/external/wpa_supplicant_8/src/crypto/ |
D | aes-ccm.c | 29 const u8 *aad, size_t aad_len, size_t plain_len, in aes_ccm_auth_start() argument 37 b[0] = aad_len ? 0x40 : 0 /* Adata */; in aes_ccm_auth_start() 46 if (!aad_len) in aes_ccm_auth_start() 49 WPA_PUT_BE16(aad_buf, aad_len); in aes_ccm_auth_start() 50 os_memcpy(aad_buf + 2, aad, aad_len); in aes_ccm_auth_start() 51 os_memset(aad_buf + 2 + aad_len, 0, sizeof(aad_buf) - 2 - aad_len); in aes_ccm_auth_start() 56 if (aad_len > AES_BLOCK_SIZE - 2) { in aes_ccm_auth_start() 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) in aes_ccm_ae() argument 156 if (aad_len > 30 || M > AES_BLOCK_SIZE) in aes_ccm_ae() 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); in aes_ccm_ae() [all …]
|
D | aes-gcm.c | 229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, in aes_gcm_ghash() argument 241 ghash(H, aad, aad_len, S); in aes_gcm_ghash() 243 WPA_PUT_BE64(len_buf, aad_len * 8); in aes_gcm_ghash() 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) in aes_gcm_ae() argument 272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S); in aes_gcm_ae() 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) in aes_gcm_ad() argument 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); in aes_gcm_ad() 323 const u8 *aad, size_t aad_len, u8 *tag) in aes_gmac() argument 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL, in aes_gmac()
|
D | aes_wrap.h | 55 const u8 *aad, size_t aad_len, 60 const u8 *aad, size_t aad_len, const u8 *tag, 64 const u8 *aad, size_t aad_len, u8 *tag); 67 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth); 70 const u8 *aad, size_t aad_len, const u8 *auth,
|
/external/boringssl/src/crypto/fipsmodule/modes/ |
D | ccm.c | 87 const uint8_t *aad, size_t aad_len, in ccm128_init_state() argument 102 if (aad_len != 0) { in ccm128_init_state() 113 if (aad_len != 0) { in ccm128_init_state() 116 uint64_t aad_len_u64 = aad_len; in ccm128_init_state() 144 for (; i < 16 && aad_len != 0; i++) { in ccm128_init_state() 147 aad_len--; in ccm128_init_state() 152 } while (aad_len != 0); in ccm128_init_state() 238 size_t aad_len) { in CRYPTO_ccm128_encrypt() argument 240 return ccm128_init_state(ctx, &state, key, nonce, nonce_len, aad, aad_len, in CRYPTO_ccm128_encrypt() 250 size_t aad_len) { in CRYPTO_ccm128_decrypt() argument [all …]
|
D | internal.h | 372 size_t aad_len); 381 size_t aad_len);
|
/external/kernel-headers/original/uapi/linux/ |
D | virtio_crypto.h | 172 __le32 aad_len; member 201 __le32 aad_len; member 324 __le32 aad_len; member 364 __le32 aad_len; member
|
/external/boringssl/src/fipstools/ |
D | cavp_aes_gcm_test.cc | 96 size_t aad_len = strtoul(aad_len_str.c_str(), nullptr, 0) / 8; in TestAEADDecrypt() local 110 aad.size() != aad_len || in TestAEADDecrypt()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | mesh_rsn.c | 541 const size_t aad_len[] = { ETH_ALEN, ETH_ALEN, ie - cat }; in mesh_rsn_protect_frame() local 621 aad, aad_len, mic_payload)) { in mesh_rsn_protect_frame() 645 const size_t aad_len[] = { ETH_ALEN, ETH_ALEN, in mesh_rsn_process_ampe() local 694 aad, aad_len, ampe_buf)) { in mesh_rsn_process_ampe()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth.c | 1522 size_t aad_len[1]; in __wpa_send_eapol() local 1533 aad_len[0] = key_mic + 2 - (u8 *) hdr; in __wpa_send_eapol() 1535 1, aad, aad_len, key_mic + 2) < 0) { in __wpa_send_eapol() 2279 size_t aad_len[1]; in wpa_aead_decrypt() local 2300 aad_len[0] = pos - buf; in wpa_aead_decrypt() 2302 1, aad, aad_len, tmp) < 0) { in wpa_aead_decrypt() 2429 size_t aad_len[5]; in fils_decrypt_assoc() local 2475 aad_len[0] = ETH_ALEN; in fils_decrypt_assoc() 2478 aad_len[1] = ETH_ALEN; in fils_decrypt_assoc() 2481 aad_len[2] = FILS_NONCE_LEN; in fils_decrypt_assoc() [all …]
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 105 size_t aad_len[1]; in wpa_eapol_key_send() local 141 aad_len[0] = key_data - buf; in wpa_eapol_key_send() 144 1, aad, aad_len, key_data) < 0) { in wpa_eapol_key_send() 2099 size_t aad_len[1]; in wpa_supp_aead_decrypt() local 2125 aad_len[0] = pos - buf; in wpa_supp_aead_decrypt() 2127 1, aad, aad_len, tmp) < 0) { in wpa_supp_aead_decrypt()
|