/openbsd-current/usr.bin/ssh/ |
H A D | cipher-chachapoly.c | 54 * En/decrypt with header key 'aadlen' bytes from 'src', storing result 57 * En/decrypt 'len' bytes at offset 'aadlen' from 'src' to 'dest'. Use 58 * POLY1305_TAGLEN bytes at offset 'len'+'aadlen' as the authentication 63 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) 82 const u_char *tag = src + aadlen + len; 84 poly1305_auth(expected_tag, src, aadlen + len, poly_key); 92 if (aadlen) { 94 chacha_encrypt_bytes(&ctx->header_ctx, src, dest, aadlen); 99 chacha_encrypt_bytes(&ctx->main_ctx, src + aadlen, 100 dest + aadlen, le 62 chachapoly_crypt(struct chachapoly_ctx *ctx, u_int seqnr, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) argument [all...] |
H A D | cipher-chachapoly-libcrypto.c | 70 * En/decrypt with header key 'aadlen' bytes from 'src', storing result 73 * En/decrypt 'len' bytes at offset 'aadlen' from 'src' to 'dest'. Use 74 * POLY1305_TAGLEN bytes at offset 'len'+'aadlen' as the authentication 79 const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) 101 const u_char *tag = src + aadlen + len; 103 poly1305_auth(expected_tag, src, aadlen + len, poly_key); 111 if (aadlen) { 113 EVP_Cipher(ctx->header_evp, dest, src, aadlen) < 0) { 122 EVP_Cipher(ctx->main_evp, dest + aadlen, src + aadlen, le 78 chachapoly_crypt(struct chachapoly_ctx *ctx, u_int seqnr, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) argument [all...] |
H A D | cipher-chachapoly.h | 34 u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen,
|
H A D | cipher.c | 330 * Copy 'aadlen' bytes (without en/decryption) from 'src' to 'dest'. 333 * En/Decrypt 'len' bytes at offset 'aadlen' from 'src' to 'dest'. 334 * Use 'authlen' bytes at offset 'len'+'aadlen' as the authentication tag. 336 * Both 'aadlen' and 'authlen' can be set to 0. 340 const u_char *src, u_int len, u_int aadlen, u_int authlen) 344 len, aadlen, authlen, cc->encrypt); 347 memcpy(dest, src, aadlen + len); 352 if (aadlen) 353 memcpy(dest, src, aadlen); 354 aesctr_encrypt_bytes(&cc->ac_ctx, src + aadlen, 339 cipher_crypt(struct sshcipher_ctx *cc, u_int seqnr, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen) argument [all...] |
H A D | sshkey-xmss.c | 891 size_t i, keylen, ivlen, blocksize, authlen, encrypted_len, aadlen; local 942 aadlen = sshbuf_len(encoded); 951 encrypted_len + aadlen + authlen, &cp)) != 0 || 955 encrypted_len, aadlen, authlen)) != 0) 982 size_t keylen, ivlen, authlen, aadlen; local 1037 aadlen = sshbuf_len(copy) - sshbuf_len(encoded); 1044 if ((r = sshbuf_reserve(decrypted, aadlen + encrypted_len, &dp)) != 0 || 1048 encrypted_len, aadlen, authlen)) != 0) 1060 if ((r = sshbuf_consume(decrypted, aadlen)) != 0)
|
H A D | packet.c | 1145 u_int authlen = 0, aadlen = 0; local 1161 aadlen = (mac && mac->enabled && mac->etm) || authlen ? 4 : 0; 1197 len -= aadlen; /* packet length is not encrypted for EtM modes */ 1241 DBG(debug("send: len %d (includes padlen %d, aadlen %d)", 1242 len, padlen, aadlen)); 1258 len - aadlen, aadlen, authlen)) != 0) 1263 /* EtM: compute mac over aadlen + cipher text */ 1539 u_int maclen, aadlen = 0, authlen = 0, block_size; local 1563 aadlen [all...] |
/openbsd-current/regress/sys/crypto/gmac/ |
H A D | gmac_test.c | 639 const unsigned char *aad, size_t aadlen, 653 for (i = 0; i < aadlen; i += GMAC_BLOCK_LEN) { 655 memcpy(blk, aad + i, MINIMUM(aadlen - i, GMAC_BLOCK_LEN)); 666 *p = htobe32(aadlen * 8); 637 dogmac(const unsigned char *key, size_t klen, const unsigned char *iv, size_t ivlen, const unsigned char *aad, size_t aadlen, const unsigned char *in, unsigned char *out, size_t len) argument
|
/openbsd-current/regress/sys/crypto/chachapoly/ |
H A D | chachapoly_test.c | 317 const unsigned char *aad, size_t aadlen, 331 for (i = 0; i < aadlen; i += POLY1305_BLOCK_LEN) { 333 memcpy(blk, aad + i, MINIMUM(aadlen - i, POLY1305_BLOCK_LEN)); 344 *p = htole32(aadlen); 315 dopoly(const unsigned char *key, size_t klen, const unsigned char *iv, size_t ivlen, const unsigned char *aad, size_t aadlen, const unsigned char *in, unsigned char *out, size_t len) argument
|
/openbsd-current/sys/arch/amd64/amd64/ |
H A D | aesni.c | 441 int aadlen, err, ivlen, iskip, oskip, rlen; local 448 aadlen = rlen = err = iskip = oskip = 0; 502 aadlen = crda->crd_len; 504 aadlen += 4; 517 rlen = roundup(aadlen, GMAC_BLOCK_LEN); 529 bzero(buf, aadlen); 583 *dw = htobe32(aadlen * 8);
|
/openbsd-current/sys/arch/octeon/dev/ |
H A D | octcrypto.c | 686 size_t aadlen; local 749 aadlen = crda->crd_len; 751 aadlen += 4; 771 octcrypto_ghash_update(buf, roundup(aadlen, GMAC_BLOCK_LEN)); 774 memset(buf, 0, aadlen); 804 block[0] = htobe64(aadlen * 8);
|
/openbsd-current/sys/crypto/ |
H A D | cryptosoft.c | 494 int aadlen, blksz, i, ivlen, outtype, len, iskip, oskip; local 569 aadlen = crda->crd_len; 580 aadlen += 4; 623 *blkp = htobe32(aadlen * 8); 632 *blkp = htole32(aadlen);
|