HomeSort by: relevance | last modified time | path
    Searched defs:aad (Results 1 - 25 of 25) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/ssl/record/methods/
tls_multib.c 71 unsigned char aad[13]; local
120 memcpy(aad, rl->sequence, 8);
121 aad[8] = templates[0].type;
122 aad[9] = (unsigned char)(templates[0].version >> 8);
123 aad[10] = (unsigned char)(templates[0].version);
124 aad[11] = 0;
125 aad[12] = 0;
127 mb_param.inp = aad;
  /src/sys/external/isc/libsodium/src/
sodium_selftest.c 104 static const uint8_t aad[] = { local
140 uint8_t aadbuf[sizeof(aad) + TESTALIGN];
173 memcpy(aadbuf + j, aad, sizeof(aad));
180 aadbuf + j, sizeof(aad),
218 memcpy(aadbuf + j, aad, sizeof(aad));
226 aadbuf + j, sizeof(aad),
262 aadbuf + j, sizeof(aad),
294 aadbuf + j, sizeof(aad),
345 static const uint8_t aad[] = { local
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/
cipher_chacha20_poly1305.h 26 uint64_t aad, text; member in struct:__anon509::__anon510
28 unsigned int aad : 1; member in struct:__anon509
40 int (*tls_init)(PROV_CIPHER_CTX *ctx, unsigned char *aad, size_t alen);
cipher_aes_gcm_siv.h 18 /* AAD manipulation macros */
36 uint8_t *aad; /* Allocated, rounded up to 16 bytes, from user */ member in struct:prov_aes_gcm_siv_ctx_st
39 size_t aad_len; /* actual AAD length */
  /src/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/
cipher_chacha20_poly1305.h 25 struct { uint64_t aad, text; } len; member in struct:__anon1573::__anon1574
26 unsigned int aad : 1; member in struct:__anon1573
38 int (*tls_init)(PROV_CIPHER_CTX *ctx, unsigned char *aad, size_t alen);
  /src/crypto/external/apache2/openssl/dist/crypto/evp/
e_chacha20_poly1305.c 160 uint64_t aad, text; member in struct:__anon286::__anon287
162 int aad, mac_inited, tag_len, nonce_len; member in struct:__anon286
179 actx->len.aad = 0;
181 actx->aad = 0;
240 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN;
265 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN;
299 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN;
322 ctr[0] = (unsigned char)(actx->len.aad);
323 ctr[1] = (unsigned char)(actx->len.aad >> 8);
324 ctr[2] = (unsigned char)(actx->len.aad >> 16)
574 unsigned char *aad = ptr; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/evp/
e_chacha20_poly1305.c 158 struct { uint64_t aad, text; } len; member in struct:__anon1395::__anon1396
159 int aad, mac_inited, tag_len, nonce_len; member in struct:__anon1395
176 actx->len.aad = 0;
178 actx->aad = 0;
238 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN;
263 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN;
297 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN;
320 ctr[0] = (unsigned char)(actx->len.aad);
321 ctr[1] = (unsigned char)(actx->len.aad>>8);
322 ctr[2] = (unsigned char)(actx->len.aad>>16)
574 unsigned char *aad = ptr; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/evp/
e_chacha20_poly1305.c 156 struct { uint64_t aad, text; } len; member in struct:__anon2037::__anon2038
157 int aad, mac_inited, tag_len, nonce_len; member in struct:__anon2037
174 actx->len.aad = 0;
176 actx->aad = 0;
236 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN;
261 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN;
295 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN;
321 ctr[0] = (unsigned char)(actx->len.aad);
322 ctr[1] = (unsigned char)(actx->len.aad>>8);
323 ctr[2] = (unsigned char)(actx->len.aad>>16)
578 unsigned char *aad = ptr; local
    [all...]
  /src/external/bsd/libfido2/dist/tools/
largeblob.c 362 uint8_t aad[4 + sizeof(uint64_t)]; local
392 aad[0] = 0x62; /* b */
393 aad[1] = 0x6c; /* l */
394 aad[2] = 0x6f; /* o */
395 aad[3] = 0x62; /* b */
397 memcpy(&aad[4], &tmp, sizeof(uint64_t));
398 if (EVP_Cipher(ctx, NULL, aad, (u_int)sizeof(aad)) < 0 ||
  /src/external/bsd/wpa/dist/wpa_supplicant/
mesh_rsn.c 558 const u8 *aad[] = { rsn->wpa_s->own_addr, sta->addr, cat }; local
635 aad, aad_len, mic_payload)) {
658 const u8 *aad[] = { sta->addr, wpa_s->own_addr, cat }; local
708 aad, aad_len, ampe_buf)) {
dpp_supplicant.c 3799 const u8 *aad; local
3836 aad = wpabuf_head_u8(msg) + 2; /* from the OUI field (inclusive) */
3838 wpa_hexdump(MSG_MSGDUMP, "DPP: AAD for HPKE", aad, aad_len);
3841 intro->peer_key, NULL, 0, aad, aad_len,
  /src/external/bsd/libfido2/dist/src/
largeblob.c 50 largeblob_aad(fido_blob_t *aad, uint64_t size)
61 return fido_blob_set(aad, buf, sizeof(buf));
67 fido_blob_t *plaintext = NULL, *aad = NULL; local
71 (aad = fido_blob_new()) == NULL) {
75 if (largeblob_aad(aad, blob->origsiz) < 0) {
79 if (aes256_gcm_dec(key, &blob->nonce, aad, &blob->ciphertext,
87 fido_blob_free(&aad);
121 fido_blob_t *plaintext = NULL, *aad = NULL; local
125 (aad = fido_blob_new()) == NULL) {
133 if (largeblob_aad(aad, body->len) < 0)
    [all...]
  /src/crypto/external/bsd/openssl/dist/ssl/record/
rec_layer_s3.c 457 unsigned char aad[13]; local
511 memcpy(aad, s->rlayer.write_sequence, 8);
512 aad[8] = type;
513 aad[9] = (unsigned char)(s->version >> 8);
514 aad[10] = (unsigned char)(s->version);
515 aad[11] = 0;
516 aad[12] = 0;
518 mb_param.inp = aad;
  /src/crypto/external/bsd/openssl.old/dist/ssl/record/
rec_layer_s3.c 440 unsigned char aad[13]; local
494 memcpy(aad, s->rlayer.write_sequence, 8);
495 aad[8] = type;
496 aad[9] = (unsigned char)(s->version >> 8);
497 aad[10] = (unsigned char)(s->version);
498 aad[11] = 0;
499 aad[12] = 0;
501 mb_param.inp = aad;
  /src/crypto/external/apache2/openssl/dist/test/
hpke_test.c 53 const unsigned char *aad; member in struct:__anon710
162 aead[i].aad, aead[i].aadlen,
199 aead[i].aad, aead[i].aadlen,
988 * a key gen, encrypt and decrypt for each. The aad, info, and
1006 unsigned char aad[OSSL_HPKE_TSTSIZE]; local
1027 * Randomly try with/without info, aad, seq. Given mode and suite
1033 aadp = aad;
1034 memset(aad, 'a', aadlen);
evp_test.c 894 unsigned char *aad[AAD_NUM]; member in struct:cipher_data_st
994 OPENSSL_free(cdat->aad[i]);
1036 if (strcmp(keyword, "AAD") == 0 || tls_aad) {
1038 if (cdat->aad[i] == NULL)
1039 return parse_bin(value, &cdat->aad[i], &cdat->aad_len[i]);
1287 if (expected->aad[0] != NULL && !expected->tls_aad) {
1291 for (i = 0; expected->aad[i] != NULL; i++) {
1301 expected->aad[i] + donelen,
1309 /* Supply the AAD in chunks less than the block size where possible */
1310 for (i = 0; expected->aad[i] != NULL; i++)
    [all...]
  /src/external/bsd/wpa/dist/src/ap/
dpp_hostapd.c 2795 const u8 *aad = hdr; local
2854 aad, aad_len, wrapped, wrapped_len);
wpa_auth.c 2072 const u8 *aad[1]; local
2081 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to
2083 aad[0] = (u8 *) hdr;
2086 1, aad, aad_len, key_mic + 2) < 0) {
3052 const u8 *aad[1]; local
3071 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to
3073 aad[0] = buf;
3076 1, aad, aad_len, tmp) < 0) {
3202 const u8 *aad[5]; local
3245 /* AES-SIV AAD vectors *
3292 const u8 *aad[5]; local
    [all...]
  /src/external/bsd/wpa/dist/src/crypto/
crypto_module_tests.c 2207 const char *aad; member in struct:hpke_test
2222 .aad = "436f756e742d30",
2237 .aad = "436f756e742d30",
2252 .aad = "436f756e742d30",
2267 .aad = "436f756e742d30",
2282 .aad = "436f756e742d30",
2297 .aad = "436f756e742d30",
2312 .aad = "436f756e742d30",
2320 struct wpabuf *info, *pk_r, *sk_r, *enc, *pt, *aad, *ct; local
2333 aad = wpabuf_parse_bin(test->aad)
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/
evp_test.c 483 unsigned char *aad; member in struct:cipher_data_st
529 OPENSSL_free(cdat->aad);
547 if (strcmp(keyword, "AAD") == 0)
548 return parse_bin(value, &cdat->aad, &cdat->aad_len);
674 if (expected->aad) {
677 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad,
682 * Supply the AAD in chunks less than the block size where possible
685 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad, 1))
691 expected->aad + donelen,
698 expected->aad + donelen, 1)
    [all...]
  /src/external/bsd/wpa/dist/src/rsn_supp/
wpa.c 145 const u8 *aad[1]; local
179 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to
181 aad[0] = buf;
185 1, aad, aad_len, key_data) < 0) {
3486 const u8 *aad[1]; local
3510 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to
3512 aad[0] = buf;
3515 1, aad, aad_len, tmp) < 0) {
6109 wpa_hexdump(MSG_DEBUG, "FILS: SNonce for AEAD AAD",
6112 wpa_hexdump(MSG_DEBUG, "FILS: ANonce for AEAD AAD",
    [all...]
  /src/crypto/external/bsd/openssl/dist/apps/
speed.c 464 static unsigned char aad[EVP_AEAD_TLS1_AAD_LEN] = { 0xcc }; variable
766 * 13-byte AAD followed by payload. But don't use TLS-formatted AAD, as
815 if (!EVP_EncryptUpdate(ctx, NULL, &outl, aad, sizeof(aad))) {
816 BIO_printf(bio_err, "\nCouldn't insert AAD when encrypting\n");
834 * 13-byte AAD followed by payload. But don't use TLS-formatted AAD, as
903 if (!EVP_DecryptUpdate(ctx, NULL, &outl, aad, sizeof(aad))) {
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
evp_test.c 536 unsigned char *aad[AAD_NUM]; member in struct:cipher_data_st
605 OPENSSL_free(cdat->aad[i]);
646 if (strcmp(keyword, "AAD") == 0 || tls_aad) {
648 if (cdat->aad[i] == NULL)
649 return parse_bin(value, &cdat->aad[i], &cdat->aad_len[i]);
875 if (expected->aad[0] != NULL && !expected->tls_aad) {
878 for (i = 0; expected->aad[i] != NULL; i++) {
879 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i],
885 * Supply the AAD in chunks less than the block size where possible
887 for (i = 0; expected->aad[i] != NULL; i++)
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
speed.c 992 * 13-byte AAD followed by payload. But don't use TLS-formatted AAD, as
1001 unsigned char aad[13] = { 0xcc }; local
1011 EVP_DecryptUpdate(ctx, NULL, &outl, aad, sizeof(aad));
1018 EVP_EncryptUpdate(ctx, NULL, &outl, aad, sizeof(aad));
3650 unsigned char aad[EVP_AEAD_TLS1_AAD_LEN]; local
3655 memset(aad, 0, 8); /* avoid uninitialized values */
3656 aad[8] = 23; /* SSL3_RT_APPLICATION_DATA *
    [all...]
  /src/crypto/external/apache2/openssl/dist/apps/
speed.c 600 static unsigned char aad[EVP_AEAD_TLS1_AAD_LEN] = { 0xcc }; variable
993 * 13-byte AAD followed by payload. But don't use TLS-formatted AAD, as
1043 if (!EVP_EncryptUpdate(ctx, NULL, &outl, aad, sizeof(aad))) {
1044 BIO_printf(bio_err, "\nCouldn't insert AAD when encrypting\n");
1062 * 13-byte AAD followed by payload. But don't use TLS-formatted AAD, as
1132 if (!EVP_DecryptUpdate(ctx, NULL, &outl, aad, sizeof(aad))) {
    [all...]

Completed in 67 milliseconds