/external/boringssl/src/crypto/cipher/ |
H A D | cipher_test.cc | 111 const std::vector<uint8_t> &aad, 154 // parameters are NULL, so it is important to skip the |in| and |aad| 160 (!aad.empty() && 161 !EVP_CipherUpdate(ctx.get(), nullptr, &unused, bssl::vector_data(&aad), 162 aad.size())) || 204 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; local 215 if (!t->GetBytes(&aad, "AAD") || 241 ciphertext, aad, tag)) { 246 ciphertext, aad, tag)) { 104 TestOperation(FileTest *t, const EVP_CIPHER *cipher, bool encrypt, const std::vector<uint8_t> &key, const std::vector<uint8_t> &iv, const std::vector<uint8_t> &plaintext, const std::vector<uint8_t> &ciphertext, const std::vector<uint8_t> &aad, const std::vector<uint8_t> &tag) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes_wrap.h | 53 const u8 *aad, size_t aad_len, 58 const u8 *aad, size_t aad_len, const u8 *tag, 62 const u8 *aad, size_t aad_len, u8 *tag); 65 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth); 68 const u8 *aad, size_t aad_len, const u8 *auth,
|
H A D | aes-gcm.c | 229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, argument 241 ghash(H, aad, aad_len, S); 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) 272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S); 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); 323 const u8 *aad, size_t aad_len, u8 *tag) 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL, 254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
|
H A D | aes-ccm.c | 29 const u8 *aad, size_t aad_len, size_t plain_len, 50 os_memcpy(aad_buf + 2, aad, aad_len); 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 28 aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, const u8 *aad, size_t aad_len, size_t plain_len, u8 *x) argument 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes_wrap.h | 53 const u8 *aad, size_t aad_len, 58 const u8 *aad, size_t aad_len, const u8 *tag, 62 const u8 *aad, size_t aad_len, u8 *tag); 65 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth); 68 const u8 *aad, size_t aad_len, const u8 *auth,
|
H A D | aes-gcm.c | 229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, argument 241 ghash(H, aad, aad_len, S); 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) 272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S); 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); 323 const u8 *aad, size_t aad_len, u8 *tag) 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL, 254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
|
H A D | aes-ccm.c | 29 const u8 *aad, size_t aad_len, size_t plain_len, 50 os_memcpy(aad_buf + 2, aad, aad_len); 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 28 aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, const u8 *aad, size_t aad_len, size_t plain_len, u8 *x) argument 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes_wrap.h | 53 const u8 *aad, size_t aad_len, 58 const u8 *aad, size_t aad_len, const u8 *tag, 62 const u8 *aad, size_t aad_len, u8 *tag); 65 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth); 68 const u8 *aad, size_t aad_len, const u8 *auth,
|
H A D | aes-gcm.c | 229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, argument 241 ghash(H, aad, aad_len, S); 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) 272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S); 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); 323 const u8 *aad, size_t aad_len, u8 *tag) 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL, 254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
|
H A D | aes-ccm.c | 29 const u8 *aad, size_t aad_len, size_t plain_len, 50 os_memcpy(aad_buf + 2, aad, aad_len); 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 28 aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, const u8 *aad, size_t aad_len, size_t plain_len, u8 *x) argument 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
/external/llvm/test/MC/X86/ |
H A D | x86-16.s | 568 // CHECK: aad $1 570 aad $1 572 // CHECK: aad 574 aad $0xA 576 // CHECK: aad 578 aad
|
H A D | x86-32.s | 660 // CHECK: aad $1 662 aad $1 664 // CHECK: aad 666 aad $0xA 668 // CHECK: aad 670 aad
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLCipher.java | 871 private byte[] aad; field in class:OpenSSLCipher.EVP_AEAD 1004 iv, buf, 0, bufCount, aad); 1007 iv, buf, 0, bufCount, aad); 1054 if (aad == null) { 1055 aad = Arrays.copyOfRange(input, inputOffset, inputLen); 1057 int newSize = aad.length + inputLen; 1059 System.arraycopy(aad, 0, newaad, 0, aad.length); 1060 System.arraycopy(input, inputOffset, newaad, aad.length, inputLen);
|
/external/boringssl/include/openssl/ |
H A D | modes.h | 114 OPENSSL_EXPORT int CRYPTO_gcm128_aad(GCM128_CONTEXT *ctx, const uint8_t *aad,
|
/external/boringssl/src/include/openssl/ |
H A D | modes.h | 114 OPENSSL_EXPORT int CRYPTO_gcm128_aad(GCM128_CONTEXT *ctx, const uint8_t *aad,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | mesh_rsn.c | 439 const u8 *aad[] = { rsn->wpa_s->own_addr, sta->addr, cat }; local 488 aad, aad_len, mic_payload)) { 513 const u8 *aad[] = { sta->addr, wpa_s->own_addr, cat }; local 543 aad, aad_len, ampe_buf)) {
|
/external/boringssl/src/crypto/modes/ |
H A D | gcm.c | 568 int CRYPTO_gcm128_aad(GCM128_CONTEXT *ctx, const uint8_t *aad, size_t len) { argument 593 ctx->Xi.c[n] ^= *(aad++); 607 GHASH(ctx, aad, i); 608 aad += i; 614 ctx->Xi.c[i] ^= aad[i]; 617 aad += 16; 624 ctx->Xi.c[i] ^= aad[i];
|
/external/valgrind/exp-dhat/ |
H A D | dh_main.c | 1115 ULong aad = api->deaths == 0 local 1122 ? 0 : (10000ULL * aad) / g_guest_instrs_executed; 1127 api->deaths, aad, buf );
|
/external/mesa3d/src/mesa/x86/ |
H A D | assyntax.h | 381 #define AAD CHOICE(aad, aad, aad) 1117 #define AAD aad
|
/external/valgrind/VEX/test/ |
H A D | test-amd64.c | 861 TEST_BCD(aad, 0x12340407, CC_A, (CC_C | CC_P | CC_Z | CC_S | CC_O | CC_A));
|
H A D | test-i386.c | 823 TEST_BCD(aad, 0x12340407, CC_A, (CC_C | CC_P | CC_Z | CC_S | CC_O | CC_A));
|
/external/conscrypt/src/main/native/ |
H A D | org_conscrypt_NativeCrypto.cpp | 5212 UniquePtr<ScopedByteArrayRO> aad; local 5216 aad.reset(new ScopedByteArrayRO(env, aadArray)); 5217 aad_chars = reinterpret_cast<const uint8_t*>(aad->get()); 5221 aad_chars_size = aad->size();
|
/external/valgrind/perf/ |
H A D | tinycc.c | 3142 DEF_ASM_OP0(aad, 0xd50a) 3599 DEF_ASM_OP0(aad, 0xd50a) 4474 DEF_ASM_OP0(aad, 0xd50a) 4931 DEF_ASM_OP0(aad, 0xd50a) 15181 DEF_ASM_OP0(aad, 0xd50a) 15643 DEF_ASM_OP0(aad, 0xd50a)
|