/netbsd-current/external/bsd/wpa/dist/src/crypto/ |
H A D | aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, argument 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
H A D | aes_wrap.h | 41 const u8 *nonce, size_t nonce_len, 45 const u8 *nonce, size_t nonce_len,
|
/netbsd-current/crypto/external/bsd/openssl/dist/providers/implementations/rands/ |
H A D | test_rng.c | 46 size_t entropy_len, entropy_pos, nonce_len; member in struct:__anon549 136 memcpy(out, t->nonce, t->nonce_len); 137 return t->nonce_len; 202 t->nonce_len = size;
|
H A D | drbg_hash.c | 243 * nonce is a string of bytes of length nonce_len. 250 const unsigned char *nonce, size_t nonce_len, 261 ent, ent_len, nonce, nonce_len, pstr, pstr_len) 248 drbg_hash_instantiate(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, const unsigned char *nonce, size_t nonce_len, const unsigned char *pstr, size_t pstr_len) argument
|
H A D | drbg_hmac.c | 117 * nonce = nonce data (Can be NULL) of length nonce_len. 124 const unsigned char *nonce, size_t nonce_len, 139 return drbg_hmac_update(drbg, ent, ent_len, nonce, nonce_len, pstr, 122 drbg_hmac_instantiate(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, const unsigned char *nonce, size_t nonce_len, const unsigned char *pstr, size_t pstr_len) argument
|
/netbsd-current/external/bsd/wpa/dist/src/eap_common/ |
H A D | eap_eke_common.c | 494 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; 505 os_memcpy(pos, nonce_p, sess->nonce_len); 506 pos += sess->nonce_len; 507 os_memcpy(pos, nonce_s, sess->nonce_len); 539 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len; 550 os_memcpy(pos, nonce_p, sess->nonce_len); 551 pos += sess->nonce_len; 552 os_memcpy(pos, nonce_s, sess->nonce_len); 708 sess->nonce_len = eap_eke_nonce_len(prf); 713 if (sess->prf_len < 0 || sess->nonce_len < [all...] |
H A D | eap_eke_common.h | 74 int nonce_len; member in struct:eap_eke_session
|
H A D | ikev2_common.h | 290 const u8 *nonce, size_t nonce_len, 309 size_t nonce_len; member in struct:ikev2_payloads
|
H A D | ikev2_common.c | 318 payloads->nonce_len = pdatalen; 373 const u8 *nonce, size_t nonce_len, 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 409 os_memcpy(pos, nonce, nonce_len); 410 pos += nonce_len; 369 ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg, const u8 *ID, size_t ID_len, u8 ID_type, struct ikev2_keys *keys, int initiator, const u8 *shared_secret, size_t shared_secret_len, const u8 *nonce, size_t nonce_len, const u8 *key_pad, size_t key_pad_len, u8 *auth_data) argument
|
/netbsd-current/external/bsd/wpa/dist/src/eap_server/ |
H A D | eap_server_eke.c | 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { 326 data->nonce_s, data->sess.nonce_len); 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, 330 data->sess.nonce_len); 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, 569 if (decrypt_len < (size_t) data->sess.nonce_len) { 575 data->nonce_p, data->sess.nonce_len); 618 if (decrypt_len < (size_t) data->sess.nonce_len) { 624 nonce, data->sess.nonce_len); [all...] |
H A D | ikev2.c | 487 ikev2_process_nr(data, pl->nonce, pl->nonce_len) < 0)
|
/netbsd-current/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_eke.c | 464 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) { 470 data->nonce_p, data->sess.nonce_len); 472 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len, 539 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) { 545 nonces, 2 * data->sess.nonce_len); 546 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { 552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, 553 data->sess.nonce_len); 555 data->nonce_s, data->sess.nonce_len); 588 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len, [all...] |
H A D | ikev2.c | 448 ikev2_process_ni(data, pl->nonce, pl->nonce_len) < 0)
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
H A D | e_chacha20_poly1305.c | 157 int aad, mac_inited, tag_len, nonce_len; member in struct:__anon240 184 if (actx->nonce_len <= CHACHA_CTR_SIZE) 185 memcpy(temp + CHACHA_CTR_SIZE - actx->nonce_len, iv, 186 actx->nonce_len); 519 actx->nonce_len = 12; 538 *(int *)ptr = actx->nonce_len; 544 actx->nonce_len = arg;
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | e_chacha20_poly1305.c | 159 int aad, mac_inited, tag_len, nonce_len; member in struct:__anon323 186 if (actx->nonce_len <= CHACHA_CTR_SIZE) 187 memcpy(temp + CHACHA_CTR_SIZE - actx->nonce_len, iv, 188 actx->nonce_len); 515 actx->nonce_len = 12; 534 *(int *)ptr = actx->nonce_len; 540 actx->nonce_len = arg;
|
/netbsd-current/external/bsd/wpa/dist/src/common/ |
H A D | dpp.c | 1579 size_t nonce_len; local 1597 nonce_len = auth->curve->nonce_len; 1598 os_memcpy(nonces, auth->i_nonce, nonce_len); 1599 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); 1616 res = dpp_hmac_vector(hash_len, nonces, 2 * nonce_len, 1671 size_t nonce_len, 1760 WPA_PUT_LE16(pos, nonce_len - 1); 1762 os_memcpy(pos, auth->i_nonce, nonce_len 1669 dpp_auth_build_req(struct dpp_authentication *auth, const struct wpabuf *pi, size_t nonce_len, const u8 *r_pubkey_hash, const u8 *i_pubkey_hash, unsigned int neg_freq) argument 1841 dpp_auth_build_resp(struct dpp_authentication *auth, enum dpp_status_error status, const struct wpabuf *pr, size_t nonce_len, const u8 *r_pubkey_hash, const u8 *i_pubkey_hash, const u8 *r_nonce, const u8 *i_nonce, const u8 *wrapped_r_auth, size_t wrapped_r_auth_len, const u8 *siv_key) argument 2229 size_t nonce_len; local 2364 size_t nonce_len; local 2538 size_t nonce_len; local 2617 size_t nonce_len; local 2824 size_t nonce_len; local 6101 size_t nonce_len, clear_len, attr_len; local [all...] |
H A D | dpp.h | 95 size_t nonce_len; member in struct:dpp_curve_params
|
/netbsd-current/crypto/external/bsd/openssl/dist/test/ |
H A D | cmp_vfy_test.c | 460 int nonce_len = OSSL_CMP_SENDERNONCE_LENGTH; local 469 nonce_data, nonce_len))) {
|
H A D | evp_test.c | 2438 size_t entropy_len, nonce_len, pers_len, addinA_len, addinB_len, member in struct:rand_data_pass_st 2543 return parse_bin(value, &item->nonce, &item->nonce_len); 2624 z, item->nonce_len);
|
H A D | acvp_test.c | 1353 tst->nonce_len);
|
H A D | acvp_test.inc | 1991 size_t nonce_len;
|