/openssl/ssl/record/methods/ |
H A D | tls13_meth.c | 92 size_t nonce_len, offset, loop, hdrlen, taglen; in tls13_cipher() local 132 nonce_len = EVP_MAC_CTX_get_mac_size(rl->mac_ctx); in tls13_cipher() 141 nonce_len = (size_t)ivlen; in tls13_cipher() 155 if (nonce_len < SEQ_NUM_SIZE) { in tls13_cipher() 160 offset = nonce_len - SEQ_NUM_SIZE; in tls13_cipher() 187 || !EVP_MAC_update(mac_ctx, nonce, nonce_len) in tls13_cipher()
|
/openssl/providers/implementations/rands/ |
H A D | test_rng.c | 49 size_t entropy_len, entropy_pos, nonce_len; member 178 memcpy(out, t->nonce, t->nonce_len); in test_rng_nonce() 179 return t->nonce_len; in test_rng_nonce() 256 t->nonce_len = size; in test_rng_set_ctx_params()
|
H A D | drbg_hmac.c | 116 const unsigned char *nonce, size_t nonce_len, in ossl_drbg_hmac_init() argument 129 return drbg_hmac_update(hmac, ent, ent_len, nonce, nonce_len, pstr, in ossl_drbg_hmac_init() 134 const unsigned char *nonce, size_t nonce_len, in drbg_hmac_instantiate() argument 138 nonce, nonce_len, pstr, pstr_len); in drbg_hmac_instantiate()
|
H A D | drbg_hash.c | 252 const unsigned char *nonce, size_t nonce_len, in drbg_hash_instantiate() argument 263 ent, ent_len, nonce, nonce_len, pstr, pstr_len) in drbg_hash_instantiate()
|
/openssl/crypto/evp/ |
H A D | e_chacha20_poly1305.c | 159 int aad, mac_inited, tag_len, nonce_len; member 186 if (actx->nonce_len <= CHACHA_CTR_SIZE) in chacha20_poly1305_init_key() 187 memcpy(temp + CHACHA_CTR_SIZE - actx->nonce_len, iv, in chacha20_poly1305_init_key() 188 actx->nonce_len); in chacha20_poly1305_init_key() 515 actx->nonce_len = 12; in chacha20_poly1305_ctrl() 534 *(int *)ptr = actx->nonce_len; in chacha20_poly1305_ctrl() 540 actx->nonce_len = arg; in chacha20_poly1305_ctrl()
|
/openssl/providers/implementations/include/prov/ |
H A D | hmac_drbg.h | 27 const unsigned char *nonce, size_t nonce_len,
|
/openssl/ssl/quic/ |
H A D | quic_record_tx.c | 493 int l = 0, l2 = 0, nonce_len; in qtx_encrypt_into_txe() local 527 nonce_len = EVP_CIPHER_CTX_get_iv_length(cctx); in qtx_encrypt_into_txe() 528 if (!ossl_assert(nonce_len >= (int)sizeof(QUIC_PN))) { in qtx_encrypt_into_txe() 533 memcpy(nonce, el->iv[0], (size_t)nonce_len); in qtx_encrypt_into_txe() 535 nonce[nonce_len - i - 1] ^= (unsigned char)(pn >> (i * 8)); in qtx_encrypt_into_txe()
|
H A D | quic_record_rx.c | 667 int l = 0, l2 = 0, is_old_key, nonce_len; in qrx_decrypt_pkt_body() local 712 nonce_len = EVP_CIPHER_CTX_get_iv_length(cctx); in qrx_decrypt_pkt_body() 713 if (!ossl_assert(nonce_len >= (int)sizeof(QUIC_PN))) in qrx_decrypt_pkt_body() 716 memcpy(nonce, el->iv[cctx_idx], nonce_len); in qrx_decrypt_pkt_body() 718 nonce[nonce_len - i - 1] ^= (unsigned char)(pn >> (i * 8)); in qrx_decrypt_pkt_body()
|
/openssl/providers/fips/ |
H A D | self_test_kats.c | 24 const unsigned char *nonce, size_t nonce_len, 475 t->nonce, t->nonce_len, t->persstr, t->persstr_len)) in self_test_digest_sign() 658 const unsigned char *nonce, size_t nonce_len, in set_kat_drbg() argument 704 (void *)nonce, nonce_len); in set_kat_drbg()
|
H A D | self_test_data.inc | 129 size_t nonce_len;
|
/openssl/test/ |
H A D | cmp_vfy_test.c | 477 int nonce_len = OSSL_CMP_SENDERNONCE_LENGTH; in setup_check_update() local 486 nonce_data, nonce_len))) { in setup_check_update()
|
H A D | evp_test.c | 3281 size_t entropy_len, nonce_len, pers_len, addinA_len, addinB_len, member 3389 return parse_bin(value, &item->nonce, &item->nonce_len); in rand_test_parse() 3482 z, item->nonce_len); in rand_test_run()
|
H A D | acvp_test.c | 1606 tst->nonce_len); in drbg_test()
|
H A D | acvp_test.inc | 2141 size_t nonce_len;
|