| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpciph_aes_ccm_cavs.txt | 16 AAD = 24 AAD = 34 AAD = 44 AAD = 54 AAD = 62 AAD = 72 AAD = 82 AAD = 92 AAD = 102 AAD = [all …]
|
| H A D | evpciph_aes_siv.txt | 18 AAD = 101112131415161718191a1b1c1d1e1f2021222324252627 31 AAD = 38 AAD = 00112233445566778899aabbccddeeffdeaddadadeaddadaffeeddccbbaa99887766554433221100 39 AAD = 102030405060708090a0 40 AAD = 09f911029d74e35bd84156c5635688c0 47 AAD = 00112233445566778899aabbccddeeffdeaddadadeaddadaffeeddccbbaa99887766554433221100 48 AAD = 49 AAD = 09f911029d74e35bd84156c5635688c0 56 AAD = 57 AAD = 00112233445566778899aabbccddeeffdeaddadadeaddadaffeeddccbbaa99887766554433221100 [all …]
|
| H A D | evpciph_aes_common.txt | 661 AAD = c17a32514eb6103f3249e076d4c871dc97e04b286699e54491dc18f6d734d4c0 669 AAD = c17a32514eb6103f3249e076d4c871dc97e04b286699e54491dc18f6d734d4c0 676 # Test that the tag can be set after specifying AAD. 680 AAD = c17a32514eb6103f3249e076d4c871dc97e04b286699e54491dc18f6d734d4c0 691 AAD = 699 AAD = 708 AAD = 717 AAD = feedfacedeadbeeffeedfacedeadbeefabaddad2 726 AAD = feedfacedeadbeeffeedfacedeadbeefabaddad2 734 AAD = feedfacedeadbeeffeedfacedeadbeefabaddad2 [all …]
|
| H A D | evpciph_aes_ocb.txt | 19 AAD = 27 AAD = 0001020304050607 35 AAD = 0001020304050607 43 AAD = 51 AAD = 000102030405060708090A0B0C0D0E0F 59 AAD = 000102030405060708090A0B0C0D0E0F 67 AAD = 75 AAD = 000102030405060708090A0B0C0D0E0F1011121314151617 83 AAD = 000102030405060708090A0B0C0D0E0F1011121314151617 91 AAD = [all …]
|
| H A D | evpciph_aes_gcm_siv.txt | 90 AAD = 01 100 AAD = 01 110 AAD = 01 120 AAD = 01 130 AAD = 01 140 AAD = 01 150 AAD = 010000000000000000000000 160 AAD = 010000000000000000000000000000000200 170 AAD = 0100000000000000000000000000000002000000 179 AAD = 46bb91c3c5 [all …]
|
| H A D | evpciph_aria.txt | 154 AAD = 8008315ebf2e6fe020e8f5eb 162 AAD = 8008315ebf2e6fe020e8f5eb 173 AAD = 8008315ebf2e6fe020e8f5eb 182 AAD = 8008315ebf2e6fe020e8f5eb 191 AAD = 8008315ebf2e6fe020e8f5eb 204 AAD = 8008315ebf2e6fe020e8f5eb 212 AAD = 8008315ebf2e6fe020e8f5eb 222 AAD = 8008315ebf2e6fe020e8f5eb 230 AAD = 8008315ebf2e6fe020e8f5eb 240 AAD = 8008315ebf2e6fe020e8f5eb [all …]
|
| H A D | evpciph_chacha.txt | 143 AAD = 50515253c0c1c2c3c4c5c6c7 151 AAD = f33388860000000000004e91 161 AAD = f33388860000000000004e91 169 AAD = f33388860000000000004e91 180 AAD = f33388860000000000004e91 188 AAD = f33388860000000000004e91 196 AAD = f33388860000000000004e91 204 AAD = f33388860000000000004e91
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/crypto/ |
| H A D | aes_ccm_test.txt | 11 aad: 22 aad: 33 aad: 44 aad: 55 aad: 66 aad: 77 aad: 88 aad: 99 aad: 110 aad: [all …]
|
| H A D | aes_gcm_test.txt | 11 aad: 22 aad: 00112233445566778899aabbccddeeff 33 aad: aac39231129872a2 44 aad: 55 aad: 66 aad: 77 aad: 88 aad: 99 aad: 110 aad: [all …]
|
| H A D | aes_ccm_test.json | 62 "aad" : "", string 76 "aad" : "", string 90 "aad" : "", string 104 "aad" : "", string 118 "aad" : "", string 132 "aad" : "", string 146 "aad" : "", string 160 "aad" : "", string 174 "aad" : "", string 188 "aad" : "", string [all …]
|
| H A D | aes_gcm_test.json | 68 "aad" : "", string 82 "aad" : "00112233445566778899aabbccddeeff", string 96 "aad" : "aac39231129872a2", string 110 "aad" : "", string 124 "aad" : "", string 138 "aad" : "", string 152 "aad" : "", string 166 "aad" : "", string 180 "aad" : "", string 194 "aad" : "", string [all …]
|
| /freebsd/crypto/openssl/providers/implementations/ciphers/ |
| H A D | cipher_chacha20_poly1305_hw.c | 16 unsigned char *aad, size_t alen) in chacha_poly1305_tls_init() argument 24 memcpy(ctx->tls_aad, aad, EVP_AEAD_TLS1_AAD_LEN); in chacha_poly1305_tls_init() 25 len = aad[EVP_AEAD_TLS1_AAD_LEN - 2] << 8 | aad[EVP_AEAD_TLS1_AAD_LEN - 1]; in chacha_poly1305_tls_init() 26 aad = ctx->tls_aad; in chacha_poly1305_tls_init() 31 aad[EVP_AEAD_TLS1_AAD_LEN - 2] = (unsigned char)(len >> 8); in chacha_poly1305_tls_init() 32 aad[EVP_AEAD_TLS1_AAD_LEN - 1] = (unsigned char)len; in chacha_poly1305_tls_init() 38 ctx->chacha.counter[2] = ctx->nonce[1] ^ CHACHA_U8TOU32(aad); in chacha_poly1305_tls_init() 39 ctx->chacha.counter[3] = ctx->nonce[2] ^ CHACHA_U8TOU32(aad+4); in chacha_poly1305_tls_init() 63 ctx->len.aad = 0; in chacha20_poly1305_initkey() 65 ctx->aad = 0; in chacha20_poly1305_initkey() [all …]
|
| H A D | cipher_aes_gcm_hw_vaes_avx512.inc | 38 void ossl_aes_gcm_update_aad_avx512(void *gcm128ctx, const unsigned char *aad, 68 gcmctx->Xi.u[0] = 0; /* AAD hash */ 70 gcmctx->len.u[0] = 0; /* AAD length */ 85 const unsigned char *aad, 93 /* Bad sequence: call of AAD update after message processing */ 98 /* AAD is limited by 2^64 bits, thus 2^61 bytes */ 105 /* Partial AAD block left from previous AAD update calls */ 112 gcmctx->Xi.c[15 - ares] ^= *(aad++); 119 } else { /* no more AAD */ 125 /* Bulk AAD processing */ [all …]
|
| H A D | cipher_aes_gcm_siv_hw.c | 108 const unsigned char *aad, size_t len) in aes_gcm_siv_aad() argument 114 /* length of 0 resets the AAD */ in aes_gcm_siv_aad() 116 OPENSSL_free(ctx->aad); in aes_gcm_siv_aad() 117 ctx->aad = NULL; in aes_gcm_siv_aad() 122 /* need to check the size of the AAD per RFC8452 */ in aes_gcm_siv_aad() 126 ptr = OPENSSL_realloc(ctx->aad, to_alloc); in aes_gcm_siv_aad() 129 ctx->aad = ptr; in aes_gcm_siv_aad() 130 memcpy(&ctx->aad[ctx->aad_len], aad, len); in aes_gcm_siv_aad() 133 memset(&ctx->aad[ctx->aad_len], 0, to_alloc - ctx->aad_len); in aes_gcm_siv_aad() 178 if (ctx->aad != NULL) { in aes_gcm_siv_encrypt() [all …]
|
| H A D | ciphercommon_gcm_hw.c | 20 int ossl_gcm_aad_update(PROV_GCM_CTX *ctx, const unsigned char *aad, in ossl_gcm_aad_update() argument 23 return CRYPTO_gcm128_aad(&ctx->gcm, aad, aad_len) == 0; in ossl_gcm_aad_update() 51 int ossl_gcm_one_shot(PROV_GCM_CTX *ctx, unsigned char *aad, size_t aad_len, in ossl_gcm_one_shot() argument 57 /* Use saved AAD */ in ossl_gcm_one_shot() 58 if (!ctx->hw->aadupdate(ctx, aad, aad_len)) in ossl_gcm_one_shot()
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | e_chacha20_poly1305.c | 158 struct { uint64_t aad, text; } len; member 159 int aad, mac_inited, tag_len, nonce_len; member 176 actx->len.aad = 0; in chacha20_poly1305_init_key() 178 actx->aad = 0; in chacha20_poly1305_init_key() 238 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN; in chacha20_poly1305_tls_cipher() 263 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN; in chacha20_poly1305_tls_cipher() 297 actx->len.aad = EVP_AEAD_TLS1_AAD_LEN; in chacha20_poly1305_tls_cipher() 320 ctr[0] = (unsigned char)(actx->len.aad); in chacha20_poly1305_tls_cipher() 321 ctr[1] = (unsigned char)(actx->len.aad>>8); in chacha20_poly1305_tls_cipher() 322 ctr[2] = (unsigned char)(actx->len.aad>>16); in chacha20_poly1305_tls_cipher() [all …]
|
| /freebsd/sys/crypto/openssl/amd64/ |
| H A D | ossl_aes_gcm_avx512.c | 54 void ossl_aes_gcm_update_aad_avx512(void *gcm128ctx, const unsigned char *aad, 79 ctx->gcm.Xi.u[0] = 0; /* AAD hash */ in gcm_setiv_avx512() 81 ctx->gcm.len.u[0] = 0; /* AAD length */ in gcm_setiv_avx512() 90 gcm_aad_avx512(struct ossl_gcm_context *ctx, const unsigned char *aad, in gcm_aad_avx512() argument 97 /* Bad sequence: call of AAD update after message processing */ in gcm_aad_avx512() 102 /* AAD is limited by 2^64 bits, thus 2^61 bytes */ in gcm_aad_avx512() 108 /* Partial AAD block left from previous AAD update calls */ in gcm_aad_avx512() 115 ctx->gcm.Xi.c[15 - ares] ^= *(aad++); in gcm_aad_avx512() 122 } else { /* no more AAD */ in gcm_aad_avx512() 128 /* Bulk AAD processing */ in gcm_aad_avx512() [all …]
|
| /freebsd/sys/net80211/ |
| H A D | ieee80211_crypto.c | 989 * @brief Calculate the AAD required for this frame for AES-GCM/AES-CCM. 991 * The contents are described in 802.11-2020 12.5.3.3.3 (Construct AAD) 993 * (Construct AAD) (AES-GCM). 1011 * @param wh 802.11 frame to calculate the AAD over 1012 * @param aad AAD (additional authentication data) buffer 1013 * @param len The AAD buffer length in bytes. 1014 * @returns The number of AAD payload bytes (ignoring the first two 1015 * bytes, which are the AAD payload length in big-endian). 1018 ieee80211_crypto_init_aad(const struct ieee80211_frame *wh, uint8_t *aad, in ieee80211_crypto_init_aad() argument 1023 memset(aad, 0, len); in ieee80211_crypto_init_aad() [all …]
|
| /freebsd/sys/contrib/device-tree/Bindings/memory-controllers/ |
| H A D | ti,gpmc-child.yaml | 54 gpmc,adv-aad-mux-on-ns: 55 description: Assertion time for AAD 58 gpmc,adv-aad-mux-rd-off-ns: 59 description: Read deassertion time for AAD 62 gpmc,adv-aad-mux-wr-off-ns: 63 description: Write deassertion time for AAD 84 gpmc,oe-aad-mux-on-ns: 85 description: Assertion time for AAD 88 gpmc,oe-aad-mux-off-ns: 89 description: Deassertion time for AAD
|
| H A D | omap-gpmc.txt | 66 - gpmc,adv-aad-mux-on-ns: Assertion time for AAD 67 - gpmc,adv-aad-mux-rd-off-ns: Read deassertion time for AAD 68 - gpmc,adv-aad-mux-wr-off-ns: Write deassertion time for AAD 77 - gpmc,oe-aad-mux-on-ns: Assertion time for AAD 78 - gpmc,oe-aad-mux-off-ns: Deassertion time for AAD
|
| /freebsd/tests/sys/opencrypto/ |
| H A D | cryptodev.py | 112 ('aad', 'P', 0), 255 def _doaead(self, op, src, aad, iv, tag=None): argument 266 aad = str_to_ascii(aad) 267 caead.aadlen = len(aad) 268 saad = array.array('B', aad) 269 caead.aad = saad.buffer_info()[0] 338 def encrypt(self, data, iv, aad=None): argument 339 if aad is None: 342 return self._doaead(COP_ENCRYPT, data, aad, 345 def decrypt(self, data, iv, aad=None, tag=None): argument [all …]
|
| /freebsd/crypto/openssl/ssl/record/methods/ |
| H A D | tls_multib.c | 73 unsigned char aad[13]; in tls_write_records_multiblock_int() local 122 memcpy(aad, rl->sequence, 8); in tls_write_records_multiblock_int() 123 aad[8] = templates[0].type; in tls_write_records_multiblock_int() 124 aad[9] = (unsigned char)(templates[0].version >> 8); in tls_write_records_multiblock_int() 125 aad[10] = (unsigned char)(templates[0].version); in tls_write_records_multiblock_int() 126 aad[11] = 0; in tls_write_records_multiblock_int() 127 aad[12] = 0; in tls_write_records_multiblock_int() 129 mb_param.inp = aad; in tls_write_records_multiblock_int()
|
| /freebsd/contrib/libfido2/src/ |
| H A D | aes256.c | 116 const fido_blob_t *aad, const fido_blob_t *in, fido_blob_t *out, in aes256_gcm() argument 126 if (nonce->len != 12 || key->len != 32 || aad->len > UINT_MAX) { in aes256_gcm() 128 nonce->len, key->len, aad->len); in aes256_gcm() 163 if (EVP_Cipher(ctx, NULL, aad->ptr, (u_int)aad->len) < 0 || in aes256_gcm() 206 const fido_blob_t *aad, const fido_blob_t *in, fido_blob_t *out) in aes256_gcm_enc() argument 208 return aes256_gcm(key, nonce, aad, in, out, 1); in aes256_gcm_enc() 213 const fido_blob_t *aad, const fido_blob_t *in, fido_blob_t *out) in aes256_gcm_dec() argument 215 return aes256_gcm(key, nonce, aad, in, out, 0); in aes256_gcm_dec()
|
| /freebsd/share/man/man9/ |
| H A D | crypto_request.9 | 230 the AAD, IV, and payload regions are always defined as regions in the 246 .It AAD Ta Input Ta 259 .It AAD Ta Fa crp_aad_start Ta Fa crp_aad_length 269 used as either additional authentication data (AAD) or payload data. 311 Calculate a digest over the AAD and payload regions and store the 314 Calculate a digest over the AAD and payload regions of the data buffer. 322 .Ss Request AAD 325 AAD may either be supplied in the AAD region of the input buffer or 330 always indicates the amount of AAD in bytes. 335 or as part of the AAD pointed to by [all …]
|
| /freebsd/crypto/openssl/util/ |
| H A D | cavs-to-evptest.pl | 19 my $aad = ""; 47 # AAD Length 70 $aad = $2; 94 print "AAD ="; 96 print " $aad"; 116 $aad = "";
|