/openssl-master/providers/implementations/ciphers/ |
A D | ciphercommon_gcm_hw.c | 21 size_t aad_len) in ossl_gcm_aad_update() argument 23 return CRYPTO_gcm128_aad(&ctx->gcm, aad, aad_len) == 0; in ossl_gcm_aad_update() 51 int ossl_gcm_one_shot(PROV_GCM_CTX *ctx, unsigned char *aad, size_t aad_len, in ossl_gcm_one_shot() argument 58 if (!ctx->hw->aadupdate(ctx, aad, aad_len)) in ossl_gcm_one_shot()
|
A D | cipher_rc4_hmac_md5_hw.c | 166 unsigned char *aad, size_t aad_len) in cipher_hw_rc4_hmac_md5_tls_init() argument 171 if (aad_len != EVP_AEAD_TLS1_AAD_LEN) in cipher_hw_rc4_hmac_md5_tls_init() 174 len = aad[aad_len - 2] << 8 | aad[aad_len - 1]; in cipher_hw_rc4_hmac_md5_tls_init() 180 aad[aad_len - 2] = len >> 8; in cipher_hw_rc4_hmac_md5_tls_init() 181 aad[aad_len - 1] = len; in cipher_hw_rc4_hmac_md5_tls_init() 185 MD5_Update(&ctx->md, aad, aad_len); in cipher_hw_rc4_hmac_md5_tls_init()
|
A D | ciphercommon_gcm.c | 19 static int gcm_tls_init(PROV_GCM_CTX *dat, unsigned char *aad, size_t aad_len); 438 static int gcm_tls_init(PROV_GCM_CTX *dat, unsigned char *aad, size_t aad_len) in gcm_tls_init() argument 443 if (!ossl_prov_is_running() || aad_len != EVP_AEAD_TLS1_AAD_LEN) in gcm_tls_init() 448 memcpy(buf, aad, aad_len); in gcm_tls_init() 449 dat->tls_aad_len = aad_len; in gcm_tls_init() 452 len = buf[aad_len - 2] << 8 | buf[aad_len - 1]; in gcm_tls_init() 464 buf[aad_len - 2] = (unsigned char)(len >> 8); in gcm_tls_init() 465 buf[aad_len - 1] = (unsigned char)(len & 0xff); in gcm_tls_init()
|
A D | cipher_aes_cbc_hmac_sha1_hw.c | 664 unsigned char *aad_rec, int aad_len) in aesni_cbc_hmac_sha1_set_tls1_aad() argument 671 if (aad_len != EVP_AEAD_TLS1_AAD_LEN) in aesni_cbc_hmac_sha1_set_tls1_aad() 674 len = p[aad_len - 2] << 8 | p[aad_len - 1]; in aesni_cbc_hmac_sha1_set_tls1_aad() 679 p[aad_len - 4] << 8 | p[aad_len - 3]) >= TLS1_1_VERSION) { in aesni_cbc_hmac_sha1_set_tls1_aad() 683 p[aad_len - 2] = len >> 8; in aesni_cbc_hmac_sha1_set_tls1_aad() 684 p[aad_len - 1] = len; in aesni_cbc_hmac_sha1_set_tls1_aad() 687 sha1_update(&sctx->md, p, aad_len); in aesni_cbc_hmac_sha1_set_tls1_aad() 693 memcpy(ctx->aux.tls_aad, aad_rec, aad_len); in aesni_cbc_hmac_sha1_set_tls1_aad() 694 ctx->payload_length = aad_len; in aesni_cbc_hmac_sha1_set_tls1_aad()
|
A D | cipher_aes_cbc_hmac_sha256_hw.c | 717 unsigned char *aad_rec, int aad_len) in aesni_cbc_hmac_sha256_set_tls1_aad() argument 724 if (aad_len != EVP_AEAD_TLS1_AAD_LEN) in aesni_cbc_hmac_sha256_set_tls1_aad() 727 len = p[aad_len - 2] << 8 | p[aad_len - 1]; in aesni_cbc_hmac_sha256_set_tls1_aad() 732 p[aad_len - 4] << 8 | p[aad_len - 3]) >= TLS1_1_VERSION) { in aesni_cbc_hmac_sha256_set_tls1_aad() 736 p[aad_len - 2] = len >> 8; in aesni_cbc_hmac_sha256_set_tls1_aad() 737 p[aad_len - 1] = len; in aesni_cbc_hmac_sha256_set_tls1_aad() 740 sha256_update(&sctx->md, p, aad_len); in aesni_cbc_hmac_sha256_set_tls1_aad() 746 memcpy(ctx->aux.tls_aad, p, aad_len); in aesni_cbc_hmac_sha256_set_tls1_aad() 747 ctx->payload_length = aad_len; in aesni_cbc_hmac_sha256_set_tls1_aad()
|
A D | cipher_rc4_hmac_md5.h | 27 int (*tls_init)(PROV_CIPHER_CTX *ctx, unsigned char *aad, size_t aad_len);
|
A D | cipher_aes_cbc_hmac_sha.h | 19 int (*set_tls1_aad)(void *ctx, unsigned char *aad_rec, int aad_len);
|
A D | cipher_aes_gcm_hw_s390x.inc | 113 unsigned char *aad, size_t aad_len, 123 kma->taadl = aad_len << 3; 126 s390x_kma(aad, aad_len, in, in_len, out, fc, kma);
|
/openssl-master/providers/implementations/include/prov/ |
A D | ciphercommon_gcm.h | 92 size_t aad_len, const unsigned char *in, 116 size_t aad_len); 118 int ossl_gcm_one_shot(PROV_GCM_CTX *ctx, unsigned char *aad, size_t aad_len,
|
/openssl-master/test/ |
A D | acvp_test.c | 720 const unsigned char *aad, size_t aad_len, in aes_ccm_enc_dec() argument 744 || !TEST_true(EVP_CipherUpdate(ctx, NULL, &len, aad, aad_len)) in aes_ccm_enc_dec() 789 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_ccm_enc_dec_test() 793 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_ccm_enc_dec_test() 798 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_ccm_enc_dec_test() 807 const unsigned char *aad, size_t aad_len, in aes_gcm_enc_dec() argument 840 || !TEST_true(EVP_CipherUpdate(ctx, NULL, &len, aad, aad_len)) in aes_gcm_enc_dec() 877 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_gcm_enc_dec_test() 882 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_gcm_enc_dec_test() 888 tst->iv, tst->iv_len, tst->aad, tst->aad_len, in aes_gcm_enc_dec_test()
|
A D | evp_test.c | 538 size_t aad_len[AAD_NUM]; member 648 return parse_bin(value, &cdat->aad[i], &cdat->aad_len[i]); in cipher_test_parse() 868 expected->aad_len[i])) in cipher_test_enc() 876 if (expected->aad_len[i] > 0) { in cipher_test_enc() 881 if (expected->aad_len[i] > 2) { in cipher_test_enc() 884 expected->aad_len[i] - 2)) in cipher_test_enc() 886 donelen += expected->aad_len[i] - 2; in cipher_test_enc() 888 if (expected->aad_len[i] > 1 in cipher_test_enc() 902 expected->aad_len[0])) == NULL) in cipher_test_enc() 906 expected->aad_len[0]); in cipher_test_enc()
|
A D | acvp_test.inc | 719 size_t aad_len; 733 size_t aad_len;
|
/openssl-master/providers/fips/ |
A D | self_test_kats.c | 81 && EVP_CipherUpdate(ctx, NULL, &tmp, t->aad, t->aad_len); in cipher_init()
|
A D | self_test_data.inc | 56 size_t aad_len;
|