/external/rust/crates/quiche/deps/boringssl/src/crypto/cipher_extra/ |
D | e_chacha20poly1305.c | 93 size_t ad_len, union open_data *aead_data); 103 size_t ad_len, union seal_data *aead_data); 111 size_t ad_len, union open_data *aead_data) {} in chacha20_poly1305_open() argument 116 size_t ad_len, union seal_data *aead_data) {} in chacha20_poly1305_seal() argument 158 const uint8_t nonce[12], const uint8_t *ad, size_t ad_len, in calc_tag() argument 170 CRYPTO_poly1305_update(&ctx, ad, ad_len); in calc_tag() 171 if (ad_len % 16 != 0) { in calc_tag() 172 CRYPTO_poly1305_update(&ctx, padding, sizeof(padding) - (ad_len % 16)); in calc_tag() 181 poly1305_update_length(&ctx, ad_len); in calc_tag() 190 size_t extra_in_len, const uint8_t *ad, size_t ad_len, size_t tag_len) { in chacha20_poly1305_seal_scatter() argument [all …]
|
D | e_aesgcmsiv.c | 226 size_t in_len, const uint8_t *ad, size_t ad_len, in gcm_siv_asm_polyval() argument 230 const size_t ad_blocks = ad_len / 16; in gcm_siv_asm_polyval() 241 aesgcmsiv_htable_polyval(htable, ad, ad_len & ~15, out_tag); in gcm_siv_asm_polyval() 247 if (ad_len & 15) { in gcm_siv_asm_polyval() 249 OPENSSL_memcpy(scratch, &ad[ad_len & ~15], ad_len & 15); in gcm_siv_asm_polyval() 273 length_block.bitlens.ad = ad_len * 8; in gcm_siv_asm_polyval() 345 size_t extra_in_len, const uint8_t *ad, size_t ad_len) { in aead_aes_gcm_siv_asm_seal_scatter() argument 348 const uint64_t ad_len_64 = ad_len; in aead_aes_gcm_siv_asm_seal_scatter() 372 gcm_siv_asm_polyval(tag, in, in_len, ad, ad_len, in aead_aes_gcm_siv_asm_seal_scatter() 415 const uint8_t *ad, size_t ad_len) { in aead_aes_gcm_siv_asm_open() argument [all …]
|
D | e_aesctrhmac.c | 122 const uint8_t *ad, size_t ad_len, in hmac_calculate() argument 127 hmac_update_uint64(&sha256, ad_len); in hmac_calculate() 130 SHA256_Update(&sha256, ad, ad_len); in hmac_calculate() 135 EVP_AEAD_AES_CTR_HMAC_SHA256_NONCE_LEN + ad_len) % in hmac_calculate() 180 size_t extra_in_len, const uint8_t *ad, size_t ad_len) { in aead_aes_ctr_hmac_sha256_seal_scatter() argument 205 &aes_ctx->outer_init_state, ad, ad_len, nonce, out, in_len); in aead_aes_ctr_hmac_sha256_seal_scatter() 215 size_t in_tag_len, const uint8_t *ad, size_t ad_len) { in aead_aes_ctr_hmac_sha256_open_gather() argument 231 &aes_ctx->outer_init_state, ad, ad_len, nonce, in, in aead_aes_ctr_hmac_sha256_open_gather()
|
D | aead_test.cc | 49 size_t ad_len; member 558 const size_t ad_len = in TEST_P() local 559 GetParam().ad_len != 0 ? GetParam().ad_len : sizeof(ad) - 1; in TEST_P() 560 ASSERT_GE(sizeof(ad) - 1, ad_len); in TEST_P() 572 ad_len)); in TEST_P() 583 ciphertext_len, ad + 1, ad_len)); in TEST_P() 630 const size_t ad_len = GetParam().ad_len != 0 ? GetParam().ad_len : 16; in TEST_P() local 631 ASSERT_LE(ad_len, sizeof(kZeros)); in TEST_P() 645 0, kZeros /* ad */, ad_len)); in TEST_P() 659 sizeof(kZeros), kZeros /* ad */, ad_len)); in TEST_P() [all …]
|
D | e_tls.c | 129 const size_t ad_len) { in aead_tls_seal_scatter() argument 154 if (ad_len != 13 - 2 /* length bytes */) { in aead_tls_seal_scatter() 170 !HMAC_Update(&tls_ctx->hmac_ctx, ad, ad_len) || in aead_tls_seal_scatter() 245 const uint8_t *ad, size_t ad_len) { in aead_tls_open() argument 271 if (ad_len != 13 - 2 /* length bytes */) { in aead_tls_open() 336 ad_len += 2; in aead_tls_open() 362 !HMAC_Update(&tls_ctx->hmac_ctx, ad_fixed, ad_len) || in aead_tls_open()
|
D | e_aesccm.c | 327 size_t extra_in_len, const uint8_t *ad, size_t ad_len) { in aead_aes_ccm_seal_scatter() argument 348 ad_len)) { in aead_aes_ccm_seal_scatter() 361 const uint8_t *ad, size_t ad_len) { in aead_aes_ccm_open_gather() argument 384 ad_len)) { in aead_aes_ccm_open_gather()
|
/external/boringssl/src/crypto/cipher_extra/ |
D | e_chacha20poly1305.c | 83 const uint8_t nonce[12], const uint8_t *ad, size_t ad_len, in calc_tag() argument 95 CRYPTO_poly1305_update(&ctx, ad, ad_len); in calc_tag() 96 if (ad_len % 16 != 0) { in calc_tag() 97 CRYPTO_poly1305_update(&ctx, padding, sizeof(padding) - (ad_len % 16)); in calc_tag() 106 poly1305_update_length(&ctx, ad_len); in calc_tag() 115 size_t extra_in_len, const uint8_t *ad, size_t ad_len, size_t tag_len) { in chacha20_poly1305_seal_scatter() argument 173 chacha20_poly1305_seal(out, in, in_len, ad, ad_len, &data); in chacha20_poly1305_seal_scatter() 176 calc_tag(data.out.tag, key, nonce, ad, ad_len, out, in_len, out_tag, in chacha20_poly1305_seal_scatter() 189 size_t extra_in_len, const uint8_t *ad, size_t ad_len) { in aead_chacha20_poly1305_seal_scatter() argument 195 nonce_len, in, in_len, extra_in, extra_in_len, ad, ad_len, ctx->tag_len); in aead_chacha20_poly1305_seal_scatter() [all …]
|
D | e_aesgcmsiv.c | 226 size_t in_len, const uint8_t *ad, size_t ad_len, in gcm_siv_asm_polyval() argument 230 const size_t ad_blocks = ad_len / 16; in gcm_siv_asm_polyval() 241 aesgcmsiv_htable_polyval(htable, ad, ad_len & ~15, out_tag); in gcm_siv_asm_polyval() 247 if (ad_len & 15) { in gcm_siv_asm_polyval() 249 OPENSSL_memcpy(scratch, &ad[ad_len & ~15], ad_len & 15); in gcm_siv_asm_polyval() 273 length_block.bitlens.ad = ad_len * 8; in gcm_siv_asm_polyval() 345 size_t extra_in_len, const uint8_t *ad, size_t ad_len) { in aead_aes_gcm_siv_asm_seal_scatter() argument 348 const uint64_t ad_len_64 = ad_len; in aead_aes_gcm_siv_asm_seal_scatter() 372 gcm_siv_asm_polyval(tag, in, in_len, ad, ad_len, in aead_aes_gcm_siv_asm_seal_scatter() 415 const uint8_t *ad, size_t ad_len) { in aead_aes_gcm_siv_asm_open() argument [all …]
|
D | e_aesctrhmac.c | 122 const uint8_t *ad, size_t ad_len, in hmac_calculate() argument 127 hmac_update_uint64(&sha256, ad_len); in hmac_calculate() 130 SHA256_Update(&sha256, ad, ad_len); in hmac_calculate() 135 EVP_AEAD_AES_CTR_HMAC_SHA256_NONCE_LEN + ad_len) % in hmac_calculate() 180 size_t extra_in_len, const uint8_t *ad, size_t ad_len) { in aead_aes_ctr_hmac_sha256_seal_scatter() argument 205 &aes_ctx->outer_init_state, ad, ad_len, nonce, out, in_len); in aead_aes_ctr_hmac_sha256_seal_scatter() 215 size_t in_tag_len, const uint8_t *ad, size_t ad_len) { in aead_aes_ctr_hmac_sha256_open_gather() argument 231 &aes_ctx->outer_init_state, ad, ad_len, nonce, in, in aead_aes_ctr_hmac_sha256_open_gather()
|
D | internal.h | 176 size_t ad_len, 187 size_t ad_len, 196 size_t ad_len, in chacha20_poly1305_open() argument 204 size_t ad_len, in chacha20_poly1305_seal() argument
|
D | aead_test.cc | 634 const size_t ad_len = RequiredADLength(GetParam().flags) != 0 in TEST_P() local 637 ASSERT_GE(sizeof(ad) - 1, ad_len); in TEST_P() 649 ad_len)); in TEST_P() 660 ciphertext_len, ad + 1, ad_len)); in TEST_P() 707 const size_t ad_len = RequiredADLength(GetParam().flags) != 0 in TEST_P() local 710 ASSERT_LE(ad_len, sizeof(kZeros)); in TEST_P() 724 0, kZeros /* ad */, ad_len)); in TEST_P() 738 sizeof(kZeros), kZeros /* ad */, ad_len)); in TEST_P() 768 const uint8_t *ad, size_t ad_len) { in aead_ctx_seal() argument 772 nonce_len, plaintext, plaintext_len, ad, ad_len); in aead_ctx_seal() [all …]
|
D | e_tls.c | 129 const size_t ad_len) { in aead_tls_seal_scatter() argument 154 if (ad_len != 13 - 2 /* length bytes */) { in aead_tls_seal_scatter() 170 !HMAC_Update(&tls_ctx->hmac_ctx, ad, ad_len) || in aead_tls_seal_scatter() 245 const uint8_t *ad, size_t ad_len) { in aead_tls_open() argument 271 if (ad_len != 13 - 2 /* length bytes */) { in aead_tls_open() 336 ad_len += 2; in aead_tls_open() 362 !HMAC_Update(&tls_ctx->hmac_ctx, ad_fixed, ad_len) || in aead_tls_open()
|
D | e_aesccm.c | 327 size_t extra_in_len, const uint8_t *ad, size_t ad_len) { in aead_aes_ccm_seal_scatter() argument 348 ad_len)) { in aead_aes_ccm_seal_scatter() 361 const uint8_t *ad, size_t ad_len) { in aead_aes_ccm_open_gather() argument 384 ad_len)) { in aead_aes_ccm_open_gather()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/cipher/ |
D | aead.c | 118 const uint8_t *ad, size_t ad_len) { in EVP_AEAD_CTX_seal() argument 137 in_len, NULL, 0, ad, ad_len)) { in EVP_AEAD_CTX_seal() 154 size_t extra_in_len, const uint8_t *ad, size_t ad_len) { in EVP_AEAD_CTX_seal_scatter() argument 170 extra_in_len, ad, ad_len)) { in EVP_AEAD_CTX_seal_scatter() 186 const uint8_t *ad, size_t ad_len) { in EVP_AEAD_CTX_open() argument 194 in_len, ad, ad_len)) { in EVP_AEAD_CTX_open() 215 in + plaintext_len, ctx->tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open() 233 const uint8_t *ad, size_t ad_len) { in EVP_AEAD_CTX_open_gather() argument 245 in_tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open_gather()
|
D | internal.h | 95 size_t ad_len); 101 size_t extra_in_len, const uint8_t *ad, size_t ad_len); 106 const uint8_t *ad, size_t ad_len);
|
D | e_aes.c | 941 const uint8_t *ad, size_t ad_len) { in aead_aes_gcm_seal_scatter() argument 964 if (ad_len > 0 && !CRYPTO_gcm128_aad(&gcm, ad, ad_len)) { in aead_aes_gcm_seal_scatter() 1002 const uint8_t *ad, size_t ad_len) { in aead_aes_gcm_open_gather() argument 1023 if (!CRYPTO_gcm128_aad(&gcm, ad, ad_len)) { in aead_aes_gcm_open_gather() 1127 size_t extra_in_len, const uint8_t *ad, size_t ad_len) { in aead_aes_gcm_tls12_seal_scatter() argument 1151 in_len, extra_in, extra_in_len, ad, ad_len); in aead_aes_gcm_tls12_seal_scatter() 1222 size_t extra_in_len, const uint8_t *ad, size_t ad_len) { in aead_aes_gcm_tls13_seal_scatter() argument 1257 in_len, extra_in, extra_in_len, ad, ad_len); in aead_aes_gcm_tls13_seal_scatter()
|
/external/boringssl/src/crypto/fipsmodule/cipher/ |
D | aead.c | 118 const uint8_t *ad, size_t ad_len) { in EVP_AEAD_CTX_seal() argument 137 in_len, NULL, 0, ad, ad_len)) { in EVP_AEAD_CTX_seal() 154 size_t extra_in_len, const uint8_t *ad, size_t ad_len) { in EVP_AEAD_CTX_seal_scatter() argument 170 extra_in_len, ad, ad_len)) { in EVP_AEAD_CTX_seal_scatter() 186 const uint8_t *ad, size_t ad_len) { in EVP_AEAD_CTX_open() argument 194 in_len, ad, ad_len)) { in EVP_AEAD_CTX_open() 215 in + plaintext_len, ctx->tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open() 233 const uint8_t *ad, size_t ad_len) { in EVP_AEAD_CTX_open_gather() argument 245 in_tag_len, ad, ad_len)) { in EVP_AEAD_CTX_open_gather()
|
D | internal.h | 95 size_t ad_len); 101 size_t extra_in_len, const uint8_t *ad, size_t ad_len); 106 const uint8_t *ad, size_t ad_len);
|
D | e_aes.c | 942 const uint8_t *ad, size_t ad_len, in aead_aes_gcm_seal_scatter_impl() argument 964 if (ad_len > 0 && !CRYPTO_gcm128_aad(&gcm, ad, ad_len)) { in aead_aes_gcm_seal_scatter_impl() 1005 const uint8_t *ad, size_t ad_len) { in aead_aes_gcm_seal_scatter() argument 1010 in_len, extra_in, extra_in_len, ad, ad_len, ctx->tag_len); in aead_aes_gcm_seal_scatter() 1019 const uint8_t *ad, size_t ad_len, in aead_aes_gcm_open_gather_impl() argument 1040 if (!CRYPTO_gcm128_aad(&gcm, ad, ad_len)) { in aead_aes_gcm_open_gather_impl() 1068 const uint8_t *ad, size_t ad_len) { in aead_aes_gcm_open_gather() argument 1071 in_len, in_tag, in_tag_len, ad, ad_len, in aead_aes_gcm_open_gather() 1145 const uint8_t *ad, size_t ad_len) { in aead_aes_gcm_seal_scatter_randnonce() argument 1163 extra_in, extra_in_len, ad, ad_len, in aead_aes_gcm_seal_scatter_randnonce() [all …]
|
/external/boringssl/src/include/openssl/ |
D | aead.h | 300 const uint8_t *ad, size_t ad_len); 325 const uint8_t *ad, size_t ad_len); 362 const uint8_t *ad, size_t ad_len); 382 size_t in_tag_len, const uint8_t *ad, size_t ad_len);
|
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/ |
D | aead.h | 276 const uint8_t *ad, size_t ad_len); 301 const uint8_t *ad, size_t ad_len); 338 const uint8_t *ad, size_t ad_len); 358 size_t in_tag_len, const uint8_t *ad, size_t ad_len);
|
/external/boringssl/src/crypto/cipher_extra/test/ |
D | xchacha20_poly1305_tests.txt | 20 # for (size_t ad_len = 0; ad_len < sizeof(ad); ad_len += 4) { 25 # randombytes(ad, ad_len); 30 # c, tag, &tag_len, m, m_len, ad, ad_len, NULL, nonce, key)) { 41 # hexdump(ad, ad_len);
|
/external/boringssl/src/tool/ |
D | speed.cc | 359 size_t chunk_len, size_t ad_len, in SpeedAEADChunk() argument 381 std::unique_ptr<uint8_t[]> ad(new uint8_t[ad_len]); in SpeedAEADChunk() 382 OPENSSL_memset(ad.get(), 0, ad_len); in SpeedAEADChunk() 406 [chunk_len, nonce_len, ad_len, overhead_len, in, out, tag, in SpeedAEADChunk() 412 ad.get(), ad_len); in SpeedAEADChunk() 421 nonce.get(), nonce_len, in, chunk_len, ad.get(), ad_len); in SpeedAEADChunk() 433 [chunk_len, overhead_len, nonce_len, ad_len, in2, out, in SpeedAEADChunk() 441 out_len, ad.get(), ad_len); in SpeedAEADChunk() 455 size_t ad_len, const std::string &selected) { in SpeedAEAD() argument 461 if (!SpeedAEADChunk(aead, name, chunk_len, ad_len, evp_aead_seal)) { in SpeedAEAD() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/tool/ |
D | speed.cc | 358 size_t chunk_len, size_t ad_len, in SpeedAEADChunk() argument 380 std::unique_ptr<uint8_t[]> ad(new uint8_t[ad_len]); in SpeedAEADChunk() 381 OPENSSL_memset(ad.get(), 0, ad_len); in SpeedAEADChunk() 405 [chunk_len, nonce_len, ad_len, overhead_len, in, out, tag, in SpeedAEADChunk() 411 ad.get(), ad_len); in SpeedAEADChunk() 420 nonce.get(), nonce_len, in, chunk_len, ad.get(), ad_len); in SpeedAEADChunk() 432 [chunk_len, overhead_len, nonce_len, ad_len, in2, out, in SpeedAEADChunk() 440 out_len, ad.get(), ad_len); in SpeedAEADChunk() 454 size_t ad_len, const std::string &selected) { in SpeedAEAD() argument 460 if (!SpeedAEADChunk(aead, name, chunk_len, ad_len, evp_aead_seal)) { in SpeedAEAD() [all …]
|
/external/boringssl/src/crypto/hpke/ |
D | internal.h | 182 const uint8_t *ad, size_t ad_len); 202 const uint8_t *ad, size_t ad_len);
|