| /src/crypto/external/apache2/openssl/dist/providers/implementations/skeymgmt/ |
| aes_skmgmt.c | 22 PROV_SKEY *aes = generic_import(provctx, selection, params); local 24 if (aes == NULL) 27 if (aes->length != 16 && aes->length != 24 && aes->length != 32) { 28 generic_free(aes); 31 aes->type = SKEY_TYPE_AES; 33 return aes; 39 PROV_SKEY *aes = keydata; local 41 if (aes->type != SKEY_TYPE_AES [all...] |
| /src/sys/crypto/aes/ |
| aes.h | 1 /* $NetBSD: aes.h,v 1.5 2025/11/22 22:32:39 riastradh Exp $ */ 36 * struct aes 39 * the standard AES key schedule, see aes_keysched.h.) 41 union aes { union 51 union aes aese_aes; 55 union aes aesd_aes;
|
| /src/crypto/external/apache2/openssl/dist/demos/mac/ |
| poly1305.c | 19 * This is a demonstration of how to compute Poly1305-AES using the OpenSSL 20 * Poly1305 and AES providers and the EVP API. 36 * This example uses AES, as described in the original paper, "The Poly1305-AES 46 * These are the "r" and "k" inputs to Poly1305-AES. 87 EVP_CIPHER *aes = NULL; local 117 /* Fetch the AES implementation */ 118 aes = EVP_CIPHER_fetch(library_context, "AES-128-ECB", propq); 119 if (aes == NULL) [all...] |
| /src/crypto/external/bsd/openssl/dist/demos/mac/ |
| poly1305.c | 19 * This is a demonstration of how to compute Poly1305-AES using the OpenSSL 20 * Poly1305 and AES providers and the EVP API. 36 * This example uses AES, as described in the original paper, "The Poly1305-AES 46 * These are the "r" and "k" inputs to Poly1305-AES. 87 EVP_CIPHER *aes = NULL; local 117 /* Fetch the AES implementation */ 118 aes = EVP_CIPHER_fetch(library_context, "AES-128-ECB", propq); 119 if (aes == NULL) [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| aes-ccm.c | 2 * Counter with CBC-MAC (CCM) with AES 13 #include "aes.h" 28 static void aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, 44 aes_encrypt(aes, b, x); /* X_1 = E(K, B_0) */ 54 aes_encrypt(aes, aad_buf, x); /* X_2 = E(K, X_1 XOR B_1) */ 59 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); 64 static void aes_ccm_auth(void *aes, const u8 *data, size_t len, u8 *x) 73 aes_encrypt(aes, x, x); 79 aes_encrypt(aes, x, x); 92 static void aes_ccm_encr(void *aes, size_t L, const u8 *in, size_t len, u8 *out 153 void *aes; local 183 void *aes; local [all...] |
| crypto_internal-cipher.c | 13 #include "aes.h" 29 } aes; member in union:crypto_cipher::__anon8300 65 ctx->u.aes.ctx_enc = aes_encrypt_init(key, key_len); 66 if (ctx->u.aes.ctx_enc == NULL) { 70 ctx->u.aes.ctx_dec = aes_decrypt_init(key, key_len); 71 if (ctx->u.aes.ctx_dec == NULL) { 72 aes_encrypt_deinit(ctx->u.aes.ctx_enc); 76 os_memcpy(ctx->u.aes.cbc, iv, AES_BLOCK_SIZE); 122 ctx->u.aes.cbc[j] ^= plain[j]; 123 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc [all...] |
| aes-gcm.c | 2 * Galois/Counter Mode (GCM) and GMAC with AES 13 #include "aes.h" 143 static void aes_gctr(void *aes, const u8 *icb, const u8 *x, size_t xlen, u8 *y) 158 aes_encrypt(aes, cb, ypos); 168 aes_encrypt(aes, cb, tmp); 177 void *aes; local 179 aes = aes_encrypt_init(key, key_len); 180 if (aes == NULL) 185 aes_encrypt(aes, H, H); 188 return aes; 261 void *aes; local 295 void *aes; local [all...] |
| crypto_wolfssl.c | 19 #include <wolfssl/wolfcrypt/aes.h> 556 Aes *aes; local 562 aes = os_malloc(sizeof(Aes)); 563 if (!aes) { 568 err = wc_AesSetKey(aes, key, len, NULL, AES_ENCRYPTION); 571 os_free(aes); 575 return aes; 605 Aes *aes local 654 Aes aes; local 673 Aes aes; local 761 Aes aes; member in union:wolfssl_cipher [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| test_rsa.c | 353 unsigned char aes[32]; local 355 RAND_bytes(aes, sizeof(aes)); 356 check_rsa(aes, sizeof(aes), rsa, RSA_PKCS1_PADDING);
|
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| e_aes.c | 11 * This file uses the low-level AES functions (which are deprecated for 12 * non-internal use) in order to implement the EVP AES ciphers. 22 #include <openssl/aes.h> 48 } ks; /* AES key schedule to use */ 66 } ks1, ks2; /* AES key schedules to use */ 84 } ks; /* AES key schedule to use */ 100 } ksenc; /* AES key schedule to use for encryption */ 104 } ksdec; /* AES key schedule to use for decryption */ 296 /* key_len is two AES keys */ 664 /* key_len is two AES keys * 1012 } aes; member in struct:__anon248 [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| e_aes.c | 11 * This file uses the low level AES functions (which are deprecated for 12 * non-internal use) in order to implement the EVP AES ciphers. 22 #include <openssl/aes.h> 48 } ks; /* AES key schedule to use */ 66 } ks1, ks2; /* AES key schedules to use */ 84 } ks; /* AES key schedule to use */ 100 } ksenc; /* AES key schedule to use for encryption */ 104 } ksdec; /* AES key schedule to use for decryption */ 285 /* key_len is two AES keys */ 622 /* key_len is two AES keys * 950 } aes; member in struct:__anon1357 [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
| e_aes.c | 16 #include <openssl/aes.h> 38 } ks; /* AES key schedule to use */ 54 } ks1, ks2; /* AES key schedules to use */ 66 } ks; /* AES key schedule to use */ 82 } ksenc; /* AES key schedule to use for encryption */ 86 } ksdec; /* AES key schedule to use for decryption */ 194 * AES-NI section 405 /* key_len is two AES keys */ 826 /* key_len is two AES keys */ 1009 * KM-AES parameter block - begi 1153 } aes; member in struct:__anon1999 [all...] |