Home
last modified time | relevance | path

Searched +full:aes +full:- +full:256 +full:- +full:cbc (Results 1 – 25 of 316) sorted by relevance

12345678910>>...13

/external/cronet/third_party/boringssl/src/crypto/cipher_extra/test/nist_cavp/
Daes_256_cbc.txt1 # Generated by "make_cavp -cipher=aes -extra-labels=Cipher=AES-256-CBC kat_aes/CBCGFSbox256.rsp kat…
5 Cipher: AES-256-CBC
12 Cipher: AES-256-CBC
19 Cipher: AES-256-CBC
26 Cipher: AES-256-CBC
33 Cipher: AES-256-CBC
40 Cipher: AES-256-CBC
47 Cipher: AES-256-CBC
54 Cipher: AES-256-CBC
61 Cipher: AES-256-CBC
[all …]
/external/boringssl/src/crypto/cipher_extra/test/nist_cavp/
Daes_256_cbc.txt1 # Generated by "make_cavp -cipher=aes -extra-labels=Cipher=AES-256-CBC kat_aes/CBCGFSbox256.rsp kat…
5 Cipher: AES-256-CBC
12 Cipher: AES-256-CBC
19 Cipher: AES-256-CBC
26 Cipher: AES-256-CBC
33 Cipher: AES-256-CBC
40 Cipher: AES-256-CBC
47 Cipher: AES-256-CBC
54 Cipher: AES-256-CBC
61 Cipher: AES-256-CBC
[all …]
/external/openthread/third_party/mbedtls/repo/tests/suites/
Dtest_suite_cipher.aes.data1 AES-128 CBC - Decrypt empty buffer
5 AES-128 XTS - Decrypt empty buffer
9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding
11 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:0:-1
13 AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding
15 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:1:-1
17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding
19 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:2:-1
21 AES-128 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding
23 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:7:-1
[all …]
Dtest_suite_aes.cbc.data1 AES-128-CBC Encrypt NIST KAT #1
4 AES-128-CBC Encrypt NIST KAT #2
7 AES-128-CBC Encrypt NIST KAT #3
10 AES-128-CBC Encrypt NIST KAT #4
13 AES-128-CBC Encrypt NIST KAT #5
16 AES-128-CBC Encrypt NIST KAT #6
19 AES-128-CBC Encrypt NIST KAT #7
22 AES-128-CBC Encrypt NIST KAT #8
25 AES-128-CBC Encrypt NIST KAT #9
28 AES-128-CBC Encrypt NIST KAT #10
[all …]
Dtest_suite_ssl.data40 Test mock non-blocking TCP connection
46 Test mock non-blocking TCP connection (interleaving)
49 Message queue - sanity
52 Message queue - basic test
55 Message queue - overflow/underflow
58 Message queue - interleaved
61 Message queue - insufficient buffer
64 Message transport mock - uninitialized structures
67 Message transport mock - basic test
70 Message transport mock - queue overflow/underflow
[all …]
/external/mbedtls/tests/suites/
Dtest_suite_aes.cbc.data1 AES-128-CBC Encrypt NIST KAT #1
4 AES-128-CBC Encrypt NIST KAT #2
7 AES-128-CBC Encrypt NIST KAT #3
10 AES-128-CBC Encrypt NIST KAT #4
13 AES-128-CBC Encrypt NIST KAT #5
16 AES-128-CBC Encrypt NIST KAT #6
19 AES-128-CBC Encrypt NIST KAT #7
22 AES-128-CBC Encrypt NIST KAT #8
25 AES-128-CBC Encrypt NIST KAT #9
28 AES-128-CBC Encrypt NIST KAT #10
[all …]
Dtest_suite_cipher.aes.data1 AES-128 CBC - Decrypt empty buffer
5 AES-128 XTS - Decrypt empty buffer
9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding
11 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:0:MBEDTLS_PADDING_PKCS7
13 AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding
15 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:1:MBEDTLS_PADDING_PKCS7
17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding
19 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:2:MBEDTLS_PADDING_PKCS7
21 AES-128 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding
23 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:7:MBEDTLS_PADDING_PKCS7
[all …]
Dtest_suite_ssl.data52 Test mock non-blocking TCP connection
58 Test mock non-blocking TCP connection (interleaving)
61 Message queue - sanity
64 Message queue - basic test
67 Message queue - overflow/underflow
70 Message queue - interleaved
73 Message queue - insufficient buffer
76 Message transport mock - uninitialized structures
79 Message transport mock - basic test
82 Message transport mock - queue overflow/underflow
[all …]
/external/openthread/third_party/mbedtls/repo/tests/
Dcompat.sh6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
15 set -u
19 ulimit -f 20971520
36 : ${GNUTLS_CLI:=gnutls-cli}
37 : ${GNUTLS_SERV:=gnutls-serv}
52 G_VER="$( $GNUTLS_CLI --version | head -n1 )"
56 …eval $( echo $G_VER | sed 's/.* \([0-9]*\)\.\([0-9]\)*\.\([0-9]*\)$/MAJOR="\1" MINOR="\2" PATCH="\…
57 if [ $MAJOR -lt 3 -o \
58 \( $MAJOR -eq 3 -a $MINOR -lt 2 \) -o \
59 \( $MAJOR -eq 3 -a $MINOR -eq 2 -a $PATCH -lt 15 \) ]
[all …]
/external/boringssl/src/crypto/cipher_extra/test/
Dcipher_tests.txt39 Cipher = DES-EDE3
44 Cipher = DES-EDE3
49 Cipher = DES-EDE3
54 Cipher = DES-EDE3
59 Cipher = DES-EDE3
64 Cipher = DES-EDE3
69 Cipher = DES-EDE3
74 Cipher = DES-EDE3
79 Cipher = DES-EDE3
84 Cipher = DES-EDE3
[all …]
/external/cronet/third_party/boringssl/src/crypto/cipher_extra/test/
Dcipher_tests.txt39 Cipher = DES-EDE3
44 Cipher = DES-EDE3
49 Cipher = DES-EDE3
54 Cipher = DES-EDE3
59 Cipher = DES-EDE3
64 Cipher = DES-EDE3
69 Cipher = DES-EDE3
74 Cipher = DES-EDE3
79 Cipher = DES-EDE3
84 Cipher = DES-EDE3
[all …]
/external/curl/lib/vtls/
Dcipher_suite.c21 * SPDX-License-Identifier: curl
58 "256" "\0"
61 "AES" "\0"
64 "CBC" "\0"
163 CS_ENTRY(0x002F, TLS,RSA,WITH,AES,128,CBC,SHA,),
165 CS_ENTRY(0x0035, TLS,RSA,WITH,AES,256,CBC,SHA,),
167 CS_ENTRY(0x003C, TLS,RSA,WITH,AES,128,CBC,SHA256,),
169 CS_ENTRY(0x003D, TLS,RSA,WITH,AES,256,CBC,SHA256,),
171 CS_ENTRY(0x009C, TLS,RSA,WITH,AES,128,GCM,SHA256,),
173 CS_ENTRY(0x009D, TLS,RSA,WITH,AES,256,GCM,SHA384,),
[all …]
/external/mbedtls/library/
Dssl_ciphersuites.c7 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
30 * Forward-secure non-PSK > forward-secure PSK > ECJPAKE > other non-PSK > other PSK
32 * ChaCha > AES-256 > Camellia-256 > ARIA-256 > AES-128 > Camellia-128 > ARIA-128
33 * 3. By cipher mode when relevant GCM > CCM > CBC > CCM_8
35 * 5. By key exchange/auth again: EC > non-EC
51 /* Chacha-Poly ephemeral suites */
56 /* All AES-256 ephemeral suites */
71 /* All CAMELLIA-256 ephemeral suites */
80 /* All ARIA-256 ephemeral suites */
88 /* All AES-128 ephemeral suites */
[all …]
/external/rust/crates/quiche/deps/boringssl/src/decrepit/evp/
Devp_do_all.c22 callback(EVP_aes_128_cbc(), "AES-128-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted()
23 callback(EVP_aes_192_cbc(), "AES-192-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted()
24 callback(EVP_aes_256_cbc(), "AES-256-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted()
25 callback(EVP_aes_128_ctr(), "AES-128-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted()
26 callback(EVP_aes_192_ctr(), "AES-192-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted()
27 callback(EVP_aes_256_ctr(), "AES-256-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted()
28 callback(EVP_aes_128_ecb(), "AES-128-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted()
29 callback(EVP_aes_192_ecb(), "AES-192-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted()
30 callback(EVP_aes_256_ecb(), "AES-256-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted()
31 callback(EVP_aes_128_ofb(), "AES-128-OFB", NULL, arg); in EVP_CIPHER_do_all_sorted()
[all …]
/external/cronet/third_party/boringssl/src/decrepit/evp/
Devp_do_all.c22 callback(EVP_aes_128_cbc(), "AES-128-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted()
23 callback(EVP_aes_192_cbc(), "AES-192-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted()
24 callback(EVP_aes_256_cbc(), "AES-256-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted()
25 callback(EVP_aes_128_ctr(), "AES-128-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted()
26 callback(EVP_aes_192_ctr(), "AES-192-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted()
27 callback(EVP_aes_256_ctr(), "AES-256-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted()
28 callback(EVP_aes_128_ecb(), "AES-128-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted()
29 callback(EVP_aes_192_ecb(), "AES-192-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted()
30 callback(EVP_aes_256_ecb(), "AES-256-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted()
31 callback(EVP_aes_128_ofb(), "AES-128-OFB", NULL, arg); in EVP_CIPHER_do_all_sorted()
[all …]
/external/boringssl/src/decrepit/evp/
Devp_do_all.c22 callback(EVP_aes_128_cbc(), "AES-128-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted()
23 callback(EVP_aes_192_cbc(), "AES-192-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted()
24 callback(EVP_aes_256_cbc(), "AES-256-CBC", NULL, arg); in EVP_CIPHER_do_all_sorted()
25 callback(EVP_aes_128_ctr(), "AES-128-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted()
26 callback(EVP_aes_192_ctr(), "AES-192-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted()
27 callback(EVP_aes_256_ctr(), "AES-256-CTR", NULL, arg); in EVP_CIPHER_do_all_sorted()
28 callback(EVP_aes_128_ecb(), "AES-128-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted()
29 callback(EVP_aes_192_ecb(), "AES-192-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted()
30 callback(EVP_aes_256_ecb(), "AES-256-ECB", NULL, arg); in EVP_CIPHER_do_all_sorted()
31 callback(EVP_aes_128_ofb(), "AES-128-OFB", NULL, arg); in EVP_CIPHER_do_all_sorted()
[all …]
/external/openthread/third_party/mbedtls/repo/library/
Dssl_ciphersuites.c7 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
31 * Forward-secure non-PSK > forward-secure PSK > ECJPAKE > other non-PSK > other PSK
33 * ChaCha > AES-256 > Camellia-256 > ARIA-256 > AES-128 > Camellia-128 > ARIA-128
34 * 3. By cipher mode when relevant GCM > CCM > CBC > CCM_8
36 * 5. By key exchange/auth again: EC > non-EC
43 /* Chacha-Poly ephemeral suites */
48 /* All AES-256 ephemeral suites */
63 /* All CAMELLIA-256 ephemeral suites */
72 /* All ARIA-256 ephemeral suites */
80 /* All AES-128 ephemeral suites */
[all …]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/
DAES.java4 // BEGIN Android-added: Needed for setting mode with GCM
6 // END Android-added: Needed for setting mode with GCM
17 // BEGIN Android-added: Needed for setting padding with GCM
19 // END Android-added: Needed for setting padding with GCM
21 // Android-removed: Unsupported algorithms
35 // Android-removed: Unsupported algorithms
43 // Android-removed: Unsupported algorithms
49 // Android-removed: Unsupported algorithms
54 // Android-removed: Unsupported algorithms
64 public final class AES class
[all …]
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/symmetric/
DAES.java5 // BEGIN Android-added: Needed for setting mode with GCM
7 // END Android-added: Needed for setting mode with GCM
18 // BEGIN Android-added: Needed for setting padding with GCM
20 // END Android-added: Needed for setting padding with GCM
22 // Android-removed: Unsupported algorithms
36 // Android-removed: Unsupported algorithms
44 // Android-removed: Unsupported algorithms
50 // Android-removed: Unsupported algorithms
55 // Android-removed: Unsupported algorithms
68 public final class AES class
[all …]
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jcajce/provider/symmetric/
DAES.java5 // BEGIN Android-added: Needed for setting mode with GCM
7 // END Android-added: Needed for setting mode with GCM
18 // BEGIN Android-added: Needed for setting padding with GCM
20 // END Android-added: Needed for setting padding with GCM
22 // Android-removed: Unsupported algorithms
36 // Android-removed: Unsupported algorithms
44 // Android-removed: Unsupported algorithms
50 // Android-removed: Unsupported algorithms
55 // Android-removed: Unsupported algorithms
68 public final class AES class
[all …]
/external/boringssl/src/crypto/obj/
Dobjects.txt1 # CCITT was renamed to ITU-T quite some time ago
2 0 : ITU-T : itu-t
3 !Alias ccitt itu-t
7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t
8 !Alias joint-iso-ccitt joint-iso-itu-t
10 iso 2 : member-body : ISO Member Body
12 iso 3 : identified-organization
15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5
16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1
18 identified-organization 132 : certicom-arc
[all …]
/external/cronet/third_party/boringssl/src/crypto/obj/
Dobjects.txt1 # CCITT was renamed to ITU-T quite some time ago
2 0 : ITU-T : itu-t
3 !Alias ccitt itu-t
7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t
8 !Alias joint-iso-ccitt joint-iso-itu-t
10 iso 2 : member-body : ISO Member Body
12 iso 3 : identified-organization
15 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5
16 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1
18 identified-organization 132 : certicom-arc
[all …]
/external/oss-fuzz/projects/openvpn/
Dfuzz_verify_cert.h5 http://www.apache.org/licenses/LICENSE-2.0
15 "AES-128-CBC",
16 "AES-128-CBC-HMAC-SHA1",
17 "AES-128-CBC-HMAC-SHA256",
18 "AES-128-CFB",
19 "AES-128-CFB1",
20 "AES-128-CFB8",
21 "AES-128-CTR",
22 "AES-128-ECB",
23 "AES-128-OCB",
[all …]
/external/rust/beto-rust/nearby/crypto/crypto_provider_test/src/aes/
Dcbc.rs7 // http://www.apache.org/licenses/LICENSE-2.0
15 use crate::aes::Aes256Key;
19 aes::cbc::{AesCbcIv, AesCbcPkcs7Padded},
25 /// Tests for AES-256-CBC encryption
37 /// Tests for AES-256-CBC in-place encryption
53 /// Tests for AES-256-CBC encryption, where the given buffer `SliceVec` is too short to contain the
66 .expect_err("Encrypting AES with 15-byte buffer should fail"); in aes_256_cbc_test_encrypt_in_place_too_short()
67 // Buffer content is undefined, but test to make sure it doesn't contain half-decrypted data in aes_256_cbc_test_encrypt_in_place_too_short()
74 /// Tests for AES-256-CBC decryption
86 /// Tests for AES-256-CBC decryption with bad padding
[all …]
/external/boringssl/src/crypto/cipher_extra/
Dcipher_extra.c1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
8 * This library is free for commercial and non-commercial use as long as
35 * being used are not cryptographic related :-).
75 {NID_aes_128_cbc, "aes-128-cbc", EVP_aes_128_cbc},
76 {NID_aes_128_ctr, "aes-128-ctr", EVP_aes_128_ctr},
77 {NID_aes_128_ecb, "aes-128-ecb", EVP_aes_128_ecb},
78 {NID_aes_128_gcm, "aes-128-gcm", EVP_aes_128_gcm},
79 {NID_aes_128_ofb128, "aes-128-ofb", EVP_aes_128_ofb},
80 {NID_aes_192_cbc, "aes-192-cbc", EVP_aes_192_cbc},
81 {NID_aes_192_ctr, "aes-192-ctr", EVP_aes_192_ctr},
[all …]

12345678910>>...13