/third_party/mbedtls/library/ |
D | chachapoly.c | 60 uint32_t partial_block_len = (uint32_t) ( ctx->aad_len % 16U ); in chachapoly_pad_aad() 98 ctx->aad_len = 0U; in mbedtls_chachapoly_init() 111 ctx->aad_len = 0U; in mbedtls_chachapoly_free() 158 ctx->aad_len = 0U; in mbedtls_chachapoly_starts() 171 size_t aad_len ) in mbedtls_chachapoly_update_aad() argument 174 CHACHAPOLY_VALIDATE_RET( aad_len == 0 || aad != NULL ); in mbedtls_chachapoly_update_aad() 179 ctx->aad_len += aad_len; in mbedtls_chachapoly_update_aad() 181 return( mbedtls_poly1305_update( &ctx->poly1305_ctx, aad, aad_len ) ); in mbedtls_chachapoly_update_aad() 266 MBEDTLS_PUT_UINT64_LE(ctx->aad_len, len_block, 0); in mbedtls_chachapoly_finish() 283 size_t aad_len, in chachapoly_crypt_and_tag() argument [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | aes-ccm.c | 29 const u8 *aad, size_t aad_len, size_t plain_len, in aes_ccm_auth_start() argument 37 b[0] = aad_len ? 0x40 : 0 /* Adata */; in aes_ccm_auth_start() 46 if (!aad_len) in aes_ccm_auth_start() 49 WPA_PUT_BE16(aad_buf, aad_len); in aes_ccm_auth_start() 50 os_memcpy(aad_buf + 2, aad, aad_len); in aes_ccm_auth_start() 51 os_memset(aad_buf + 2 + aad_len, 0, sizeof(aad_buf) - 2 - aad_len); in aes_ccm_auth_start() 56 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument 156 if (aad_len > 30 || M > AES_BLOCK_SIZE) in aes_ccm_ae() 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); in aes_ccm_ae() [all …]
|
D | aes-gcm.c | 229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, in aes_gcm_ghash() argument 241 ghash(H, aad, aad_len, S); in aes_gcm_ghash() 243 WPA_PUT_BE64(len_buf, aad_len * 8); in aes_gcm_ghash() 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) in aes_gcm_ae() argument 272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S); in aes_gcm_ae() 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) in aes_gcm_ad() argument 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); in aes_gcm_ad() 323 const u8 *aad, size_t aad_len, u8 *tag) in aes_gmac() argument 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL, in aes_gmac()
|
D | aes_wrap.h | 55 const u8 *aad, size_t aad_len, 60 const u8 *aad, size_t aad_len, const u8 *tag, 64 const u8 *aad, size_t aad_len, u8 *tag); 67 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth); 70 const u8 *aad, size_t aad_len, const u8 *auth,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | aes-ccm.c | 29 const u8 *aad, size_t aad_len, size_t plain_len, in aes_ccm_auth_start() argument 37 b[0] = aad_len ? 0x40 : 0 /* Adata */; in aes_ccm_auth_start() 46 if (!aad_len) in aes_ccm_auth_start() 49 WPA_PUT_BE16(aad_buf, aad_len); in aes_ccm_auth_start() 50 os_memcpy(aad_buf + 2, aad, aad_len); in aes_ccm_auth_start() 51 os_memset(aad_buf + 2 + aad_len, 0, sizeof(aad_buf) - 2 - aad_len); in aes_ccm_auth_start() 56 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument 156 if (aad_len > 30 || M > AES_BLOCK_SIZE) in aes_ccm_ae() 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); in aes_ccm_ae() [all …]
|
D | aes-gcm.c | 229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, in aes_gcm_ghash() argument 241 ghash(H, aad, aad_len, S); in aes_gcm_ghash() 243 WPA_PUT_BE64(len_buf, aad_len * 8); in aes_gcm_ghash() 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) in aes_gcm_ae() argument 272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S); in aes_gcm_ae() 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) in aes_gcm_ad() argument 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); in aes_gcm_ad() 323 const u8 *aad, size_t aad_len, u8 *tag) in aes_gmac() argument 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL, in aes_gmac()
|
D | aes_wrap.h | 55 const u8 *aad, size_t aad_len, 60 const u8 *aad, size_t aad_len, const u8 *tag, 64 const u8 *aad, size_t aad_len, u8 *tag); 67 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth); 70 const u8 *aad, size_t aad_len, const u8 *auth,
|
/third_party/libwebsockets/lib/jose/jwe/ |
D | private-lib-jose-jwe.h | 40 uint8_t *aad, int aad_len); 47 uint8_t *aad, int aad_len); 54 uint8_t *enc_cek, uint8_t *aad, int aad_len); 76 uint8_t *aad, int aad_len); 80 uint8_t *cek, uint8_t *aad, int aad_len);
|
/third_party/mbedtls/include/mbedtls/ |
D | chachapoly.h | 65 …uint64_t MBEDTLS_PRIVATE(aad_len); /**< The length (bytes) of the Additional… 213 size_t aad_len ); 303 size_t aad_len, 337 size_t aad_len,
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_chachapoly.function | 79 size_t aad_len = sizeof( aad ); 96 TEST_ASSERT( mbedtls_chachapoly_update_aad( &ctx, aad, aad_len ) 107 TEST_ASSERT( mbedtls_chachapoly_update_aad( &ctx, aad, aad_len ) 119 TEST_ASSERT( mbedtls_chachapoly_update_aad( &ctx, aad, aad_len ) 131 TEST_ASSERT( mbedtls_chachapoly_update_aad( &ctx, aad, aad_len ) 137 TEST_ASSERT( mbedtls_chachapoly_update_aad( &ctx, aad, aad_len ) 139 TEST_ASSERT( mbedtls_chachapoly_update_aad( &ctx, aad, aad_len )
|
/third_party/libwebsockets/lib/jose/jwe/enc/ |
D | aescbc.c | 30 uint8_t *aad, int aad_len) in lws_jwe_encrypt_cbc_hs() argument 116 lws_jwe_be64((unsigned int)aad_len * 8, al); in lws_jwe_encrypt_cbc_hs() 137 if (lws_genhmac_update(&hmacctx, aad, (unsigned int)aad_len) || in lws_jwe_encrypt_cbc_hs() 163 uint8_t *aad, int aad_len) in lws_jwe_auth_and_decrypt_cbc_hs() argument 200 lws_jwe_be64((unsigned int)aad_len * 8, al); in lws_jwe_auth_and_decrypt_cbc_hs() 209 if (lws_genhmac_update(&hmacctx, aad, (unsigned int)aad_len) || in lws_jwe_auth_and_decrypt_cbc_hs()
|
D | aesgcm.c | 54 uint8_t *enc_cek, uint8_t *aad, int aad_len) in lws_jwe_encrypt_gcm() argument 89 n = lws_genaes_crypt(&aesctx, aad, (unsigned int)aad_len, NULL, in lws_jwe_encrypt_gcm() 118 uint8_t *enc_cek, uint8_t *aad, int aad_len) in lws_jwe_auth_and_decrypt_gcm() argument 152 n = lws_genaes_crypt(&aesctx, aad, (unsigned int)aad_len, in lws_jwe_auth_and_decrypt_gcm()
|
/third_party/libwebsockets/include/libwebsockets/ |
D | lws-jwe.h | 159 uint8_t *aad, int aad_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | mesh_rsn.c | 541 const size_t aad_len[] = { ETH_ALEN, ETH_ALEN, ie - cat }; in mesh_rsn_protect_frame() local 621 aad, aad_len, mic_payload)) { in mesh_rsn_protect_frame() 645 const size_t aad_len[] = { ETH_ALEN, ETH_ALEN, in mesh_rsn_process_ampe() local 694 aad, aad_len, ampe_buf)) { in mesh_rsn_process_ampe()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | mesh_rsn.c | 540 const size_t aad_len[] = { ETH_ALEN, ETH_ALEN, ie - cat }; in mesh_rsn_protect_frame() local 616 aad, aad_len, mic_payload)) { in mesh_rsn_protect_frame() 640 const size_t aad_len[] = { ETH_ALEN, ETH_ALEN, in mesh_rsn_process_ampe() local 689 aad, aad_len, ampe_buf)) { in mesh_rsn_process_ampe()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | wpa_auth.c | 1544 size_t aad_len[1]; in __wpa_send_eapol() local 1555 aad_len[0] = key_mic + 2 - (u8 *) hdr; in __wpa_send_eapol() 1557 1, aad, aad_len, key_mic + 2) < 0) { in __wpa_send_eapol() 2342 size_t aad_len[1]; in wpa_aead_decrypt() local 2363 aad_len[0] = pos - buf; in wpa_aead_decrypt() 2365 1, aad, aad_len, tmp) < 0) { in wpa_aead_decrypt() 2492 size_t aad_len[5]; in fils_decrypt_assoc() local 2538 aad_len[0] = ETH_ALEN; in fils_decrypt_assoc() 2541 aad_len[1] = ETH_ALEN; in fils_decrypt_assoc() 2544 aad_len[2] = FILS_NONCE_LEN; in fils_decrypt_assoc() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | wpa_auth.c | 1606 size_t aad_len[1]; in __wpa_send_eapol() local 1617 aad_len[0] = key_mic + 2 - (u8 *) hdr; in __wpa_send_eapol() 1619 1, aad, aad_len, key_mic + 2) < 0) { in __wpa_send_eapol() 2439 size_t aad_len[1]; in wpa_aead_decrypt() local 2460 aad_len[0] = pos - buf; in wpa_aead_decrypt() 2462 1, aad, aad_len, tmp) < 0) { in wpa_aead_decrypt() 2589 size_t aad_len[5]; in fils_decrypt_assoc() local 2635 aad_len[0] = ETH_ALEN; in fils_decrypt_assoc() 2638 aad_len[1] = ETH_ALEN; in fils_decrypt_assoc() 2641 aad_len[2] = FILS_NONCE_LEN; in fils_decrypt_assoc() [all …]
|
/third_party/openssl/test/ |
D | evp_test.c | 484 size_t aad_len; member 548 return parse_bin(value, &cdat->aad, &cdat->aad_len); in cipher_test_parse() 678 expected->aad_len)) in cipher_test_enc() 684 if (expected->aad_len > 0) { in cipher_test_enc() 689 if (expected->aad_len > 2) { in cipher_test_enc() 692 expected->aad_len - 2)) in cipher_test_enc() 694 donelen += expected->aad_len - 2; in cipher_test_enc() 696 if (expected->aad_len > 1 in cipher_test_enc()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
D | wpa.c | 105 size_t aad_len[1]; in wpa_eapol_key_send() local 141 aad_len[0] = key_data - buf; in wpa_eapol_key_send() 144 1, aad, aad_len, key_data) < 0) { in wpa_eapol_key_send() 2125 size_t aad_len[1]; in wpa_supp_aead_decrypt() local 2151 aad_len[0] = pos - buf; in wpa_supp_aead_decrypt() 2153 1, aad, aad_len, tmp) < 0) { in wpa_supp_aead_decrypt()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
D | wpa.c | 107 size_t aad_len[1]; in wpa_eapol_key_send() local 143 aad_len[0] = key_data - buf; in wpa_eapol_key_send() 146 1, aad, aad_len, key_data) < 0) { in wpa_eapol_key_send() 2404 size_t aad_len[1]; in wpa_supp_aead_decrypt() local 2430 aad_len[0] = pos - buf; in wpa_supp_aead_decrypt() 2432 1, aad, aad_len, tmp) < 0) { in wpa_supp_aead_decrypt()
|