Home
last modified time | relevance | path

Searched +full:aes +full:- +full:256 +full:- +full:cbc (Results 1 – 25 of 211) sorted by relevance

123456789

/third_party/mbedtls/tests/suites/
Dtest_suite_aes.cbc.data1 AES-128-CBC Encrypt NIST KAT #1
4 AES-128-CBC Encrypt NIST KAT #2
7 AES-128-CBC Encrypt NIST KAT #3
10 AES-128-CBC Encrypt NIST KAT #4
13 AES-128-CBC Encrypt NIST KAT #5
16 AES-128-CBC Encrypt NIST KAT #6
19 AES-128-CBC Encrypt NIST KAT #7
22 AES-128-CBC Encrypt NIST KAT #8
25 AES-128-CBC Encrypt NIST KAT #9
28 AES-128-CBC Encrypt NIST KAT #10
[all …]
Dtest_suite_cipher.aes.data1 AES-128 CBC - Decrypt empty buffer
5 AES-128 XTS - Decrypt empty buffer
9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding
11 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:0:MBEDTLS_PADDING_PKCS7
13 AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding
15 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:1:MBEDTLS_PADDING_PKCS7
17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding
19 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:2:MBEDTLS_PADDING_PKCS7
21 AES-128 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding
23 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:7:MBEDTLS_PADDING_PKCS7
[all …]
Dtest_suite_ssl.data52 Test mock non-blocking TCP connection
58 Test mock non-blocking TCP connection (interleaving)
61 Message queue - sanity
64 Message queue - basic test
67 Message queue - overflow/underflow
70 Message queue - interleaved
73 Message queue - insufficient buffer
76 Message transport mock - uninitialized structures
79 Message transport mock - basic test
82 Message transport mock - queue overflow/underflow
[all …]
Dtest_suite_aes.rest.data1 AES-ECB Encrypt (Invalid keylength)
4 AES-ECB Decrypt (Invalid keylength)
7 AES-256-CBC Encrypt (Invalid input length)
11 AES-256-CBC Decrypt (Invalid input length)
15 AES - Mode Parameter Validation
18 AES - Mandatory Parameter Validation and Valid Parameters
21 AES Selftest
/third_party/openssl/doc/man7/
DEVP_CIPHER-AES.pod5 EVP_CIPHER-AES - The AES EVP_CIPHER implementations
9 Support for AES symmetric encryption using the B<EVP_CIPHER> API.
18 =item "AES-128-CBC", "AES-192-CBC" and "AES-256-CBC"
20 =item "AES-128-CBC-CTS", "AES-192-CBC-CTS" and "AES-256-CBC-CTS"
22 =item "AES-128-CFB", "AES-192-CFB", "AES-256-CFB",
23 "AES-128-CFB1", "AES-192-CFB1", "AES-256-CFB1",
24 "AES-128-CFB8", "AES-192-CFB8" and "AES-256-CFB8"
26 =item "AES-128-CTR", "AES-192-CTR" and "AES-256-CTR"
28 =item "AES-128-ECB", "AES-192-ECB" and "AES-256-ECB"
30 =item "AES-192-OFB", "AES-128-OFB" and "AES-256-OFB"
[all …]
DEVP_CIPHER-ARIA.pod5 EVP_CIPHER-ARIA - The ARIA EVP_CIPHER implementations
17 =item "ARIA-128-CBC", "ARIA-192-CBC" and "ARIA-256-CBC"
19 =item "ARIA-128-CFB", "ARIA-192-CFB", "ARIA-256-CFB",
20 "ARIA-128-CFB1", "ARIA-192-CFB1", "ARIA-256-CFB1",
21 "ARIA-128-CFB8", "ARIA-192-CFB8" and "ARIA-256-CFB8"
23 =item "ARIA-128-CTR", "ARIA-192-CTR" and "ARIA-256-CTR"
25 =item "ARIA-128-ECB", "ARIA-192-ECB" and "ARIA-256-ECB"
27 =item "AES-192-OCB", "AES-128-OCB" and "AES-256-OCB"
29 =item "ARIA-128-OFB", "ARIA-192-OFB" and "ARIA-256-OFB"
31 =item "ARIA-128-CCM", "ARIA-192-CCM" and "ARIA-256-CCM"
[all …]
/third_party/openssl/providers/implementations/include/prov/
Dnames.h22 * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?]
31 * algorithms together, e.g. MD5-SHA1.
34 * with different sizes (e.g. AES-128-CBC, AES-256-CBC)
39 /*-
41 * -----------------
43 #define PROV_NAMES_AES_256_ECB "AES-256-ECB:2.16.840.1.101.3.4.1.41"
44 #define PROV_NAMES_AES_192_ECB "AES-192-ECB:2.16.840.1.101.3.4.1.21"
45 #define PROV_NAMES_AES_128_ECB "AES-128-ECB:2.16.840.1.101.3.4.1.1"
46 #define PROV_NAMES_AES_256_CBC "AES-256-CBC:AES256:2.16.840.1.101.3.4.1.42"
47 #define PROV_NAMES_AES_192_CBC "AES-192-CBC:AES192:2.16.840.1.101.3.4.1.22"
[all …]
/third_party/openssl/test/recipes/30-test_evp_data/
Devpciph_aes_common.txt2 # Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved.
16 Title = AES (from FIPS-197 test vectors)
18 Cipher = AES-128-ECB
24 # AES 192 ECB tests (from FIPS-197 test vectors, encrypt)
26 Cipher = AES-192-ECB
33 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt)
35 Cipher = AES-256-ECB
42 # AES 128 ECB tests (from NIST test vectors, encrypt)
44 #AES-128-ECB:00000000000000000000000000000000::00000000000000000000000000000000:C34C052CC0DA8D73451…
46 # AES 128 ECB tests (from NIST test vectors, decrypt)
[all …]
Devpciph_aes_stitched.txt1 Title = AES-128-CBC-HMAC-SHA1 test vectors
3 Cipher = AES-128-CBC-HMAC-SHA1
13 Cipher = AES-128-CBC-HMAC-SHA1
23 Cipher = AES-128-CBC-HMAC-SHA1
33 Title = AES-256-CBC-HMAC-SHA1 test vectors
35 Cipher = AES-256-CBC-HMAC-SHA1
45 Cipher = AES-256-CBC-HMAC-SHA1
55 Cipher = AES-256-CBC-HMAC-SHA1
64 Title = AES-128-CBC-HMAC-SHA256 test vectors
66 Cipher = AES-128-CBC-HMAC-SHA256
[all …]
Devpciph_aes_cts.txt2 # Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.
10 # These have an IV of all zeros, for a 128 bit AES key.
12 Title = AES CBC Test vectors
14 #------------------------------------------------------
18 Cipher = AES-128-CBC
25 Cipher = AES-128-CBC
32 Cipher = AES-128-CBC
38 Title = AES CBC CTS1 Test vectors
40 #------------------------------------------------------
42 # where aligned blocks are the same as CBC mode, and partial lengths
[all …]
Devpkdf_krb5.txt2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved.
18 Ctrl.cipher = cipher:DES-EDE3-CBC
24 Ctrl.cipher = cipher:DES-EDE3-CBC
30 Ctrl.cipher = cipher:DES-EDE3-CBC
36 Ctrl.cipher = cipher:DES-EDE3-CBC
42 Ctrl.cipher = cipher:DES-EDE3-CBC
48 Ctrl.cipher = cipher:DES-EDE3-CBC
54 Ctrl.cipher = cipher:DES-EDE3-CBC
60 Ctrl.cipher = cipher:DES-EDE3-CBC
66 Ctrl.cipher = cipher:DES-EDE3-CBC
[all …]
/third_party/mbedtls/library/
Dssl_ciphersuites.c7 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
30 * Forward-secure non-PSK > forward-secure PSK > ECJPAKE > other non-PSK > other PSK
32 * ChaCha > AES-256 > Camellia-256 > ARIA-256 > AES-128 > Camellia-128 > ARIA-128
33 * 3. By cipher mode when relevant GCM > CCM > CBC > CCM_8
35 * 5. By key exchange/auth again: EC > non-EC
51 /* Chacha-Poly ephemeral suites */
56 /* All AES-256 ephemeral suites */
71 /* All CAMELLIA-256 ephemeral suites */
80 /* All ARIA-256 ephemeral suites */
88 /* All AES-128 ephemeral suites */
[all …]
/third_party/curl/lib/vtls/
Dcipher_suite.c21 * SPDX-License-Identifier: curl
58 "256" "\0"
61 "AES" "\0"
64 "CBC" "\0"
163 CS_ENTRY(0x002F, TLS,RSA,WITH,AES,128,CBC,SHA,),
165 CS_ENTRY(0x0035, TLS,RSA,WITH,AES,256,CBC,SHA,),
167 CS_ENTRY(0x003C, TLS,RSA,WITH,AES,128,CBC,SHA256,),
169 CS_ENTRY(0x003D, TLS,RSA,WITH,AES,256,CBC,SHA256,),
171 CS_ENTRY(0x009C, TLS,RSA,WITH,AES,128,GCM,SHA256,),
173 CS_ENTRY(0x009D, TLS,RSA,WITH,AES,256,GCM,SHA384,),
[all …]
/third_party/openssl/doc/man1/
Dopenssl-enc.pod.in2 {- OpenSSL::safe::output_do_not_edit_headers(); -}
6 openssl-enc - symmetric cipher routines
11 [B<-I<cipher>>]
12 [B<-help>]
13 [B<-list>]
14 [B<-ciphers>]
15 [B<-in> I<filename>]
16 [B<-out> I<filename>]
17 [B<-pass> I<arg>]
18 [B<-e>]
[all …]
Dopenssl.pod5 openssl - OpenSSL command line program
14 B<openssl> B<no->I<XXX> [ I<options> ]
43 (e.g., L<openssl-x509(1)>). The subcommand L<openssl-list(1)> may be used to list
46 The command B<no->I<XXX> tests whether a command of the
48 returns 0 (success) and prints B<no->I<XXX>; otherwise it returns 1
53 availability of ciphers in the B<openssl> program. (B<no->I<XXX> is
54 not able to detect pseudo-commands such as B<quit>,
55 B<list>, or B<no->I<XXX> itself.)
60 arguments and have a B<-config> option to specify that file.
62 storage area, which can be determined from the L<openssl-version(1)>
[all …]
/third_party/openssl/crypto/objects/
Dobjects.txt1 # CCITT was renamed to ITU-T quite some time ago
2 0 : ITU-T : itu-t
3 !Alias ccitt itu-t
7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t
8 !Alias joint-iso-ccitt joint-iso-itu-t
10 iso 2 : member-body : ISO Member Body
12 iso 3 : identified-organization
18 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5
19 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1
22 identified-organization 36 8 3 3 : x509ExtAdmission : Professional Information or basis for Admissi…
[all …]
/third_party/openssl/providers/implementations/ciphers/
Dcipher_aes.c2 * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved.
11 * AES low level APIs are deprecated for public use, but still ok for internal
17 /* Dispatch functions for AES cipher modes ecb, cbc, ofb, cfb, ctr */
47 in->base.hw->copyctx(&ret->base, &in->base); in aes_dupctx()
53 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 256, 128, 0, block)
55 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 192, 128, 0, block)
57 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 128, 128, 0, block)
59 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 256, 128, 128, block)
61 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 192, 128, 128, block)
63 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 128, 128, 128, block)
[all …]
Dcipher_aes_siv_hw.c2 * Copyright 2019-2021 The OpenSSL Project Authors. All Rights Reserved.
11 * This file uses the low level AES functions (which are deprecated for
12 * non-internal use) in order to implement provider AES ciphers.
23 SIV128_CONTEXT *sctx = &ctx->siv; in aes_siv_initkey()
25 OSSL_LIB_CTX *libctx = ctx->libctx; in aes_siv_initkey()
28 EVP_CIPHER_free(ctx->cbc); in aes_siv_initkey()
29 EVP_CIPHER_free(ctx->ctr); in aes_siv_initkey()
30 ctx->cbc = NULL; in aes_siv_initkey()
31 ctx->ctr = NULL; in aes_siv_initkey()
35 ctx->cbc = EVP_CIPHER_fetch(libctx, "AES-128-CBC", propq); in aes_siv_initkey()
[all …]
/third_party/openssl/apps/
Dprogs.pl2 # Copyright 1995-2022 The OpenSSL Project Authors. All Rights Reserved.
18 die "Unrecognised option, must be -C or -H\n"
19 unless ($opt eq '-H' || $opt eq '-C');
22 my $cmdre = qr/^\s*int\s+([a-z_][a-z0-9_]*)_main\(\s*int\s+argc\s*,/;
24 my $YEAR = [gmtime($ENV{SOURCE_DATE_EPOCH} || time())]->[5] + 1900;
30 map { @{$unified_info{sources}->{$_}} }
32 && !$unified_info{attributes}->{sources}->{$apps_openssl}->{$_}->{nocheck} }
33 @{$unified_info{sources}->{$apps_openssl}};
46 if ($opt eq '-H') {
52 * Copyright 1995-$YEAR The OpenSSL Project Authors. All Rights Reserved.
[all …]
/third_party/openssl/doc/man3/
DEVP_aes_128_gcm.pod50 - EVP AES cipher
65 The AES encryption algorithm for EVP.
94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit
95 shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB, and OFB.
100 Authenticated encryption with AES in CBC mode using SHA-1 as HMAC, with keys of
101 128 and 256 bits length respectively. The authentication tag is 160 bits long.
110 Authenticated encryption with AES in CBC mode using SHA256 (SHA-2, 256-bits) as
111 HMAC, with keys of 128 and 256 bits length respectively. The authentication tag
112 is 256 bits long.
128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode
[all …]
/third_party/mbedtls/tests/scripts/
Dtranslate_ciphers.py6 # SPDX-License-Identifier: Apache-2.0
12 # http://www.apache.org/licenses/LICENSE-2.0
24 python3 -m unittest translate_cipher.py
44 "+ECDHE-ECDSA:+NULL:+SHA1",
45 "ECDHE-ECDSA-NULL-SHA",
46 "TLS-ECDHE-ECDSA-WITH-NULL-SHA"),
48 "+ECDHE-ECDSA:+AES-128-GCM:+AEAD",
49 "ECDHE-ECDSA-AES128-GCM-SHA256",
50 "TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256"),
52 "+DHE-RSA:+3DES-CBC:+SHA1",
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Daes-omac1.c2 * One-key CBC MAC (OMAC1) hash with AES
4 * Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
13 #include "aes.h"
21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in gf_mulx()
23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx()
25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx()
30 * omac1_aes_vector - One-Key CBC MAC (OMAC1) hash with AES
37 * Returns: 0 on success, -1 on failure
39 * This is a mode for using block cipher (AES in this case) for authentication.
41 * (SP) 800-38B.
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Daes-omac1.c2 * One-key CBC MAC (OMAC1) hash with AES
4 * Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
13 #include "aes.h"
21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in gf_mulx()
23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx()
25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx()
30 * omac1_aes_vector - One-Key CBC MAC (OMAC1) hash with AES
37 * Returns: 0 on success, -1 on failure
39 * This is a mode for using block cipher (AES in this case) for authentication.
41 * (SP) 800-38B.
[all …]
/third_party/openssl/include/openssl/
Dobj_mac.h5 * Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved.
21 #define SN_itu_t "ITU-T"
22 #define LN_itu_t "itu-t"
34 #define SN_joint_iso_itu_t "JOINT-ISO-ITU-T"
35 #define LN_joint_iso_itu_t "joint-iso-itu-t"
42 #define SN_member_body "member-body"
47 #define SN_identified_organization "identified-organization"
56 #define SN_hmac_md5 "HMAC-MD5"
57 #define LN_hmac_md5 "hmac-md5"
61 #define SN_hmac_sha1 "HMAC-SHA1"
[all …]
/third_party/skia/third_party/externals/microhttpd/src/testcurl/https/
Dtest_tls_options.c17 Free Software Foundation, Inc., 59 Temple Place - Suite 330,
18 Boston, MA 02111-1307, USA.
47 struct CBC cbc; in test_unmatching_ssl_version() local
48 if (NULL == (cbc.buf = malloc (sizeof (char) * 256))) in test_unmatching_ssl_version()
52 return -1; in test_unmatching_ssl_version()
54 cbc.size = 256; in test_unmatching_ssl_version()
55 cbc.pos = 0; in test_unmatching_ssl_version()
60 free (cbc.buf); in test_unmatching_ssl_version()
62 return -1; in test_unmatching_ssl_version()
67 send_curl_req (url, &cbc, cipher_suite, curl_req_ssl_version)) in test_unmatching_ssl_version()
[all …]

123456789