HomeSort by relevance Sort by last modified time
    Searched full:aead (Results 1 - 25 of 147) sorted by null

1 2 3 4 5 6

  /external/boringssl/src/ssl/
ssl_aead_ctx.cc 20 #include <openssl/aead.h>
34 const EVP_AEAD *aead; local
36 if (!ssl_cipher_get_evp_aead(&aead, &expected_mac_key_len,
48 /* This is a "stateful" AEAD (for compatibility with pre-AEAD cipher
73 &aead_ctx->ctx, aead, enc_key, enc_key_len,
79 assert(EVP_AEAD_nonce_length(aead) <= EVP_AEAD_MAX_NONCE_LENGTH);
82 aead_ctx->variable_nonce_len = (uint8_t)EVP_AEAD_nonce_length(aead);
123 void SSL_AEAD_CTX_free(SSL_AEAD_CTX *aead) {
124 if (aead == NULL)
    [all...]
  /external/boringssl/src/crypto/fipsmodule/cipher/
aead.c 15 #include <openssl/aead.h>
28 size_t EVP_AEAD_key_length(const EVP_AEAD *aead) { return aead->key_len; }
30 size_t EVP_AEAD_nonce_length(const EVP_AEAD *aead) { return aead->nonce_len; }
32 size_t EVP_AEAD_max_overhead(const EVP_AEAD *aead) { return aead->overhead; }
34 size_t EVP_AEAD_max_tag_len(const EVP_AEAD *aead) { return aead->max_tag_len; }
40 EVP_AEAD_CTX *EVP_AEAD_CTX_new(const EVP_AEAD *aead, const uint8_t *key
    [all...]
  /prebuilts/go/darwin-x86/src/vendor/golang_org/x/crypto/chacha20poly1305/
chacha20poly1305_test.go 22 aead, err := New(key)
27 ct := aead.Seal(nil, nonce, plaintext, ad)
33 plaintext2, err := aead.Open(nil, nonce, ct, ad)
47 if _, err := aead.Open(nil, nonce, ct, ad); err == nil {
53 alterNonceIdx := mr.Intn(aead.NonceSize())
55 if _, err := aead.Open(nil, nonce, ct, ad); err == nil {
62 if _, err := aead.Open(nil, nonce, ct, ad); err == nil {
84 aead, err := New(key[:])
89 ct := aead.Seal(nil, nonce[:], plaintext, ad)
91 plaintext2, err := aead.Open(nil, nonce[:], ct, ad
    [all...]
chacha20poly1305.go 5 // Package chacha20poly1305 implements the ChaCha20-Poly1305 AEAD as specified in RFC 7539.
14 // KeySize is the size of the key used by this AEAD, in bytes.
16 // NonceSize is the size of the nonce used with this AEAD, in bytes.
24 // New returns a ChaCha20-Poly1305 AEAD that uses the given, 256-bit key.
25 func New(key []byte) (cipher.AEAD, error) {
  /prebuilts/go/linux-x86/src/vendor/golang_org/x/crypto/chacha20poly1305/
chacha20poly1305_test.go 22 aead, err := New(key)
27 ct := aead.Seal(nil, nonce, plaintext, ad)
33 plaintext2, err := aead.Open(nil, nonce, ct, ad)
47 if _, err := aead.Open(nil, nonce, ct, ad); err == nil {
53 alterNonceIdx := mr.Intn(aead.NonceSize())
55 if _, err := aead.Open(nil, nonce, ct, ad); err == nil {
62 if _, err := aead.Open(nil, nonce, ct, ad); err == nil {
84 aead, err := New(key[:])
89 ct := aead.Seal(nil, nonce[:], plaintext, ad)
91 plaintext2, err := aead.Open(nil, nonce[:], ct, ad
    [all...]
chacha20poly1305.go 5 // Package chacha20poly1305 implements the ChaCha20-Poly1305 AEAD as specified in RFC 7539.
14 // KeySize is the size of the key used by this AEAD, in bytes.
16 // NonceSize is the size of the nonce used with this AEAD, in bytes.
24 // New returns a ChaCha20-Poly1305 AEAD that uses the given, 256-bit key.
25 func New(key []byte) (cipher.AEAD, error) {
  /external/boringssl/src/crypto/cipher_extra/
aead_test.cc 22 #include <openssl/aead.h>
36 // limited_implementation indicates that tests that assume a generic AEAD
41 // truncated_tags is true if the AEAD supports truncating tags to arbitrary
100 const EVP_AEAD *aead() { return GetParam().func(); } function in class:PerAEADTest
107 // Tests an AEAD against a series of test vectors from a file, using the
139 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_seal));
141 std::vector<uint8_t> out(in.size() + EVP_AEAD_max_overhead(aead()));
158 // The "stateful" AEADs for implementing pre-AEAD cipher suites need to be
162 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_open));
179 // The "stateful" AEADs for implementing pre-AEAD cipher suites need to b
    [all...]
e_ssl3.c 19 #include <openssl/aead.h>
94 if (key_len != EVP_AEAD_key_length(ctx->aead)) {
136 /* Unlike a normal AEAD, an SSL3 AEAD may only be used in one direction. */
147 const size_t max_overhead = EVP_AEAD_max_overhead(ctx->aead);
239 /* Unlike a normal AEAD, an SSL3 AEAD may only be used in one direction. */
  /prebuilts/go/darwin-x86/src/crypto/tls/
cipher_suites.go 75 aead func(key, fixedNonce []byte) cipher.AEAD
152 type aead interface { type
153 cipher.AEAD
161 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to
166 aead cipher.AEAD
170 func (f *fixedNonceAEAD) Overhead() int { return f.aead.Overhead() }
175 return f.aead.Seal(out, f.nonce[:], plaintext, additionalData)
180 return f.aead.Open(out, f.nonce[:], plaintext, additionalData
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
cipher_suites.go 75 aead func(key, fixedNonce []byte) cipher.AEAD
152 type aead interface { type
153 cipher.AEAD
161 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to
166 aead cipher.AEAD
170 func (f *fixedNonceAEAD) Overhead() int { return f.aead.Overhead() }
175 return f.aead.Seal(out, f.nonce[:], plaintext, additionalData)
180 return f.aead.Open(out, f.nonce[:], plaintext, additionalData
    [all...]
  /external/boringssl/src/include/openssl/
aead.h 27 * AEAD couples confidentiality and integrity in a single primitive. AEAD
33 * performs any precomputation needed to use |aead| with |key|. The length of
56 * fixed by the AEAD in use and is returned by |EVP_AEAD_nonce_length|. *The
58 * important - nonce reuse may completely undermine the security of the AEAD.
91 /* AEAD algorithms. */
99 /* EVP_aead_chacha20_poly1305 is the AEAD built from ChaCha20 and
128 * |aead|. */
129 OPENSSL_EXPORT size_t EVP_AEAD_key_length(const EVP_AEAD *aead);
132 * for |aead|. *
150 const EVP_AEAD *aead; member in struct:evp_aead_ctx_st
    [all...]
  /external/boringssl/src/fipstools/
cavp_aes_gcm_test.cc 20 #include <openssl/aead.h>
32 const EVP_AEAD *aead; member in struct:__anon13425::TestCtx
74 if (!AEADEncrypt(ctx->aead, &ct, &tag, tag_len, key, pt, aad, iv)) {
118 AEADDecrypt(ctx->aead, &pt, pt_len, key, aad, ct, tag, iv);
148 const EVP_AEAD *aead = GetAEAD(argv[2], mode == "enc"); local
149 if (aead == nullptr) {
150 fprintf(stderr, "invalid aead: %s\n", argv[2]);
154 TestCtx ctx = {aead};
cavp_test_util.h 22 #include <openssl/aead.h>
37 bool AEADEncrypt(const EVP_AEAD *aead, std::vector<uint8_t> *ct,
44 bool AEADDecrypt(const EVP_AEAD *aead, std::vector<uint8_t> *pt, size_t pt_len,
cavp_test_util.cc 108 bool AEADEncrypt(const EVP_AEAD *aead, std::vector<uint8_t> *ct,
115 if (!EVP_AEAD_CTX_init(ctx.get(), aead, key.data(), key.size(), tag_len,
121 out.resize(pt.size() + EVP_AEAD_max_overhead(aead));
136 bool AEADDecrypt(const EVP_AEAD *aead, std::vector<uint8_t> *pt, size_t pt_len,
143 if (!EVP_AEAD_CTX_init_with_direction(ctx.get(), aead, key.data(), key.size(),
  /prebuilts/go/darwin-x86/src/crypto/aes/
modes.go 12 // implementation of GCM through the AEAD interface.
15 NewGCM(size int) (cipher.AEAD, error)
modes_test.go 28 func (*testBlock) NewGCM(int) (cipher.AEAD, error) {
41 // testAEAD implements the cipher.AEAD interface.
56 aead, err := cipher.NewGCM(b)
60 if _, ok := aead.(testInterface); !ok {
  /prebuilts/go/linux-x86/src/crypto/aes/
modes.go 12 // implementation of GCM through the AEAD interface.
15 NewGCM(size int) (cipher.AEAD, error)
modes_test.go 28 func (*testBlock) NewGCM(int) (cipher.AEAD, error) {
41 // testAEAD implements the cipher.AEAD interface.
56 aead, err := cipher.NewGCM(b)
60 if _, ok := aead.(testInterface); !ok {
  /external/boringssl/src/ssl/test/runner/
cipher_suites.go 76 cipher.AEAD
93 aead func(version uint16, key, fixedNonce []byte) *tlsAead
248 // fixedNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to
255 aead cipher.AEAD
259 func (f *fixedNonceAEAD) Overhead() int { return f.aead.Overhead() }
263 return f.aead.Seal(out, f.sealNonce, plaintext, additionalData)
268 return f.aead.Open(out, f.openNonce, plaintext, additionalData)
276 aead, err := cipher.NewGCM(aes)
286 return &tlsAead{&xorNonceAEAD{nonce1, nonce2, aead}, false
    [all...]
chacha20_poly1305.go 118 // chaCha20Poly1305 implements the AEAD from
124 func newChaCha20Poly1305(key []byte) (cipher.AEAD, error) {
128 aead := new(chaCha20Poly1305)
129 copy(aead.key[:], key)
130 return aead, nil
chacha20_poly1305_test.go 121 aead, err := newChaCha20Poly1305(key)
126 out, err := aead.Open(nil, nonce, output, ad)
133 out = aead.Seal(nil, nonce, input, ad)
139 _, err = aead.Open(nil, nonce, out, ad)
  /external/libchrome/crypto/
crypto.gypi 26 'aead.cc',
27 'aead.h',
  /external/boringssl/src/util/
doc.config 48 "include/openssl/aead.h",
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/spec/
AEADParameterSpec.java 8 * ParameterSpec for AEAD modes which allows associated data to be added via an algorithm parameter spec.In normal
  /external/openssh/regress/
try-ciphers.sh 20 # No point trying all MACs for AEAD ciphers since they

Completed in 3662 milliseconds

1 2 3 4 5 6