/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
H A D | AesEaxTest.java | 36 final byte[] aad; field in class:AesEaxTest.EaxTestVector 44 String message, String keyMaterial, String nonce, String aad, String ciphertext) { 47 this.aad = TestUtil.hexToBytes(aad); 261 cipher.updateAAD(test.aad); 273 cipher.updateAAD(test.aad); 43 EaxTestVector( String message, String keyMaterial, String nonce, String aad, String ciphertext) argument
|
H A D | AesGcmTest.java | 51 final byte[] aad; field in class:AesGcmTest.GcmTestVector 64 String aad, 69 this.aad = TestUtil.hexToBytes(aad); 152 cipher.updateAAD(test.aad); 175 cipher.updateAAD(test.aad); 205 cipher.updateAAD(test.aad); 230 cipher.updateAAD(test.aad); 239 cipher.updateAAD(test.aad); 257 cipher.updateAAD(test.aad); 60 GcmTestVector( String message, String keyMaterial, String nonce, String aad, String ciphertext, String tag) argument [all...] |
H A D | CipherInputStreamTest.java | 61 public byte[] aad; field in class:CipherInputStreamTest.TestVector 72 this.aad = randomBytes(aadSize); 75 cipher.updateAAD(aad); 108 cipher.updateAAD(t.aad); 132 cipher.updateAAD(t.aad); 163 cipher.updateAAD(t.aad); 197 cipher.updateAAD(t.aad);
|
H A D | CipherOutputStreamTest.java | 61 public byte[] aad; field in class:CipherOutputStreamTest.TestVector 71 this.aad = randomBytes(aadSize); 74 cipher.updateAAD(aad); 107 cipher.updateAAD(t.aad); 121 cipher.updateAAD(t.aad); 135 cipher.updateAAD(t.aad); 166 cipher.updateAAD(t.aad);
|
/external/boringssl/src/crypto/cipher_extra/ |
H A D | cipher_test.cc | 119 const std::vector<uint8_t> &aad, 156 // parameters are NULL, so it is important to skip the |in| and |aad| 158 if (!aad.empty()) { 160 EVP_CipherUpdate(ctx.get(), nullptr, &unused, aad.data(), aad.size())); 199 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; local 207 ASSERT_TRUE(t->GetBytes(&aad, "AAD")); 236 plaintext, ciphertext, aad, tag); 242 plaintext, ciphertext, aad, tag); 114 TestOperation(FileTest *t, const EVP_CIPHER *cipher, bool encrypt, size_t chunk_size, const std::vector<uint8_t> &key, const std::vector<uint8_t> &iv, const std::vector<uint8_t> &plaintext, const std::vector<uint8_t> &ciphertext, const std::vector<uint8_t> &aad, const std::vector<uint8_t> &tag) argument
|
/external/boringssl/src/fipstools/ |
H A D | cavp_aes_gcm_test.cc | 59 std::vector<uint8_t> key, iv, pt, aad, tag, ct; local 64 !t->GetBytes(&aad, "AAD") || 68 aad.size() * 8 != strtoul(aad_len_str.c_str(), nullptr, 0) || 74 if (!AEADEncrypt(ctx->aead, &ct, &tag, tag_len, key, pt, aad, iv)) { 100 std::vector<uint8_t> key, iv, ct, aad, tag, pt; local 103 !t->GetBytes(&aad, "AAD") || 110 aad.size() != aad_len || 118 AEADDecrypt(ctx->aead, &pt, pt_len, key, aad, ct, tag, iv);
|
H A D | cavp_test_util.cc | 112 const std::vector<uint8_t> &aad, 124 iv.size(), pt.data(), pt.size(), aad.data(), 125 aad.size())) { 138 const std::vector<uint8_t> &aad, 154 iv.data(), iv.size(), in.data(), in.size(), aad.data(), 155 aad.size()) || 108 AEADEncrypt(const EVP_AEAD *aead, std::vector<uint8_t> *ct, std::vector<uint8_t> *tag, size_t tag_len, const std::vector<uint8_t> &key, const std::vector<uint8_t> &pt, const std::vector<uint8_t> &aad, const std::vector<uint8_t> &iv) argument 136 AEADDecrypt(const EVP_AEAD *aead, std::vector<uint8_t> *pt, size_t pt_len, const std::vector<uint8_t> &key, const std::vector<uint8_t> &aad, const std::vector<uint8_t> &ct, const std::vector<uint8_t> &tag, const std::vector<uint8_t> &iv) argument
|
/external/nos/host/android/hals/keymaster/test/ |
H A D | import_wrapped_key_test.cpp | 156 const hidl_vec<uint8_t>& aad, 165 aad_(aad), 224 (const uint8_t *)request.aad().data(), 225 request.aad().size())) { 302 const hidl_vec<uint8_t>& aad, 309 encrypted_import_key, aad, gcm_tag, 150 ImportWrappedKeyRequestMatcher( KeyFormat key_format, const hidl_vec<KeyParameter>& params, const hidl_vec<uint8_t>& rsa_envelope, const hidl_vec<uint8_t>& initialization_vector, const hidl_vec<uint8_t>& encrypted_import_key, const hidl_vec<uint8_t>& aad, const hidl_vec<uint8_t>& gcm_tag, const hidl_vec<uint8_t>& wrapping_key_blob, const hidl_vec<uint8_t>& masking_key) argument 296 ImportWrappedKeyRequestEq( KeyFormat key_format, const hidl_vec<KeyParameter>& params, const hidl_vec<uint8_t>& rsa_envelope, const hidl_vec<uint8_t>& initialization_vector, const hidl_vec<uint8_t>& encrypted_import_key, const hidl_vec<uint8_t>& aad, const hidl_vec<uint8_t>& gcm_tag, const hidl_vec<uint8_t>& wrapping_key_blob, const hidl_vec<uint8_t>& masking_key) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-ccm.c | 29 const u8 *aad, size_t aad_len, size_t plain_len, 50 os_memcpy(aad_buf + 2, aad, aad_len); 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 28 aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, const u8 *aad, size_t aad_len, size_t plain_len, u8 *x) argument 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
H A D | aes-gcm.c | 229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, argument 241 ghash(H, aad, aad_len, S); 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) 272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S); 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); 323 const u8 *aad, size_t aad_len, u8 *tag) 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL, 254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-ccm.c | 29 const u8 *aad, size_t aad_len, size_t plain_len, 50 os_memcpy(aad_buf + 2, aad, aad_len); 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 28 aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, const u8 *aad, size_t aad_len, size_t plain_len, u8 *x) argument 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
H A D | aes-gcm.c | 229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, argument 241 ghash(H, aad, aad_len, S); 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) 272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S); 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); 323 const u8 *aad, size_t aad_len, u8 *tag) 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL, 254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-ccm.c | 29 const u8 *aad, size_t aad_len, size_t plain_len, 50 os_memcpy(aad_buf + 2, aad, aad_len); 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x); 28 aes_ccm_auth_start(void *aes, size_t M, size_t L, const u8 *nonce, const u8 *aad, size_t aad_len, size_t plain_len, u8 *x) argument 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
H A D | aes-gcm.c | 229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, argument 241 ghash(H, aad, aad_len, S); 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) 272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S); 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); 323 const u8 *aad, size_t aad_len, u8 *tag) 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL, 254 aes_gcm_ae(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) argument 288 aes_gcm_ad(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) argument 322 aes_gmac(const u8 *key, size_t key_len, const u8 *iv, size_t iv_len, const u8 *aad, size_t aad_len, u8 *tag) argument
|
/external/nos/host/android/hals/keymaster/ |
H A D | import_wrapped_key.cpp | 377 CBS aad; local 378 if (!CBS_get_asn1_element(&child, &aad, CBS_ASN1_SEQUENCE)) { 379 LOG(ERROR) << "Failed to parse aad"; 383 request->set_aad(CBS_data(&aad), CBS_len(&aad)); 386 if (!CBS_get_asn1(&aad, &keyDescription, CBS_ASN1_SEQUENCE)) {
|
/external/boringssl/src/crypto/fipsmodule/modes/ |
H A D | gcm.c | 485 int CRYPTO_gcm128_aad(GCM128_CONTEXT *ctx, const uint8_t *aad, size_t len) { argument 509 ctx->Xi.c[n] ^= *(aad++); 525 GHASH(ctx, aad, len_blocks); 526 aad += len_blocks; 532 ctx->Xi.c[i] ^= aad[i]; 535 aad += 16; 544 ctx->Xi.c[i] ^= aad[i];
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
H A D | OpenSSLCipher.java | 1041 private byte[] aad; field in class:OpenSSLCipher.EVP_AEAD 1085 aad = null; 1223 tagLengthInBytes, output, outputOffset, iv, buf, 0, bufCount, aad); 1226 tagLengthInBytes, output, outputOffset, iv, buf, 0, bufCount, aad); 1264 if (aad == null) { 1265 aad = Arrays.copyOfRange(input, inputOffset, inputOffset + inputLen); 1267 int newSize = aad.length + inputLen; 1269 System.arraycopy(aad, 0, newaad, 0, aad.length); 1270 System.arraycopy(input, inputOffset, newaad, aad [all...] |
/external/syslinux/gpxe/src/net/80211/ |
H A D | wpa_ccmp.c | 252 * @v aad Additional authentication data, for MIC but not encryption 261 const void *aad, void *mic ) 280 memcpy ( B + 2, aad, 14 ); 285 memcpy ( B, aad + 14, 8 ); 328 struct ccmp_aad aad; local 358 aad.fc = hdr->fc & CCMP_AAD_FC_MASK; 359 memcpy ( aad.a1, hdr->addr1, 3 * ETH_ALEN ); /* all 3 at once */ 360 aad.seq = hdr->seq & CCMP_AAD_SEQ_MASK; 363 ccmp_cbc_mac ( ctx, &nonce, iob->data + hdrlen, datalen, &aad, mic ); 396 struct ccmp_aad aad; local 259 ccmp_cbc_mac( struct ccmp_ctx *ctx, const void *nonce, const void *data, u16 datalen, const void *aad, void *mic ) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | mesh_rsn.c | 529 const u8 *aad[] = { rsn->wpa_s->own_addr, sta->addr, cat }; local 610 aad, aad_len, mic_payload)) { 633 const u8 *aad[] = { sta->addr, wpa_s->own_addr, cat }; local 681 aad, aad_len, ampe_buf)) {
|
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/crypto/ |
H A D | CipherTest.java | 3371 public final byte[] aad; field in class:CipherTest.CipherTestParam 3382 Key decryptKey, byte[] aad, byte[] plaintext, byte[] plaintextPadded, 3388 this.aad = aad; 3396 byte[] aad, byte[] plaintext, byte[] plaintextPadded, byte[] ciphertext, 3398 this(transformation, spec, key, key, aad, plaintext, plaintextPadded, ciphertext, 3403 byte[] aad, byte[] plaintext, byte[] plaintextPadded, byte[] ciphertext) { 3404 this(transformation, spec, key, aad, plaintext, plaintextPadded, ciphertext, 3473 null, // aad 3483 null, // aad 3381 CipherTestParam(String transformation, AlgorithmParameterSpec spec, Key encryptKey, Key decryptKey, byte[] aad, byte[] plaintext, byte[] plaintextPadded, byte[] ciphertext, boolean isStreamCipher) argument 3395 CipherTestParam(String transformation, AlgorithmParameterSpec spec, Key key, byte[] aad, byte[] plaintext, byte[] plaintextPadded, byte[] ciphertext, boolean isStreamCipher) argument 3402 CipherTestParam(String transformation, AlgorithmParameterSpec spec, Key key, byte[] aad, byte[] plaintext, byte[] plaintextPadded, byte[] ciphertext) argument [all...] |
/external/valgrind/exp-dhat/ |
H A D | dh_main.c | 1116 ULong aad = api->deaths == 0 local 1123 ? 0 : (10000ULL * aad) / g_guest_instrs_executed; 1128 api->deaths, aad, buf );
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 102 const u8 *aad[1]; local 138 aad[0] = buf; 142 1, aad, aad_len, key_data) < 0) { 1920 const u8 *aad[1]; local 1946 aad[0] = buf; 1949 1, aad, aad_len, tmp) < 0) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.c | 102 const u8 *aad[1]; local 138 aad[0] = buf; 142 1, aad, aad_len, key_data) < 0) { 1920 const u8 *aad[1]; local 1946 aad[0] = buf; 1949 1, aad, aad_len, tmp) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 102 const u8 *aad[1]; local 138 aad[0] = buf; 142 1, aad, aad_len, key_data) < 0) { 1920 const u8 *aad[1]; local 1946 aad[0] = buf; 1949 1, aad, aad_len, tmp) < 0) {
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 1478 const u8 *aad[1]; local 1489 aad[0] = (u8 *) hdr; 1492 1, aad, aad_len, key_mic + 2) < 0) { 2161 const u8 *aad[1]; local 2182 aad[0] = buf; 2185 1, aad, aad_len, tmp) < 0) { 2311 const u8 *aad[5]; local 2357 aad[0] = mgmt->sa; 2360 aad[1] = mgmt->da; 2363 aad[ 2401 const u8 *aad[5]; local [all...] |