Home | History | Annotate | Download | only in cipher_extra

Lines Matching refs:aead

22 #include <openssl/aead.h>
36 // limited_implementation indicates that tests that assume a generic AEAD
41 // truncated_tags is true if the AEAD supports truncating tags to arbitrary
100 const EVP_AEAD *aead() { return GetParam().func(); }
107 // Tests an AEAD against a series of test vectors from a file, using the
139 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_seal));
141 std::vector<uint8_t> out(in.size() + EVP_AEAD_max_overhead(aead()));
158 // The "stateful" AEADs for implementing pre-AEAD cipher suites need to be
162 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_open));
179 // The "stateful" AEADs for implementing pre-AEAD cipher suites need to be
183 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_open));
194 // The "stateful" AEADs for implementing pre-AEAD cipher suites need to be
198 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_open));
214 if (!aead()->seal_scatter_supports_extra_in) {
236 ASSERT_TRUE(EVP_AEAD_CTX_init(ctx.get(), aead(), key.data(), key.size(),
238 std::vector<uint8_t> out_tag(EVP_AEAD_max_overhead(aead()) + in.size());
286 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_seal));
289 std::vector<uint8_t> out_tag(EVP_AEAD_max_overhead(aead()));
309 // The "stateful" AEADs for implementing pre-AEAD cipher suites need to be
313 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_open));
340 // The "stateful" AEADs for implementing pre-AEAD cipher suites need to be
344 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_open));
355 // The "stateful" AEADs for implementing pre-AEAD cipher suites need to be
359 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_open));
373 ctx.get(), aead(), key.data(), key.size(), tag_len, evp_aead_open));
387 const size_t key_len = EVP_AEAD_key_length(aead());
392 &ctx, aead(), key, key_len,
398 &ctx, aead(), key, key_len,
414 aead());
419 const size_t nonce_len = EVP_AEAD_nonce_length(aead());
423 ASSERT_TRUE(EVP_AEAD_CTX_init(ctx.get(), aead(), key, key_len,
445 1 + EVP_AEAD_max_overhead(aead()) - EVP_AEAD_max_tag_len(aead());
447 << "AEAD is probably ignoring request to truncate tags.";
472 const size_t key_len = EVP_AEAD_key_length(aead());
473 const size_t nonce_len = EVP_AEAD_nonce_length(aead());
474 const size_t max_overhead = EVP_AEAD_max_overhead(aead());
478 ASSERT_TRUE(EVP_AEAD_CTX_init(ctx.get(), aead(), key.data(), key_len,
550 const size_t key_len = EVP_AEAD_key_length(aead());
552 const size_t nonce_len = EVP_AEAD_nonce_length(aead());
561 ctx.get(), aead(), key + 1, key_len, EVP_AEAD_DEFAULT_TAG_LENGTH,
574 ctx.get(), aead(), key + 1, key_len, EVP_AEAD_DEFAULT_TAG_LENGTH,
589 const size_t max_tag_len = EVP_AEAD_max_tag_len(aead());
590 ASSERT_TRUE(EVP_AEAD_CTX_init_with_direction(ctx.get(), aead(), key,
591 EVP_AEAD_key_length(aead()),
597 // The AEAD must not overflow when calculating the ciphertext length.