| /optee_os/core/lib/libtomcrypt/src/encauth/chachapoly/ |
| H A D | chacha20poly1305_test.c | 17 unsigned char aad[] = { 0x50, 0x51, 0x52, 0x53, 0xc0, 0xc1, 0xc2, 0xc3, 0xc4, 0xc5, 0xc6, 0xc7 }; in chacha20poly1305_test() 39 if ((err = chacha20poly1305_add_aad(&st1, aad, sizeof(aad))) != CRYPT_OK) return err; in chacha20poly1305_test() 56 if ((err = chacha20poly1305_add_aad(&st2, aad, sizeof(aad))) != CRYPT_OK) return err; in chacha20poly1305_test() 67 …if ((err = chacha20poly1305_memory(k, sizeof(k), i12, sizeof(i12), aad, sizeof(aad), (unsigned cha… in chacha20poly1305_test() 75 if ((err = chacha20poly1305_memory(k, sizeof(k), i12, sizeof(i12), aad, sizeof(aad), in chacha20poly1305_test() 82 if ((err = chacha20poly1305_add_aad(&st1, aad, sizeof(aad))) != CRYPT_OK) return err; in chacha20poly1305_test() 93 if ((err = chacha20poly1305_add_aad(&st1, aad, sizeof(aad))) != CRYPT_OK) return err; in chacha20poly1305_test() 104 if ((err = chacha20poly1305_add_aad(&st1, aad, sizeof(aad))) != CRYPT_OK) return err; in chacha20poly1305_test() 112 if ((err = chacha20poly1305_add_aad(&st2, aad, sizeof(aad))) != CRYPT_OK) return err; in chacha20poly1305_test()
|
| H A D | chacha20poly1305_memory.c | 26 const unsigned char *aad, unsigned long aadlen, in chacha20poly1305_memory() argument 44 if (aad && aadlen > 0) { in chacha20poly1305_memory() 45 if ((err = chacha20poly1305_add_aad(&st, aad, aadlen)) != CRYPT_OK) { goto LBL_ERR; } in chacha20poly1305_memory()
|
| /optee_os/core/lib/libtomcrypt/src/encauth/ocb3/ |
| H A D | ocb3_add_aad.c | 45 int ocb3_add_aad(ocb3_state *ocb, const unsigned char *aad, unsigned long aadlen) in ocb3_add_aad() argument 53 LTC_ARGCHK(aad != NULL); in ocb3_add_aad() 58 XMEMCPY(ocb->adata_buffer+ocb->adata_buffer_bytes, aad, l); in ocb3_add_aad() 68 data = (unsigned char *)aad + l; in ocb3_add_aad() 72 data = (unsigned char *)aad; in ocb3_add_aad()
|
| H A D | ocb3_test.c | 27 unsigned char pt[64], aad[64], ct[64], tag[16]; in ocb3_test() 217 … tests[x].aadlen != 0 ? tests[x].aad : NULL, tests[x].aadlen, in ocb3_test() 231 … tests[x].aadlen != 0 ? tests[x].aad : NULL, tests[x].aadlen, in ocb3_test()
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | chachapoly.h | 198 const unsigned char *aad, 288 const unsigned char *aad, 322 const unsigned char *aad,
|
| /optee_os/core/drivers/crypto/caam/ae/ |
| H A D | caam_ae_ccm.c | 52 struct caambuf aad = { }; in caam_ae_ccm_init_ctx() local 112 retstatus = caam_calloc_align_buf(&aad, AAD_SIZE_LEN); in caam_ae_ccm_init_ctx() 116 aad.data[0] = (caam_ctx->aad_length & GENMASK_32(15, 8)) >> 8; in caam_ae_ccm_init_ctx() 117 aad.data[1] = caam_ctx->aad_length & GENMASK_32(7, 0); in caam_ae_ccm_init_ctx() 118 retstatus = caam_cpy_block_src(&caam_ctx->buf_aad, &aad, 0); in caam_ae_ccm_init_ctx() 140 caam_free_buf(&aad); in caam_ae_ccm_init_ctx()
|
| H A D | caam_ae.c | 207 struct caambuf aad = { }; in caam_ae_update_aad() local 215 if (dupdate->aad.data) { in caam_ae_update_aad() 216 retstatus = caam_cpy_buf(&aad, dupdate->aad.data, in caam_ae_update_aad() 217 dupdate->aad.length); in caam_ae_update_aad() 225 caam_ctx->buf_aad.max = dupdate->aad.length; in caam_ae_update_aad() 227 retstatus = caam_cpy_block_src(&caam_ctx->buf_aad, &aad, 0); in caam_ae_update_aad() 236 caam_free_buf(&aad); in caam_ae_update_aad() 481 struct caamdmaobj *aad) in caam_ae_do_oneshot() argument 509 if (!src && !aad) in caam_ae_do_oneshot() 524 if (aad) { in caam_ae_do_oneshot() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | chachapoly.c | 144 const unsigned char *aad, in mbedtls_chachapoly_update_aad() argument 153 return mbedtls_poly1305_update(&ctx->poly1305_ctx, aad, aad_len); in mbedtls_chachapoly_update_aad() 248 const unsigned char *aad, in chachapoly_crypt_and_tag() argument 261 ret = mbedtls_chachapoly_update_aad(ctx, aad, aad_len); in chachapoly_crypt_and_tag() 280 const unsigned char *aad, in mbedtls_chachapoly_encrypt_and_tag() argument 287 length, nonce, aad, aad_len, in mbedtls_chachapoly_encrypt_and_tag() 294 const unsigned char *aad, in mbedtls_chachapoly_auth_decrypt() argument 306 aad, aad_len, input, output, check_tag)) != 0) { in mbedtls_chachapoly_auth_decrypt()
|
| /optee_os/core/pta/veraison_attestation/ |
| H A D | cbor.c | 31 UsefulBufC aad; member 154 UsefulBufC protected_header, UsefulBufC aad, in encode_tbs_structure() argument 160 QCBOREncode_AddBytes(context, aad); in encode_tbs_structure() 171 encode_tbs_structure(context, tbs_args->protected_header, tbs_args->aad, in encode_tbs_structure_wrapper() 181 UsefulBufC aad, UsefulBufC payload) in build_tbs_structure() argument 185 .aad = aad, in build_tbs_structure()
|
| /optee_os/core/drivers/crypto/hisilicon/ |
| H A D | sec_authenc.c | 31 sqe->type2.cipher_src_offset = ae_ctx->aad.length; in sec_aead_bd_fill() 36 sqe->type2.alen_ivllen = ae_ctx->aad.length; in sec_aead_bd_fill() 85 sqe->cipher_src_offset = ae_ctx->aad.length; in sec_aead_bd3_fill() 90 sqe->a_len_key = ae_ctx->aad.length; in sec_aead_bd3_fill() 425 ae_drv_ctx->aad.length; in sec_aead_data_alloc() 487 ae_drv_ctx->aad.length = dinit->aad_len; in sec_authenc_initialize() 537 dupdate->aad.data, dupdate->aad.length); in sec_authenc_update_aad() 544 if (dupdate->aad.length + ae_drv_ctx->src_offset > in sec_authenc_update_aad() 554 dupdate->aad.data, dupdate->aad.length); in sec_authenc_update_aad() 555 ae_drv_ctx->src_offset += dupdate->aad.length; in sec_authenc_update_aad() [all …]
|
| H A D | sec_authenc.h | 50 struct drvcrypt_buf aad; member
|
| /optee_os/core/include/crypto/ |
| H A D | internal_aes-gcm.h | 77 const void *aad, size_t aad_len, 83 const void *aad, size_t aad_len,
|
| /optee_os/core/crypto/ |
| H A D | aes-gcm.c | 370 const void *aad, size_t aad_len, in internal_aes_gcm_enc() argument 382 if (aad) { in internal_aes_gcm_enc() 383 res = __gcm_update_aad(&state, aad, aad_len); in internal_aes_gcm_enc() 393 const void *aad, size_t aad_len, in internal_aes_gcm_dec() argument 405 if (aad) { in internal_aes_gcm_dec() 406 res = __gcm_update_aad(&state, aad, aad_len); in internal_aes_gcm_dec()
|
| /optee_os/core/drivers/crypto/versal/ |
| H A D | authenc.c | 148 struct versal_aad aad; member 277 ret = replay_aad(&node->aad); in do_replay() 430 versal_mbox_alloc(dupdate->aad.length, dupdate->aad.data, &p); in do_update_aad() 437 dupdate->aad.length, arg.data[0]); in do_update_aad() 452 node->aad.mem = p; in do_update_aad() 698 free(node->aad.mem.buf); in do_free()
|
| /optee_os/core/drivers/crypto/crypto_api/include/ |
| H A D | drvcrypt_authenc.h | 41 struct drvcrypt_buf aad; /* Additional Authenticated Data buffer */ member
|
| /optee_os/core/drivers/crypto/crypto_api/authenc/ |
| H A D | authenc.c | 132 .aad.data = (uint8_t *)data, in authenc_update_aad() 133 .aad.length = len, in authenc_update_aad()
|
| /optee_os/ta/pkcs11/src/ |
| H A D | processing_aes.c | 466 void *aad = NULL; in tee_init_gcm_operation() local 487 rc = serialargs_get_ptr(&args, &aad, aad_len); in tee_init_gcm_operation() 526 aad, aad_len); in tee_init_gcm_operation()
|
| /optee_os/core/drivers/crypto/stm32/ |
| H A D | authenc.c | 238 return stm32_cryp_update_assodata(&c->cryp, dupdate->aad.data, in stm32_ae_update_aad() 239 dupdate->aad.length); in stm32_ae_update_aad()
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_mac.h | 380 int ocb3_add_aad(ocb3_state *ocb, const unsigned char *aad, unsigned long aadlen); 559 const unsigned char *aad, unsigned long aadlen,
|