crypto_aead_retry(ngtcp2_crypto_aead *aead) { in ngtcp2_crypto_aead_retry() argument 68 return ngtcp2_crypto_aead_init(aead, (void *)&ptls_openssl_aes128gcm); in ngtcp2_crypto_aead_retry() 74 return cs->aead; in crypto_ptls_get_aead() 157 crypto_aead_keylen(const ptls_aead_algorithm_t *aead) crypto_aead_keylen() argument 161 ngtcp2_crypto_aead_keylen(const ngtcp2_crypto_aead *aead) ngtcp2_crypto_aead_keylen() argument 165 crypto_aead_noncelen(const ptls_aead_algorithm_t *aead) crypto_aead_noncelen() argument 169 ngtcp2_crypto_aead_noncelen(const ngtcp2_crypto_aead *aead) ngtcp2_crypto_aead_noncelen() argument 173 ngtcp2_crypto_aead_ctx_encrypt_init(ngtcp2_crypto_aead_ctx *aead_ctx, const ngtcp2_crypto_aead *aead, const uint8_t *key, size_t noncelen) ngtcp2_crypto_aead_ctx_encrypt_init() argument 194 ngtcp2_crypto_aead_ctx_decrypt_init(ngtcp2_crypto_aead_ctx *aead_ctx, const ngtcp2_crypto_aead *aead, const uint8_t *key, size_t noncelen) ngtcp2_crypto_aead_ctx_decrypt_init() argument 298 ngtcp2_crypto_encrypt(uint8_t *dest, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *plaintext, size_t plaintextlen, const uint8_t *nonce, size_t noncelen, const uint8_t *aad, size_t aadlen) ngtcp2_crypto_encrypt() argument 317 ngtcp2_crypto_decrypt(uint8_t *dest, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *ciphertext, size_t ciphertextlen, const uint8_t *nonce, size_t noncelen, const uint8_t *aad, size_t aadlen) ngtcp2_crypto_decrypt() argument [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/crypto/boringssl/ |
H A D | boringssl.c | 66 ngtcp2_crypto_aead *ngtcp2_crypto_aead_aes_128_gcm(ngtcp2_crypto_aead *aead) { in ngtcp2_crypto_aead_aes_128_gcm() argument 67 return ngtcp2_crypto_aead_init(aead, (void *)EVP_aead_aes_128_gcm()); in ngtcp2_crypto_aead_aes_128_gcm() 76 ngtcp2_crypto_aead_init(&ctx->aead, (void *)EVP_aead_aes_128_gcm()); in ngtcp2_crypto_ctx_initial() 84 ngtcp2_crypto_aead *ngtcp2_crypto_aead_init(ngtcp2_crypto_aead *aead, in ngtcp2_crypto_aead_init() argument 86 aead->native_handle = aead_native_handle; in ngtcp2_crypto_aead_init() 87 aead->max_overhead = EVP_AEAD_max_overhead(aead->native_handle); in ngtcp2_crypto_aead_init() 88 return aead; in ngtcp2_crypto_aead_init() 91 ngtcp2_crypto_aead *ngtcp2_crypto_aead_retry(ngtcp2_crypto_aead *aead) { in ngtcp2_crypto_aead_retry() argument 92 return ngtcp2_crypto_aead_init(aead, (voi in ngtcp2_crypto_aead_retry() 181 crypto_aead_keylen(const EVP_AEAD *aead) crypto_aead_keylen() argument 185 ngtcp2_crypto_aead_keylen(const ngtcp2_crypto_aead *aead) ngtcp2_crypto_aead_keylen() argument 189 crypto_aead_noncelen(const EVP_AEAD *aead) crypto_aead_noncelen() argument 193 ngtcp2_crypto_aead_noncelen(const ngtcp2_crypto_aead *aead) ngtcp2_crypto_aead_noncelen() argument 197 ngtcp2_crypto_aead_ctx_encrypt_init(ngtcp2_crypto_aead_ctx *aead_ctx, const ngtcp2_crypto_aead *aead, const uint8_t *key, size_t noncelen) ngtcp2_crypto_aead_ctx_encrypt_init() argument 216 ngtcp2_crypto_aead_ctx_decrypt_init(ngtcp2_crypto_aead_ctx *aead_ctx, const ngtcp2_crypto_aead *aead, const uint8_t *key, size_t noncelen) ngtcp2_crypto_aead_ctx_decrypt_init() argument 324 ngtcp2_crypto_encrypt(uint8_t *dest, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *plaintext, size_t plaintextlen, const uint8_t *nonce, size_t noncelen, const uint8_t *aad, size_t aadlen) ngtcp2_crypto_encrypt() argument 342 ngtcp2_crypto_decrypt(uint8_t *dest, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *ciphertext, size_t ciphertextlen, const uint8_t *nonce, size_t noncelen, const uint8_t *aad, size_t aadlen) ngtcp2_crypto_decrypt() argument [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/crypto/openssl/ |
H A D | openssl.c | 45 static size_t crypto_aead_max_overhead(const EVP_CIPHER *aead) { in crypto_aead_max_overhead() argument 46 switch (EVP_CIPHER_nid(aead)) { in crypto_aead_max_overhead() 60 ngtcp2_crypto_aead *ngtcp2_crypto_aead_aes_128_gcm(ngtcp2_crypto_aead *aead) { in ngtcp2_crypto_aead_aes_128_gcm() argument 61 return ngtcp2_crypto_aead_init(aead, (void *)EVP_aes_128_gcm()); in ngtcp2_crypto_aead_aes_128_gcm() 70 ngtcp2_crypto_aead_init(&ctx->aead, (void *)EVP_aes_128_gcm()); in ngtcp2_crypto_ctx_initial() 78 ngtcp2_crypto_aead *ngtcp2_crypto_aead_init(ngtcp2_crypto_aead *aead, in ngtcp2_crypto_aead_init() argument 80 aead->native_handle = aead_native_handle; in ngtcp2_crypto_aead_init() 81 aead->max_overhead = crypto_aead_max_overhead(aead_native_handle); in ngtcp2_crypto_aead_init() 82 return aead; in ngtcp2_crypto_aead_init() 85 ngtcp2_crypto_aead *ngtcp2_crypto_aead_retry(ngtcp2_crypto_aead *aead) { in ngtcp2_crypto_aead_retry() argument 183 crypto_aead_keylen(const EVP_CIPHER *aead) crypto_aead_keylen() argument 187 ngtcp2_crypto_aead_keylen(const ngtcp2_crypto_aead *aead) ngtcp2_crypto_aead_keylen() argument 191 crypto_aead_noncelen(const EVP_CIPHER *aead) crypto_aead_noncelen() argument 195 ngtcp2_crypto_aead_noncelen(const ngtcp2_crypto_aead *aead) ngtcp2_crypto_aead_noncelen() argument 199 ngtcp2_crypto_aead_ctx_encrypt_init(ngtcp2_crypto_aead_ctx *aead_ctx, const ngtcp2_crypto_aead *aead, const uint8_t *key, size_t noncelen) ngtcp2_crypto_aead_ctx_encrypt_init() argument 246 ngtcp2_crypto_aead_ctx_decrypt_init(ngtcp2_crypto_aead_ctx *aead_ctx, const ngtcp2_crypto_aead *aead, const uint8_t *key, size_t noncelen) ngtcp2_crypto_aead_ctx_decrypt_init() argument 488 ngtcp2_crypto_encrypt(uint8_t *dest, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *plaintext, size_t plaintextlen, const uint8_t *nonce, size_t noncelen, const uint8_t *aad, size_t aadlen) ngtcp2_crypto_encrypt() argument 527 ngtcp2_crypto_decrypt(uint8_t *dest, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *ciphertext, size_t ciphertextlen, const uint8_t *nonce, size_t noncelen, const uint8_t *aad, size_t aadlen) ngtcp2_crypto_decrypt() argument [all...] |
/third_party/node/deps/ngtcp2/ngtcp2/lib/ |
H A D | ngtcp2_ppe.c | 51 if (ngtcp2_buf_left(buf) < cc->aead.max_overhead) { in ngtcp2_ppe_encode_hd() 62 buf->last, ngtcp2_buf_left(buf) - cc->aead.max_overhead, hd); in ngtcp2_ppe_encode_hd() 66 buf->last, ngtcp2_buf_left(buf) - cc->aead.max_overhead, hd); in ngtcp2_ppe_encode_hd() 89 if (ngtcp2_buf_left(buf) < cc->aead.max_overhead) { in ngtcp2_ppe_encode_frame() 94 buf->last, ngtcp2_buf_left(buf) - cc->aead.max_overhead, fr); in ngtcp2_ppe_encode_frame() 120 (uint16_t)(payloadlen + ppe->pkt_numlen + cc->aead.max_overhead)); in ngtcp2_ppe_final() 126 rv = cc->encrypt(payload, &cc->aead, &cc->ckm->aead_ctx, payload, payloadlen, in ngtcp2_ppe_final() 132 buf->last = payload + payloadlen + cc->aead.max_overhead; in ngtcp2_ppe_final() 164 if (ngtcp2_buf_left(&ppe->buf) < cc->aead.max_overhead) { in ngtcp2_ppe_left() 168 return ngtcp2_buf_left(&ppe->buf) - cc->aead in ngtcp2_ppe_left() [all...] |
H A D | ngtcp2_crypto.h | 118 ngtcp2_crypto_aead aead; member
|
H A D | ngtcp2_conn.c | 2597 cc.aead = pktns->crypto.ctx.aead; in conn_write_handshake_pkt() 3542 cc->aead = pktns->crypto.ctx.aead; in conn_write_pkt() 3569 cc->aead = conn->early.ctx.aead; in conn_write_pkt() 4367 cc.aead = pktns->crypto.ctx.aead; in ngtcp2_conn_write_single_frame_pkt() 5681 static ngtcp2_ssize decrypt_pkt(uint8_t *dest, const ngtcp2_crypto_aead *aead, in decrypt_pkt() argument 5694 rv = decrypt(dest, aead, in decrypt_pkt() 6159 ngtcp2_crypto_aead *aead; conn_recv_handshake_pkt() local 8758 ngtcp2_crypto_aead *aead; conn_recv_pkt() local 13240 ngtcp2_conn_set_retry_aead(ngtcp2_conn *conn, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx) ngtcp2_conn_set_retry_aead() argument 13422 ngtcp2_pkt_write_connection_close( uint8_t *dest, size_t destlen, uint32_t version, const ngtcp2_cid *dcid, const ngtcp2_cid *scid, uint64_t error_code, const uint8_t *reason, size_t reasonlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx, const uint8_t *iv, ngtcp2_hp_mask hp_mask, const ngtcp2_crypto_cipher *hp, const ngtcp2_crypto_cipher_ctx *hp_ctx) ngtcp2_pkt_write_connection_close() argument [all...] |
H A D | ngtcp2_pkt.h | 1209 * be specified. |aead| must be AEAD_AES_128_GCM. 1220 const ngtcp2_crypto_aead *aead,
|
H A D | ngtcp2_pkt.c | 2253 size_t tokenlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead, in ngtcp2_pkt_write_retry() 2301 rv = encrypt(tag, aead, aead_ctx, (const uint8_t *)"", 0, nonce, noncelen, in ngtcp2_pkt_write_retry() 2355 const ngtcp2_crypto_aead *aead, in ngtcp2_pkt_verify_retry_tag() 2393 rv = encrypt(tag, aead, aead_ctx, (const uint8_t *)"", 0, nonce, noncelen, in ngtcp2_pkt_verify_retry_tag() 2250 ngtcp2_pkt_write_retry( uint8_t *dest, size_t destlen, uint32_t version, const ngtcp2_cid *dcid, const ngtcp2_cid *scid, const ngtcp2_cid *odcid, const uint8_t *token, size_t tokenlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx) ngtcp2_pkt_write_retry() argument 2352 ngtcp2_pkt_verify_retry_tag(uint32_t version, const ngtcp2_pkt_retry *retry, const uint8_t *pkt, size_t pktlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead, const ngtcp2_crypto_aead_ctx *aead_ctx) ngtcp2_pkt_verify_retry_tag() argument
|
/third_party/node/deps/ngtcp2/ngtcp2/crypto/includes/ngtcp2/ |
H A D | ngtcp2_crypto.h | 121 * `ngtcp2_crypto_aead_keylen` returns the length of key for |aead|. 123 NGTCP2_EXTERN size_t ngtcp2_crypto_aead_keylen(const ngtcp2_crypto_aead *aead); 129 * |aead|. 132 ngtcp2_crypto_aead_noncelen(const ngtcp2_crypto_aead *aead); 221 ngtcp2_crypto_packet_protection_ivlen(const ngtcp2_crypto_aead *aead); 229 * :member:`aead->max_overhead <ngtcp2_crypto_aead.max_overhead>` 237 const ngtcp2_crypto_aead *aead, 255 ngtcp2_crypto_encrypt_cb(uint8_t *dest, const ngtcp2_crypto_aead *aead, 267 * :member:`aead->max_overhead <ngtcp2_crypto_aead.max_overhead>` 275 const ngtcp2_crypto_aead *aead, [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon_block.c | 33 int aead, 152 * aead: whether this is an aead cipher 162 int aead) in ossl_cipher_tlsunpadblock() 184 aead, libctx); in ossl_cipher_tlsunpadblock() 158 ossl_cipher_tlsunpadblock(OSSL_LIB_CTX *libctx, unsigned int tlsversion, unsigned char *buf, size_t *buflen, size_t blocksize, unsigned char **mac, int *alloced, size_t macsize, int aead) ossl_cipher_tlsunpadblock() argument
|
/third_party/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon_block.c | 33 int aead, 152 * aead: whether this is an aead cipher 162 int aead) in ossl_cipher_tlsunpadblock() 184 aead, libctx); in ossl_cipher_tlsunpadblock() 158 ossl_cipher_tlsunpadblock(OSSL_LIB_CTX *libctx, unsigned int tlsversion, unsigned char *buf, size_t *buflen, size_t blocksize, unsigned char **mac, int *alloced, size_t macsize, int aead) ossl_cipher_tlsunpadblock() argument
|
/third_party/node/deps/openssl/openssl/ssl/record/ |
H A D | tls_pad.c | 48 int aead, 62 * aead: 1 if an AEAD cipher is in use, or 0 otherwise 107 * aead: 1 if an AEAD cipher is in use, or 0 otherwise 119 int aead, in tls1_cbc_remove_padding_and_mac() 138 if (aead) { in tls1_cbc_remove_padding_and_mac() 113 tls1_cbc_remove_padding_and_mac(size_t *reclen, size_t origreclen, unsigned char *recdata, unsigned char **mac, int *alloced, size_t block_size, size_t mac_size, int aead, OSSL_LIB_CTX *libctx) tls1_cbc_remove_padding_and_mac() argument
|
H A D | record_local.h | 123 int aead,
|
/third_party/openssl/ssl/record/ |
H A D | tls_pad.c | 48 int aead, 62 * aead: 1 if an AEAD cipher is in use, or 0 otherwise 107 * aead: 1 if an AEAD cipher is in use, or 0 otherwise 119 int aead, in tls1_cbc_remove_padding_and_mac() 138 if (aead) { in tls1_cbc_remove_padding_and_mac() 113 tls1_cbc_remove_padding_and_mac(size_t *reclen, size_t origreclen, unsigned char *recdata, unsigned char **mac, int *alloced, size_t block_size, size_t mac_size, int aead, OSSL_LIB_CTX *libctx) tls1_cbc_remove_padding_and_mac() argument
|
H A D | record_local.h | 123 int aead,
|
/third_party/node/deps/ngtcp2/ngtcp2/lib/includes/ngtcp2/ |
H A D | ngtcp2.h | 2168 * :member:`aead` is AEAD object. 2170 ngtcp2_crypto_aead aead; member 2668 * AEAD cipher is |aead|. |aead_ctx| is the AEAD cipher context 2684 typedef int (*ngtcp2_encrypt)(uint8_t *dest, const ngtcp2_crypto_aead *aead, 2696 * AEAD cipher is |aead|. |aead_ctx| is the AEAD cipher context 2713 typedef int (*ngtcp2_decrypt)(uint8_t *dest, const ngtcp2_crypto_aead *aead, 3607 size_t reasonlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead, 3621 * specifies Retry Token, and |tokenlen| specifies its length. |aead| 3639 size_t tokenlen, ngtcp2_encrypt encrypt, const ngtcp2_crypto_aead *aead, 5078 * `ngtcp2_conn_set_retry_aead` sets |aead| an [all...] |
/third_party/openssl/test/ |
H A D | evp_test.c | 523 int aead; member 584 cdat->aead = m != 0 ? m : -1; in cipher_test_init() 586 cdat->aead = 0; in cipher_test_init() 641 if (cdat->aead) { in cipher_test_parse() 757 if (expected->aead) { in cipher_test_enc() 768 if (expected->aead && !expected->tls_aad) { in cipher_test_enc() 774 if (enc || expected->aead == EVP_CIPH_OCB_MODE || expected->tag_late) { in cipher_test_enc() 781 if (tag || expected->aead != EVP_CIPH_GCM_MODE) { in cipher_test_enc() 858 if (expected->aead == EVP_CIPH_CCM_MODE) { in cipher_test_enc() 915 } else if (!enc && (expected->aead in cipher_test_enc() [all...] |
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | evp_lib.c | 343 int ok, aead = 0, custom_iv = 0, cts = 0, multiblock = 0, randkey = 0; in evp_cipher_cache_constants() local 354 params[4] = OSSL_PARAM_construct_int(OSSL_CIPHER_PARAM_AEAD, &aead); in evp_cipher_cache_constants() 369 if (aead) in evp_cipher_cache_constants()
|
/third_party/openssl/crypto/evp/ |
H A D | evp_lib.c | 343 int ok, aead = 0, custom_iv = 0, cts = 0, multiblock = 0, randkey = 0; in evp_cipher_cache_constants() local 354 params[4] = OSSL_PARAM_construct_int(OSSL_CIPHER_PARAM_AEAD, &aead); in evp_cipher_cache_constants() 369 if (aead) in evp_cipher_cache_constants()
|
/third_party/curl/lib/ |
H A D | Makefile.mk | 193 ifneq ($(wildcard $(OPENSSL_INCLUDE)/openssl/aead.h),)
|
/third_party/mbedtls/include/psa/ |
H A D | crypto_se_driver.h | 1323 const psa_drv_se_aead_t *MBEDTLS_PRIVATE(aead);
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | speed.c | 244 {"aead", OPT_AEAD, '-', 1369 int ret = 1, misalign = 0, lengths_single = 0, aead = 0; in speed_main() local 1629 aead = 1; in speed_main() 1743 if (aead) { in speed_main() 1745 BIO_printf(bio_err, "-aead can be used only with an AEAD cipher\n"); in speed_main() 2227 } else if (aead && (EVP_CIPHER_get_flags(evp_cipher) & in speed_main()
|