/external/boringssl/src/ssl/ |
ssl_aead_ctx.cc | 20 #include <openssl/aead.h> 34 const EVP_AEAD *aead; local 36 if (!ssl_cipher_get_evp_aead(&aead, &expected_mac_key_len, 48 /* This is a "stateful" AEAD (for compatibility with pre-AEAD cipher 73 &aead_ctx->ctx, aead, enc_key, enc_key_len, 79 assert(EVP_AEAD_nonce_length(aead) <= EVP_AEAD_MAX_NONCE_LENGTH); 82 aead_ctx->variable_nonce_len = (uint8_t)EVP_AEAD_nonce_length(aead); 123 void SSL_AEAD_CTX_free(SSL_AEAD_CTX *aead) { 124 if (aead == NULL) [all...] |
/external/boringssl/src/crypto/fipsmodule/cipher/ |
aead.c | 15 #include <openssl/aead.h> 28 size_t EVP_AEAD_key_length(const EVP_AEAD *aead) { return aead->key_len; } 30 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; } 32 size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead) { return aead->overhead; } 34 size_t EVP_AEAD_max_tag_len(const EVP_AEAD *aead) { return aead->max_tag_len; } 40 EVP_AEAD_CTX *EVP_AEAD_CTX_new(const EVP_AEAD *aead, const uint8_t *key [all...] |
/prebuilts/go/darwin-x86/src/vendor/golang_org/x/crypto/chacha20poly1305/ |
chacha20poly1305_test.go | 22 aead, err := New(key) 27 ct := aead.Seal(nil, nonce, plaintext, ad) 33 plaintext2, err := aead.Open(nil, nonce, ct, ad) 47 if _, err := aead.Open(nil, nonce, ct, ad); err == nil { 53 alterNonceIdx := mr.Intn(aead.NonceSize()) 55 if _, err := aead.Open(nil, nonce, ct, ad); err == nil { 62 if _, err := aead.Open(nil, nonce, ct, ad); err == nil { 84 aead, err := New(key[:]) 89 ct := aead.Seal(nil, nonce[:], plaintext, ad) 91 plaintext2, err := aead.Open(nil, nonce[:], ct, ad [all...] |
chacha20poly1305.go | 5 // Package chacha20poly1305 implements the ChaCha20-Poly1305 AEAD as specified in RFC 7539. 14 // KeySize is the size of the key used by this AEAD, in bytes. 16 // NonceSize is the size of the nonce used with this AEAD, in bytes. 24 // New returns a ChaCha20-Poly1305 AEAD that uses the given, 256-bit key. 25 func New(key []byte) (cipher.AEAD, error) {
|
/prebuilts/go/linux-x86/src/vendor/golang_org/x/crypto/chacha20poly1305/ |
chacha20poly1305_test.go | 22 aead, err := New(key) 27 ct := aead.Seal(nil, nonce, plaintext, ad) 33 plaintext2, err := aead.Open(nil, nonce, ct, ad) 47 if _, err := aead.Open(nil, nonce, ct, ad); err == nil { 53 alterNonceIdx := mr.Intn(aead.NonceSize()) 55 if _, err := aead.Open(nil, nonce, ct, ad); err == nil { 62 if _, err := aead.Open(nil, nonce, ct, ad); err == nil { 84 aead, err := New(key[:]) 89 ct := aead.Seal(nil, nonce[:], plaintext, ad) 91 plaintext2, err := aead.Open(nil, nonce[:], ct, ad [all...] |
chacha20poly1305.go | 5 // Package chacha20poly1305 implements the ChaCha20-Poly1305 AEAD as specified in RFC 7539. 14 // KeySize is the size of the key used by this AEAD, in bytes. 16 // NonceSize is the size of the nonce used with this AEAD, in bytes. 24 // New returns a ChaCha20-Poly1305 AEAD that uses the given, 256-bit key. 25 func New(key []byte) (cipher.AEAD, error) {
|
/external/boringssl/src/crypto/cipher_extra/ |
aead_test.cc | 22 #include <openssl/aead.h> 36 // limited_implementation indicates that tests that assume a generic AEAD 41 // truncated_tags is true if the AEAD supports truncating tags to arbitrary 100 const EVP_AEAD *aead() { return GetParam().func(); } function in class:PerAEADTest 107 // Tests an AEAD against a series of test vectors from a file, using the 139 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_seal)); 141 std::vector<uint8_t> out(in.size() + EVP_AEAD_max_overhead(aead())); 158 // The "stateful" AEADs for implementing pre-AEAD cipher suites need to be 162 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_open)); 179 // The "stateful" AEADs for implementing pre-AEAD cipher suites need to b [all...] |
e_ssl3.c | 19 #include <openssl/aead.h> 94 if (key_len != EVP_AEAD_key_length(ctx->aead)) { 136 /* Unlike a normal AEAD, an SSL3 AEAD may only be used in one direction. */ 147 const size_t max_overhead = EVP_AEAD_max_overhead(ctx->aead); 239 /* Unlike a normal AEAD, an SSL3 AEAD may only be used in one direction. */
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
cipher_suites.go | 75 aead func(key, fixedNonce []byte) cipher.AEAD 152 type aead interface { type 153 cipher.AEAD 161 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to 166 aead cipher.AEAD 170 func (f *fixedNonceAEAD) Overhead() int { return f.aead.Overhead() } 175 return f.aead.Seal(out, f.nonce[:], plaintext, additionalData) 180 return f.aead.Open(out, f.nonce[:], plaintext, additionalData [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
cipher_suites.go | 75 aead func(key, fixedNonce []byte) cipher.AEAD 152 type aead interface { type 153 cipher.AEAD 161 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to 166 aead cipher.AEAD 170 func (f *fixedNonceAEAD) Overhead() int { return f.aead.Overhead() } 175 return f.aead.Seal(out, f.nonce[:], plaintext, additionalData) 180 return f.aead.Open(out, f.nonce[:], plaintext, additionalData [all...] |
/external/boringssl/src/include/openssl/ |
aead.h | 27 * AEAD couples confidentiality and integrity in a single primitive. AEAD 33 * performs any precomputation needed to use |aead| with |key|. The length of 56 * fixed by the AEAD in use and is returned by |EVP_AEAD_nonce_length|. *The 58 * important - nonce reuse may completely undermine the security of the AEAD. 91 /* AEAD algorithms. */ 99 /* EVP_aead_chacha20_poly1305 is the AEAD built from ChaCha20 and 128 * |aead|. */ 129 OPENSSL_EXPORT size_t EVP_AEAD_key_length(const EVP_AEAD *aead); 132 * for |aead|. * 150 const EVP_AEAD *aead; member in struct:evp_aead_ctx_st [all...] |
/external/boringssl/src/fipstools/ |
cavp_aes_gcm_test.cc | 20 #include <openssl/aead.h> 32 const EVP_AEAD *aead; member in struct:__anon13425::TestCtx 74 if (!AEADEncrypt(ctx->aead, &ct, &tag, tag_len, key, pt, aad, iv)) { 118 AEADDecrypt(ctx->aead, &pt, pt_len, key, aad, ct, tag, iv); 148 const EVP_AEAD *aead = GetAEAD(argv[2], mode == "enc"); local 149 if (aead == nullptr) { 150 fprintf(stderr, "invalid aead: %s\n", argv[2]); 154 TestCtx ctx = {aead};
|
cavp_test_util.h | 22 #include <openssl/aead.h> 37 bool AEADEncrypt(const EVP_AEAD *aead, std::vector<uint8_t> *ct, 44 bool AEADDecrypt(const EVP_AEAD *aead, std::vector<uint8_t> *pt, size_t pt_len,
|
cavp_test_util.cc | 108 bool AEADEncrypt(const EVP_AEAD *aead, std::vector<uint8_t> *ct, 115 if (!EVP_AEAD_CTX_init(ctx.get(), aead, key.data(), key.size(), tag_len, 121 out.resize(pt.size() + EVP_AEAD_max_overhead(aead)); 136 bool AEADDecrypt(const EVP_AEAD *aead, std::vector<uint8_t> *pt, size_t pt_len, 143 if (!EVP_AEAD_CTX_init_with_direction(ctx.get(), aead, key.data(), key.size(),
|
/prebuilts/go/darwin-x86/src/crypto/aes/ |
modes.go | 12 // implementation of GCM through the AEAD interface. 15 NewGCM(size int) (cipher.AEAD, error)
|
modes_test.go | 28 func (*testBlock) NewGCM(int) (cipher.AEAD, error) { 41 // testAEAD implements the cipher.AEAD interface. 56 aead, err := cipher.NewGCM(b) 60 if _, ok := aead.(testInterface); !ok {
|
/prebuilts/go/linux-x86/src/crypto/aes/ |
modes.go | 12 // implementation of GCM through the AEAD interface. 15 NewGCM(size int) (cipher.AEAD, error)
|
modes_test.go | 28 func (*testBlock) NewGCM(int) (cipher.AEAD, error) { 41 // testAEAD implements the cipher.AEAD interface. 56 aead, err := cipher.NewGCM(b) 60 if _, ok := aead.(testInterface); !ok {
|
/external/boringssl/src/ssl/test/runner/ |
cipher_suites.go | 76 cipher.AEAD 93 aead func(version uint16, key, fixedNonce []byte) *tlsAead 248 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to 255 aead cipher.AEAD 259 func (f *fixedNonceAEAD) Overhead() int { return f.aead.Overhead() } 263 return f.aead.Seal(out, f.sealNonce, plaintext, additionalData) 268 return f.aead.Open(out, f.openNonce, plaintext, additionalData) 276 aead, err := cipher.NewGCM(aes) 286 return &tlsAead{&xorNonceAEAD{nonce1, nonce2, aead}, false [all...] |
chacha20_poly1305.go | 118 // chaCha20Poly1305 implements the AEAD from 124 func newChaCha20Poly1305(key []byte) (cipher.AEAD, error) { 128 aead := new(chaCha20Poly1305) 129 copy(aead.key[:], key) 130 return aead, nil
|
chacha20_poly1305_test.go | 121 aead, err := newChaCha20Poly1305(key) 126 out, err := aead.Open(nil, nonce, output, ad) 133 out = aead.Seal(nil, nonce, input, ad) 139 _, err = aead.Open(nil, nonce, out, ad)
|
/external/libchrome/crypto/ |
crypto.gypi | 26 'aead.cc', 27 'aead.h',
|
/external/boringssl/src/util/ |
doc.config | 48 "include/openssl/aead.h",
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/ |
AEADParameterSpec.java | 8 * ParameterSpec for AEAD modes which allows associated data to be added via an algorithm parameter spec.In normal
|
/external/openssh/regress/ |
try-ciphers.sh | 20 # No point trying all MACs for AEAD ciphers since they
|