/external/boringssl/src/crypto/cipher_extra/test/nist_cavp/ |
D | aes_256_cbc.txt | 1 # Generated by "make_cavp -cipher=aes -extra-labels=Cipher=AES-256-CBC kat_aes/CBCGFSbox256.rsp kat… 5 Cipher: AES-256-CBC 12 Cipher: AES-256-CBC 19 Cipher: AES-256-CBC 26 Cipher: AES-256-CBC 33 Cipher: AES-256-CBC 40 Cipher: AES-256-CBC 47 Cipher: AES-256-CBC 54 Cipher: AES-256-CBC 61 Cipher: AES-256-CBC [all …]
|
/external/boringssl/src/crypto/cipher_extra/test/ |
D | cipher_tests.txt | 34 Cipher = DES-EDE3 39 Cipher = DES-EDE3 44 Cipher = DES-EDE3 49 Cipher = DES-EDE3 54 Cipher = DES-EDE3 59 Cipher = DES-EDE3 64 Cipher = DES-EDE3 69 Cipher = DES-EDE3 74 Cipher = DES-EDE3 79 Cipher = DES-EDE3 [all …]
|
D | make_legacy_aead_tests.go | 5 "crypto/aes" 22 var implicitIV *bool = flag.Bool("implicit-iv", false, "If true, generate tests for a cipher using … 76 return aes.NewCipher(key) 78 return aes.NewCipher(key) 127 ad := adFull[:len(adFull)-2] 129 adFull[len(adFull)-2] = uint8(length >> 8) 130 adFull[len(adFull)-1] = uint8(length & 0xff) 169 cbc := cipher.NewCBCEncrypter(block, iv) 171 sealed = make([]byte, 0, len(input)+len(digest)+cbc.BlockSize()) 179 paddingLen := cbc.BlockSize() - len(sealed)%cbc.BlockSize() [all …]
|
/external/boringssl/src/decrepit/evp/ |
D | evp_do_all.c | 22 callback(EVP_aes_128_cbc(), "AES-128-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted() 23 callback(EVP_aes_192_cbc(), "AES-192-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted() 24 callback(EVP_aes_256_cbc(), "AES-256-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted() 25 callback(EVP_aes_128_ctr(), "AES-128-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted() 26 callback(EVP_aes_192_ctr(), "AES-192-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted() 27 callback(EVP_aes_256_ctr(), "AES-256-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted() 28 callback(EVP_aes_128_ecb(), "AES-128-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted() 29 callback(EVP_aes_192_ecb(), "AES-192-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted() 30 callback(EVP_aes_256_ecb(), "AES-256-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted() 31 callback(EVP_aes_128_ofb(), "AES-128-OFB", NULL, arg); in EVP_CIPHER_do_all_sorted() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
D | AES.java | 4 // BEGIN Android-added: Needed for setting mode with GCM 6 // END Android-added: Needed for setting mode with GCM 17 // BEGIN Android-added: Needed for setting padding with GCM 19 // END Android-added: Needed for setting padding with GCM 21 // Android-removed: Unsupported algorithms 34 // Android-removed: Unsupported algorithms 42 // Android-removed: Unsupported algorithms 48 // Android-removed: Unsupported algorithms 53 // Android-removed: Unsupported algorithms 62 public final class AES class [all …]
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/symmetric/ |
D | AES.java | 5 // BEGIN Android-added: Needed for setting mode with GCM 7 // END Android-added: Needed for setting mode with GCM 18 // BEGIN Android-added: Needed for setting padding with GCM 20 // END Android-added: Needed for setting padding with GCM 22 // Android-removed: Unsupported algorithms 35 // Android-removed: Unsupported algorithms 43 // Android-removed: Unsupported algorithms 49 // Android-removed: Unsupported algorithms 54 // Android-removed: Unsupported algorithms 66 public final class AES class [all …]
|
/external/boringssl/src/crypto/obj/ |
D | objects.txt | 1 # CCITT was renamed to ITU-T quite some time ago 2 0 : ITU-T : itu-t 3 !Alias ccitt itu-t 7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t 8 !Alias joint-iso-ccitt joint-iso-itu-t 10 iso 2 : member-body : ISO Member Body 12 iso 3 : identified-organization 15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5 16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1 18 identified-organization 132 : certicom-arc [all …]
|
/external/boringssl/src/fipstools/ |
D | run_cavp.go | 21 oraclePath = flag.String("oracle-bin", "", "Path to the oracle binary") 22 suiteDir = flag.String("suite-dir", "", "Base directory containing the CAVP test suite") 23 noFAX = flag.Bool("no-fax", false, "Skip comparing against FAX files") 42 // the FAX file. (E.g. because the primitive is non-deterministic.) 46 // nextLineState can be used by FAX next-line function to store state. 55 // directory is the name of the directory in the CAVP input, i.e. “AES”. 57 // suite names the test suite to pass as the first command-line argument. 77 {"gcmDecrypt128", []string{"dec", "aes-128-gcm"}, false}, 78 {"gcmDecrypt256", []string{"dec", "aes-256-gcm"}, false}, 79 {"gcmEncryptExtIV128", []string{"enc", "aes-128-gcm"}, false}, [all …]
|
D | cavp_test_util.cc | 35 if (name == "des-cbc") { in GetCipher() 37 } else if (name == "des-ecb") { in GetCipher() 39 } else if (name == "des-ede") { in GetCipher() 41 } else if (name == "des-ede3") { in GetCipher() 43 } else if (name == "des-ede-cbc") { in GetCipher() 45 } else if (name == "des-ede3-cbc") { in GetCipher() 49 } else if (name == "aes-128-ecb") { in GetCipher() 51 } else if (name == "aes-256-ecb") { in GetCipher() 53 } else if (name == "aes-128-cbc") { in GetCipher() 55 } else if (name == "aes-128-gcm") { in GetCipher() [all …]
|
D | test_fips.c | 21 #include <openssl/aes.h> 68 uint8_t output[256]; in main() 70 /* AES-CBC Encryption */ in main() 77 printf("About to AES-CBC encrypt "); in main() 84 /* AES-CBC Decryption */ in main() 87 printf("AES decrypt failed\n"); in main() 90 printf("About to AES-CBC decrypt "); in main() 107 /* AES-GCM Encryption */ in main() 108 printf("About to AES-GCM seal "); in main() 113 printf("AES-GCM encrypt failed\n"); in main() [all …]
|
/external/conscrypt/ |
D | CAPABILITIES.md | 5 on the most important and widely-used algorithms. Following is a list of JCA algorithm names 18 Conscrypt supports TLS v1.0-1.3. For backwards compatibility it will accept 20 ….oracle.com/javase/9/docs/api/javax/net/ssl/SSLSocket.html#setEnabledProtocols-java.lang.String:A-) 36 …tDefault()`](https://docs.oracle.com/javase/9/docs/api/javax/net/ssl/SSLContext.html#getDefault--). 38 v1.0-1.3 are all enabled; the others return a context with TLS v1.0-1.2 enabled. 43 * TLS 1.0-1.2 67 …acle.com/javase/9/docs/api/javax/net/ssl/SSLSocket.html#setEnabledCipherSuites-java.lang.String:A-) 71 * TLS 1.0-1.2 87 * `AES/CBC/NoPadding` 88 * `AES/CBC/PKCS5Padding` [all …]
|
/external/boringssl/src/crypto/cipher_extra/ |
D | cipher_extra.c | 1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 8 * This library is free for commercial and non-commercial use as long as 35 * being used are not cryptographic related :-). 94 } else if (OPENSSL_strcasecmp(name, "des-cbc") == 0) { in EVP_get_cipherbyname() 96 } else if (OPENSSL_strcasecmp(name, "des-ede3-cbc") == 0 || in EVP_get_cipherbyname() 99 // no-op, so we support the name here. in EVP_get_cipherbyname() 102 } else if (OPENSSL_strcasecmp(name, "aes-128-cbc") == 0) { in EVP_get_cipherbyname() 104 } else if (OPENSSL_strcasecmp(name, "aes-192-cbc") == 0) { in EVP_get_cipherbyname() 106 } else if (OPENSSL_strcasecmp(name, "aes-256-cbc") == 0) { in EVP_get_cipherbyname() 108 } else if (OPENSSL_strcasecmp(name, "aes-128-ctr") == 0) { in EVP_get_cipherbyname() [all …]
|
D | cipher_test.cc | 74 if (name == "DES-CBC") { in GetCipher() 76 } else if (name == "DES-ECB") { in GetCipher() 78 } else if (name == "DES-EDE") { in GetCipher() 80 } else if (name == "DES-EDE3") { in GetCipher() 82 } else if (name == "DES-EDE-CBC") { in GetCipher() 84 } else if (name == "DES-EDE3-CBC") { in GetCipher() 88 } else if (name == "AES-128-ECB") { in GetCipher() 90 } else if (name == "AES-256-ECB") { in GetCipher() 92 } else if (name == "AES-128-CBC") { in GetCipher() 94 } else if (name == "AES-128-GCM") { in GetCipher() [all …]
|
/external/wpa_supplicant_8/src/crypto/ |
D | aes-omac1.c | 2 * One-key CBC MAC (OMAC1) hash with AES 4 * Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi> 13 #include "aes.h" 21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in gf_mulx() 23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx() 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx() 30 * omac1_aes_vector - One-Key CBC MAC (OMAC1) hash with AES 37 * Returns: 0 on success, -1 on failure 39 * This is a mode for using block cipher (AES in this case) for authentication. 41 * (SP) 800-38B. [all …]
|
D | aes_wrap.h | 2 * AES-based functions 4 * - AES Key Wrap Algorithm (RFC3394) 5 * - One-Key CBC MAC (OMAC1) hash with AES-128 and AES-256 6 * - AES-128/192/256 CTR mode encryption 7 * - AES-128 EAX mode encryption/decryption 8 * - AES-128 CBC 9 * - AES-GCM 10 * - AES-CCM 12 * Copyright (c) 2003-2012, Jouni Malinen <j@w1.fi>
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
D | OpenSSLProvider.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 26 * href="http://www.iana.org/assignments/hash-function-text-names/hash-function-text-names.xml">Hash 55 super(providerName, 1.0, "Android's OpenSSL-backed security provider"); in OpenSSLProvider() 81 put("AlgorithmParameters.AES", PREFIX + "IvParameters$AES"); in OpenSSLProvider() 82 put("Alg.Alias.AlgorithmParameters.2.16.840.1.101.3.4.1.2", "AES"); in OpenSSLProvider() 83 put("Alg.Alias.AlgorithmParameters.2.16.840.1.101.3.4.1.22", "AES"); in OpenSSLProvider() 84 put("Alg.Alias.AlgorithmParameters.2.16.840.1.101.3.4.1.42", "AES"); in OpenSSLProvider() 101 put("MessageDigest.SHA-1", PREFIX + "OpenSSLMessageDigestJDK$SHA1"); in OpenSSLProvider() 102 put("Alg.Alias.MessageDigest.SHA1", "SHA-1"); in OpenSSLProvider() 103 put("Alg.Alias.MessageDigest.SHA", "SHA-1"); in OpenSSLProvider() [all …]
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
D | OpenSSLProvider.java | 9 * http://www.apache.org/licenses/LICENSE-2.0 27 * href="http://www.iana.org/assignments/hash-function-text-names/hash-function-text-names.xml">Hash 60 super(providerName, 1.0, "Android's OpenSSL-backed security provider"); in OpenSSLProvider() 86 put("AlgorithmParameters.AES", PREFIX + "IvParameters$AES"); in OpenSSLProvider() 87 put("Alg.Alias.AlgorithmParameters.2.16.840.1.101.3.4.1.2", "AES"); in OpenSSLProvider() 88 put("Alg.Alias.AlgorithmParameters.2.16.840.1.101.3.4.1.22", "AES"); in OpenSSLProvider() 89 put("Alg.Alias.AlgorithmParameters.2.16.840.1.101.3.4.1.42", "AES"); in OpenSSLProvider() 106 put("MessageDigest.SHA-1", PREFIX + "OpenSSLMessageDigestJDK$SHA1"); in OpenSSLProvider() 107 put("Alg.Alias.MessageDigest.SHA1", "SHA-1"); in OpenSSLProvider() 108 put("Alg.Alias.MessageDigest.SHA", "SHA-1"); in OpenSSLProvider() [all …]
|
/external/python/oauth2client/scripts/ |
D | run_system_tests.sh | 9 # http://www.apache.org/licenses/LICENSE-2.0 17 set -ev 27 openssl aes-256-cbc -K ${OAUTH2CLIENT_KEY} \ 28 -iv ${OAUTH2CLIENT_IV} \ 29 -in tests/data/key.json.enc \ 30 -out ${OAUTH2CLIENT_TEST_JSON_KEY_PATH} -d 32 openssl aes-256-cbc -K ${OAUTH2CLIENT_KEY} \ 33 -iv ${OAUTH2CLIENT_IV} \ 34 -in tests/data/key.p12.enc \ 35 -out ${OAUTH2CLIENT_TEST_P12_KEY_PATH} -d [all …]
|
/external/syzkaller/sys/linux/ |
D | init_alg.go | 143 {"gcm(aes)", nil}, 144 {"gcm_base(ctr(aes-aesni),ghash-generic)", nil}, 145 {"generic-gcm-aesni", nil}, 146 {"rfc4106(gcm(aes))", nil}, 147 {"rfc4106-gcm-aesni", nil}, 149 {"morus640-generic", nil}, 150 {"morus640-sse2", nil}, 152 {"morus1280-generic", nil}, 153 {"morus1280-sse2", nil}, 154 {"morus1280-avx2", nil}, [all …]
|
/external/autotest/client/site_tests/platform_AesThroughput/ |
D | platform_AesThroughput.py | 2 # Use of this source code is governed by a BSD-style license that can be 22 results = self.openssl_speed('aes-256-cbc', '-multi %d' % num_cpus) 29 cmd = 'openssl speed %s -mr %s' % (cipher, options) 36 type, times = results.split("\n")[-1].split(' ') 37 # +F:num:aes-256 cbc -> aes_256_cbc 38 type = re.sub('[- ]', '_', type.split(':')[-1]) 39 # cbc:time:time:time:... -> time, time, ... 46 keys = ['16_bytes', '64_bytes', '256_bytes', '1024_bytes', '8192_bytes']
|
/external/boringssl/src/include/openssl/ |
D | nid.h | 1 /* Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com) 8 * This library is free for commercial and non-commercial use as long as 35 * being used are not cryptographic related :-). 117 #define SN_md2WithRSAEncryption "RSA-MD2" 122 #define SN_md5WithRSAEncryption "RSA-MD5" 127 #define SN_pbeWithMD2AndDES_CBC "PBE-MD2-DES" 128 #define LN_pbeWithMD2AndDES_CBC "pbeWithMD2AndDES-CBC" 132 #define SN_pbeWithMD5AndDES_CBC "PBE-MD5-DES" 133 #define LN_pbeWithMD5AndDES_CBC "pbeWithMD5AndDES-CBC" 185 #define LN_pkcs7_data "pkcs7-data" [all …]
|
D | tls1.h | 1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 8 * This library is free for commercial and non-commercial use as long as 35 * being used are not cryptographic related :-). 58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. 80 * openssl-core@openssl.org. 131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites 174 // codes 110-114 are from RFC3546 205 // ExtensionType value from draft-ietf-tokbind-negotiation-10 208 // ExtensionType value from draft-ietf-quic-tls. Note that this collides with 209 // TLS-LTS and, based on scans, something else too. Since it's QUIC-only, that [all …]
|
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/crypto/ |
D | CipherTest.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 89 // BEGIN Android-Added: Allow access to deprecated BC algorithms. 103 // END Android-Added: Allow access to deprecated BC algorithms. 131 if (algorithm.equals("PBEWITHSHAAND40BITRC2-CBC")) { in isSupported() 134 if (algorithm.equals("PBEWITHSHAAND128BITRC2-CBC")) { in isSupported() 137 if (algorithm.equals("PBEWITHSHAANDTWOFISH-CBC")) { in isSupported() 147 (algorithm.equals("AES/CFB/PKCS5PADDING") in isSupported() 148 || algorithm.equals("AES/CFB/PKCS7PADDING") in isSupported() 149 || algorithm.equals("AES/CTR/PKCS5PADDING") in isSupported() 150 || algorithm.equals("AES/CTR/PKCS7PADDING") in isSupported() [all …]
|
/external/conscrypt/repackaged/openjdk-integ-tests/src/test/java/com/android/org/conscrypt/javax/crypto/ |
D | CipherTest.java | 9 * http://www.apache.org/licenses/LICENSE-2.0 93 // BEGIN Android-Added: Allow access to deprecated BC algorithms. 107 // END Android-Added: Allow access to deprecated BC algorithms. 135 if (algorithm.equals("PBEWITHSHAAND40BITRC2-CBC")) { in isSupported() 138 if (algorithm.equals("PBEWITHSHAAND128BITRC2-CBC")) { in isSupported() 141 if (algorithm.equals("PBEWITHSHAANDTWOFISH-CBC")) { in isSupported() 151 (algorithm.equals("AES/CFB/PKCS5PADDING") in isSupported() 152 || algorithm.equals("AES/CFB/PKCS7PADDING") in isSupported() 153 || algorithm.equals("AES/CTR/PKCS5PADDING") in isSupported() 154 || algorithm.equals("AES/CTR/PKCS7PADDING") in isSupported() [all …]
|
/external/epid-sdk/ext/ipp/sources/ippcp/ |
D | pcpaes_cbc.h | 2 * Copyright 2013-2018 Intel Corporation 30 * obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 45 // AES encryption/decryption (CBC mode) 46 // AES encryption/decryption (CBC-CS mode) 71 // AES-CBC decryption 78 // pCtx pointer to the AES context 100 /* not inplace block-by-block decryption */ in cpDecryptAES_cbc() 103 …32u*)pSrc, (Ipp32u*)pDst, RIJ_NR(pCtx), RIJ_DKEYS(pCtx), (const Ipp32u (*)[256])RIJ_DEC_SBOX(pCtx)… in cpDecryptAES_cbc() 122 nBlocks--; in cpDecryptAES_cbc() 126 /* inplace block-by-block decryption */ in cpDecryptAES_cbc() [all …]
|