boringssl/crypto/aes
David Benjamin 97227dc52d Replace keywrap AEADs with upstream's APIs.
This finally removes the last Android hack. Both Chromium and Android
end up needing this thing (Chromium needs it for WebCrypto but currently
uses the EVP_AEAD version and Android needs it by way of
wpa_supplicant).

On the Android side, the alternative is we finish upstream's
NEED_INTERNAL_AES_WRAP patch, but then it just uses its own key-wrap
implementation. This seems a little silly, considering we have a version
of key-wrap under a different API anyway.

It also doesn't make much sense to leave the EVP_AEAD API around if we
don't want people to use it and Chromium's the only consumer. Remove it
and I'll switch Chromium to the new---er, old--- APIs next roll.

Change-Id: I23a89cda25bddb6ac1033e4cd408165f393d1e6c
Reviewed-on: https://boringssl-review.googlesource.com/11410
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: Adam Langley <agl@google.com>
2016-10-04 01:37:31 +00:00
..
asm Add PPC64LE assembly for AES-GCM. 2016-09-27 18:43:20 +00:00
aes_test.cc Replace keywrap AEADs with upstream's APIs. 2016-10-04 01:37:31 +00:00
aes_tests.txt Replace keywrap AEADs with upstream's APIs. 2016-10-04 01:37:31 +00:00
aes.c Update aes.c for new ARM asm names. 2016-09-27 19:09:05 +00:00
CMakeLists.txt Replace keywrap AEADs with upstream's APIs. 2016-10-04 01:37:31 +00:00
internal.h Inital import. 2014-06-20 13:17:32 -07:00
key_wrap.c Replace keywrap AEADs with upstream's APIs. 2016-10-04 01:37:31 +00:00
mode_wrappers.c Switch all 'num' parameters in crypto/modes to unsigned. 2016-04-19 17:56:25 +00:00