/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-cbc.c | 27 u8 cbc[AES_BLOCK_SIZE]; 34 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 36 blocks = data_len / AES_BLOCK_SIZE; 38 for (j = 0; j < AES_BLOCK_SIZE; j++) 41 os_memcpy(pos, cbc, AES_BLOCK_SIZE); 42 pos += AES_BLOCK_SIZE; 60 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; 67 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 69 blocks = data_len / AES_BLOCK_SIZE; [all...] |
H A D | aes-ctr.c | 31 u8 counter[AES_BLOCK_SIZE], buf[AES_BLOCK_SIZE]; 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE); 41 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; 47 for (i = AES_BLOCK_SIZE - 1; i >= 0; i--) {
|
H A D | aes-omac1.c | 21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 23 pad[AES_BLOCK_SIZE - 1] <<= 1; 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 47 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; 54 os_memset(cbc, 0, AES_BLOCK_SIZE); 65 while (left >= AES_BLOCK_SIZE) { 66 for (i = 0; i < AES_BLOCK_SIZE; i++) { 73 if (i + 1 == AES_BLOCK_SIZE && 74 left == AES_BLOCK_SIZE) [all...] |
H A D | aes-ccm.c | 32 u8 aad_buf[2 * AES_BLOCK_SIZE]; 33 u8 b[AES_BLOCK_SIZE]; 41 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); 43 wpa_hexdump_key(MSG_EXCESSIVE, "CCM B_0", b, AES_BLOCK_SIZE); 56 if (aad_len > AES_BLOCK_SIZE - 2) { 57 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); 59 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); 66 size_t last = len % AES_BLOCK_SIZE; 69 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { 72 data += AES_BLOCK_SIZE; [all...] |
H A D | aes-siv.c | 17 static const u8 zero[AES_BLOCK_SIZE]; 25 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 27 pad[AES_BLOCK_SIZE - 1] <<= 1; 29 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 37 for (i = 0; i < AES_BLOCK_SIZE; i++) 56 os_memset(pad, 0, AES_BLOCK_SIZE); 59 if (len < AES_BLOCK_SIZE) 67 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; 74 tmp[AES_BLOCK_SIZE [all...] |
H A D | aes-eax.c | 34 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 35 data_mac[AES_BLOCK_SIZE]; 69 for (i = 0; i < AES_BLOCK_SIZE; i++) 98 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 99 data_mac[AES_BLOCK_SIZE]; 139 for (i = 0; i < AES_BLOCK_SIZE; i++) {
|
H A D | aes.h | 12 #define AES_BLOCK_SIZE 16 macro
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-cbc.c | 27 u8 cbc[AES_BLOCK_SIZE]; 34 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 36 blocks = data_len / AES_BLOCK_SIZE; 38 for (j = 0; j < AES_BLOCK_SIZE; j++) 41 os_memcpy(pos, cbc, AES_BLOCK_SIZE); 42 pos += AES_BLOCK_SIZE; 60 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; 67 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 69 blocks = data_len / AES_BLOCK_SIZE; [all...] |
H A D | aes-ctr.c | 31 u8 counter[AES_BLOCK_SIZE], buf[AES_BLOCK_SIZE]; 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE); 41 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; 47 for (i = AES_BLOCK_SIZE - 1; i >= 0; i--) {
|
H A D | aes-omac1.c | 21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 23 pad[AES_BLOCK_SIZE - 1] <<= 1; 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 47 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; 54 os_memset(cbc, 0, AES_BLOCK_SIZE); 65 while (left >= AES_BLOCK_SIZE) { 66 for (i = 0; i < AES_BLOCK_SIZE; i++) { 73 if (i + 1 == AES_BLOCK_SIZE && 74 left == AES_BLOCK_SIZE) [all...] |
H A D | aes-ccm.c | 32 u8 aad_buf[2 * AES_BLOCK_SIZE]; 33 u8 b[AES_BLOCK_SIZE]; 41 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); 43 wpa_hexdump_key(MSG_EXCESSIVE, "CCM B_0", b, AES_BLOCK_SIZE); 56 if (aad_len > AES_BLOCK_SIZE - 2) { 57 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); 59 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); 66 size_t last = len % AES_BLOCK_SIZE; 69 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { 72 data += AES_BLOCK_SIZE; [all...] |
H A D | aes-siv.c | 17 static const u8 zero[AES_BLOCK_SIZE]; 25 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 27 pad[AES_BLOCK_SIZE - 1] <<= 1; 29 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 37 for (i = 0; i < AES_BLOCK_SIZE; i++) 56 os_memset(pad, 0, AES_BLOCK_SIZE); 59 if (len < AES_BLOCK_SIZE) 67 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; 74 tmp[AES_BLOCK_SIZE [all...] |
H A D | aes-eax.c | 34 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 35 data_mac[AES_BLOCK_SIZE]; 69 for (i = 0; i < AES_BLOCK_SIZE; i++) 98 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 99 data_mac[AES_BLOCK_SIZE]; 139 for (i = 0; i < AES_BLOCK_SIZE; i++) {
|
H A D | aes.h | 12 #define AES_BLOCK_SIZE 16 macro
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-cbc.c | 27 u8 cbc[AES_BLOCK_SIZE]; 34 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 36 blocks = data_len / AES_BLOCK_SIZE; 38 for (j = 0; j < AES_BLOCK_SIZE; j++) 41 os_memcpy(pos, cbc, AES_BLOCK_SIZE); 42 pos += AES_BLOCK_SIZE; 60 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; 67 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 69 blocks = data_len / AES_BLOCK_SIZE; [all...] |
H A D | aes-ctr.c | 31 u8 counter[AES_BLOCK_SIZE], buf[AES_BLOCK_SIZE]; 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE); 41 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; 47 for (i = AES_BLOCK_SIZE - 1; i >= 0; i--) {
|
H A D | aes-omac1.c | 21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 23 pad[AES_BLOCK_SIZE - 1] <<= 1; 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 47 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; 54 os_memset(cbc, 0, AES_BLOCK_SIZE); 65 while (left >= AES_BLOCK_SIZE) { 66 for (i = 0; i < AES_BLOCK_SIZE; i++) { 73 if (i + 1 == AES_BLOCK_SIZE && 74 left == AES_BLOCK_SIZE) [all...] |
H A D | aes-ccm.c | 32 u8 aad_buf[2 * AES_BLOCK_SIZE]; 33 u8 b[AES_BLOCK_SIZE]; 41 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); 43 wpa_hexdump_key(MSG_EXCESSIVE, "CCM B_0", b, AES_BLOCK_SIZE); 56 if (aad_len > AES_BLOCK_SIZE - 2) { 57 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); 59 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); 66 size_t last = len % AES_BLOCK_SIZE; 69 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { 72 data += AES_BLOCK_SIZE; [all...] |
H A D | aes-siv.c | 17 static const u8 zero[AES_BLOCK_SIZE]; 25 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 27 pad[AES_BLOCK_SIZE - 1] <<= 1; 29 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 37 for (i = 0; i < AES_BLOCK_SIZE; i++) 56 os_memset(pad, 0, AES_BLOCK_SIZE); 59 if (len < AES_BLOCK_SIZE) 67 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; 74 tmp[AES_BLOCK_SIZE [all...] |
H A D | aes-eax.c | 34 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 35 data_mac[AES_BLOCK_SIZE]; 69 for (i = 0; i < AES_BLOCK_SIZE; i++) 98 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 99 data_mac[AES_BLOCK_SIZE]; 139 for (i = 0; i < AES_BLOCK_SIZE; i++) {
|
H A D | aes.h | 12 #define AES_BLOCK_SIZE 16 macro
|
/external/boringssl/src/crypto/cmac/ |
H A D | cmac.c | 63 uint8_t k1[AES_BLOCK_SIZE]; 64 uint8_t k2[AES_BLOCK_SIZE]; 66 uint8_t block[AES_BLOCK_SIZE]; 143 static const uint8_t kZeroIV[AES_BLOCK_SIZE] = {0}; 147 uint8_t scratch[AES_BLOCK_SIZE]; 149 if (EVP_CIPHER_block_size(cipher) != AES_BLOCK_SIZE || 152 !EVP_Cipher(&ctx->cipher_ctx, scratch, kZeroIV, AES_BLOCK_SIZE) || 171 uint8_t scratch[AES_BLOCK_SIZE]; 174 size_t todo = AES_BLOCK_SIZE - ctx->block_used; 185 * |AES_BLOCK_SIZE|, i [all...] |
/external/openssh/ |
H A D | cipher-aesctr.h | 23 #define AES_BLOCK_SIZE 16 macro 28 u8 ctr[AES_BLOCK_SIZE]; /* counter */
|
H A D | cipher-aesctr.c | 65 memcpy(x->ctr, iv, AES_BLOCK_SIZE); 72 u8 buf[AES_BLOCK_SIZE]; 77 aesctr_inc(x->ctr, AES_BLOCK_SIZE); 80 n = (n + 1) % AES_BLOCK_SIZE;
|
H A D | cipher-ctr.c | 40 u_char aes_counter[AES_BLOCK_SIZE]; 64 u_char buf[AES_BLOCK_SIZE]; 74 ssh_ctr_inc(c->aes_counter, AES_BLOCK_SIZE); 77 n = (n + 1) % AES_BLOCK_SIZE; 96 memcpy(c->aes_counter, iv, AES_BLOCK_SIZE); 133 aes_ctr.block_size = AES_BLOCK_SIZE; 134 aes_ctr.iv_len = AES_BLOCK_SIZE;
|