/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
aead.c | 15 #include <openssl/aead.h> 25 size_t EVP_AEAD_key_length(const EVP_AEAD *aead) { return aead->key_len; } 27 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; } 29 size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead) { return aead->overhead; } 31 size_t EVP_AEAD_max_tag_len(const EVP_AEAD *aead) { return aead->max_tag_len; } 33 int EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, [all...] |
CMakeLists.txt | 11 aead.c
|
aead_test.c | 20 #include <openssl/aead.h> 23 /* This program tests an AEAD against a series of test vectors from a file. The 71 static int run_test_case(const EVP_AEAD *aead, 79 if (!EVP_AEAD_CTX_init(&ctx, aead, bufs[KEY], lengths[KEY], lengths[TAG], 81 fprintf(stderr, "Failed to init AEAD on line %u\n", line_no); 88 fprintf(stderr, "Failed to run AEAD on line %u\n", line_no); 108 /* The "stateful" AEADs for implementing pre-AEAD cipher suites need to be 111 if (!EVP_AEAD_CTX_init(&ctx, aead, bufs[KEY], lengths[KEY], lengths[TAG], 113 fprintf(stderr, "Failed to init AEAD on line %u\n", line_no); 130 /* The "stateful" AEADs for implementing pre-AEAD cipher suites need to b 153 const EVP_AEAD *aead = NULL; local [all...] |
/external/chromium_org/net/quic/crypto/ |
scoped_evp_aead_ctx.cc | 10 ctx_.aead = NULL; 14 if (ctx_.aead != NULL) {
|
crypto_handshake.cc | 16 aead(0),
|
quic_crypto_client_config.cc | 308 aead.clear(); 310 aead.push_back(kCC12); 312 aead.push_back(kAESG); 428 *error_details = "Missing AEAD or KEXS"; 432 // AEAD: the work loads on the client and server are symmetric. Since the 439 aead, their_aeads, num_their_aeads, QuicUtils::LOCAL_PRIORITY, 440 &out_params->aead, NULL) || 445 *error_details = "Unsupported AEAD or KEXS"; 448 out->SetTaglist(kAEAD, out_params->aead, 0); 524 out_params->aead, out_params->client_nonce [all...] |
crypto_utils.h | 54 // |premaster_secret|, |client_nonce|, |server_nonce| and |hkdf_input|. |aead| 60 QuicTag aead,
|
crypto_server_test.cc | 114 "AEAD", "AESG", 351 "AEAD", "AESG", 451 "AEAD", "AESG", 472 "AEAD", "AESG", 493 "AEAD", "AESG", 515 "AEAD", "AESG", 539 "AEAD", "AESG", 686 "AEAD", "AESG",
|
crypto_handshake.h | 100 QuicTag aead; member in struct:net::QuicCryptoNegotiatedParameters 159 // Authenticated encryption with associated data (AEAD) algorithms. 160 QuicTagVector aead; member in class:net::QuicCryptoConfig
|
crypto_utils.cc | 82 QuicTag aead, 89 crypters->encrypter.reset(QuicEncrypter::Create(aead)); 90 crypters->decrypter.reset(QuicDecrypter::Create(aead));
|
quic_crypto_client_config_test.cc | 85 if (config.aead.size() > 1) 86 EXPECT_NE(kAESG, config.aead[0]); 88 EXPECT_EQ(kAESG, config.aead[0]);
|
aead_base_decrypter.h | 25 // AeadBaseDecrypter is the base class of AEAD QuicDecrypter subclasses.
|
aead_base_encrypter.h | 25 // AeadBaseEncrypter is the base class of AEAD QuicEncrypter subclasses.
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
aead.h | 27 * AEAD couples confidentiality and integrity in a single primtive. AEAD 33 * performs any precomputation needed to use |aead| with |key|. The length of 56 * fixed by the AEAD in use and is returned by |EVP_AEAD_nonce_length|. *The 58 * important - nonce reuse may completely undermine the security of the AEAD. 93 /* AEAD algorithms. */ 101 /* EVP_aead_chacha20_poly1305 is an AEAD built from ChaCha20 and Poly1305. */ 123 /* TLS specific AEAD algorithms. 125 * These AEAD primitives do not meet the definition of generic AEADs. They are 130 * a standard AEAD, this is stateful as the RC4 state is carried from operatio 160 const EVP_AEAD *aead; member in struct:evp_aead_ctx_st [all...] |
/external/chromium_org/third_party/boringssl/src/tool/ |
speed.cc | 23 #include <openssl/aead.h> 165 static bool SpeedAEADChunk(const EVP_AEAD *aead, const std::string &name, 168 const size_t key_len = EVP_AEAD_key_length(aead); 169 const size_t nonce_len = EVP_AEAD_nonce_length(aead); 170 const size_t overhead_len = EVP_AEAD_max_overhead(aead); 181 if (!EVP_AEAD_CTX_init(&ctx, aead, key.get(), key_len, 209 static bool SpeedAEAD(const EVP_AEAD *aead, const std::string &name) { 210 return SpeedAEADChunk(aead, name + " (16 bytes)", 16) && 211 SpeedAEADChunk(aead, name + " (1350 bytes)", 1350) && 212 SpeedAEADChunk(aead, name + " (8192 bytes)", 8192) [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
t1_enc.c | 342 const EVP_AEAD *aead = s->s3->tmp.new_aead; local 344 /* mac_key_and_key is used to merge the MAC and cipher keys for an AEAD 345 * which simulates pre-AEAD cipher suites. It needs to be large enough 351 /* This is a "stateful" AEAD (for compatibility with pre-AEAD 377 if (!EVP_AEAD_CTX_init(&aead_ctx->ctx, aead, key, key_len, 392 if (aead_ctx->variable_nonce_len + aead_ctx->fixed_nonce_len != EVP_AEAD_nonce_length(aead)) 397 aead_ctx->tag_len = EVP_AEAD_max_overhead(aead); 494 const EVP_AEAD *aead = s->s3->tmp.new_aead; local 507 if (aead != NULL 578 const EVP_AEAD *aead = NULL; local 707 const SSL_AEAD_CTX *aead; local [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
sslt.h | 164 /* AEAD ciphers don't have a MAC. For an AEAD cipher, macAlgorithmName 165 * is "AEAD", macAlgorithm is ssl_mac_aead, and macBits is the length in
|
/external/chromium_org/third_party/boringssl/src/ssl/test/runner/ |
cipher_suites.go | 75 aead func(key, fixedNonce []byte) cipher.AEAD 189 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to 196 aead cipher.AEAD 200 func (f *fixedNonceAEAD) Overhead() int { return f.aead.Overhead() } 204 return f.aead.Seal(out, f.sealNonce, plaintext, additionalData) 209 return f.aead.Open(out, f.openNonce, plaintext, additionalData) 212 func aeadAESGCM(key, fixedNonce []byte) cipher.AEAD { 217 aead, err := cipher.NewGCM(aes [all...] |
/external/chromium_org/content/child/webcrypto/openssl/ |
util_openssl.h | 28 // Does either encryption or decryption for an AEAD algorithm.
|
/libcore/luni/src/main/java/javax/crypto/ |
AEADBadTagException.java | 21 * Additional Data (AEAD) mode such as Galois/Counter Mode (GCM) and the tag
|
/external/chromium_org/net/quic/test_tools/ |
mock_crypto_client_stream.cc | 51 crypto_negotiated_params_.aead = kAESG;
|
/external/chromium_org/net/ssl/ |
ssl_cipher_suite_names.h | 21 // In the case of an AEAD cipher suite, *mac_str is NULL and *is_aead is true.
|
/external/chromium_org/net/quic/ |
quic_crypto_client_stream_test.cc | 105 EXPECT_EQ(crypto_config_.aead[0], crypto_params.aead);
|
/external/chromium_org/net/third_party/nss/patches/ |
chacha20poly1305.patch | 127 - pwSpec->aead = ssl3_AESGCM; 129 + pwSpec->aead = ssl3_AESGCM; 131 + pwSpec->aead = ssl3_ChaCha20Poly1305;
|
/libcore/luni/src/main/java/javax/crypto/spec/ |
GCMParameterSpec.java | 25 * Associated Data (AEAD) mode for a cipher which allows you to use the
|