HomeSort by: relevance | last modified time | path
    Searched refs:aadlen (Results 1 - 16 of 16) sorted by relevancy

  /src/crypto/external/bsd/openssh/dist/
cipher-chachapoly.c 59 * En/decrypt with header key 'aadlen' bytes from 'src', storing result
62 * En/decrypt 'len' bytes at offset 'aadlen' from 'src' to 'dest'. Use
63 * POLY1305_TAGLEN bytes at offset 'len'+'aadlen' as the authentication
68 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt)
87 const u_char *tag = src + aadlen + len;
89 poly1305_auth(expected_tag, src, aadlen + len, poly_key);
97 if (aadlen) {
99 chacha_encrypt_bytes(&ctx->header_ctx, src, dest, aadlen);
104 chacha_encrypt_bytes(&ctx->main_ctx, src + aadlen,
105 dest + aadlen, len)
    [all...]
cipher-chachapoly-libcrypto.c 75 * En/decrypt with header key 'aadlen' bytes from 'src', storing result
78 * En/decrypt 'len' bytes at offset 'aadlen' from 'src' to 'dest'. Use
79 * POLY1305_TAGLEN bytes at offset 'len'+'aadlen' as the authentication
84 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt)
106 const u_char *tag = src + aadlen + len;
108 poly1305_auth(expected_tag, src, aadlen + len, poly_key);
116 if (aadlen) {
118 EVP_Cipher(ctx->header_evp, dest, src, aadlen) < 0) {
127 EVP_Cipher(ctx->main_evp, dest + aadlen, src + aadlen, len) < 0)
    [all...]
cipher-chachapoly.h 35 u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen,
cipher.c 360 * Copy 'aadlen' bytes (without en/decryption) from 'src' to 'dest'.
363 * En/Decrypt 'len' bytes at offset 'aadlen' from 'src' to 'dest'.
364 * Use 'authlen' bytes at offset 'len'+'aadlen' as the authentication tag.
366 * Both 'aadlen' and 'authlen' can be set to 0.
370 const u_char *src, u_int len, u_int aadlen, u_int authlen)
374 len, aadlen, authlen, cc->encrypt);
377 memcpy(dest, src, aadlen + len);
382 if (aadlen)
383 memcpy(dest, src, aadlen);
384 aesctr_encrypt_bytes(&cc->ac_ctx, src + aadlen,
    [all...]
packet.c 1174 u_int authlen = 0, aadlen = 0; local
1190 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0;
1226 len -= aadlen; /* packet length is not encrypted for EtM modes */
1270 DBG(debug("send: len %d (includes padlen %d, aadlen %d)",
1271 len, padlen, aadlen));
1287 len - aadlen, aadlen, authlen)) != 0)
1292 /* EtM: compute mac over aadlen + cipher text */
1575 u_int maclen, aadlen = 0, authlen = 0, block_size; local
1599 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0
    [all...]
  /src/crypto/external/apache2/openssl/dist/util/
cavs-to-evptest.pl 23 my $aadlen = 0;
49 $aadlen = $2;
87 $aadlen = $2;
95 if ($aadlen > 0) {
  /src/crypto/external/bsd/openssl/dist/util/
cavs-to-evptest.pl 23 my $aadlen = 0;
49 $aadlen = $2;
87 $aadlen = $2;
95 if ($aadlen > 0) {
  /src/crypto/external/bsd/openssl.old/dist/util/
cavs-to-evptest.pl 23 my $aadlen = 0;
49 $aadlen = $2;
87 $aadlen = $2;
95 if ($aadlen > 0) {
  /src/crypto/external/apache2/openssl/dist/include/openssl/
hpke.h 118 const unsigned char *aad, size_t aadlen,
131 const unsigned char *aad, size_t aadlen,
  /src/crypto/external/apache2/openssl/dist/providers/implementations/include/prov/
ciphercommon_ccm.h 54 PROV_CIPHER_FUNC(int, CCM_setaad, (PROV_CCM_CTX * ctx, const unsigned char *aad, size_t aadlen));
ciphercommon_gcm.h 86 PROV_CIPHER_FUNC(int, GCM_aadupdate, (PROV_GCM_CTX * ctx, const unsigned char *aad, size_t aadlen));
  /src/crypto/external/bsd/openssl/dist/providers/implementations/include/prov/
ciphercommon_ccm.h 56 const unsigned char *aad, size_t aadlen));
ciphercommon_gcm.h 86 const unsigned char *aad, size_t aadlen));
  /src/crypto/external/apache2/openssl/dist/crypto/hpke/
hpke.c 134 * @param aadlen is the length of the aad
142 const unsigned char *aad, size_t aadlen,
176 if (aadlen != 0 && aad != NULL) {
177 if (EVP_DecryptUpdate(ctx, NULL, &len, aad, aadlen) != 1) {
211 * @param aadlen is the length of the aad
219 const unsigned char *aad, size_t aadlen,
258 if (aadlen != 0 && aad != NULL) {
259 if (EVP_EncryptUpdate(ctx, NULL, &len, aad, aadlen) != 1) {
1165 const unsigned char *aad, size_t aadlen,
1194 if (hpke_aead_enc(ctx, seqbuf, aad, aadlen, pt, ptlen, ct, ctlen) != 1)
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/
cipher_aes_gcm_hw_vaes_avx512.inc 39 size_t aadlen);
  /src/crypto/external/apache2/openssl/dist/test/
hpke_test.c 54 size_t aadlen; member in struct:__anon710
162 aead[i].aad, aead[i].aadlen,
199 aead[i].aad, aead[i].aadlen,
1005 size_t aadlen = OSSL_HPKE_TSTSIZE; local
1034 memset(aad, 'a', aadlen);
1036 aadlen = 0;
1125 aadp, aadlen,
1131 aadp, aadlen,
1169 aadp, aadlen, cipher,
1175 aadp, aadlen, cipher
    [all...]

Completed in 36 milliseconds