/external/chromium_org/net/quic/crypto/ |
scoped_evp_aead_ctx.cc | 10 ctx_.aead = NULL; 14 if (ctx_.aead != NULL) {
|
crypto_handshake.h | 37 QuicTag aead; member in struct:net::QuicCryptoNegotiatedParameters 87 // Authenticated encryption with associated data (AEAD) algorithms. 88 QuicTagVector aead; member in class:net::QuicCryptoConfig
|
crypto_handshake.cc | 16 aead(0) {
|
crypto_utils.h | 54 // |hkdf_input|. |aead| determines which cipher will be used. |perspective| 59 QuicTag aead,
|
quic_crypto_client_config.cc | 263 aead.clear(); 265 aead.push_back(kCC12); 267 aead.push_back(kAESG); 383 *error_details = "Missing AEAD or KEXS"; 387 // AEAD: the work loads on the client and server are symmetric. Since the 394 aead, their_aeads, num_their_aeads, QuicUtils::LOCAL_PRIORITY, 395 &out_params->aead, NULL) || 400 *error_details = "Unsupported AEAD or KEXS"; 403 out->SetTaglist(kAEAD, out_params->aead, 0); 479 out_params->aead, out_params->client_nonce [all...] |
crypto_utils.cc | 81 QuicTag aead, 87 out->encrypter.reset(QuicEncrypter::Create(aead)); 88 out->decrypter.reset(QuicDecrypter::Create(aead));
|
crypto_server_test.cc | 114 "AEAD", "AESG", 350 "AEAD", "AESG", 450 "AEAD", "AESG", 471 "AEAD", "AESG", 492 "AEAD", "AESG", 514 "AEAD", "AESG", 538 "AEAD", "AESG", 685 "AEAD", "AESG",
|
quic_crypto_client_config_test.cc | 73 if (config.aead.size() > 1) 74 EXPECT_NE(kAESG, config.aead[0]); 76 EXPECT_EQ(kAESG, config.aead[0]);
|
aead_base_decrypter.h | 25 // AeadBaseDecrypter is the base class of AEAD QuicDecrypter subclasses.
|
aead_base_encrypter.h | 25 // AeadBaseEncrypter is the base class of AEAD QuicEncrypter subclasses.
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
evp_aead.c | 66 size_t EVP_AEAD_key_length(const EVP_AEAD *aead) 68 return aead->key_len; 71 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) 73 return aead->nonce_len; 76 size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead) 78 return aead->overhead; 81 size_t EVP_AEAD_max_tag_len(const EVP_AEAD *aead) 83 return aead->max_tag_len; 86 int EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, 90 ctx->aead = aead [all...] |
evp.h | 387 /* AEAD cipher deduces payload length and returns number of bytes 392 /* Used by composite AEAD ciphers, no-op in GCM, CCM... */ 1286 const EVP_AEAD *aead; member in struct:evp_aead_ctx_st [all...] |
/external/chromium_org/third_party/openssl/openssl/patches/ |
aead_ssl_support.patch | 126 + SSL_AEAD_CTX *aead_read_ctx; /* AEAD context. If non-NULL, then 136 + SSL_AEAD_CTX *aead_write_ctx; /* AEAD context. If non-NULL, then 198 +/* ssl_cipher_get_evp_aead sets |*aead| to point to the correct EVP_AEAD object 200 +int ssl_cipher_get_evp_aead(const SSL_SESSION *s, const EVP_AEAD **aead) 204 + *aead = NULL; 212 + /* There is only one AEAD for now. */ 213 + *aead = EVP_aead_aes_128_gcm(); 314 +/* ssl_aead_ctx_st contains information about an AEAD that is being used to 333 +int ssl_cipher_get_evp_aead(const SSL_SESSION *s, const EVP_AEAD **aead); 384 + const EVP_AEAD *aead = s->s3->tmp.new_aead [all...] |
aead_support.patch | 6 This change adds an AEAD interface to EVP and an AES-GCM implementation 300 + * AEAD couples confidentiality and integrity in a single primtive. AEAD 314 + * |aead|. */ 315 +size_t EVP_AEAD_key_length(const EVP_AEAD *aead); 318 + * for |aead|. */ 319 +size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead); 322 + * by the act of sealing data with |aead|. */ 323 +size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead); 325 +/* EVP_AEAD_max_tag_len returns the maximum tag length when using |aead|. Thi [all...] |
use_aead_for_aes_gcm.patch | 6 Switches AES-GCM ciphersuites to use AEAD interfaces.
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
t1_enc.c | 342 const EVP_AEAD *aead = s->s3->tmp.new_aead; local 358 if (!EVP_AEAD_CTX_init(&aead_ctx->ctx, aead, key, key_len, 371 if (aead_ctx->variable_nonce_len + aead_ctx->fixed_nonce_len != EVP_AEAD_nonce_length(aead)) 376 aead_ctx->tag_len = EVP_AEAD_max_overhead(aead); 500 /* is_aead_cipher indicates whether the EVP_CIPHER implements an AEAD 559 const EVP_AEAD *aead = s->s3->tmp.new_aead; local 617 if (aead != NULL) 619 key_len = EVP_AEAD_key_length(aead); 661 if (aead != NULL) 687 const EVP_AEAD *aead = NULL local 815 const SSL_AEAD_CTX *aead; local [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
sslt.h | 164 /* AEAD ciphers don't have a MAC. For an AEAD cipher, macAlgorithmName 165 * is "AEAD", macAlgorithm is ssl_mac_aead, and macBits is the length in
|
/libcore/luni/src/main/java/javax/crypto/ |
AEADBadTagException.java | 21 * Additional Data (AEAD) mode such as Galois/Counter Mode (GCM) and the tag
|
/external/chromium_org/net/quic/ |
quic_crypto_client_stream_test.cc | 105 EXPECT_EQ(crypto_config_.aead[0], crypto_params.aead);
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
evp.h | 387 /* AEAD cipher deduces payload length and returns number of bytes 392 /* Used by composite AEAD ciphers, no-op in GCM, CCM... */ 1286 const EVP_AEAD *aead; member in struct:evp_aead_ctx_st [all...] |
/external/chromium_org/net/quic/test_tools/ |
mock_crypto_client_stream.cc | 51 crypto_negotiated_params_.aead = kAESG;
|
/external/chromium_org/net/ssl/ |
ssl_cipher_suite_names.h | 21 // In the case of an AEAD cipher suite, *mac_str is NULL and *is_aead is true.
|
/external/chromium_org/net/third_party/nss/patches/ |
chacha20poly1305.patch | 127 - pwSpec->aead = ssl3_AESGCM; 129 + pwSpec->aead = ssl3_AESGCM; 131 + pwSpec->aead = ssl3_ChaCha20Poly1305;
|
/libcore/luni/src/main/java/javax/crypto/spec/ |
GCMParameterSpec.java | 25 * Associated Data (AEAD) mode for a cipher which allows you to use the
|
/system/keymaster/ |
ae.h | 3 * AEAD API 0.12 - 23-MAY-2012 6 * encryption with associated data (AEAD) implementations. It does not try 46 * AEAD opaque structure definition 71 * AEAD Routines
|