/toolchain/binutils/binutils-2.25/gas/testsuite/gas/i386/ |
x86-64-opcode-inval.s | 6 aad 8 aad $2
|
x86-64-inval.s | 5 aad # illegal
|
x86-64-inval.l | 119 [ ]*5[ ]+aad \# illegal
|
opcode.s | 206 aad $0xffffff90
|
intel.s | 209 aad 0xffffff90
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
AESGCMCipherTestBase.java | 152 byte[] aad, byte[] input, byte[] expectedOutput) throws Exception { 154 updateAAD(aad); 158 updateAAD(aad, 0, aad.length); 162 updateAAD(ByteBuffer.wrap(aad)); 167 byte[] aad, byte[] input, byte[] expectedOutput, int maxChunkSize) throws Exception { 171 while (aadOffset < aad.length) { 172 int chunkSize = Math.min(aad.length - aadOffset, maxChunkSize); 173 updateAAD(aad, aadOffset, chunkSize); 195 byte[] aad = getKatCiphertext() [all...] |
/external/boringssl/src/crypto/cipher/ |
cipher_test.cc | 117 const std::vector<uint8_t> &aad, 160 // parameters are NULL, so it is important to skip the |in| and |aad| 166 (!aad.empty() && 167 !EVP_CipherUpdate(ctx.get(), nullptr, &unused, aad.data(), 168 aad.size())) || 227 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; local 238 if (!t->GetBytes(&aad, "AAD") || 264 key, iv, plaintext, ciphertext, aad, tag) || 266 iv, plaintext, ciphertext, aad, tag)) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
aes_wrap.h | 53 const u8 *aad, size_t aad_len, 58 const u8 *aad, size_t aad_len, const u8 *tag, 62 const u8 *aad, size_t aad_len, u8 *tag); 65 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth); 68 const u8 *aad, size_t aad_len, const u8 *auth,
|
aes-gcm.c | 229 static void aes_gcm_ghash(const u8 *H, const u8 *aad, size_t aad_len, 241 ghash(H, aad, aad_len, S); 256 const u8 *aad, size_t aad_len, u8 *crypt, u8 *tag) 272 aes_gcm_ghash(H, aad, aad_len, crypt, plain_len, S); 290 const u8 *aad, size_t aad_len, const u8 *tag, u8 *plain) 306 aes_gcm_ghash(H, aad, aad_len, crypt, crypt_len, S); 323 const u8 *aad, size_t aad_len, u8 *tag) 325 return aes_gcm_ae(key, key_len, iv, iv_len, NULL, 0, aad, aad_len, NULL,
|
aes-ccm.c | 29 const u8 *aad, size_t aad_len, size_t plain_len, 50 os_memcpy(aad_buf + 2, aad, aad_len); 150 const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) 163 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, plain_len, x); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 201 aes_ccm_auth_start(aes, M, L, nonce, aad, aad_len, crypt_len, x);
|
/system/keymaster/ |
aes_operation.cpp | 374 * the wrong thing when given partial AAD blocks, so we have to take care to process AAD in 382 keymaster_blob_t aad; local 383 if (input_params.GetTagValue(TAG_ASSOCIATED_DATA, &aad)) { 390 FillBufferedAadBlock(&aad); 395 size_t blocks_to_process = aad.data_length / AES_BLOCK_SIZE; 396 if (blocks_to_process && !ProcessAadBlocks(aad.data, blocks_to_process, error)) 398 aad.data += blocks_to_process * AES_BLOCK_SIZE; 399 aad.data_length -= blocks_to_process * AES_BLOCK_SIZE; 401 FillBufferedAadBlock(&aad); [all...] |
aes_operation.h | 85 void FillBufferedAadBlock(keymaster_blob_t* aad);
|
android_keymaster_test.cpp | 2807 string aad = "foobar"; local 2850 string aad = "foobar"; local 2873 string aad = "foobar"; local 2972 string aad = "123456789012345678"; local 3224 string aad = "foobar"; local [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
OpenSSLCipher.java | 877 private byte[] aad; field in class:OpenSSLCipher.EVP_AEAD 900 aad = null; [all...] |
/external/llvm/test/MC/X86/ |
x86-16.s | 568 // CHECK: aad $1 570 aad $1 572 // CHECK: aad 574 aad $0xA 576 // CHECK: aad 578 aad
|
x86-32.s | 660 // CHECK: aad $1 662 aad $1 664 // CHECK: aad 666 aad $0xA 668 // CHECK: aad 670 aad
|
/external/wpa_supplicant_8/wpa_supplicant/ |
mesh_rsn.c | 459 const u8 *aad[] = { rsn->wpa_s->own_addr, sta->addr, cat }; local 508 aad, aad_len, mic_payload)) { 534 const u8 *aad[] = { sta->addr, wpa_s->own_addr, cat }; local 581 aad, aad_len, ampe_buf)) {
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
CipherTest.java | 2937 public final byte[] aad; field in class:CipherTest.CipherTestParam [all...] |
/external/boringssl/src/crypto/modes/ |
internal.h | 253 OPENSSL_EXPORT int CRYPTO_gcm128_aad(GCM128_CONTEXT *ctx, const uint8_t *aad,
|
gcm.c | 508 ctx->len.u[0] = 0; /* AAD length */ 571 int CRYPTO_gcm128_aad(GCM128_CONTEXT *ctx, const uint8_t *aad, size_t len) { 596 ctx->Xi.c[n] ^= *(aad++); 610 GHASH(ctx, aad, i); 611 aad += i; 617 ctx->Xi.c[i] ^= aad[i]; 620 aad += 16; 627 ctx->Xi.c[i] ^= aad[i]; 662 /* First call to encrypt finalizes GHASH(AAD) */ 822 /* First call to decrypt finalizes GHASH(AAD) */ [all...] |
/external/valgrind/exp-dhat/ |
dh_main.c | 1115 ULong aad = api->deaths == 0 local [all...] |
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/mips/ |
micromips@msa.d | 298 [0-9a-f]+ <[^>]*> 5aad 62c3 ave_u\.h \$w11,\$w12,\$w13 330 [0-9a-f]+ <[^>]*> 5aad 62d3 asub_u\.h \$w11,\$w12,\$w13 458 [0-9a-f]+ <[^>]*> 5aad 62db hadd_u\.h \$w11,\$w12,\$w13 [all...] |
/external/mesa3d/src/mesa/x86/ |
assyntax.h | 381 #define AAD CHOICE(aad, aad, aad) [all...] |
/external/valgrind/VEX/test/ |
test-amd64.c | 861 TEST_BCD(aad, 0x12340407, CC_A, (CC_C | CC_P | CC_Z | CC_S | CC_O | CC_A)); [all...] |
test-i386.c | 823 TEST_BCD(aad, 0x12340407, CC_A, (CC_C | CC_P | CC_Z | CC_S | CC_O | CC_A)); [all...] |