HomeSort by relevance Sort by last modified time
    Searched full:aead (Results 1 - 25 of 88) sorted by null

1 2 3 4

  /external/chromium_org/third_party/boringssl/src/crypto/cipher/
aead.c 15 #include <openssl/aead.h>
25 size_t EVP_AEAD_key_length(const EVP_AEAD *aead) { return aead->key_len; }
27 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; }
29 size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead) { return aead->overhead; }
31 size_t EVP_AEAD_max_tag_len(const EVP_AEAD *aead) { return aead->max_tag_len; }
33 int EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead,
    [all...]
CMakeLists.txt 11 aead.c
aead_test.c 20 #include <openssl/aead.h>
23 /* This program tests an AEAD against a series of test vectors from a file. The
71 static int run_test_case(const EVP_AEAD *aead,
79 if (!EVP_AEAD_CTX_init(&ctx, aead, bufs[KEY], lengths[KEY], lengths[TAG],
81 fprintf(stderr, "Failed to init AEAD on line %u\n", line_no);
88 fprintf(stderr, "Failed to run AEAD on line %u\n", line_no);
108 /* The "stateful" AEADs for implementing pre-AEAD cipher suites need to be
111 if (!EVP_AEAD_CTX_init(&ctx, aead, bufs[KEY], lengths[KEY], lengths[TAG],
113 fprintf(stderr, "Failed to init AEAD on line %u\n", line_no);
130 /* The "stateful" AEADs for implementing pre-AEAD cipher suites need to b
153 const EVP_AEAD *aead = NULL; local
    [all...]
  /external/chromium_org/net/quic/crypto/
scoped_evp_aead_ctx.cc 10 ctx_.aead = NULL;
14 if (ctx_.aead != NULL) {
crypto_handshake.cc 16 aead(0),
quic_crypto_client_config.cc 308 aead.clear();
310 aead.push_back(kCC12);
312 aead.push_back(kAESG);
428 *error_details = "Missing AEAD or KEXS";
432 // AEAD: the work loads on the client and server are symmetric. Since the
439 aead, their_aeads, num_their_aeads, QuicUtils::LOCAL_PRIORITY,
440 &out_params->aead, NULL) ||
445 *error_details = "Unsupported AEAD or KEXS";
448 out->SetTaglist(kAEAD, out_params->aead, 0);
524 out_params->aead, out_params->client_nonce
    [all...]
crypto_utils.h 54 // |premaster_secret|, |client_nonce|, |server_nonce| and |hkdf_input|. |aead|
60 QuicTag aead,
crypto_server_test.cc 114 "AEAD", "AESG",
351 "AEAD", "AESG",
451 "AEAD", "AESG",
472 "AEAD", "AESG",
493 "AEAD", "AESG",
515 "AEAD", "AESG",
539 "AEAD", "AESG",
686 "AEAD", "AESG",
crypto_handshake.h 100 QuicTag aead; member in struct:net::QuicCryptoNegotiatedParameters
159 // Authenticated encryption with associated data (AEAD) algorithms.
160 QuicTagVector aead; member in class:net::QuicCryptoConfig
crypto_utils.cc 82 QuicTag aead,
89 crypters->encrypter.reset(QuicEncrypter::Create(aead));
90 crypters->decrypter.reset(QuicDecrypter::Create(aead));
quic_crypto_client_config_test.cc 85 if (config.aead.size() > 1)
86 EXPECT_NE(kAESG, config.aead[0]);
88 EXPECT_EQ(kAESG, config.aead[0]);
aead_base_decrypter.h 25 // AeadBaseDecrypter is the base class of AEAD QuicDecrypter subclasses.
aead_base_encrypter.h 25 // AeadBaseEncrypter is the base class of AEAD QuicEncrypter subclasses.
  /external/chromium_org/third_party/boringssl/src/include/openssl/
aead.h 27 * AEAD couples confidentiality and integrity in a single primtive. AEAD
33 * performs any precomputation needed to use |aead| with |key|. The length of
56 * fixed by the AEAD in use and is returned by |EVP_AEAD_nonce_length|. *The
58 * important - nonce reuse may completely undermine the security of the AEAD.
93 /* AEAD algorithms. */
101 /* EVP_aead_chacha20_poly1305 is an AEAD built from ChaCha20 and Poly1305. */
123 /* TLS specific AEAD algorithms.
125 * These AEAD primitives do not meet the definition of generic AEADs. They are
130 * a standard AEAD, this is stateful as the RC4 state is carried from operatio
160 const EVP_AEAD *aead; member in struct:evp_aead_ctx_st
    [all...]
  /external/chromium_org/third_party/boringssl/src/tool/
speed.cc 23 #include <openssl/aead.h>
165 static bool SpeedAEADChunk(const EVP_AEAD *aead, const std::string &name,
168 const size_t key_len = EVP_AEAD_key_length(aead);
169 const size_t nonce_len = EVP_AEAD_nonce_length(aead);
170 const size_t overhead_len = EVP_AEAD_max_overhead(aead);
181 if (!EVP_AEAD_CTX_init(&ctx, aead, key.get(), key_len,
209 static bool SpeedAEAD(const EVP_AEAD *aead, const std::string &name) {
210 return SpeedAEADChunk(aead, name + " (16 bytes)", 16) &&
211 SpeedAEADChunk(aead, name + " (1350 bytes)", 1350) &&
212 SpeedAEADChunk(aead, name + " (8192 bytes)", 8192)
    [all...]
  /external/chromium_org/third_party/boringssl/src/ssl/
t1_enc.c 342 const EVP_AEAD *aead = s->s3->tmp.new_aead; local
344 /* mac_key_and_key is used to merge the MAC and cipher keys for an AEAD
345 * which simulates pre-AEAD cipher suites. It needs to be large enough
351 /* This is a "stateful" AEAD (for compatibility with pre-AEAD
377 if (!EVP_AEAD_CTX_init(&aead_ctx->ctx, aead, key, key_len,
392 if (aead_ctx->variable_nonce_len + aead_ctx->fixed_nonce_len != EVP_AEAD_nonce_length(aead))
397 aead_ctx->tag_len = EVP_AEAD_max_overhead(aead);
494 const EVP_AEAD *aead = s->s3->tmp.new_aead; local
507 if (aead != NULL
578 const EVP_AEAD *aead = NULL; local
707 const SSL_AEAD_CTX *aead; local
    [all...]
  /external/chromium_org/net/third_party/nss/ssl/
sslt.h 164 /* AEAD ciphers don't have a MAC. For an AEAD cipher, macAlgorithmName
165 * is "AEAD", macAlgorithm is ssl_mac_aead, and macBits is the length in
  /external/chromium_org/third_party/boringssl/src/ssl/test/runner/
cipher_suites.go 75 aead func(key, fixedNonce []byte) cipher.AEAD
189 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to
196 aead cipher.AEAD
200 func (f *fixedNonceAEAD) Overhead() int { return f.aead.Overhead() }
204 return f.aead.Seal(out, f.sealNonce, plaintext, additionalData)
209 return f.aead.Open(out, f.openNonce, plaintext, additionalData)
212 func aeadAESGCM(key, fixedNonce []byte) cipher.AEAD {
217 aead, err := cipher.NewGCM(aes
    [all...]
  /external/chromium_org/content/child/webcrypto/openssl/
util_openssl.h 28 // Does either encryption or decryption for an AEAD algorithm.
  /libcore/luni/src/main/java/javax/crypto/
AEADBadTagException.java 21 * Additional Data (AEAD) mode such as Galois/Counter Mode (GCM) and the tag
  /external/chromium_org/net/quic/test_tools/
mock_crypto_client_stream.cc 51 crypto_negotiated_params_.aead = kAESG;
  /external/chromium_org/net/ssl/
ssl_cipher_suite_names.h 21 // In the case of an AEAD cipher suite, *mac_str is NULL and *is_aead is true.
  /external/chromium_org/net/quic/
quic_crypto_client_stream_test.cc 105 EXPECT_EQ(crypto_config_.aead[0], crypto_params.aead);
  /external/chromium_org/net/third_party/nss/patches/
chacha20poly1305.patch 127 - pwSpec->aead = ssl3_AESGCM;
129 + pwSpec->aead = ssl3_AESGCM;
131 + pwSpec->aead = ssl3_ChaCha20Poly1305;
  /libcore/luni/src/main/java/javax/crypto/spec/
GCMParameterSpec.java 25 * Associated Data (AEAD) mode for a cipher which allows you to use the

Completed in 192 milliseconds

1 2 3 4