/optee_os/core/lib/libtomcrypt/src/encauth/chachapoly/ |
A D | chacha20poly1305_test.c | 24 unsigned char aad[] = { 0x50, 0x51, 0x52, 0x53, 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7 }; in chacha20poly1305_test() 46 if ((err = chacha20poly1305_add_aad(&st1, aad, sizeof(aad))) != CRYPT_OK) return err; in chacha20poly1305_test() 63 if ((err = chacha20poly1305_add_aad(&st2, aad, sizeof(aad))) != CRYPT_OK) return err; in chacha20poly1305_test() 74 …if ((err = chacha20poly1305_memory(k, sizeof(k), i12, sizeof(i12), aad, sizeof(aad), (unsigned cha… in chacha20poly1305_test() 82 if ((err = chacha20poly1305_memory(k, sizeof(k), i12, sizeof(i12), aad, sizeof(aad), in chacha20poly1305_test() 89 if ((err = chacha20poly1305_add_aad(&st1, aad, sizeof(aad))) != CRYPT_OK) return err; in chacha20poly1305_test() 100 if ((err = chacha20poly1305_add_aad(&st1, aad, sizeof(aad))) != CRYPT_OK) return err; in chacha20poly1305_test() 111 if ((err = chacha20poly1305_add_aad(&st1, aad, sizeof(aad))) != CRYPT_OK) return err; in chacha20poly1305_test() 119 if ((err = chacha20poly1305_add_aad(&st2, aad, sizeof(aad))) != CRYPT_OK) return err; in chacha20poly1305_test()
|
A D | chacha20poly1305_memory.c | 33 const unsigned char *aad, unsigned long aadlen, in chacha20poly1305_memory() argument 51 if (aad && aadlen > 0) { in chacha20poly1305_memory() 52 if ((err = chacha20poly1305_add_aad(&st, aad, aadlen)) != CRYPT_OK) { goto LBL_ERR; } in chacha20poly1305_memory()
|
/optee_os/core/lib/libtomcrypt/src/encauth/ocb3/ |
A D | ocb3_add_aad.c | 52 int ocb3_add_aad(ocb3_state *ocb, const unsigned char *aad, unsigned long aadlen) in ocb3_add_aad() argument 60 LTC_ARGCHK(aad != NULL); in ocb3_add_aad() 65 XMEMCPY(ocb->adata_buffer+ocb->adata_buffer_bytes, aad, l); in ocb3_add_aad() 75 data = (unsigned char *)aad + l; in ocb3_add_aad() 79 data = (unsigned char *)aad; in ocb3_add_aad()
|
A D | ocb3_test.c | 34 unsigned char pt[64], aad[64], ct[64], tag[16]; in ocb3_test() 224 … tests[x].aadlen != 0 ? tests[x].aad : NULL, tests[x].aadlen, in ocb3_test() 238 … tests[x].aadlen != 0 ? tests[x].aad : NULL, tests[x].aadlen, in ocb3_test()
|
/optee_os/lib/libmbedtls/mbedtls/library/ |
A D | chachapoly.c | 170 const unsigned char *aad, in mbedtls_chachapoly_update_aad() argument 174 CHACHAPOLY_VALIDATE_RET( aad_len == 0 || aad != NULL ); in mbedtls_chachapoly_update_aad() 181 return( mbedtls_poly1305_update( &ctx->poly1305_ctx, aad, aad_len ) ); in mbedtls_chachapoly_update_aad() 296 const unsigned char *aad, in chachapoly_crypt_and_tag() argument 308 ret = mbedtls_chachapoly_update_aad( ctx, aad, aad_len ); in chachapoly_crypt_and_tag() 325 const unsigned char *aad, in mbedtls_chachapoly_encrypt_and_tag() argument 334 CHACHAPOLY_VALIDATE_RET( aad_len == 0 || aad != NULL ); in mbedtls_chachapoly_encrypt_and_tag() 339 length, nonce, aad, aad_len, in mbedtls_chachapoly_encrypt_and_tag() 346 const unsigned char *aad, in mbedtls_chachapoly_auth_decrypt() argument 359 CHACHAPOLY_VALIDATE_RET( aad_len == 0 || aad != NULL ); in mbedtls_chachapoly_auth_decrypt() [all …]
|
/optee_os/out/arm/export-ta_arm32/include/mbedtls/ |
A D | chachapoly.h | 213 const unsigned char *aad, 303 const unsigned char *aad, 337 const unsigned char *aad,
|
/optee_os/out/arm/export-ta_arm64/host_include/mbedtls/ |
A D | chachapoly.h | 213 const unsigned char *aad, 303 const unsigned char *aad, 337 const unsigned char *aad,
|
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | chachapoly.h | 213 const unsigned char *aad, 303 const unsigned char *aad, 337 const unsigned char *aad,
|
/optee_os/out/arm/export-ta_arm64/include/mbedtls/ |
A D | chachapoly.h | 213 const unsigned char *aad, 303 const unsigned char *aad, 337 const unsigned char *aad,
|
/optee_os/out/arm/export-ta_arm32/host_include/mbedtls/ |
A D | chachapoly.h | 213 const unsigned char *aad, 303 const unsigned char *aad, 337 const unsigned char *aad,
|
/optee_os/core/crypto/ |
A D | aes-gcm.c | 372 const void *aad, size_t aad_len, in internal_aes_gcm_enc() argument 384 if (aad) { in internal_aes_gcm_enc() 385 res = __gcm_update_aad(&state, aad, aad_len); in internal_aes_gcm_enc() 395 const void *aad, size_t aad_len, in internal_aes_gcm_dec() argument 407 if (aad) { in internal_aes_gcm_dec() 408 res = __gcm_update_aad(&state, aad, aad_len); in internal_aes_gcm_dec()
|
/optee_os/core/include/crypto/ |
A D | internal_aes-gcm.h | 77 const void *aad, size_t aad_len, 83 const void *aad, size_t aad_len,
|
/optee_os/core/drivers/crypto/crypto_api/include/ |
A D | drvcrypt_authenc.h | 41 struct drvcrypt_buf aad; /* Additional Authenticated Data buffer */ member
|
/optee_os/core/drivers/crypto/crypto_api/authenc/ |
A D | authenc.c | 132 .aad.data = (uint8_t *)data, in authenc_update_aad() 133 .aad.length = len, in authenc_update_aad()
|
/optee_os/core/drivers/crypto/stm32/ |
A D | authenc.c | 242 return stm32_cryp_update_assodata(&c->cryp, dupdate->aad.data, in stm32_ae_update_aad() 243 dupdate->aad.length); in stm32_ae_update_aad()
|
/optee_os/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_mac.h | 374 int ocb3_add_aad(ocb3_state *ocb, const unsigned char *aad, unsigned long aadlen); 554 const unsigned char *aad, unsigned long aadlen,
|
/optee_os/out/arm/ta/trusted_keys/ |
A D | f04a0fe7-1f5d-4b9b-abf7-619b85b4ce8c.dmp | 6838 29e4: 1aad subhi r5, r5, r2
|
/optee_os/out/arm/ta/avb/ |
A D | 023f8f1a-292a-432b-8fc4-de8471358067.dmp | 19317 80f8: 1aad subhi r5, r5, r2
|
/optee_os/out/arm/ta/pkcs11/ |
A D | fd02c9da-306c-48c7-a49c-bbd827ae86ee.dmp | 28732 be30: 1aad subhi r5, r5, r2
|