| /system/utest/crypto/ |
| A D | cipher.cpp | 57 Bytes iv; in TestInitEncrypt_Uninitialized() local 66 Bytes iv; in TestInitEncrypt() local 76 ASSERT_OK(bad_iv.Copy(iv.get(), iv.len() - 1)); in TestInitEncrypt() 94 Bytes iv; in DEFINE_EACH() local 103 Bytes iv; in TestInitDecrypt() local 113 ASSERT_OK(bad_iv.Copy(iv.get(), iv.len() - 1)); in TestInitDecrypt() 131 Bytes iv, ptext; in DEFINE_EACH() local 166 Bytes iv, ptext; in DEFINE_EACH() local 204 Bytes iv, ptext; in DEFINE_EACH() local 269 Bytes iv, ptext; in DEFINE_EACH() local [all …]
|
| A D | aead.cpp | 76 Bytes iv; in TestInitSeal_Uninitialized() local 85 Bytes iv; in TestInitSeal() local 95 ASSERT_OK(iv.Copy(iv.get(), iv.len() - 1)); in TestInitSeal() 99 EXPECT_OK(sealer.InitSeal(aead, key, iv)); in TestInitSeal() 109 Bytes iv; in DEFINE_EACH() local 118 Bytes iv; in TestInitOpen() local 128 ASSERT_OK(bad_iv.Copy(iv.get(), iv.len() - 1)); in TestInitOpen() 142 Bytes iv, ptext, ctext; in DEFINE_EACH() local 173 Bytes iv, ptext, ctext, result; in DEFINE_EACH() local 240 ASSERT_OK(HexToBytes(xiv, &iv)); in DEFINE_EACH() [all …]
|
| A D | utils.cpp | 76 zx_status_t GenerateKeyMaterial(Cipher::Algorithm cipher, Secret* key, Bytes* iv) { in GenerateKeyMaterial() argument 85 if (iv) { in GenerateKeyMaterial() 88 (rc = iv->Randomize(iv_len)) != ZX_OK) { in GenerateKeyMaterial() 96 zx_status_t GenerateKeyMaterial(AEAD::Algorithm cipher, Secret* key, Bytes* iv) { in GenerateKeyMaterial() argument 105 if (iv) { in GenerateKeyMaterial() 108 (rc = iv->Randomize(iv_len)) != ZX_OK) { in GenerateKeyMaterial()
|
| A D | utils.h | 70 zx_status_t GenerateKeyMaterial(Cipher::Algorithm cipher, Secret* key, Bytes* iv); 74 zx_status_t GenerateKeyMaterial(AEAD::Algorithm aead, Secret* key, Bytes* iv);
|
| /system/ulib/crypto/include/crypto/ |
| A D | cipher.h | 59 zx_status_t Init(Algorithm algo, Direction direction, const Secret& key, const Bytes& iv, 64 zx_status_t InitEncrypt(Algorithm algo, const Secret& key, const Bytes& iv) { in InitEncrypt() argument 65 return Init(algo, kEncrypt, key, iv, 0); in InitEncrypt() 67 … zx_status_t InitEncrypt(Algorithm algo, const Secret& key, const Bytes& iv, uint64_t alignment) { in InitEncrypt() argument 68 return Init(algo, kEncrypt, key, iv, alignment); in InitEncrypt() 73 zx_status_t InitDecrypt(Algorithm algo, const Secret& key, const Bytes& iv) { in InitDecrypt() argument 74 return Init(algo, kDecrypt, key, iv, 0); in InitDecrypt() 76 … zx_status_t InitDecrypt(Algorithm algo, const Secret& key, const Bytes& iv, uint64_t alignment) { in InitDecrypt() argument 77 return Init(algo, kDecrypt, key, iv, alignment); in InitDecrypt()
|
| A D | aead.h | 47 zx_status_t InitSeal(Algorithm aead, const Secret& key, const Bytes& iv) { in InitSeal() argument 48 return Init(aead, key, iv, Cipher::kEncrypt); in InitSeal() 53 zx_status_t InitOpen(Algorithm aead, const Secret& key, const Bytes& iv) { in InitOpen() argument 54 return Init(aead, key, iv, Cipher::kDecrypt); in InitOpen() 87 zx_status_t Init(Algorithm aead, const Secret& key, const Bytes& iv,
|
| /system/ulib/crypto/ |
| A D | cipher.cpp | 115 zx_status_t Cipher::Init(Algorithm algo, Direction direction, const Secret& key, const Bytes& iv, in Init() argument 126 if (key.len() != cipher->key_len || iv.len() != cipher->iv_len) { in Init() 127 xprintf("bad parameter(s): key_len=%zu, iv_len=%zu\n", key.len(), iv.len()); in Init() 140 memcpy(iv_.get(), iv.get(), iv.len()); in Init()
|
| A D | aead.cpp | 208 zx_status_t AEAD::Init(Algorithm algo, const Secret& key, const Bytes& iv, in Init() argument 229 if (iv.len() != iv_len_) { in Init() 230 xprintf("wrong IV length; have %zu, need %zu\n", iv.len(), iv_len_); in Init() 257 memcpy(iv_.get(), iv.get(), iv_len_); in Init()
|