| /src/crypto/external/apache2/openssl/dist/ssl/record/methods/ |
| tls_multib.c | 71 unsigned char aad[13]; local 120 memcpy(aad, rl->sequence, 8); 121 aad[8] = templates[0].type; 122 aad[9] = (unsigned char)(templates[0].version >> 8); 123 aad[10] = (unsigned char)(templates[0].version); 124 aad[11] = 0; 125 aad[12] = 0; 127 mb_param.inp = aad;
|
| /src/sys/external/isc/libsodium/src/ |
| sodium_selftest.c | 104 static const uint8_t aad[] = { local 140 uint8_t aadbuf[sizeof(aad) + TESTALIGN]; 173 memcpy(aadbuf + j, aad, sizeof(aad)); 180 aadbuf + j, sizeof(aad), 218 memcpy(aadbuf + j, aad, sizeof(aad)); 226 aadbuf + j, sizeof(aad), 262 aadbuf + j, sizeof(aad), 294 aadbuf + j, sizeof(aad), 345 static const uint8_t aad[] = { local [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/ |
| cipher_chacha20_poly1305.h | 26 uint64_t aad, text; member in struct:__anon509::__anon510 28 unsigned int aad : 1; member in struct:__anon509 40 int (*tls_init)(PROV_CIPHER_CTX *ctx, unsigned char *aad, size_t alen);
|
| cipher_aes_gcm_siv.h | 18 /* AAD manipulation macros */ 36 uint8_t *aad; /* Allocated, rounded up to 16 bytes, from user */ member in struct:prov_aes_gcm_siv_ctx_st 39 size_t aad_len; /* actual AAD length */
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/ |
| cipher_chacha20_poly1305.h | 25 struct { uint64_t aad, text; } len; member in struct:__anon1573::__anon1574 26 unsigned int aad : 1; member in struct:__anon1573 38 int (*tls_init)(PROV_CIPHER_CTX *ctx, unsigned char *aad, size_t alen);
|
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| e_chacha20_poly1305.c | 160 uint64_t aad, text; member in struct:__anon286::__anon287 162 int aad, mac_inited, tag_len, nonce_len; member in struct:__anon286 179 actx->len.aad = 0; 181 actx->aad = 0; 240 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN; 265 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN; 299 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN; 322 ctr[0] = (unsigned char)(actx->len.aad); 323 ctr[1] = (unsigned char)(actx->len.aad >> 8); 324 ctr[2] = (unsigned char)(actx->len.aad >> 16) 574 unsigned char *aad = ptr; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| e_chacha20_poly1305.c | 158 struct { uint64_t aad, text; } len; member in struct:__anon1395::__anon1396 159 int aad, mac_inited, tag_len, nonce_len; member in struct:__anon1395 176 actx->len.aad = 0; 178 actx->aad = 0; 238 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN; 263 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN; 297 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN; 320 ctr[0] = (unsigned char)(actx->len.aad); 321 ctr[1] = (unsigned char)(actx->len.aad>>8); 322 ctr[2] = (unsigned char)(actx->len.aad>>16) 574 unsigned char *aad = ptr; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
| e_chacha20_poly1305.c | 156 struct { uint64_t aad, text; } len; member in struct:__anon2037::__anon2038 157 int aad, mac_inited, tag_len, nonce_len; member in struct:__anon2037 174 actx->len.aad = 0; 176 actx->aad = 0; 236 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN; 261 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN; 295 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN; 321 ctr[0] = (unsigned char)(actx->len.aad); 322 ctr[1] = (unsigned char)(actx->len.aad>>8); 323 ctr[2] = (unsigned char)(actx->len.aad>>16) 578 unsigned char *aad = ptr; local [all...] |
| /src/external/bsd/libfido2/dist/tools/ |
| largeblob.c | 362 uint8_t aad[4 + sizeof(uint64_t)]; local 392 aad[0] = 0x62; /* b */ 393 aad[1] = 0x6c; /* l */ 394 aad[2] = 0x6f; /* o */ 395 aad[3] = 0x62; /* b */ 397 memcpy(&aad[4], &tmp, sizeof(uint64_t)); 398 if (EVP_Cipher(ctx, NULL, aad, (u_int)sizeof(aad)) < 0 ||
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| mesh_rsn.c | 558 const u8 *aad[] = { rsn->wpa_s->own_addr, sta->addr, cat }; local 635 aad, aad_len, mic_payload)) { 658 const u8 *aad[] = { sta->addr, wpa_s->own_addr, cat }; local 708 aad, aad_len, ampe_buf)) {
|
| dpp_supplicant.c | 3799 const u8 *aad; local 3836 aad = wpabuf_head_u8(msg) + 2; /* from the OUI field (inclusive) */ 3838 wpa_hexdump(MSG_MSGDUMP, "DPP: AAD for HPKE", aad, aad_len); 3841 intro->peer_key, NULL, 0, aad, aad_len,
|
| /src/external/bsd/libfido2/dist/src/ |
| largeblob.c | 50 largeblob_aad(fido_blob_t *aad, uint64_t size) 61 return fido_blob_set(aad, buf, sizeof(buf)); 67 fido_blob_t *plaintext = NULL, *aad = NULL; local 71 (aad = fido_blob_new()) == NULL) { 75 if (largeblob_aad(aad, blob->origsiz) < 0) { 79 if (aes256_gcm_dec(key, &blob->nonce, aad, &blob->ciphertext, 87 fido_blob_free(&aad); 121 fido_blob_t *plaintext = NULL, *aad = NULL; local 125 (aad = fido_blob_new()) == NULL) { 133 if (largeblob_aad(aad, body->len) < 0) [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/record/ |
| rec_layer_s3.c | 457 unsigned char aad[13]; local 511 memcpy(aad, s->rlayer.write_sequence, 8); 512 aad[8] = type; 513 aad[9] = (unsigned char)(s->version >> 8); 514 aad[10] = (unsigned char)(s->version); 515 aad[11] = 0; 516 aad[12] = 0; 518 mb_param.inp = aad;
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/record/ |
| rec_layer_s3.c | 440 unsigned char aad[13]; local 494 memcpy(aad, s->rlayer.write_sequence, 8); 495 aad[8] = type; 496 aad[9] = (unsigned char)(s->version >> 8); 497 aad[10] = (unsigned char)(s->version); 498 aad[11] = 0; 499 aad[12] = 0; 501 mb_param.inp = aad;
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| hpke_test.c | 53 const unsigned char *aad; member in struct:__anon710 162 aead[i].aad, aead[i].aadlen, 199 aead[i].aad, aead[i].aadlen, 988 * a key gen, encrypt and decrypt for each. The aad, info, and 1006 unsigned char aad[OSSL_HPKE_TSTSIZE]; local 1027 * Randomly try with/without info, aad, seq. Given mode and suite 1033 aadp = aad; 1034 memset(aad, 'a', aadlen);
|
| evp_test.c | 894 unsigned char *aad[AAD_NUM]; member in struct:cipher_data_st 994 OPENSSL_free(cdat->aad[i]); 1036 if (strcmp(keyword, "AAD") == 0 || tls_aad) { 1038 if (cdat->aad[i] == NULL) 1039 return parse_bin(value, &cdat->aad[i], &cdat->aad_len[i]); 1287 if (expected->aad[0] != NULL && !expected->tls_aad) { 1291 for (i = 0; expected->aad[i] != NULL; i++) { 1301 expected->aad[i] + donelen, 1309 /* Supply the AAD in chunks less than the block size where possible */ 1310 for (i = 0; expected->aad[i] != NULL; i++) [all...] |
| /src/external/bsd/wpa/dist/src/ap/ |
| dpp_hostapd.c | 2795 const u8 *aad = hdr; local 2854 aad, aad_len, wrapped, wrapped_len);
|
| wpa_auth.c | 2072 const u8 *aad[1]; local 2081 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to 2083 aad[0] = (u8 *) hdr; 2086 1, aad, aad_len, key_mic + 2) < 0) { 3052 const u8 *aad[1]; local 3071 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to 3073 aad[0] = buf; 3076 1, aad, aad_len, tmp) < 0) { 3202 const u8 *aad[5]; local 3245 /* AES-SIV AAD vectors * 3292 const u8 *aad[5]; local [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| crypto_module_tests.c | 2207 const char *aad; member in struct:hpke_test 2222 .aad = "436f756e742d30", 2237 .aad = "436f756e742d30", 2252 .aad = "436f756e742d30", 2267 .aad = "436f756e742d30", 2282 .aad = "436f756e742d30", 2297 .aad = "436f756e742d30", 2312 .aad = "436f756e742d30", 2320 struct wpabuf *info, *pk_r, *sk_r, *enc, *pt, *aad, *ct; local 2333 aad = wpabuf_parse_bin(test->aad) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| evp_test.c | 483 unsigned char *aad; member in struct:cipher_data_st 529 OPENSSL_free(cdat->aad); 547 if (strcmp(keyword, "AAD") == 0) 548 return parse_bin(value, &cdat->aad, &cdat->aad_len); 674 if (expected->aad) { 677 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad, 682 * Supply the AAD in chunks less than the block size where possible 685 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad, 1)) 691 expected->aad + donelen, 698 expected->aad + donelen, 1) [all...] |
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| wpa.c | 145 const u8 *aad[1]; local 179 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to 181 aad[0] = buf; 185 1, aad, aad_len, key_data) < 0) { 3486 const u8 *aad[1]; local 3510 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to 3512 aad[0] = buf; 3515 1, aad, aad_len, tmp) < 0) { 6109 wpa_hexdump(MSG_DEBUG, "FILS: SNonce for AEAD AAD", 6112 wpa_hexdump(MSG_DEBUG, "FILS: ANonce for AEAD AAD", [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| speed.c | 464 static unsigned char aad[EVP_AEAD_TLS1_AAD_LEN] = { 0xcc }; variable 766 * 13-byte AAD followed by payload. But don't use TLS-formatted AAD, as 815 if (!EVP_EncryptUpdate(ctx, NULL, &outl, aad, sizeof(aad))) { 816 BIO_printf(bio_err, "\nCouldn't insert AAD when encrypting\n"); 834 * 13-byte AAD followed by payload. But don't use TLS-formatted AAD, as 903 if (!EVP_DecryptUpdate(ctx, NULL, &outl, aad, sizeof(aad))) { [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_test.c | 536 unsigned char *aad[AAD_NUM]; member in struct:cipher_data_st 605 OPENSSL_free(cdat->aad[i]); 646 if (strcmp(keyword, "AAD") == 0 || tls_aad) { 648 if (cdat->aad[i] == NULL) 649 return parse_bin(value, &cdat->aad[i], &cdat->aad_len[i]); 875 if (expected->aad[0] != NULL && !expected->tls_aad) { 878 for (i = 0; expected->aad[i] != NULL; i++) { 879 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad[i], 885 * Supply the AAD in chunks less than the block size where possible 887 for (i = 0; expected->aad[i] != NULL; i++) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| speed.c | 992 * 13-byte AAD followed by payload. But don't use TLS-formatted AAD, as 1001 unsigned char aad[13] = { 0xcc }; local 1011 EVP_DecryptUpdate(ctx, NULL, &outl, aad, sizeof(aad)); 1018 EVP_EncryptUpdate(ctx, NULL, &outl, aad, sizeof(aad)); 3650 unsigned char aad[EVP_AEAD_TLS1_AAD_LEN]; local 3655 memset(aad, 0, 8); /* avoid uninitialized values */ 3656 aad[8] = 23; /* SSL3_RT_APPLICATION_DATA * [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| speed.c | 600 static unsigned char aad[EVP_AEAD_TLS1_AAD_LEN] = { 0xcc }; variable 993 * 13-byte AAD followed by payload. But don't use TLS-formatted AAD, as 1043 if (!EVP_EncryptUpdate(ctx, NULL, &outl, aad, sizeof(aad))) { 1044 BIO_printf(bio_err, "\nCouldn't insert AAD when encrypting\n"); 1062 * 13-byte AAD followed by payload. But don't use TLS-formatted AAD, as 1132 if (!EVP_DecryptUpdate(ctx, NULL, &outl, aad, sizeof(aad))) { [all...] |