Home
last modified time | relevance | path

Searched +full:aes +full:- +full:256 +full:- +full:cbc (Results 1 – 25 of 96) sorted by relevance

1234

/external/boringssl/src/crypto/cipher_extra/test/nist_cavp/
Daes_256_cbc.txt1 # Generated by "make_cavp -cipher=aes -extra-labels=Cipher=AES-256-CBC kat_aes/CBCGFSbox256.rsp kat…
5 Cipher: AES-256-CBC
12 Cipher: AES-256-CBC
19 Cipher: AES-256-CBC
26 Cipher: AES-256-CBC
33 Cipher: AES-256-CBC
40 Cipher: AES-256-CBC
47 Cipher: AES-256-CBC
54 Cipher: AES-256-CBC
61 Cipher: AES-256-CBC
[all …]
/external/boringssl/src/crypto/cipher_extra/test/
Dcipher_tests.txt34 Cipher = DES-EDE3
39 Cipher = DES-EDE3
44 Cipher = DES-EDE3
49 Cipher = DES-EDE3
54 Cipher = DES-EDE3
59 Cipher = DES-EDE3
64 Cipher = DES-EDE3
69 Cipher = DES-EDE3
74 Cipher = DES-EDE3
79 Cipher = DES-EDE3
[all …]
Dmake_legacy_aead_tests.go5 "crypto/aes"
22 var implicitIV *bool = flag.Bool("implicit-iv", false, "If true, generate tests for a cipher using …
76 return aes.NewCipher(key)
78 return aes.NewCipher(key)
127 ad := adFull[:len(adFull)-2]
129 adFull[len(adFull)-2] = uint8(length >> 8)
130 adFull[len(adFull)-1] = uint8(length & 0xff)
169 cbc := cipher.NewCBCEncrypter(block, iv)
171 sealed = make([]byte, 0, len(input)+len(digest)+cbc.BlockSize())
179 paddingLen := cbc.BlockSize() - len(sealed)%cbc.BlockSize()
[all …]
/external/boringssl/src/decrepit/evp/
Devp_do_all.c22 callback(EVP_aes_128_cbc(), "AES-128-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted()
23 callback(EVP_aes_192_cbc(), "AES-192-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted()
24 callback(EVP_aes_256_cbc(), "AES-256-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted()
25 callback(EVP_aes_128_ctr(), "AES-128-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted()
26 callback(EVP_aes_192_ctr(), "AES-192-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted()
27 callback(EVP_aes_256_ctr(), "AES-256-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted()
28 callback(EVP_aes_128_ecb(), "AES-128-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted()
29 callback(EVP_aes_192_ecb(), "AES-192-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted()
30 callback(EVP_aes_256_ecb(), "AES-256-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted()
31 callback(EVP_aes_128_ofb(), "AES-128-OFB", NULL, arg); in EVP_CIPHER_do_all_sorted()
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/
DAES.java4 // BEGIN Android-added: Needed for setting mode with GCM
6 // END Android-added: Needed for setting mode with GCM
17 // BEGIN Android-added: Needed for setting padding with GCM
19 // END Android-added: Needed for setting padding with GCM
21 // Android-removed: Unsupported algorithms
34 // Android-removed: Unsupported algorithms
42 // Android-removed: Unsupported algorithms
48 // Android-removed: Unsupported algorithms
53 // Android-removed: Unsupported algorithms
62 public final class AES class
[all …]
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/symmetric/
DAES.java5 // BEGIN Android-added: Needed for setting mode with GCM
7 // END Android-added: Needed for setting mode with GCM
18 // BEGIN Android-added: Needed for setting padding with GCM
20 // END Android-added: Needed for setting padding with GCM
22 // Android-removed: Unsupported algorithms
35 // Android-removed: Unsupported algorithms
43 // Android-removed: Unsupported algorithms
49 // Android-removed: Unsupported algorithms
54 // Android-removed: Unsupported algorithms
66 public final class AES class
[all …]
/external/boringssl/src/crypto/obj/
Dobjects.txt1 # CCITT was renamed to ITU-T quite some time ago
2 0 : ITU-T : itu-t
3 !Alias ccitt itu-t
7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t
8 !Alias joint-iso-ccitt joint-iso-itu-t
10 iso 2 : member-body : ISO Member Body
12 iso 3 : identified-organization
15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5
16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1
18 identified-organization 132 : certicom-arc
[all …]
/external/boringssl/src/fipstools/
Drun_cavp.go21 oraclePath = flag.String("oracle-bin", "", "Path to the oracle binary")
22 suiteDir = flag.String("suite-dir", "", "Base directory containing the CAVP test suite")
23 noFAX = flag.Bool("no-fax", false, "Skip comparing against FAX files")
42 // the FAX file. (E.g. because the primitive is non-deterministic.)
46 // nextLineState can be used by FAX next-line function to store state.
55 // directory is the name of the directory in the CAVP input, i.e. “AES”.
57 // suite names the test suite to pass as the first command-line argument.
77 {"gcmDecrypt128", []string{"dec", "aes-128-gcm"}, false},
78 {"gcmDecrypt256", []string{"dec", "aes-256-gcm"}, false},
79 {"gcmEncryptExtIV128", []string{"enc", "aes-128-gcm"}, false},
[all …]
Dcavp_test_util.cc35 if (name == "des-cbc") { in GetCipher()
37 } else if (name == "des-ecb") { in GetCipher()
39 } else if (name == "des-ede") { in GetCipher()
41 } else if (name == "des-ede3") { in GetCipher()
43 } else if (name == "des-ede-cbc") { in GetCipher()
45 } else if (name == "des-ede3-cbc") { in GetCipher()
49 } else if (name == "aes-128-ecb") { in GetCipher()
51 } else if (name == "aes-256-ecb") { in GetCipher()
53 } else if (name == "aes-128-cbc") { in GetCipher()
55 } else if (name == "aes-128-gcm") { in GetCipher()
[all …]
Dtest_fips.c21 #include <openssl/aes.h>
68 uint8_t output[256]; in main()
70 /* AES-CBC Encryption */ in main()
77 printf("About to AES-CBC encrypt "); in main()
84 /* AES-CBC Decryption */ in main()
87 printf("AES decrypt failed\n"); in main()
90 printf("About to AES-CBC decrypt "); in main()
107 /* AES-GCM Encryption */ in main()
108 printf("About to AES-GCM seal "); in main()
113 printf("AES-GCM encrypt failed\n"); in main()
[all …]
/external/conscrypt/
DCAPABILITIES.md5 on the most important and widely-used algorithms. Following is a list of JCA algorithm names
18 Conscrypt supports TLS v1.0-1.3. For backwards compatibility it will accept
20 ….oracle.com/javase/9/docs/api/javax/net/ssl/SSLSocket.html#setEnabledProtocols-java.lang.String:A-)
36 …tDefault()`](https://docs.oracle.com/javase/9/docs/api/javax/net/ssl/SSLContext.html#getDefault--).
38 v1.0-1.3 are all enabled; the others return a context with TLS v1.0-1.2 enabled.
43 * TLS 1.0-1.2
67 …acle.com/javase/9/docs/api/javax/net/ssl/SSLSocket.html#setEnabledCipherSuites-java.lang.String:A-)
71 * TLS 1.0-1.2
87 * `AES/CBC/NoPadding`
88 * `AES/CBC/PKCS5Padding`
[all …]
/external/boringssl/src/crypto/cipher_extra/
Dcipher_extra.c1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
8 * This library is free for commercial and non-commercial use as long as
35 * being used are not cryptographic related :-).
94 } else if (OPENSSL_strcasecmp(name, "des-cbc") == 0) { in EVP_get_cipherbyname()
96 } else if (OPENSSL_strcasecmp(name, "des-ede3-cbc") == 0 || in EVP_get_cipherbyname()
99 // no-op, so we support the name here. in EVP_get_cipherbyname()
102 } else if (OPENSSL_strcasecmp(name, "aes-128-cbc") == 0) { in EVP_get_cipherbyname()
104 } else if (OPENSSL_strcasecmp(name, "aes-192-cbc") == 0) { in EVP_get_cipherbyname()
106 } else if (OPENSSL_strcasecmp(name, "aes-256-cbc") == 0) { in EVP_get_cipherbyname()
108 } else if (OPENSSL_strcasecmp(name, "aes-128-ctr") == 0) { in EVP_get_cipherbyname()
[all …]
Dcipher_test.cc74 if (name == "DES-CBC") { in GetCipher()
76 } else if (name == "DES-ECB") { in GetCipher()
78 } else if (name == "DES-EDE") { in GetCipher()
80 } else if (name == "DES-EDE3") { in GetCipher()
82 } else if (name == "DES-EDE-CBC") { in GetCipher()
84 } else if (name == "DES-EDE3-CBC") { in GetCipher()
88 } else if (name == "AES-128-ECB") { in GetCipher()
90 } else if (name == "AES-256-ECB") { in GetCipher()
92 } else if (name == "AES-128-CBC") { in GetCipher()
94 } else if (name == "AES-128-GCM") { in GetCipher()
[all …]
/external/wpa_supplicant_8/src/crypto/
Daes-omac1.c2 * One-key CBC MAC (OMAC1) hash with AES
4 * Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
13 #include "aes.h"
21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) in gf_mulx()
23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx()
25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx()
30 * omac1_aes_vector - One-Key CBC MAC (OMAC1) hash with AES
37 * Returns: 0 on success, -1 on failure
39 * This is a mode for using block cipher (AES in this case) for authentication.
41 * (SP) 800-38B.
[all …]
Daes_wrap.h2 * AES-based functions
4 * - AES Key Wrap Algorithm (RFC3394)
5 * - One-Key CBC MAC (OMAC1) hash with AES-128 and AES-256
6 * - AES-128/192/256 CTR mode encryption
7 * - AES-128 EAX mode encryption/decryption
8 * - AES-128 CBC
9 * - AES-GCM
10 * - AES-CCM
12 * Copyright (c) 2003-2012, Jouni Malinen <j@w1.fi>
/external/conscrypt/common/src/main/java/org/conscrypt/
DOpenSSLProvider.java8 * http://www.apache.org/licenses/LICENSE-2.0
26 * href="http://www.iana.org/assignments/hash-function-text-names/hash-function-text-names.xml">Hash
55 super(providerName, 1.0, "Android's OpenSSL-backed security provider"); in OpenSSLProvider()
81 put("AlgorithmParameters.AES", PREFIX + "IvParameters$AES"); in OpenSSLProvider()
82 put("Alg.Alias.AlgorithmParameters.2.16.840.1.101.3.4.1.2", "AES"); in OpenSSLProvider()
83 put("Alg.Alias.AlgorithmParameters.2.16.840.1.101.3.4.1.22", "AES"); in OpenSSLProvider()
84 put("Alg.Alias.AlgorithmParameters.2.16.840.1.101.3.4.1.42", "AES"); in OpenSSLProvider()
101 put("MessageDigest.SHA-1", PREFIX + "OpenSSLMessageDigestJDK$SHA1"); in OpenSSLProvider()
102 put("Alg.Alias.MessageDigest.SHA1", "SHA-1"); in OpenSSLProvider()
103 put("Alg.Alias.MessageDigest.SHA", "SHA-1"); in OpenSSLProvider()
[all …]
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/
DOpenSSLProvider.java9 * http://www.apache.org/licenses/LICENSE-2.0
27 * href="http://www.iana.org/assignments/hash-function-text-names/hash-function-text-names.xml">Hash
60 super(providerName, 1.0, "Android's OpenSSL-backed security provider"); in OpenSSLProvider()
86 put("AlgorithmParameters.AES", PREFIX + "IvParameters$AES"); in OpenSSLProvider()
87 put("Alg.Alias.AlgorithmParameters.2.16.840.1.101.3.4.1.2", "AES"); in OpenSSLProvider()
88 put("Alg.Alias.AlgorithmParameters.2.16.840.1.101.3.4.1.22", "AES"); in OpenSSLProvider()
89 put("Alg.Alias.AlgorithmParameters.2.16.840.1.101.3.4.1.42", "AES"); in OpenSSLProvider()
106 put("MessageDigest.SHA-1", PREFIX + "OpenSSLMessageDigestJDK$SHA1"); in OpenSSLProvider()
107 put("Alg.Alias.MessageDigest.SHA1", "SHA-1"); in OpenSSLProvider()
108 put("Alg.Alias.MessageDigest.SHA", "SHA-1"); in OpenSSLProvider()
[all …]
/external/python/oauth2client/scripts/
Drun_system_tests.sh9 # http://www.apache.org/licenses/LICENSE-2.0
17 set -ev
27 openssl aes-256-cbc -K ${OAUTH2CLIENT_KEY} \
28 -iv ${OAUTH2CLIENT_IV} \
29 -in tests/data/key.json.enc \
30 -out ${OAUTH2CLIENT_TEST_JSON_KEY_PATH} -d
32 openssl aes-256-cbc -K ${OAUTH2CLIENT_KEY} \
33 -iv ${OAUTH2CLIENT_IV} \
34 -in tests/data/key.p12.enc \
35 -out ${OAUTH2CLIENT_TEST_P12_KEY_PATH} -d
[all …]
/external/syzkaller/sys/linux/
Dinit_alg.go143 {"gcm(aes)", nil},
144 {"gcm_base(ctr(aes-aesni),ghash-generic)", nil},
145 {"generic-gcm-aesni", nil},
146 {"rfc4106(gcm(aes))", nil},
147 {"rfc4106-gcm-aesni", nil},
149 {"morus640-generic", nil},
150 {"morus640-sse2", nil},
152 {"morus1280-generic", nil},
153 {"morus1280-sse2", nil},
154 {"morus1280-avx2", nil},
[all …]
/external/autotest/client/site_tests/platform_AesThroughput/
Dplatform_AesThroughput.py2 # Use of this source code is governed by a BSD-style license that can be
22 results = self.openssl_speed('aes-256-cbc', '-multi %d' % num_cpus)
29 cmd = 'openssl speed %s -mr %s' % (cipher, options)
36 type, times = results.split("\n")[-1].split(' ')
37 # +F:num:aes-256 cbc -> aes_256_cbc
38 type = re.sub('[- ]', '_', type.split(':')[-1])
39 # cbc:time:time:time:... -> time, time, ...
46 keys = ['16_bytes', '64_bytes', '256_bytes', '1024_bytes', '8192_bytes']
/external/boringssl/src/include/openssl/
Dnid.h1 /* Copyright (C) 1995-1997 Eric Young (eay@cryptsoft.com)
8 * This library is free for commercial and non-commercial use as long as
35 * being used are not cryptographic related :-).
117 #define SN_md2WithRSAEncryption "RSA-MD2"
122 #define SN_md5WithRSAEncryption "RSA-MD5"
127 #define SN_pbeWithMD2AndDES_CBC "PBE-MD2-DES"
128 #define LN_pbeWithMD2AndDES_CBC "pbeWithMD2AndDES-CBC"
132 #define SN_pbeWithMD5AndDES_CBC "PBE-MD5-DES"
133 #define LN_pbeWithMD5AndDES_CBC "pbeWithMD5AndDES-CBC"
185 #define LN_pkcs7_data "pkcs7-data"
[all …]
Dtls1.h1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
8 * This library is free for commercial and non-commercial use as long as
35 * being used are not cryptographic related :-).
58 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
80 * openssl-core@openssl.org.
131 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
174 // codes 110-114 are from RFC3546
205 // ExtensionType value from draft-ietf-tokbind-negotiation-10
208 // ExtensionType value from draft-ietf-quic-tls. Note that this collides with
209 // TLS-LTS and, based on scans, something else too. Since it's QUIC-only, that
[all …]
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/javax/crypto/
DCipherTest.java8 * http://www.apache.org/licenses/LICENSE-2.0
89 // BEGIN Android-Added: Allow access to deprecated BC algorithms.
103 // END Android-Added: Allow access to deprecated BC algorithms.
131 if (algorithm.equals("PBEWITHSHAAND40BITRC2-CBC")) { in isSupported()
134 if (algorithm.equals("PBEWITHSHAAND128BITRC2-CBC")) { in isSupported()
137 if (algorithm.equals("PBEWITHSHAANDTWOFISH-CBC")) { in isSupported()
147 (algorithm.equals("AES/CFB/PKCS5PADDING") in isSupported()
148 || algorithm.equals("AES/CFB/PKCS7PADDING") in isSupported()
149 || algorithm.equals("AES/CTR/PKCS5PADDING") in isSupported()
150 || algorithm.equals("AES/CTR/PKCS7PADDING") in isSupported()
[all …]
/external/conscrypt/repackaged/openjdk-integ-tests/src/test/java/com/android/org/conscrypt/javax/crypto/
DCipherTest.java9 * http://www.apache.org/licenses/LICENSE-2.0
93 // BEGIN Android-Added: Allow access to deprecated BC algorithms.
107 // END Android-Added: Allow access to deprecated BC algorithms.
135 if (algorithm.equals("PBEWITHSHAAND40BITRC2-CBC")) { in isSupported()
138 if (algorithm.equals("PBEWITHSHAAND128BITRC2-CBC")) { in isSupported()
141 if (algorithm.equals("PBEWITHSHAANDTWOFISH-CBC")) { in isSupported()
151 (algorithm.equals("AES/CFB/PKCS5PADDING") in isSupported()
152 || algorithm.equals("AES/CFB/PKCS7PADDING") in isSupported()
153 || algorithm.equals("AES/CTR/PKCS5PADDING") in isSupported()
154 || algorithm.equals("AES/CTR/PKCS7PADDING") in isSupported()
[all …]
/external/epid-sdk/ext/ipp/sources/ippcp/
Dpcpaes_cbc.h2 * Copyright 2013-2018 Intel Corporation
30 * obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0
45 // AES encryption/decryption (CBC mode)
46 // AES encryption/decryption (CBC-CS mode)
71 // AES-CBC decryption
78 // pCtx pointer to the AES context
100 /* not inplace block-by-block decryption */ in cpDecryptAES_cbc()
103 …32u*)pSrc, (Ipp32u*)pDst, RIJ_NR(pCtx), RIJ_DKEYS(pCtx), (const Ipp32u (*)[256])RIJ_DEC_SBOX(pCtx)… in cpDecryptAES_cbc()
122 nBlocks--; in cpDecryptAES_cbc()
126 /* inplace block-by-block decryption */ in cpDecryptAES_cbc()
[all …]

1234