/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-cbc.c | 27 u8 cbc[AES_BLOCK_SIZE]; 37 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 39 blocks = data_len / AES_BLOCK_SIZE; 41 for (j = 0; j < AES_BLOCK_SIZE; j++) 44 os_memcpy(pos, cbc, AES_BLOCK_SIZE); 45 pos += AES_BLOCK_SIZE; 63 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; 73 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 75 blocks = data_len / AES_BLOCK_SIZE; [all...] |
H A D | aes-omac1.c | 21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 23 pad[AES_BLOCK_SIZE - 1] <<= 1; 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 47 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; 57 os_memset(cbc, 0, AES_BLOCK_SIZE); 68 while (left >= AES_BLOCK_SIZE) { 69 for (i = 0; i < AES_BLOCK_SIZE; i++) { 76 if (i + 1 == AES_BLOCK_SIZE && 77 left == AES_BLOCK_SIZE) [all...] |
H A D | aes-ccm.c | 32 u8 aad_buf[2 * AES_BLOCK_SIZE]; 33 u8 b[AES_BLOCK_SIZE]; 41 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); 43 wpa_hexdump_key(MSG_EXCESSIVE, "CCM B_0", b, AES_BLOCK_SIZE); 56 if (aad_len > AES_BLOCK_SIZE - 2) { 57 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); 59 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); 66 size_t last = len % AES_BLOCK_SIZE; 69 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { 72 data += AES_BLOCK_SIZE; [all...] |
H A D | aes-ctr.c | 32 u8 counter[AES_BLOCK_SIZE], buf[AES_BLOCK_SIZE]; 37 os_memcpy(counter, nonce, AES_BLOCK_SIZE); 42 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; 48 for (i = AES_BLOCK_SIZE - 1; i >= 0; i--) {
|
H A D | aes-siv.c | 17 static const u8 zero[AES_BLOCK_SIZE]; 25 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 27 pad[AES_BLOCK_SIZE - 1] <<= 1; 29 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 37 for (i = 0; i < AES_BLOCK_SIZE; i++) 56 os_memset(pad, 0, AES_BLOCK_SIZE); 59 if (len < AES_BLOCK_SIZE) 67 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; 76 tmp[AES_BLOCK_SIZE [all...] |
H A D | aes-eax.c | 34 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 35 data_mac[AES_BLOCK_SIZE]; 69 for (i = 0; i < AES_BLOCK_SIZE; i++) 98 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 99 data_mac[AES_BLOCK_SIZE]; 139 for (i = 0; i < AES_BLOCK_SIZE; i++) {
|
H A D | aes.h | 12 #define AES_BLOCK_SIZE 16 macro
|
H A D | crypto_internal-cipher.c | 76 os_memcpy(ctx->u.aes.cbc, iv, AES_BLOCK_SIZE); 117 if (len % AES_BLOCK_SIZE) 119 blocks = len / AES_BLOCK_SIZE; 121 for (j = 0; j < AES_BLOCK_SIZE; j++) 125 os_memcpy(crypt, ctx->u.aes.cbc, AES_BLOCK_SIZE); 126 plain += AES_BLOCK_SIZE; 127 crypt += AES_BLOCK_SIZE; 181 if (len % AES_BLOCK_SIZE) 183 blocks = len / AES_BLOCK_SIZE; 185 os_memcpy(tmp, crypt, AES_BLOCK_SIZE); [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-cbc.c | 27 u8 cbc[AES_BLOCK_SIZE]; 37 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 39 blocks = data_len / AES_BLOCK_SIZE; 41 for (j = 0; j < AES_BLOCK_SIZE; j++) 44 os_memcpy(pos, cbc, AES_BLOCK_SIZE); 45 pos += AES_BLOCK_SIZE; 63 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; 73 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 75 blocks = data_len / AES_BLOCK_SIZE; [all...] |
H A D | aes-omac1.c | 21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 23 pad[AES_BLOCK_SIZE - 1] <<= 1; 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 47 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; 57 os_memset(cbc, 0, AES_BLOCK_SIZE); 68 while (left >= AES_BLOCK_SIZE) { 69 for (i = 0; i < AES_BLOCK_SIZE; i++) { 76 if (i + 1 == AES_BLOCK_SIZE && 77 left == AES_BLOCK_SIZE) [all...] |
H A D | aes-ccm.c | 32 u8 aad_buf[2 * AES_BLOCK_SIZE]; 33 u8 b[AES_BLOCK_SIZE]; 41 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); 43 wpa_hexdump_key(MSG_EXCESSIVE, "CCM B_0", b, AES_BLOCK_SIZE); 56 if (aad_len > AES_BLOCK_SIZE - 2) { 57 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); 59 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); 66 size_t last = len % AES_BLOCK_SIZE; 69 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { 72 data += AES_BLOCK_SIZE; [all...] |
H A D | aes-ctr.c | 32 u8 counter[AES_BLOCK_SIZE], buf[AES_BLOCK_SIZE]; 37 os_memcpy(counter, nonce, AES_BLOCK_SIZE); 42 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; 48 for (i = AES_BLOCK_SIZE - 1; i >= 0; i--) {
|
H A D | aes-siv.c | 17 static const u8 zero[AES_BLOCK_SIZE]; 25 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 27 pad[AES_BLOCK_SIZE - 1] <<= 1; 29 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 37 for (i = 0; i < AES_BLOCK_SIZE; i++) 56 os_memset(pad, 0, AES_BLOCK_SIZE); 59 if (len < AES_BLOCK_SIZE) 67 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; 76 tmp[AES_BLOCK_SIZE [all...] |
H A D | aes-eax.c | 34 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 35 data_mac[AES_BLOCK_SIZE]; 69 for (i = 0; i < AES_BLOCK_SIZE; i++) 98 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 99 data_mac[AES_BLOCK_SIZE]; 139 for (i = 0; i < AES_BLOCK_SIZE; i++) {
|
H A D | aes.h | 12 #define AES_BLOCK_SIZE 16 macro
|
H A D | crypto_internal-cipher.c | 76 os_memcpy(ctx->u.aes.cbc, iv, AES_BLOCK_SIZE); 117 if (len % AES_BLOCK_SIZE) 119 blocks = len / AES_BLOCK_SIZE; 121 for (j = 0; j < AES_BLOCK_SIZE; j++) 125 os_memcpy(crypt, ctx->u.aes.cbc, AES_BLOCK_SIZE); 126 plain += AES_BLOCK_SIZE; 127 crypt += AES_BLOCK_SIZE; 181 if (len % AES_BLOCK_SIZE) 183 blocks = len / AES_BLOCK_SIZE; 185 os_memcpy(tmp, crypt, AES_BLOCK_SIZE); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-cbc.c | 27 u8 cbc[AES_BLOCK_SIZE]; 37 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 39 blocks = data_len / AES_BLOCK_SIZE; 41 for (j = 0; j < AES_BLOCK_SIZE; j++) 44 os_memcpy(pos, cbc, AES_BLOCK_SIZE); 45 pos += AES_BLOCK_SIZE; 63 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; 73 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 75 blocks = data_len / AES_BLOCK_SIZE; [all...] |
H A D | aes-omac1.c | 21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 23 pad[AES_BLOCK_SIZE - 1] <<= 1; 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 47 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; 57 os_memset(cbc, 0, AES_BLOCK_SIZE); 68 while (left >= AES_BLOCK_SIZE) { 69 for (i = 0; i < AES_BLOCK_SIZE; i++) { 76 if (i + 1 == AES_BLOCK_SIZE && 77 left == AES_BLOCK_SIZE) [all...] |
H A D | aes-ccm.c | 32 u8 aad_buf[2 * AES_BLOCK_SIZE]; 33 u8 b[AES_BLOCK_SIZE]; 41 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); 43 wpa_hexdump_key(MSG_EXCESSIVE, "CCM B_0", b, AES_BLOCK_SIZE); 56 if (aad_len > AES_BLOCK_SIZE - 2) { 57 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); 59 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); 66 size_t last = len % AES_BLOCK_SIZE; 69 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { 72 data += AES_BLOCK_SIZE; [all...] |
H A D | aes-ctr.c | 32 u8 counter[AES_BLOCK_SIZE], buf[AES_BLOCK_SIZE]; 37 os_memcpy(counter, nonce, AES_BLOCK_SIZE); 42 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; 48 for (i = AES_BLOCK_SIZE - 1; i >= 0; i--) {
|
H A D | aes-siv.c | 17 static const u8 zero[AES_BLOCK_SIZE]; 25 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 27 pad[AES_BLOCK_SIZE - 1] <<= 1; 29 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 37 for (i = 0; i < AES_BLOCK_SIZE; i++) 56 os_memset(pad, 0, AES_BLOCK_SIZE); 59 if (len < AES_BLOCK_SIZE) 67 u8 tmp[AES_BLOCK_SIZE], tmp2[AES_BLOCK_SIZE]; 76 tmp[AES_BLOCK_SIZE [all...] |
H A D | aes-eax.c | 34 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 35 data_mac[AES_BLOCK_SIZE]; 69 for (i = 0; i < AES_BLOCK_SIZE; i++) 98 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 99 data_mac[AES_BLOCK_SIZE]; 139 for (i = 0; i < AES_BLOCK_SIZE; i++) {
|
H A D | aes.h | 12 #define AES_BLOCK_SIZE 16 macro
|
H A D | crypto_internal-cipher.c | 76 os_memcpy(ctx->u.aes.cbc, iv, AES_BLOCK_SIZE); 117 if (len % AES_BLOCK_SIZE) 119 blocks = len / AES_BLOCK_SIZE; 121 for (j = 0; j < AES_BLOCK_SIZE; j++) 125 os_memcpy(crypt, ctx->u.aes.cbc, AES_BLOCK_SIZE); 126 plain += AES_BLOCK_SIZE; 127 crypt += AES_BLOCK_SIZE; 181 if (len % AES_BLOCK_SIZE) 183 blocks = len / AES_BLOCK_SIZE; 185 os_memcpy(tmp, crypt, AES_BLOCK_SIZE); [all...] |
/external/boringssl/src/crypto/cmac/ |
H A D | cmac.c | 65 uint8_t k1[AES_BLOCK_SIZE]; 66 uint8_t k2[AES_BLOCK_SIZE]; 68 uint8_t block[AES_BLOCK_SIZE]; 145 static const uint8_t kZeroIV[AES_BLOCK_SIZE] = {0}; 149 uint8_t scratch[AES_BLOCK_SIZE]; 151 if (EVP_CIPHER_block_size(cipher) != AES_BLOCK_SIZE || 154 !EVP_Cipher(&ctx->cipher_ctx, scratch, kZeroIV, AES_BLOCK_SIZE) || 173 uint8_t scratch[AES_BLOCK_SIZE]; 176 size_t todo = AES_BLOCK_SIZE - ctx->block_used; 187 // |AES_BLOCK_SIZE|, i [all...] |