Searched defs:aad (Results 1 - 25 of 28) sorted by relevance

12

/external/wycheproof/java/com/google/security/wycheproof/testcases/
H A DAesEaxTest.java36 final byte[] aad; field in class:AesEaxTest.EaxTestVector
44 String message, String keyMaterial, String nonce, String aad, String ciphertext) {
47 this.aad = TestUtil.hexToBytes(aad);
261 cipher.updateAAD(test.aad);
273 cipher.updateAAD(test.aad);
43 EaxTestVector( String message, String keyMaterial, String nonce, String aad, String ciphertext) argument
H A DAesGcmTest.java51 final byte[] aad; field in class:AesGcmTest.GcmTestVector
64 String aad,
69 this.aad = TestUtil.hexToBytes(aad);
152 cipher.updateAAD(test.aad);
175 cipher.updateAAD(test.aad);
205 cipher.updateAAD(test.aad);
230 cipher.updateAAD(test.aad);
239 cipher.updateAAD(test.aad);
257 cipher.updateAAD(test.aad);
60 GcmTestVector( String message, String keyMaterial, String nonce, String aad, String ciphertext, String tag) argument
[all...]
H A DCipherInputStreamTest.java61 public byte[] aad; field in class:CipherInputStreamTest.TestVector
72 this.aad = randomBytes(aadSize);
75 cipher.updateAAD(aad);
108 cipher.updateAAD(t.aad);
132 cipher.updateAAD(t.aad);
163 cipher.updateAAD(t.aad);
197 cipher.updateAAD(t.aad);
H A DCipherOutputStreamTest.java61 public byte[] aad; field in class:CipherOutputStreamTest.TestVector
71 this.aad = randomBytes(aadSize);
74 cipher.updateAAD(aad);
107 cipher.updateAAD(t.aad);
121 cipher.updateAAD(t.aad);
135 cipher.updateAAD(t.aad);
166 cipher.updateAAD(t.aad);
/external/boringssl/src/crypto/cipher_extra/
H A Dcipher_test.cc119 const std::vector<uint8_t> &aad,
156 // parameters are NULL, so it is important to skip the |in| and |aad|
158 if (!aad.empty()) {
160 EVP_CipherUpdate(ctx.get(), nullptr, &unused, aad.data(), aad.size()));
199 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; local
207 ASSERT_TRUE(t->GetBytes(&aad, "AAD"));
236 plaintext, ciphertext, aad, tag);
242 plaintext, ciphertext, aad, tag);
114 TestOperation(FileTest *t, const EVP_CIPHER *cipher, bool encrypt, size_t chunk_size, const std::vector<uint8_t> &key, const std::vector<uint8_t> &iv, const std::vector<uint8_t> &plaintext, const std::vector<uint8_t> &ciphertext, const std::vector<uint8_t> &aad, const std::vector<uint8_t> &tag) argument
/external/boringssl/src/fipstools/
H A Dcavp_aes_gcm_test.cc59 std::vector<uint8_t> key, iv, pt, aad, tag, ct; local
64 !t->GetBytes(&aad, "AAD") ||
68 aad.size() * 8 != strtoul(aad_len_str.c_str(), nullptr, 0) ||
74 if (!AEADEncrypt(ctx->aead, &ct, &tag, tag_len, key, pt, aad, iv)) {
100 std::vector<uint8_t> key, iv, ct, aad, tag, pt; local
103 !t->GetBytes(&aad, "AAD") ||
110 aad.size() != aad_len ||
118 AEADDecrypt(ctx->aead, &pt, pt_len, key, aad, ct, tag, iv);
H A Dcavp_test_util.cc112 const std::vector<uint8_t> &aad,
124 iv.size(), pt.data(), pt.size(), aad.data(),
125 aad.size())) {
138 const std::vector<uint8_t> &aad,
154 iv.data(), iv.size(), in.data(), in.size(), aad.data(),
155 aad.size()) ||
108 AEADEncrypt(const EVP_AEAD *aead, std::vector<uint8_t> *ct, std::vector<uint8_t> *tag, size_t tag_len, const std::vector<uint8_t> &key, const std::vector<uint8_t> &pt, const std::vector<uint8_t> &aad, const std::vector<uint8_t> &iv) argument
136 AEADDecrypt(const EVP_AEAD *aead, std::vector<uint8_t> *pt, size_t pt_len, const std::vector<uint8_t> &key, const std::vector<uint8_t> &aad, const std::vector<uint8_t> &ct, const std::vector<uint8_t> &tag, const std::vector<uint8_t> &iv) argument
/external/nos/host/android/hals/keymaster/test/
H A Dimport_wrapped_key_test.cpp156 const hidl_vec<uint8_t>& aad,
165 aad_(aad),
224 (const uint8_t *)request.aad().data(),
225 request.aad().size())) {
302 const hidl_vec<uint8_t>& aad,
309 encrypted_import_key, aad, gcm_tag,
150 ImportWrappedKeyRequestMatcher( KeyFormat key_format, const hidl_vec<KeyParameter>& params, const hidl_vec<uint8_t>& rsa_envelope, const hidl_vec<uint8_t>& initialization_vector, const hidl_vec<uint8_t>& encrypted_import_key, const hidl_vec<uint8_t>& aad, const hidl_vec<uint8_t>& gcm_tag, const hidl_vec<uint8_t>& wrapping_key_blob, const hidl_vec<uint8_t>& masking_key) argument
296 ImportWrappedKeyRequestEq( KeyFormat key_format, const hidl_vec<KeyParameter>& params, const hidl_vec<uint8_t>& rsa_envelope, const hidl_vec<uint8_t>& initialization_vector, const hidl_vec<uint8_t>& encrypted_import_key, const hidl_vec<uint8_t>& aad, const hidl_vec<uint8_t>& gcm_tag, const hidl_vec<uint8_t>& wrapping_key_blob, const hidl_vec<uint8_t>& masking_key) argument
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-ccm.c29 const u8 *aad, size_t aad_len, size_t plain_len,
50 os_memcpy(aad_buf + 2, aad, aad_len);
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth)
163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x);
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain)
201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x);
28 aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, const u8 *aad, size_t aad_len, size_t plain_len, u8 *x) argument
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
H A Daes-gcm.c229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, argument
241 ghash(H, aad, aad_len, S);
256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S);
290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain)
306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S);
323 const u8 *aad, size_t aad_len, u8 *tag)
325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
/external/wpa_supplicant_8/src/crypto/
H A Daes-ccm.c29 const u8 *aad, size_t aad_len, size_t plain_len,
50 os_memcpy(aad_buf + 2, aad, aad_len);
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth)
163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x);
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain)
201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x);
28 aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, const u8 *aad, size_t aad_len, size_t plain_len, u8 *x) argument
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
H A Daes-gcm.c229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, argument
241 ghash(H, aad, aad_len, S);
256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S);
290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain)
306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S);
323 const u8 *aad, size_t aad_len, u8 *tag)
325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-ccm.c29 const u8 *aad, size_t aad_len, size_t plain_len,
50 os_memcpy(aad_buf + 2, aad, aad_len);
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth)
163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x);
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain)
201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x);
28 aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, const u8 *aad, size_t aad_len, size_t plain_len, u8 *x) argument
148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument
178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
H A Daes-gcm.c229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, argument
241 ghash(H, aad, aad_len, S);
256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S);
290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain)
306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S);
323 const u8 *aad, size_t aad_len, u8 *tag)
325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument
288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument
322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
/external/nos/host/android/hals/keymaster/
H A Dimport_wrapped_key.cpp377 CBS aad; local
378 if (!CBS_get_asn1_element(&child, &aad, CBS_ASN1_SEQUENCE)) {
379 LOG(ERROR) << "Failed to parse aad";
383 request->set_aad(CBS_data(&aad), CBS_len(&aad));
386 if (!CBS_get_asn1(&aad, &keyDescription, CBS_ASN1_SEQUENCE)) {
/external/boringssl/src/crypto/fipsmodule/modes/
H A Dgcm.c485 int CRYPTO_gcm128_aad(GCM128_CONTEXT *ctx, const uint8_t *aad, size_t len) { argument
509 ctx->Xi.c[n] ^= *(aad++);
525 GHASH(ctx, aad, len_blocks);
526 aad += len_blocks;
532 ctx->Xi.c[i] ^= aad[i];
535 aad += 16;
544 ctx->Xi.c[i] ^= aad[i];
/external/conscrypt/common/src/main/java/org/conscrypt/
H A DOpenSSLCipher.java1041 private byte[] aad; field in class:OpenSSLCipher.EVP_AEAD
1085 aad = null;
1223 tagLengthInBytes, output, outputOffset, iv, buf, 0, bufCount, aad);
1226 tagLengthInBytes, output, outputOffset, iv, buf, 0, bufCount, aad);
1264 if (aad == null) {
1265 aad = Arrays.copyOfRange(input, inputOffset, inputOffset + inputLen);
1267 int newSize = aad.length + inputLen;
1269 System.arraycopy(aad, 0, newaad, 0, aad.length);
1270 System.arraycopy(input, inputOffset, newaad, aad
[all...]
/external/syslinux/gpxe/src/net/80211/
H A Dwpa_ccmp.c252 * @v aad Additional authentication data, for MIC but not encryption
261 const void *aad, void *mic )
280 memcpy ( B + 2, aad, 14 );
285 memcpy ( B, aad + 14, 8 );
328 struct ccmp_aad aad; local
358 aad.fc = hdr->fc & CCMP_AAD_FC_MASK;
359 memcpy ( aad.a1, hdr->addr1, 3 * ETH_ALEN ); /* all 3 at once */
360 aad.seq = hdr->seq & CCMP_AAD_SEQ_MASK;
363 ccmp_cbc_mac ( ctx, &nonce, iob->data + hdrlen, datalen, &aad, mic );
396 struct ccmp_aad aad; local
259 ccmp_cbc_mac( struct ccmp_ctx *ctx, const void *nonce, const void *data, u16 datalen, const void *aad, void *mic ) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dmesh_rsn.c529 const u8 *aad[] = { rsn->wpa_s->own_addr, sta->addr, cat }; local
610 aad, aad_len, mic_payload)) {
633 const u8 *aad[] = { sta->addr, wpa_s->own_addr, cat }; local
681 aad, aad_len, ampe_buf)) {
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/crypto/
H A DCipherTest.java3371 public final byte[] aad; field in class:CipherTest.CipherTestParam
3382 Key decryptKey, byte[] aad, byte[] plaintext, byte[] plaintextPadded,
3388 this.aad = aad;
3396 byte[] aad, byte[] plaintext, byte[] plaintextPadded, byte[] ciphertext,
3398 this(transformation, spec, key, key, aad, plaintext, plaintextPadded, ciphertext,
3403 byte[] aad, byte[] plaintext, byte[] plaintextPadded, byte[] ciphertext) {
3404 this(transformation, spec, key, aad, plaintext, plaintextPadded, ciphertext,
3473 null, // aad
3483 null, // aad
3381 CipherTestParam(String transformation, AlgorithmParameterSpec spec, Key encryptKey, Key decryptKey, byte[] aad, byte[] plaintext, byte[] plaintextPadded, byte[] ciphertext, boolean isStreamCipher) argument
3395 CipherTestParam(String transformation, AlgorithmParameterSpec spec, Key key, byte[] aad, byte[] plaintext, byte[] plaintextPadded, byte[] ciphertext, boolean isStreamCipher) argument
3402 CipherTestParam(String transformation, AlgorithmParameterSpec spec, Key key, byte[] aad, byte[] plaintext, byte[] plaintextPadded, byte[] ciphertext) argument
[all...]
/external/valgrind/exp-dhat/
H A Ddh_main.c1116 ULong aad = api->deaths == 0 local
1123 ? 0 : (10000ULL * aad) / g_guest_instrs_executed;
1128 api->deaths, aad, buf );
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.c102 const u8 *aad[1]; local
138 aad[0] = buf;
142 1, aad, aad_len, key_data) < 0) {
1920 const u8 *aad[1]; local
1946 aad[0] = buf;
1949 1, aad, aad_len, tmp) < 0) {
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.c102 const u8 *aad[1]; local
138 aad[0] = buf;
142 1, aad, aad_len, key_data) < 0) {
1920 const u8 *aad[1]; local
1946 aad[0] = buf;
1949 1, aad, aad_len, tmp) < 0) {
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.c102 const u8 *aad[1]; local
138 aad[0] = buf;
142 1, aad, aad_len, key_data) < 0) {
1920 const u8 *aad[1]; local
1946 aad[0] = buf;
1949 1, aad, aad_len, tmp) < 0) {
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth.c1478 const u8 *aad[1]; local
1489 aad[0] = (u8 *) hdr;
1492 1, aad, aad_len, key_mic + 2) < 0) {
2161 const u8 *aad[1]; local
2182 aad[0] = buf;
2185 1, aad, aad_len, tmp) < 0) {
2311 const u8 *aad[5]; local
2357 aad[0] = mgmt->sa;
2360 aad[1] = mgmt->da;
2363 aad[
2401 const u8 *aad[5]; local
[all...]

Completed in 861 milliseconds

12