HomeSort by relevance Sort by last modified time
    Searched full:aead (Results 1 - 25 of 69) sorted by null

1 2 3

  /external/chromium_org/net/quic/crypto/
scoped_evp_aead_ctx.cc 10 ctx_.aead = NULL;
14 if (ctx_.aead != NULL) {
crypto_handshake.h 37 QuicTag aead; member in struct:net::QuicCryptoNegotiatedParameters
87 // Authenticated encryption with associated data (AEAD) algorithms.
88 QuicTagVector aead; member in class:net::QuicCryptoConfig
crypto_handshake.cc 16 aead(0) {
crypto_utils.h 54 // |hkdf_input|. |aead| determines which cipher will be used. |perspective|
59 QuicTag aead,
quic_crypto_client_config.cc 263 aead.clear();
265 aead.push_back(kCC12);
267 aead.push_back(kAESG);
383 *error_details = "Missing AEAD or KEXS";
387 // AEAD: the work loads on the client and server are symmetric. Since the
394 aead, their_aeads, num_their_aeads, QuicUtils::LOCAL_PRIORITY,
395 &out_params->aead, NULL) ||
400 *error_details = "Unsupported AEAD or KEXS";
403 out->SetTaglist(kAEAD, out_params->aead, 0);
479 out_params->aead, out_params->client_nonce
    [all...]
crypto_utils.cc 81 QuicTag aead,
87 out->encrypter.reset(QuicEncrypter::Create(aead));
88 out->decrypter.reset(QuicDecrypter::Create(aead));
crypto_server_test.cc 114 "AEAD", "AESG",
350 "AEAD", "AESG",
450 "AEAD", "AESG",
471 "AEAD", "AESG",
492 "AEAD", "AESG",
514 "AEAD", "AESG",
538 "AEAD", "AESG",
685 "AEAD", "AESG",
quic_crypto_client_config_test.cc 73 if (config.aead.size() > 1)
74 EXPECT_NE(kAESG, config.aead[0]);
76 EXPECT_EQ(kAESG, config.aead[0]);
aead_base_decrypter.h 25 // AeadBaseDecrypter is the base class of AEAD QuicDecrypter subclasses.
aead_base_encrypter.h 25 // AeadBaseEncrypter is the base class of AEAD QuicEncrypter subclasses.
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
evp_aead.c 66 size_t EVP_AEAD_key_length(const EVP_AEAD *aead)
68 return aead->key_len;
71 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead)
73 return aead->nonce_len;
76 size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead)
78 return aead->overhead;
81 size_t EVP_AEAD_max_tag_len(const EVP_AEAD *aead)
83 return aead->max_tag_len;
86 int EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead,
90 ctx->aead = aead
    [all...]
evp.h 387 /* AEAD cipher deduces payload length and returns number of bytes
392 /* Used by composite AEAD ciphers, no-op in GCM, CCM... */
1286 const EVP_AEAD *aead; member in struct:evp_aead_ctx_st
    [all...]
  /external/chromium_org/third_party/openssl/openssl/patches/
aead_ssl_support.patch 126 + SSL_AEAD_CTX *aead_read_ctx; /* AEAD context. If non-NULL, then
136 + SSL_AEAD_CTX *aead_write_ctx; /* AEAD context. If non-NULL, then
198 +/* ssl_cipher_get_evp_aead sets |*aead| to point to the correct EVP_AEAD object
200 +int ssl_cipher_get_evp_aead(const SSL_SESSION *s, const EVP_AEAD **aead)
204 + *aead = NULL;
212 + /* There is only one AEAD for now. */
213 + *aead = EVP_aead_aes_128_gcm();
314 +/* ssl_aead_ctx_st contains information about an AEAD that is being used to
333 +int ssl_cipher_get_evp_aead(const SSL_SESSION *s, const EVP_AEAD **aead);
384 + const EVP_AEAD *aead = s->s3->tmp.new_aead
    [all...]
aead_support.patch 6 This change adds an AEAD interface to EVP and an AES-GCM implementation
300 + * AEAD couples confidentiality and integrity in a single primtive. AEAD
314 + * |aead|. */
315 +size_t EVP_AEAD_key_length(const EVP_AEAD *aead);
318 + * for |aead|. */
319 +size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead);
322 + * by the act of sealing data with |aead|. */
323 +size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead);
325 +/* EVP_AEAD_max_tag_len returns the maximum tag length when using |aead|. Thi
    [all...]
use_aead_for_aes_gcm.patch 6 Switches AES-GCM ciphersuites to use AEAD interfaces.
  /external/chromium_org/third_party/openssl/openssl/ssl/
t1_enc.c 342 const EVP_AEAD *aead = s->s3->tmp.new_aead; local
358 if (!EVP_AEAD_CTX_init(&aead_ctx->ctx, aead, key, key_len,
371 if (aead_ctx->variable_nonce_len + aead_ctx->fixed_nonce_len != EVP_AEAD_nonce_length(aead))
376 aead_ctx->tag_len = EVP_AEAD_max_overhead(aead);
500 /* is_aead_cipher indicates whether the EVP_CIPHER implements an AEAD
559 const EVP_AEAD *aead = s->s3->tmp.new_aead; local
617 if (aead != NULL)
619 key_len = EVP_AEAD_key_length(aead);
661 if (aead != NULL)
687 const EVP_AEAD *aead = NULL local
815 const SSL_AEAD_CTX *aead; local
    [all...]
  /external/chromium_org/net/third_party/nss/ssl/
sslt.h 164 /* AEAD ciphers don't have a MAC. For an AEAD cipher, macAlgorithmName
165 * is "AEAD", macAlgorithm is ssl_mac_aead, and macBits is the length in
  /libcore/luni/src/main/java/javax/crypto/
AEADBadTagException.java 21 * Additional Data (AEAD) mode such as Galois/Counter Mode (GCM) and the tag
  /external/chromium_org/net/quic/
quic_crypto_client_stream_test.cc 105 EXPECT_EQ(crypto_config_.aead[0], crypto_params.aead);
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
evp.h 387 /* AEAD cipher deduces payload length and returns number of bytes
392 /* Used by composite AEAD ciphers, no-op in GCM, CCM... */
1286 const EVP_AEAD *aead; member in struct:evp_aead_ctx_st
    [all...]
  /external/chromium_org/net/quic/test_tools/
mock_crypto_client_stream.cc 51 crypto_negotiated_params_.aead = kAESG;
  /external/chromium_org/net/ssl/
ssl_cipher_suite_names.h 21 // In the case of an AEAD cipher suite, *mac_str is NULL and *is_aead is true.
  /external/chromium_org/net/third_party/nss/patches/
chacha20poly1305.patch 127 - pwSpec->aead = ssl3_AESGCM;
129 + pwSpec->aead = ssl3_AESGCM;
131 + pwSpec->aead = ssl3_ChaCha20Poly1305;
  /libcore/luni/src/main/java/javax/crypto/spec/
GCMParameterSpec.java 25 * Associated Data (AEAD) mode for a cipher which allows you to use the
  /system/keymaster/
ae.h 3 * AEAD API 0.12 - 23-MAY-2012
6 * encryption with associated data (AEAD) implementations. It does not try
46 * AEAD opaque structure definition
71 * AEAD Routines

Completed in 550 milliseconds

1 2 3