Home | History | Annotate | Download | only in crypto

Lines Matching defs:AES

147             (algorithm.equals("AES/CFB/PKCS5PADDING")
148 || algorithm.equals("AES/CFB/PKCS7PADDING")
149 || algorithm.equals("AES/CTR/PKCS5PADDING")
150 || algorithm.equals("AES/CTR/PKCS7PADDING")
151 || algorithm.equals("AES/CTS/PKCS5PADDING")
152 || algorithm.equals("AES/CTS/PKCS7PADDING")
153 || algorithm.equals("AES/OFB/PKCS5PADDING")
154 || algorithm.equals("AES/OFB/PKCS7PADDING"))) {
170 if (algorithm.startsWith("AES") || algorithm.startsWith("DESEDE")) {
192 return "AES";
194 if (algorithm.startsWith("AES/")) {
195 return "AES";
198 return "AES";
201 return "AES";
210 return "AES";
213 return "AES";
216 return "AES";
219 return "AES";
222 return "AES";
225 return "AES";
228 return "AES";
231 return "AES";
234 return "AES";
365 setExpectedBlockSize("AES", 16);
366 setExpectedBlockSize("AES/CBC/PKCS5PADDING", 16);
367 setExpectedBlockSize("AES/CBC/PKCS7PADDING", 16);
368 setExpectedBlockSize("AES/CBC/NOPADDING", 16);
369 setExpectedBlockSize("AES/CFB/PKCS5PADDING", 16);
370 setExpectedBlockSize("AES/CFB/PKCS7PADDING", 16);
371 setExpectedBlockSize("AES/CFB/NOPADDING", 16);
372 setExpectedBlockSize("AES/CTR/PKCS5PADDING", 16);
373 setExpectedBlockSize("AES/CTR/PKCS7PADDING", 16);
374 setExpectedBlockSize("AES/CTR/NOPADDING", 16);
375 setExpectedBlockSize("AES/CTS/PKCS5PADDING", 16);
376 setExpectedBlockSize("AES/CTS/PKCS7PADDING", 16);
377 setExpectedBlockSize("AES/CTS/NOPADDING", 16);
378 setExpectedBlockSize("AES/ECB/PKCS5PADDING", 16);
379 setExpectedBlockSize("AES/ECB/PKCS7PADDING", 16);
380 setExpectedBlockSize("AES/ECB/NOPADDING", 16);
381 setExpectedBlockSize("AES/GCM/NOPADDING", 16);
382 setExpectedBlockSize("AES/OFB/PKCS5PADDING", 16);
383 setExpectedBlockSize("AES/OFB/PKCS7PADDING", 16);
384 setExpectedBlockSize("AES/OFB/NOPADDING", 16);
573 setExpectedOutputSize("AES/CBC/NOPADDING", 0);
574 setExpectedOutputSize("AES/CFB/NOPADDING", 0);
575 setExpectedOutputSize("AES/CTR/NOPADDING", 0);
576 setExpectedOutputSize("AES/CTS/NOPADDING", 0);
577 setExpectedOutputSize("AES/ECB/NOPADDING", 0);
578 setExpectedOutputSize("AES/OFB/NOPADDING", 0);
584 setExpectedOutputSize("AES", Cipher.ENCRYPT_MODE, 16);
585 setExpectedOutputSize("AES/CBC/PKCS5PADDING", Cipher.ENCRYPT_MODE, 16);
586 setExpectedOutputSize("AES/CBC/PKCS7PADDING", Cipher.ENCRYPT_MODE, 16);
587 setExpectedOutputSize("AES/CFB/PKCS5PADDING", Cipher.ENCRYPT_MODE, 16);
588 setExpectedOutputSize("AES/CFB/PKCS7PADDING", Cipher.ENCRYPT_MODE, 16);
589 setExpectedOutputSize("AES/CTR/PKCS5PADDING", Cipher.ENCRYPT_MODE, 16);
590 setExpectedOutputSize("AES/CTR/PKCS7PADDING", Cipher.ENCRYPT_MODE, 16);
591 setExpectedOutputSize("AES/CTS/PKCS5PADDING", Cipher.ENCRYPT_MODE, 16);
592 setExpectedOutputSize("AES/CTS/PKCS7PADDING", Cipher.ENCRYPT_MODE, 16);
593 setExpectedOutputSize("AES/ECB/PKCS5PADDING", Cipher.ENCRYPT_MODE, 16);
594 setExpectedOutputSize("AES/ECB/PKCS7PADDING", Cipher.ENCRYPT_MODE, 16);
595 setExpectedOutputSize("AES/GCM/NOPADDING", Cipher.ENCRYPT_MODE, GCM_TAG_SIZE_BITS / 8);
596 setExpectedOutputSize("AES/OFB/PKCS5PADDING", Cipher.ENCRYPT_MODE, 16);
597 setExpectedOutputSize("AES/OFB/PKCS7PADDING", Cipher.ENCRYPT_MODE, 16);
618 setExpectedOutputSize("AES/CFB/PKCS5PADDING", Cipher.ENCRYPT_MODE, "AndroidOpenSSL", 0);
619 setExpectedOutputSize("AES/CFB/PKCS7PADDING", Cipher.ENCRYPT_MODE, "AndroidOpenSSL", 0);
620 setExpectedOutputSize("AES/CTR/PKCS5PADDING", Cipher.ENCRYPT_MODE, "AndroidOpenSSL", 0);
621 setExpectedOutputSize("AES/CTR/PKCS7PADDING", Cipher.ENCRYPT_MODE, "AndroidOpenSSL", 0);
622 setExpectedOutputSize("AES/CTS/PKCS5PADDING", Cipher.ENCRYPT_MODE, "AndroidOpenSSL", 0);
623 setExpectedOutputSize("AES/CTS/PKCS7PADDING", Cipher.ENCRYPT_MODE, "AndroidOpenSSL", 0);
624 setExpectedOutputSize("AES/OFB/PKCS5PADDING", Cipher.ENCRYPT_MODE, "AndroidOpenSSL", 0);
625 setExpectedOutputSize("AES/OFB/PKCS7PADDING", Cipher.ENCRYPT_MODE, "AndroidOpenSSL", 0);
627 setExpectedOutputSize("AES", Cipher.DECRYPT_MODE, 0);
628 setExpectedOutputSize("AES/CBC/PKCS5PADDING", Cipher.DECRYPT_MODE, 0);
629 setExpectedOutputSize("AES/CBC/PKCS7PADDING", Cipher.DECRYPT_MODE, 0);
630 setExpectedOutputSize("AES/CFB/PKCS5PADDING", Cipher.DECRYPT_MODE, 0);
631 setExpectedOutputSize("AES/CFB/PKCS7PADDING", Cipher.DECRYPT_MODE, 0);
632 setExpectedOutputSize("AES/CTR/PKCS5PADDING", Cipher.DECRYPT_MODE, 0);
633 setExpectedOutputSize("AES/CTR/PKCS7PADDING", Cipher.DECRYPT_MODE, 0);
634 setExpectedOutputSize("AES/CTS/PKCS5PADDING", Cipher.DECRYPT_MODE, 0);
635 setExpectedOutputSize("AES/CTS/PKCS7PADDING", Cipher.DECRYPT_MODE, 0);
636 setExpectedOutputSize("AES/ECB/PKCS5PADDING", Cipher.DECRYPT_MODE, 0);
637 setExpectedOutputSize("AES/ECB/PKCS7PADDING", Cipher.DECRYPT_MODE, 0);
638 setExpectedOutputSize("AES/GCM/NOPADDING", Cipher.DECRYPT_MODE, 0);
639 setExpectedOutputSize("AES/OFB/PKCS5PADDING", Cipher.DECRYPT_MODE, 0);
640 setExpectedOutputSize("AES/OFB/PKCS7PADDING", Cipher.DECRYPT_MODE, 0);
882 // Block mode AES with NoPadding needs to match underlying block size
883 if (algorithm.equals("AES")
884 || algorithm.equals("AES/CBC/NOPADDING")
885 || algorithm.equals("AES/CTS/NOPADDING")
886 || algorithm.equals("AES/ECB/NOPADDING")
902 // Block mode AES with NoPadding needs to match underlying block size
903 if (algorithm.equals("AES")
904 || algorithm.equals("AES/CBC/NOPADDING")
905 || algorithm.equals("AES/CTS/NOPADDING")
906 || algorithm.equals("AES/ECB/NOPADDING")
931 if (algorithm.equals("AES/GCM/NOPADDING")
938 if (algorithm.equals("AES/CBC/NOPADDING")
939 || algorithm.equals("AES/CBC/PKCS5PADDING")
940 || algorithm.equals("AES/CBC/PKCS7PADDING")
941 || algorithm.equals("AES/CFB/NOPADDING")
942 || algorithm.equals("AES/CTR/NOPADDING")
943 || algorithm.equals("AES/CTS/NOPADDING")
944 || algorithm.equals("AES/OFB/NOPADDING")
986 if ("AES/GCM/NOPADDING".equals(algorithm)
1117 // generated AES key to wrap starts with a leading
1270 // Generate a small SecretKey for AES.
1271 KeyGenerator kg = KeyGenerator.getInstance("AES");
3044 }, "AES");
3056 }, "AES");
3070 }, "AES");
3173 * openssl enc -aes-128-ecb -K 3d4f8970b1f27537f40a39298a41555f -in blah|openssl enc -aes-128-ecb -K 3d4f8970b1f27537f40a39298a41555f -nopad -d|recode ../x1 | sed 's/0x/(byte) 0x/g'
3183 * openssl enc -aes-128-ecb -K 3d4f8970b1f27537f40a39298a41555f -in blah|recode ../x1 | sed 's/0x/(byte) 0x/g'
3198 }, "AES");
3279 * echo -n 'AES-192 is a silly option' | recode ../x1 | sed 's/0x/(byte) 0x/g'
3291 * echo -n 'AES-192 is a silly option' | openssl enc -aes-192-ctr -K 5a7a3d7e40b64ed996f7afa15f97fd595e27db6af428e342 -iv 787bdeecf05556eac5d3d865e435f6d9 | recode ../x1 | sed 's/0x/(byte) 0x/g'
3328 * echo -n 'I only regret that I have but one test to write.' | openssl enc -aes-256-cbc -K ec53c6d51d2c4973585fb0b8e51cd2e39915ff07a1837872715d6121bf861935 -iv ceaa31952dfd3d0f5af4b2042ba06094 | openssl enc -aes-256-cbc -K ec53c6d51d2c4973585fb0b8e51cd2e39915ff07a1837872715d6121bf861935 -iv ceaa31952dfd3d0f5af4b2042ba06094 -d -nopad | recode ../x1 | sed 's/0x/(byte) 0x/g'
3346 * echo -n 'I only regret that I have but one test to write.' | openssl enc -aes-256-cbc -K ec53c6d51d2c4973585fb0b8e51cd2e39915ff07a1837872715d6121bf861935 -iv ceaa31952dfd3d0f5af4b2042ba06094 | recode ../x1 | sed 's/0x/(byte) 0x/g'
3494 "AES/ECB/PKCS5Padding",
3503 "AES/ECB/PKCS7Padding",
3511 "AES/GCM/NOPADDING",
3523 "AES/CTR/NoPadding",
3531 "AES/CBC/PKCS5Padding",
3539 "AES/CBC/PKCS7Padding",
3898 // Generate a small SecretKey for AES.
3899 KeyGenerator kg = KeyGenerator.getInstance("AES");
3939 Cipher c = Cipher.getInstance("AES/ECB/NoPadding");
3975 Cipher c = Cipher.getInstance("AES/ECB/NoPadding");
3976 c.init(Cipher.ENCRYPT_MODE, new SecretKeySpec(new byte[128 / 8], "AES"));
4024 Cipher c = Cipher.getInstance("AES/GCM/NoPadding");
4025 c.init(Cipher.ENCRYPT_MODE, new SecretKeySpec(new byte[128 / 8], "AES"));
4032 Cipher c = Cipher.getInstance("AES/GCM/NoPadding");
4033 c.init(Cipher.ENCRYPT_MODE, new SecretKeySpec(new byte[128 / 8], "AES"));
4138 Cipher c = Cipher.getInstance("AES/ECB/NoPadding");
4167 KeyGenerator kg = KeyGenerator.getInstance("AES");
4198 KeyGenerator kg = KeyGenerator.getInstance("AES");
4240 final String AES = "AES";
4241 final String AES_GCM = "AES/GCM/NoPadding";
4253 cipher.init(Cipher.ENCRYPT_MODE, new SecretKeySpec(key, AES), param);
4267 Cipher c = Cipher.getInstance("AES/ECB/PKCS5Padding", provider);
4321 Cipher c = Cipher.getInstance("AES/ECB/NoPadding", provider);
4355 Cipher c = Cipher.getInstance("AES/ECB/NoPadding", provider);
4475 String testedCipher = "AES/ECB/PKCS7Padding";
4478 encCipher.init(Cipher.ENCRYPT_MODE, new SecretKeySpec(testKey, "AES"));
4486 cipher.init(Cipher.DECRYPT_MODE, new SecretKeySpec(testKey, "AES"));
4501 String[] androidOpenSSLCiphers = { "AES/CBC/PKCS5PADDING", "AES/CBC/PKCS7PADDING",
4502 "AES/ECB/PKCS5PADDING", "AES/ECB/PKCS7PADDING", "DESEDE/CBC/PKCS5PADDING",
4510 (c.startsWith("AES/")) ? "AES" : "DESEDE"),
4512 ("01234567" + ((c.startsWith("AES/")) ? "89012345" : ""))
4517 (c.startsWith("AES/")) ? "AES" : "DESEDE"));
4545 SecretKeySpec key = new SecretKeySpec(new byte[16], "AES");
4547 Cipher c1 = Cipher.getInstance("AES/GCM/NoPadding");
4548 Cipher c2 = Cipher.getInstance("AES/GCM/NoPadding");
4573 SecretKeySpec key = new SecretKeySpec(new byte[16], "AES");
4577 Cipher c1 = Cipher.getInstance("AES/GCM/NoPadding");
4578 Cipher c2 = Cipher.getInstance("AES/GCM/NoPadding");
4601 SecretKeySpec key = new SecretKeySpec(new byte[16], "AES");
4604 SecretKeySpec key2 = new SecretKeySpec(key2bytes, "AES");
4606 Cipher c1 = Cipher.getInstance("AES/GCM/NoPadding");
4607 Cipher c2 = Cipher.getInstance("AES/GCM/NoPadding");
4780 final Cipher c = Cipher.getInstance("AES/ECB/NoPadding");