Go to the source code of this file.
Functions | |
int __must_check | aes_128_cbc_decrypt (const u8 *key, const u8 *iv, u8 *data, size_t data_len) |
int __must_check | aes_128_cbc_encrypt (const u8 *key, const u8 *iv, u8 *data, size_t data_len) |
int __must_check | aes_128_ctr_encrypt (const u8 *key, const u8 *nonce, u8 *data, size_t data_len) |
int __must_check | aes_128_eax_decrypt (const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, const u8 *tag) |
int __must_check | aes_128_eax_encrypt (const u8 *key, const u8 *nonce, size_t nonce_len, const u8 *hdr, size_t hdr_len, u8 *data, size_t data_len, u8 *tag) |
int __must_check | aes_128_encrypt_block (const u8 *key, const u8 *in, u8 *out) |
int __must_check | aes_unwrap (const u8 *kek, int n, const u8 *cipher, u8 *plain) |
int __must_check | aes_wrap (const u8 *kek, int n, const u8 *plain, u8 *cipher) |
int __must_check | omac1_aes_128 (const u8 *key, const u8 *data, size_t data_len, u8 *mac) |
int __must_check | omac1_aes_128_vector (const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) |
int __must_check aes_128_eax_decrypt | ( | const u8 * | key, | |
const u8 * | nonce, | |||
size_t | nonce_len, | |||
const u8 * | hdr, | |||
size_t | hdr_len, | |||
u8 * | data, | |||
size_t | data_len, | |||
const u8 * | tag | |||
) |
aes_128_eax_decrypt - AES-128 EAX mode decryption : Key for decryption (16 bytes) : Nonce for counter mode : Nonce length in bytes : Header data to be authenticity protected : Length of the header data bytes : Data to encrypt in-place : Length of data in bytes : 16-byte tag value Returns: 0 on success, -1 on failure, -2 if tag does not match
int __must_check aes_128_eax_encrypt | ( | const u8 * | key, | |
const u8 * | nonce, | |||
size_t | nonce_len, | |||
const u8 * | hdr, | |||
size_t | hdr_len, | |||
u8 * | data, | |||
size_t | data_len, | |||
u8 * | tag | |||
) |
aes_128_eax_encrypt - AES-128 EAX mode encryption : Key for encryption (16 bytes) : Nonce for counter mode : Nonce length in bytes : Header data to be authenticity protected : Length of the header data bytes : Data to encrypt in-place : Length of data in bytes : 16-byte tag value Returns: 0 on success, -1 on failure
aes_128_encrypt_block - Perform one AES 128-bit block operation : Key for AES : Input data (16 bytes) : Output of the AES block operation (16 bytes) Returns: 0 on success, -1 on failure
Definition at line 29 of file aes-encblock.c.
aes_unwrap - Unwrap key with AES Key Wrap Algorithm (128-bit KEK) (RFC3394) : Key encryption key (KEK)
: Length of the plaintext key in 64-bit units; e.g., 2 = 128-bit = 16 bytes : Wrapped key to be unwrapped, (n + 1) * 64 bits : Plaintext key, n * 64 bits Returns: 0 on success, -1 on failure (e.g., integrity verification failed)
Definition at line 31 of file aes-unwrap.c.
aes_wrap - Wrap keys with AES Key Wrap Algorithm (128-bit KEK) (RFC3394) : 16-octet Key encryption key (KEK)
: Length of the plaintext key in 64-bit units; e.g., 2 = 128-bit = 16 bytes : Plaintext key to be wrapped, n * 64 bits : Wrapped key, (n + 1) * 64 bits Returns: 0 on success, -1 on failure
Definition at line 31 of file aes-wrap.c.
omac1_aes_128 - One-Key CBC MAC (OMAC1) hash with AES-128 (aka AES-CMAC) : 128-bit key for the hash operation : Data buffer for which a MAC is determined : Length of data buffer in bytes : Buffer for MAC (128 bits, i.e., 16 bytes) Returns: 0 on success, -1 on failure
This is a mode for using block cipher (AES in this case) for authentication. OMAC1 was standardized with the name CMAC by NIST in a Special Publication (SP) 800-38B.
Definition at line 121 of file aes-omac1.c.
int __must_check omac1_aes_128_vector | ( | const u8 * | key, | |
size_t | num_elem, | |||
const u8 * | addr[], | |||
const size_t * | len, | |||
u8 * | mac | |||
) |
omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 : 128-bit key for the hash operation : Number of elements in the data vector : Pointers to the data areas : Lengths of the data blocks : Buffer for MAC (128 bits, i.e., 16 bytes) Returns: 0 on success, -1 on failure
This is a mode for using block cipher (AES in this case) for authentication. OMAC1 was standardized with the name CMAC by NIST in a Special Publication (SP) 800-38B.
Definition at line 48 of file aes-omac1.c.