HomeSort by relevance Sort by last modified time
    Searched refs:aad (Results 1 - 25 of 33) sorted by null

1 2

  /toolchain/binutils/binutils-2.25/gas/testsuite/gas/i386/
x86-64-opcode-inval.s 6 aad
8 aad $2
x86-64-inval.s 5 aad # illegal
x86-64-inval.l 119 [ ]*5[ ]+aad \# illegal
opcode.s 206 aad $0xffffff90
intel.s 209 aad 0xffffff90
  /cts/tests/tests/keystore/src/android/keystore/cts/
AESGCMCipherTestBase.java 152 byte[] aad, byte[] input, byte[] expectedOutput) throws Exception {
154 updateAAD(aad);
158 updateAAD(aad, 0, aad.length);
162 updateAAD(ByteBuffer.wrap(aad));
167 byte[] aad, byte[] input, byte[] expectedOutput, int maxChunkSize) throws Exception {
171 while (aadOffset < aad.length) {
172 int chunkSize = Math.min(aad.length - aadOffset, maxChunkSize);
173 updateAAD(aad, aadOffset, chunkSize);
195 byte[] aad = getKatCiphertext()
    [all...]
  /external/boringssl/src/crypto/cipher/
cipher_test.cc 117 const std::vector<uint8_t> &aad,
160 // parameters are NULL, so it is important to skip the |in| and |aad|
166 (!aad.empty() &&
167 !EVP_CipherUpdate(ctx.get(), nullptr, &unused, aad.data(),
168 aad.size())) ||
227 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; local
238 if (!t->GetBytes(&aad, "AAD") ||
264 key, iv, plaintext, ciphertext, aad, tag) ||
266 iv, plaintext, ciphertext, aad, tag))
    [all...]
  /external/wpa_supplicant_8/src/crypto/
aes_wrap.h 53 const u8 *aad, size_t aad_len,
58 const u8 *aad, size_t aad_len, const u8 *tag,
62 const u8 *aad, size_t aad_len, u8 *tag);
65 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth);
68 const u8 *aad, size_t aad_len, const u8 *auth,
aes-gcm.c 229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len,
241 ghash(H, aad, aad_len, S);
256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag)
272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S);
290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain)
306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S);
323 const u8 *aad, size_t aad_len, u8 *tag)
325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
aes-ccm.c 29 const u8 *aad, size_t aad_len, size_t plain_len,
50 os_memcpy(aad_buf + 2, aad, aad_len);
150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth)
163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x);
180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain)
201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x);
  /system/keymaster/
aes_operation.cpp 374 * the wrong thing when given partial AAD blocks, so we have to take care to process AAD in
382 keymaster_blob_t aad; local
383 if (input_params.GetTagValue(TAG_ASSOCIATED_DATA, &aad)) {
390 FillBufferedAadBlock(&aad);
395 size_t blocks_to_process = aad.data_length / AES_BLOCK_SIZE;
396 if (blocks_to_process && !ProcessAadBlocks(aad.data, blocks_to_process, error))
398 aad.data += blocks_to_process * AES_BLOCK_SIZE;
399 aad.data_length -= blocks_to_process * AES_BLOCK_SIZE;
401 FillBufferedAadBlock(&aad);
    [all...]
aes_operation.h 85 void FillBufferedAadBlock(keymaster_blob_t* aad);
android_keymaster_test.cpp 2807 string aad = "foobar"; local
2850 string aad = "foobar"; local
2873 string aad = "foobar"; local
2972 string aad = "123456789012345678"; local
3224 string aad = "foobar"; local
    [all...]
  /external/conscrypt/src/main/java/org/conscrypt/
OpenSSLCipher.java 877 private byte[] aad; field in class:OpenSSLCipher.EVP_AEAD
900 aad = null;
    [all...]
  /external/llvm/test/MC/X86/
x86-16.s 568 // CHECK: aad $1
570 aad $1
572 // CHECK: aad
574 aad $0xA
576 // CHECK: aad
578 aad
x86-32.s 660 // CHECK: aad $1
662 aad $1
664 // CHECK: aad
666 aad $0xA
668 // CHECK: aad
670 aad
  /external/wpa_supplicant_8/wpa_supplicant/
mesh_rsn.c 459 const u8 *aad[] = { rsn->wpa_s->own_addr, sta->addr, cat }; local
508 aad, aad_len, mic_payload)) {
534 const u8 *aad[] = { sta->addr, wpa_s->own_addr, cat }; local
581 aad, aad_len, ampe_buf)) {
  /libcore/luni/src/test/java/libcore/javax/crypto/
CipherTest.java 2937 public final byte[] aad; field in class:CipherTest.CipherTestParam
    [all...]
  /external/boringssl/src/crypto/modes/
internal.h 253 OPENSSL_EXPORT int CRYPTO_gcm128_aad(GCM128_CONTEXT *ctx, const uint8_t *aad,
gcm.c 508 ctx->len.u[0] = 0; /* AAD length */
571 int CRYPTO_gcm128_aad(GCM128_CONTEXT *ctx, const uint8_t *aad, size_t len) {
596 ctx->Xi.c[n] ^= *(aad++);
610 GHASH(ctx, aad, i);
611 aad += i;
617 ctx->Xi.c[i] ^= aad[i];
620 aad += 16;
627 ctx->Xi.c[i] ^= aad[i];
662 /* First call to encrypt finalizes GHASH(AAD) */
822 /* First call to decrypt finalizes GHASH(AAD) */
    [all...]
  /external/valgrind/exp-dhat/
dh_main.c 1115 ULong aad = api->deaths == 0 local
    [all...]
  /toolchain/binutils/binutils-2.25/gas/testsuite/gas/mips/
micromips@msa.d 298 [0-9a-f]+ <[^>]*> 5aad 62c3 ave_u\.h \$w11,\$w12,\$w13
330 [0-9a-f]+ <[^>]*> 5aad 62d3 asub_u\.h \$w11,\$w12,\$w13
458 [0-9a-f]+ <[^>]*> 5aad 62db hadd_u\.h \$w11,\$w12,\$w13
    [all...]
  /external/mesa3d/src/mesa/x86/
assyntax.h 381 #define AAD CHOICE(aad, aad, aad)
    [all...]
  /external/valgrind/VEX/test/
test-amd64.c 861 TEST_BCD(aad, 0x12340407, CC_A, (CC_C | CC_P | CC_Z | CC_S | CC_O | CC_A));
    [all...]
test-i386.c 823 TEST_BCD(aad, 0x12340407, CC_A, (CC_C | CC_P | CC_Z | CC_S | CC_O | CC_A));
    [all...]

Completed in 492 milliseconds

1 2