| /third_party/mbedtls/tests/suites/ |
| D | test_suite_aes.cbc.data | 1 AES-128-CBC Encrypt NIST KAT #1 4 AES-128-CBC Encrypt NIST KAT #2 7 AES-128-CBC Encrypt NIST KAT #3 10 AES-128-CBC Encrypt NIST KAT #4 13 AES-128-CBC Encrypt NIST KAT #5 16 AES-128-CBC Encrypt NIST KAT #6 19 AES-128-CBC Encrypt NIST KAT #7 22 AES-128-CBC Encrypt NIST KAT #8 25 AES-128-CBC Encrypt NIST KAT #9 28 AES-128-CBC Encrypt NIST KAT #10 [all …]
|
| D | test_suite_cipher.aes.data | 1 AES-128 CBC - Decrypt empty buffer 5 AES-128 XTS - Decrypt empty buffer 9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding 11 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:0:MBEDTLS_PADDING_PKCS7 13 AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding 15 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:1:MBEDTLS_PADDING_PKCS7 17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding 19 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:2:MBEDTLS_PADDING_PKCS7 21 AES-128 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding 23 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:7:MBEDTLS_PADDING_PKCS7 [all …]
|
| D | test_suite_ssl.data | 52 Test mock non-blocking TCP connection 58 Test mock non-blocking TCP connection (interleaving) 61 Message queue - sanity 64 Message queue - basic test 67 Message queue - overflow/underflow 70 Message queue - interleaved 73 Message queue - insufficient buffer 76 Message transport mock - uninitialized structures 79 Message transport mock - basic test 82 Message transport mock - queue overflow/underflow [all …]
|
| D | test_suite_aes.rest.data | 1 AES-ECB Encrypt (Invalid keylength) 4 AES-ECB Decrypt (Invalid keylength) 7 AES-256-CBC Encrypt (Invalid input length) 11 AES-256-CBC Decrypt (Invalid input length) 15 AES - Mode Parameter Validation 18 AES - Mandatory Parameter Validation and Valid Parameters 21 AES Selftest
|
| /third_party/openssl/doc/man7/ |
| D | EVP_CIPHER-AES.pod | 5 EVP_CIPHER-AES - The AES EVP_CIPHER implementations 9 Support for AES symmetric encryption using the B<EVP_CIPHER> API. 18 =item "AES-128-CBC", "AES-192-CBC" and "AES-256-CBC" 20 =item "AES-128-CBC-CTS", "AES-192-CBC-CTS" and "AES-256-CBC-CTS" 22 =item "AES-128-CFB", "AES-192-CFB", "AES-256-CFB", 23 "AES-128-CFB1", "AES-192-CFB1", "AES-256-CFB1", 24 "AES-128-CFB8", "AES-192-CFB8" and "AES-256-CFB8" 26 =item "AES-128-CTR", "AES-192-CTR" and "AES-256-CTR" 28 =item "AES-128-ECB", "AES-192-ECB" and "AES-256-ECB" 30 =item "AES-192-OFB", "AES-128-OFB" and "AES-256-OFB" [all …]
|
| D | EVP_CIPHER-ARIA.pod | 5 EVP_CIPHER-ARIA - The ARIA EVP_CIPHER implementations 17 =item "ARIA-128-CBC", "ARIA-192-CBC" and "ARIA-256-CBC" 19 =item "ARIA-128-CFB", "ARIA-192-CFB", "ARIA-256-CFB", 20 "ARIA-128-CFB1", "ARIA-192-CFB1", "ARIA-256-CFB1", 21 "ARIA-128-CFB8", "ARIA-192-CFB8" and "ARIA-256-CFB8" 23 =item "ARIA-128-CTR", "ARIA-192-CTR" and "ARIA-256-CTR" 25 =item "ARIA-128-ECB", "ARIA-192-ECB" and "ARIA-256-ECB" 27 =item "AES-192-OCB", "AES-128-OCB" and "AES-256-OCB" 29 =item "ARIA-128-OFB", "ARIA-192-OFB" and "ARIA-256-OFB" 31 =item "ARIA-128-CCM", "ARIA-192-CCM" and "ARIA-256-CCM" [all …]
|
| /third_party/openssl/providers/implementations/include/prov/ |
| D | names.h | 22 * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] 31 * algorithms together, e.g. MD5-SHA1. 34 * with different sizes (e.g. AES-128-CBC, AES-256-CBC) 39 /*- 41 * ----------------- 43 #define PROV_NAMES_AES_256_ECB "AES-256-ECB:2.16.840.1.101.3.4.1.41" 44 #define PROV_NAMES_AES_192_ECB "AES-192-ECB:2.16.840.1.101.3.4.1.21" 45 #define PROV_NAMES_AES_128_ECB "AES-128-ECB:2.16.840.1.101.3.4.1.1" 46 #define PROV_NAMES_AES_256_CBC "AES-256-CBC:AES256:2.16.840.1.101.3.4.1.42" 47 #define PROV_NAMES_AES_192_CBC "AES-192-CBC:AES192:2.16.840.1.101.3.4.1.22" [all …]
|
| /third_party/openssl/test/recipes/30-test_evp_data/ |
| D | evpciph_aes_common.txt | 2 # Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved. 16 Title = AES (from FIPS-197 test vectors) 18 Cipher = AES-128-ECB 24 # AES 192 ECB tests (from FIPS-197 test vectors, encrypt) 26 Cipher = AES-192-ECB 33 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt) 35 Cipher = AES-256-ECB 42 # AES 128 ECB tests (from NIST test vectors, encrypt) 44 #AES-128-ECB:00000000000000000000000000000000::00000000000000000000000000000000:C34C052CC0DA8D73451… 46 # AES 128 ECB tests (from NIST test vectors, decrypt) [all …]
|
| D | evpciph_aes_stitched.txt | 1 Title = AES-128-CBC-HMAC-SHA1 test vectors 3 Cipher = AES-128-CBC-HMAC-SHA1 13 Cipher = AES-128-CBC-HMAC-SHA1 23 Cipher = AES-128-CBC-HMAC-SHA1 33 Title = AES-256-CBC-HMAC-SHA1 test vectors 35 Cipher = AES-256-CBC-HMAC-SHA1 45 Cipher = AES-256-CBC-HMAC-SHA1 55 Cipher = AES-256-CBC-HMAC-SHA1 64 Title = AES-128-CBC-HMAC-SHA256 test vectors 66 Cipher = AES-128-CBC-HMAC-SHA256 [all …]
|
| D | evpciph_aes_cts.txt | 2 # Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved. 10 # These have an IV of all zeros, for a 128 bit AES key. 12 Title = AES CBC Test vectors 14 #------------------------------------------------------ 18 Cipher = AES-128-CBC 25 Cipher = AES-128-CBC 32 Cipher = AES-128-CBC 38 Title = AES CBC CTS1 Test vectors 40 #------------------------------------------------------ 42 # where aligned blocks are the same as CBC mode, and partial lengths [all …]
|
| D | evpkdf_krb5.txt | 2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved. 18 Ctrl.cipher = cipher:DES-EDE3-CBC 24 Ctrl.cipher = cipher:DES-EDE3-CBC 30 Ctrl.cipher = cipher:DES-EDE3-CBC 36 Ctrl.cipher = cipher:DES-EDE3-CBC 42 Ctrl.cipher = cipher:DES-EDE3-CBC 48 Ctrl.cipher = cipher:DES-EDE3-CBC 54 Ctrl.cipher = cipher:DES-EDE3-CBC 60 Ctrl.cipher = cipher:DES-EDE3-CBC 66 Ctrl.cipher = cipher:DES-EDE3-CBC [all …]
|
| /third_party/mbedtls/library/ |
| D | ssl_ciphersuites.c | 7 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 30 * Forward-secure non-PSK > forward-secure PSK > ECJPAKE > other non-PSK > other PSK 32 * ChaCha > AES-256 > Camellia-256 > ARIA-256 > AES-128 > Camellia-128 > ARIA-128 33 * 3. By cipher mode when relevant GCM > CCM > CBC > CCM_8 35 * 5. By key exchange/auth again: EC > non-EC 51 /* Chacha-Poly ephemeral suites */ 56 /* All AES-256 ephemeral suites */ 71 /* All CAMELLIA-256 ephemeral suites */ 80 /* All ARIA-256 ephemeral suites */ 88 /* All AES-128 ephemeral suites */ [all …]
|
| /third_party/curl/lib/vtls/ |
| D | cipher_suite.c | 21 * SPDX-License-Identifier: curl 58 "256" "\0" 61 "AES" "\0" 64 "CBC" "\0" 163 CS_ENTRY(0x002F, TLS,RSA,WITH,AES,128,CBC,SHA,), 165 CS_ENTRY(0x0035, TLS,RSA,WITH,AES,256,CBC,SHA,), 167 CS_ENTRY(0x003C, TLS,RSA,WITH,AES,128,CBC,SHA256,), 169 CS_ENTRY(0x003D, TLS,RSA,WITH,AES,256,CBC,SHA256,), 171 CS_ENTRY(0x009C, TLS,RSA,WITH,AES,128,GCM,SHA256,), 173 CS_ENTRY(0x009D, TLS,RSA,WITH,AES,256,GCM,SHA384,), [all …]
|
| /third_party/openssl/doc/man1/ |
| D | openssl-enc.pod.in | 2 {- OpenSSL::safe::output_do_not_edit_headers(); -} 6 openssl-enc - symmetric cipher routines 11 [B<-I<cipher>>] 12 [B<-help>] 13 [B<-list>] 14 [B<-ciphers>] 15 [B<-in> I<filename>] 16 [B<-out> I<filename>] 17 [B<-pass> I<arg>] 18 [B<-e>] [all …]
|
| D | openssl.pod | 5 openssl - OpenSSL command line program 14 B<openssl> B<no->I<XXX> [ I<options> ] 43 (e.g., L<openssl-x509(1)>). The subcommand L<openssl-list(1)> may be used to list 46 The command B<no->I<XXX> tests whether a command of the 48 returns 0 (success) and prints B<no->I<XXX>; otherwise it returns 1 53 availability of ciphers in the B<openssl> program. (B<no->I<XXX> is 54 not able to detect pseudo-commands such as B<quit>, 55 B<list>, or B<no->I<XXX> itself.) 60 arguments and have a B<-config> option to specify that file. 62 storage area, which can be determined from the L<openssl-version(1)> [all …]
|
| /third_party/openssl/crypto/objects/ |
| D | objects.txt | 1 # CCITT was renamed to ITU-T quite some time ago 2 0 : ITU-T : itu-t 3 !Alias ccitt itu-t 7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t 8 !Alias joint-iso-ccitt joint-iso-itu-t 10 iso 2 : member-body : ISO Member Body 12 iso 3 : identified-organization 18 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5 19 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1 22 identified-organization 36 8 3 3 : x509ExtAdmission : Professional Information or basis for Admissi… [all …]
|
| /third_party/openssl/providers/implementations/ciphers/ |
| D | cipher_aes.c | 2 * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. 11 * AES low level APIs are deprecated for public use, but still ok for internal 17 /* Dispatch functions for AES cipher modes ecb, cbc, ofb, cfb, ctr */ 47 in->base.hw->copyctx(&ret->base, &in->base); in aes_dupctx() 53 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 256, 128, 0, block) 55 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 192, 128, 0, block) 57 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 128, 128, 0, block) 59 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 256, 128, 128, block) 61 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 192, 128, 128, block) 63 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 128, 128, 128, block) [all …]
|
| D | cipher_aes_siv_hw.c | 2 * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved. 11 * This file uses the low level AES functions (which are deprecated for 12 * non-internal use) in order to implement provider AES ciphers. 23 SIV128_CONTEXT *sctx = &ctx->siv; in aes_siv_initkey() 25 OSSL_LIB_CTX *libctx = ctx->libctx; in aes_siv_initkey() 28 EVP_CIPHER_free(ctx->cbc); in aes_siv_initkey() 29 EVP_CIPHER_free(ctx->ctr); in aes_siv_initkey() 30 ctx->cbc = NULL; in aes_siv_initkey() 31 ctx->ctr = NULL; in aes_siv_initkey() 35 ctx->cbc = EVP_CIPHER_fetch(libctx, "AES-128-CBC", propq); in aes_siv_initkey() [all …]
|
| /third_party/openssl/apps/ |
| D | progs.pl | 2 # Copyright 1995-2022 The OpenSSL Project Authors. All Rights Reserved. 18 die "Unrecognised option, must be -C or -H\n" 19 unless ($opt eq '-H' || $opt eq '-C'); 22 my $cmdre = qr/^\s*int\s+([a-z_][a-z0-9_]*)_main\(\s*int\s+argc\s*,/; 24 my $YEAR = [gmtime($ENV{SOURCE_DATE_EPOCH} || time())]->[5] + 1900; 30 map { @{$unified_info{sources}->{$_}} } 32 && !$unified_info{attributes}->{sources}->{$apps_openssl}->{$_}->{nocheck} } 33 @{$unified_info{sources}->{$apps_openssl}}; 46 if ($opt eq '-H') { 52 * Copyright 1995-$YEAR The OpenSSL Project Authors. All Rights Reserved. [all …]
|
| /third_party/openssl/doc/man3/ |
| D | EVP_aes_128_gcm.pod | 50 - EVP AES cipher 65 The AES encryption algorithm for EVP. 94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit 95 shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB, and OFB. 100 Authenticated encryption with AES in CBC mode using SHA-1 as HMAC, with keys of 101 128 and 256 bits length respectively. The authentication tag is 160 bits long. 110 Authenticated encryption with AES in CBC mode using SHA256 (SHA-2, 256-bits) as 111 HMAC, with keys of 128 and 256 bits length respectively. The authentication tag 112 is 256 bits long. 128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode [all …]
|
| /third_party/mbedtls/tests/scripts/ |
| D | translate_ciphers.py | 6 # SPDX-License-Identifier: Apache-2.0 12 # http://www.apache.org/licenses/LICENSE-2.0 24 python3 -m unittest translate_cipher.py 44 "+ECDHE-ECDSA:+NULL:+SHA1", 45 "ECDHE-ECDSA-NULL-SHA", 46 "TLS-ECDHE-ECDSA-WITH-NULL-SHA"), 48 "+ECDHE-ECDSA:+AES-128-GCM:+AEAD", 49 "ECDHE-ECDSA-AES128-GCM-SHA256", 50 "TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256"), 52 "+DHE-RSA:+3DES-CBC:+SHA1", [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| D | aes-omac1.c | 2 * One-key CBC MAC (OMAC1) hash with AES 4 * Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi> 13 #include "aes.h" 21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in gf_mulx() 23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx() 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx() 30 * omac1_aes_vector - One-Key CBC MAC (OMAC1) hash with AES 37 * Returns: 0 on success, -1 on failure 39 * This is a mode for using block cipher (AES in this case) for authentication. 41 * (SP) 800-38B. [all …]
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
| D | aes-omac1.c | 2 * One-key CBC MAC (OMAC1) hash with AES 4 * Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi> 13 #include "aes.h" 21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in gf_mulx() 23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx() 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx() 30 * omac1_aes_vector - One-Key CBC MAC (OMAC1) hash with AES 37 * Returns: 0 on success, -1 on failure 39 * This is a mode for using block cipher (AES in this case) for authentication. 41 * (SP) 800-38B. [all …]
|
| /third_party/openssl/include/openssl/ |
| D | obj_mac.h | 5 * Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved. 21 #define SN_itu_t "ITU-T" 22 #define LN_itu_t "itu-t" 34 #define SN_joint_iso_itu_t "JOINT-ISO-ITU-T" 35 #define LN_joint_iso_itu_t "joint-iso-itu-t" 42 #define SN_member_body "member-body" 47 #define SN_identified_organization "identified-organization" 56 #define SN_hmac_md5 "HMAC-MD5" 57 #define LN_hmac_md5 "hmac-md5" 61 #define SN_hmac_sha1 "HMAC-SHA1" [all …]
|
| /third_party/skia/third_party/externals/microhttpd/src/testcurl/https/ |
| D | test_tls_options.c | 17 Free Software Foundation, Inc., 59 Temple Place - Suite 330, 18 Boston, MA 02111-1307, USA. 47 struct CBC cbc; in test_unmatching_ssl_version() local 48 if (NULL == (cbc.buf = malloc (sizeof (char) * 256))) in test_unmatching_ssl_version() 52 return -1; in test_unmatching_ssl_version() 54 cbc.size = 256; in test_unmatching_ssl_version() 55 cbc.pos = 0; in test_unmatching_ssl_version() 60 free (cbc.buf); in test_unmatching_ssl_version() 62 return -1; in test_unmatching_ssl_version() 67 send_curl_req (url, &cbc, cipher_suite, curl_req_ssl_version)) in test_unmatching_ssl_version() [all …]
|