Searched defs:aad_len (Results 1 - 8 of 8) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-ccm.c29 const u8 *aad, size_t aad_len, size_t plain_len,
37 b[0] = aad_len ? 0x40 : 0 /* Adata */;
46 if (!aad_len)
49 WPA_PUT_BE16(aad_buf, aad_len);
50 os_memcpy(aad_buf + 2, aad, aad_len);
51 os_memset(aad_buf + 2 + aad_len, 0, sizeof(aad_buf) - 2 - aad_len);
56 if (aad_len > AES_BLOCK_SIZE - 2) {
147 /* AES-CCM with fixed L=2 and aad_len <= 30 assumption */
150 const u8 *aad, size_t aad_len, u
28 aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, const u8 *aad, size_t aad_len, size_t plain_len, u8 *x) argument
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
[all...]
H A Daes-gcm.c229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, argument
241 ghash(H, aad, aad_len, S);
243 WPA_PUT_BE64(len_buf, aad_len * 8);
256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S);
290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain)
306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S);
323 const u8 *aad, size_t aad_len, u8 *tag)
325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
/external/wpa_supplicant_8/src/crypto/
H A Daes-ccm.c29 const u8 *aad, size_t aad_len, size_t plain_len,
37 b[0] = aad_len ? 0x40 : 0 /* Adata */;
46 if (!aad_len)
49 WPA_PUT_BE16(aad_buf, aad_len);
50 os_memcpy(aad_buf + 2, aad, aad_len);
51 os_memset(aad_buf + 2 + aad_len, 0, sizeof(aad_buf) - 2 - aad_len);
56 if (aad_len > AES_BLOCK_SIZE - 2) {
147 /* AES-CCM with fixed L=2 and aad_len <= 30 assumption */
150 const u8 *aad, size_t aad_len, u
28 aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, const u8 *aad, size_t aad_len, size_t plain_len, u8 *x) argument
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
[all...]
H A Daes-gcm.c229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, argument
241 ghash(H, aad, aad_len, S);
243 WPA_PUT_BE64(len_buf, aad_len * 8);
256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S);
290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain)
306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S);
323 const u8 *aad, size_t aad_len, u8 *tag)
325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-ccm.c29 const u8 *aad, size_t aad_len, size_t plain_len,
37 b[0] = aad_len ? 0x40 : 0 /* Adata */;
46 if (!aad_len)
49 WPA_PUT_BE16(aad_buf, aad_len);
50 os_memcpy(aad_buf + 2, aad, aad_len);
51 os_memset(aad_buf + 2 + aad_len, 0, sizeof(aad_buf) - 2 - aad_len);
56 if (aad_len > AES_BLOCK_SIZE - 2) {
147 /* AES-CCM with fixed L=2 and aad_len <= 30 assumption */
150 const u8 *aad, size_t aad_len, u
28 aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, const u8 *aad, size_t aad_len, size_t plain_len, u8 *x) argument
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
[all...]
H A Daes-gcm.c229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, argument
241 ghash(H, aad, aad_len, S);
243 WPA_PUT_BE64(len_buf, aad_len * 8);
256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S);
290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain)
306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S);
323 const u8 *aad, size_t aad_len, u8 *tag)
325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
/external/chromium_org/net/quic/crypto/
H A Daes_128_gcm_12_decrypter_test.cc50 size_t aad_len; member in struct:__anon8895::TestGroupInfo
324 size_t aad_len; local
341 DecodeHexString(test_vector[j].aad, aad, &aad_len, sizeof(aad)));
351 EXPECT_EQ(test_info.aad_len, aad_len * 8);
371 StringPiece(aad_len ? aad : NULL, aad_len), ciphertext));
H A Daes_128_gcm_12_encrypter_test.cc50 size_t aad_len; member in struct:__anon8899::TestGroupInfo
276 size_t aad_len; local
293 DecodeHexString(test_vector[j].aad, aad, &aad_len, sizeof(aad)));
303 EXPECT_EQ(test_info.aad_len, aad_len * 8);
314 StringPiece(aad_len ? aad : NULL, aad_len), StringPiece(pt, pt_len)));

Completed in 99 milliseconds