Home
last modified time | relevance | path

Searched +full:aes +full:- +full:256 +full:- +full:cbc (Results 1 – 25 of 426) sorted by relevance

12345678910>>...18

/third_party/mbedtls/tests/suites/
Dtest_suite_aes.cbc.data1 AES-128-CBC Encrypt NIST KAT #1
4 AES-128-CBC Encrypt NIST KAT #2
7 AES-128-CBC Encrypt NIST KAT #3
10 AES-128-CBC Encrypt NIST KAT #4
13 AES-128-CBC Encrypt NIST KAT #5
16 AES-128-CBC Encrypt NIST KAT #6
19 AES-128-CBC Encrypt NIST KAT #7
22 AES-128-CBC Encrypt NIST KAT #8
25 AES-128-CBC Encrypt NIST KAT #9
28 AES-128-CBC Encrypt NIST KAT #10
[all …]
Dtest_suite_cipher.aes.data1 AES-128 CBC - Decrypt empty buffer
5 AES-128 XTS - Decrypt empty buffer
9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding
11 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:0:MBEDTLS_PADDING_PKCS7
13 AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding
15 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:1:MBEDTLS_PADDING_PKCS7
17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding
19 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:2:MBEDTLS_PADDING_PKCS7
21 AES-128 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding
23 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:7:MBEDTLS_PADDING_PKCS7
[all …]
Dtest_suite_ssl.data52 Test mock non-blocking TCP connection
58 Test mock non-blocking TCP connection (interleaving)
61 Message queue - sanity
64 Message queue - basic test
67 Message queue - overflow/underflow
70 Message queue - interleaved
73 Message queue - insufficient buffer
76 Message transport mock - uninitialized structures
79 Message transport mock - basic test
82 Message transport mock - queue overflow/underflow
[all …]
/third_party/openssl/doc/man7/
DEVP_CIPHER-AES.pod5 EVP_CIPHER-AES - The AES EVP_CIPHER implementations
9 Support for AES symmetric encryption using the B<EVP_CIPHER> API.
18 =item "AES-128-CBC", "AES-192-CBC" and "AES-256-CBC"
20 =item "AES-128-CBC-CTS", "AES-192-CBC-CTS" and "AES-256-CBC-CTS"
22 =item "AES-128-CFB", "AES-192-CFB", "AES-256-CFB",
23 "AES-128-CFB1", "AES-192-CFB1", "AES-256-CFB1",
24 "AES-128-CFB8", "AES-192-CFB8" and "AES-256-CFB8"
26 =item "AES-128-CTR", "AES-192-CTR" and "AES-256-CTR"
28 =item "AES-128-ECB", "AES-192-ECB" and "AES-256-ECB"
30 =item "AES-192-OFB", "AES-128-OFB" and "AES-256-OFB"
[all …]
/third_party/openssl/providers/implementations/include/prov/
Dnames.h22 * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?]
31 * algorithms together, e.g. MD5-SHA1.
34 * with different sizes (e.g. AES-128-CBC, AES-256-CBC)
39 /*-
41 * -----------------
43 #define PROV_NAMES_AES_256_ECB "AES-256-ECB:2.16.840.1.101.3.4.1.41"
44 #define PROV_NAMES_AES_192_ECB "AES-192-ECB:2.16.840.1.101.3.4.1.21"
45 #define PROV_NAMES_AES_128_ECB "AES-128-ECB:2.16.840.1.101.3.4.1.1"
46 #define PROV_NAMES_AES_256_CBC "AES-256-CBC:AES256:2.16.840.1.101.3.4.1.42"
47 #define PROV_NAMES_AES_192_CBC "AES-192-CBC:AES192:2.16.840.1.101.3.4.1.22"
[all …]
/third_party/node/deps/openssl/openssl/providers/implementations/include/prov/
Dnames.h22 * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?]
31 * algorithms together, e.g. MD5-SHA1.
34 * with different sizes (e.g. AES-128-CBC, AES-256-CBC)
39 /*-
41 * -----------------
43 #define PROV_NAMES_AES_256_ECB "AES-256-ECB:2.16.840.1.101.3.4.1.41"
44 #define PROV_NAMES_AES_192_ECB "AES-192-ECB:2.16.840.1.101.3.4.1.21"
45 #define PROV_NAMES_AES_128_ECB "AES-128-ECB:2.16.840.1.101.3.4.1.1"
46 #define PROV_NAMES_AES_256_CBC "AES-256-CBC:AES256:2.16.840.1.101.3.4.1.42"
47 #define PROV_NAMES_AES_192_CBC "AES-192-CBC:AES192:2.16.840.1.101.3.4.1.22"
[all …]
/third_party/openssl/test/recipes/30-test_evp_data/
Devpciph_aes_common.txt2 # Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved.
16 Title = AES (from FIPS-197 test vectors)
18 Cipher = AES-128-ECB
24 # AES 192 ECB tests (from FIPS-197 test vectors, encrypt)
26 Cipher = AES-192-ECB
33 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt)
35 Cipher = AES-256-ECB
42 # AES 128 ECB tests (from NIST test vectors, encrypt)
44 #AES-128-ECB:00000000000000000000000000000000::00000000000000000000000000000000:C34C052CC0DA8D73451…
46 # AES 128 ECB tests (from NIST test vectors, decrypt)
[all …]
Devpciph_aes_stitched.txt1 Title = AES-128-CBC-HMAC-SHA1 test vectors
3 Cipher = AES-128-CBC-HMAC-SHA1
13 Cipher = AES-128-CBC-HMAC-SHA1
23 Cipher = AES-128-CBC-HMAC-SHA1
33 Title = AES-256-CBC-HMAC-SHA1 test vectors
35 Cipher = AES-256-CBC-HMAC-SHA1
45 Cipher = AES-256-CBC-HMAC-SHA1
55 Cipher = AES-256-CBC-HMAC-SHA1
64 Title = AES-128-CBC-HMAC-SHA256 test vectors
66 Cipher = AES-128-CBC-HMAC-SHA256
[all …]
Devpciph_aes_cts.txt2 # Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.
10 # These have an IV of all zeros, for a 128 bit AES key.
12 Title = AES CBC Test vectors
14 #------------------------------------------------------
18 Cipher = AES-128-CBC
25 Cipher = AES-128-CBC
32 Cipher = AES-128-CBC
38 Title = AES CBC CTS1 Test vectors
40 #------------------------------------------------------
42 # where aligned blocks are the same as CBC mode, and partial lengths
[all …]
Devpkdf_krb5.txt2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved.
18 Ctrl.cipher = cipher:DES-EDE3-CBC
24 Ctrl.cipher = cipher:DES-EDE3-CBC
30 Ctrl.cipher = cipher:DES-EDE3-CBC
36 Ctrl.cipher = cipher:DES-EDE3-CBC
42 Ctrl.cipher = cipher:DES-EDE3-CBC
48 Ctrl.cipher = cipher:DES-EDE3-CBC
54 Ctrl.cipher = cipher:DES-EDE3-CBC
60 Ctrl.cipher = cipher:DES-EDE3-CBC
66 Ctrl.cipher = cipher:DES-EDE3-CBC
[all …]
/third_party/mbedtls/library/
Dssl_ciphersuites.c7 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
30 * Forward-secure non-PSK > forward-secure PSK > ECJPAKE > other non-PSK > other PSK
32 * ChaCha > AES-256 > Camellia-256 > ARIA-256 > AES-128 > Camellia-128 > ARIA-128
33 * 3. By cipher mode when relevant GCM > CCM > CBC > CCM_8
35 * 5. By key exchange/auth again: EC > non-EC
51 /* Chacha-Poly ephemeral suites */
56 /* All AES-256 ephemeral suites */
71 /* All CAMELLIA-256 ephemeral suites */
80 /* All ARIA-256 ephemeral suites */
88 /* All AES-128 ephemeral suites */
[all …]
/third_party/openssl/doc/man1/
Dopenssl-enc.pod.in2 {- OpenSSL::safe::output_do_not_edit_headers(); -}
6 openssl-enc - symmetric cipher routines
11 [B<-I<cipher>>]
12 [B<-help>]
13 [B<-list>]
14 [B<-ciphers>]
15 [B<-in> I<filename>]
16 [B<-out> I<filename>]
17 [B<-pass> I<arg>]
18 [B<-e>]
[all …]
Dopenssl.pod5 openssl - OpenSSL command line program
14 B<openssl> B<no->I<XXX> [ I<options> ]
43 (e.g., L<openssl-x509(1)>). The subcommand L<openssl-list(1)> may be used to list
46 The command B<no->I<XXX> tests whether a command of the
48 returns 0 (success) and prints B<no->I<XXX>; otherwise it returns 1
53 availability of ciphers in the B<openssl> program. (B<no->I<XXX> is
54 not able to detect pseudo-commands such as B<quit>,
55 B<list>, or B<no->I<XXX> itself.)
60 arguments and have a B<-config> option to specify that file.
62 storage area, which can be determined from the L<openssl-version(1)>
[all …]
/third_party/openssl/crypto/objects/
Dobjects.txt1 # CCITT was renamed to ITU-T quite some time ago
2 0 : ITU-T : itu-t
3 !Alias ccitt itu-t
7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t
8 !Alias joint-iso-ccitt joint-iso-itu-t
10 iso 2 : member-body : ISO Member Body
12 iso 3 : identified-organization
18 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5
19 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1
22 identified-organization 36 8 3 3 : x509ExtAdmission : Professional Information or basis for Admissi…
[all …]
/third_party/node/deps/openssl/openssl/crypto/objects/
Dobjects.txt1 # CCITT was renamed to ITU-T quite some time ago
2 0 : ITU-T : itu-t
3 !Alias ccitt itu-t
7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t
8 !Alias joint-iso-ccitt joint-iso-itu-t
10 iso 2 : member-body : ISO Member Body
12 iso 3 : identified-organization
18 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5
19 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1
22 identified-organization 36 8 3 3 : x509ExtAdmission : Professional Information or basis for Admissi…
[all …]
/third_party/openssl/providers/implementations/ciphers/
Dcipher_aes.c2 * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved.
11 * AES low level APIs are deprecated for public use, but still ok for internal
17 /* Dispatch functions for AES cipher modes ecb, cbc, ofb, cfb, ctr */
47 in->base.hw->copyctx(&ret->base, &in->base); in aes_dupctx()
53 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 256, 128, 0, block)
55 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 192, 128, 0, block)
57 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 128, 128, 0, block)
59 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 256, 128, 128, block)
61 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 192, 128, 128, block)
63 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 128, 128, 128, block)
[all …]
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/
Dcipher_aes.c2 * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved.
11 * AES low level APIs are deprecated for public use, but still ok for internal
17 /* Dispatch functions for AES cipher modes ecb, cbc, ofb, cfb, ctr */
47 in->base.hw->copyctx(&ret->base, &in->base); in aes_dupctx()
53 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 256, 128, 0, block)
55 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 192, 128, 0, block)
57 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 128, 128, 0, block)
59 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 256, 128, 128, block)
61 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 192, 128, 128, block)
63 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 128, 128, 128, block)
[all …]
/third_party/node/test/parallel/
Dtest-crypto-cipher-decipher.js15 ['Use Cipheriv for counter mode of aes-256-gcm'],
84 const instance = crypto.Cipher('aes-256-cbc', 'secret');
98 () => crypto.createCipher('aes-256-cbc', null),
105 () => crypto.createCipher('aes-256-cbc', 'secret').update(null),
112 () => crypto.createCipher('aes-256-cbc', 'secret').setAAD(null),
121 const instance = crypto.Decipher('aes-256-cbc', 'secret');
135 () => crypto.createDecipher('aes-256-cbc', 'secret').setAuthTag(null),
142 () => crypto.createDecipher('aes-256-cbc', null),
150 // https://github.com/nodejs/node-v0.x-archive/issues/4837.
152 const c = crypto.createCipher('aes-256-cbc', 'secret');
[all …]
Dtest-crypto-cipheriv-decipheriv.js15 const cipher = crypto.createCipheriv('des-ede3-cbc', key, iv);
19 const decipher = crypto.createDecipheriv('des-ede3-cbc', key, iv);
30 const cStream = crypto.createCipheriv('des-ede3-cbc', key, iv);
34 const dStream = crypto.createDecipheriv('des-ede3-cbc', key, iv);
49 const cipher = crypto.createCipheriv('des-ede3-cbc', key, iv);
53 const decipher = crypto.createDecipheriv('des-ede3-cbc', key, iv);
64 // AES Key Wrap test vector comes from RFC3394
67 const cipher = crypto.createCipheriv('id-aes128-wrap', key, iv);
73 const decipher = crypto.createDecipheriv('id-aes128-wrap', key, iv);
86 const instance = Cipheriv('des-ede3-cbc', key, iv);
[all …]
/third_party/node/deps/openssl/openssl/apps/
Dprogs.pl2 # Copyright 1995-2022 The OpenSSL Project Authors. All Rights Reserved.
18 die "Unrecognised option, must be -C or -H\n"
19 unless ($opt eq '-H' || $opt eq '-C');
22 my $cmdre = qr/^\s*int\s+([a-z_][a-z0-9_]*)_main\(\s*int\s+argc\s*,/;
24 my $YEAR = [gmtime($ENV{SOURCE_DATE_EPOCH} || time())]->[5] + 1900;
30 map { @{$unified_info{sources}->{$_}} }
32 && !$unified_info{attributes}->{sources}->{$apps_openssl}->{$_}->{nocheck} }
33 @{$unified_info{sources}->{$apps_openssl}};
46 if ($opt eq '-H') {
52 * Copyright 1995-$YEAR The OpenSSL Project Authors. All Rights Reserved.
[all …]
/third_party/openssl/apps/
Dprogs.pl2 # Copyright 1995-2022 The OpenSSL Project Authors. All Rights Reserved.
18 die "Unrecognised option, must be -C or -H\n"
19 unless ($opt eq '-H' || $opt eq '-C');
22 my $cmdre = qr/^\s*int\s+([a-z_][a-z0-9_]*)_main\(\s*int\s+argc\s*,/;
24 my $YEAR = [gmtime($ENV{SOURCE_DATE_EPOCH} || time())]->[5] + 1900;
30 map { @{$unified_info{sources}->{$_}} }
32 && !$unified_info{attributes}->{sources}->{$apps_openssl}->{$_}->{nocheck} }
33 @{$unified_info{sources}->{$apps_openssl}};
46 if ($opt eq '-H') {
52 * Copyright 1995-$YEAR The OpenSSL Project Authors. All Rights Reserved.
[all …]
/third_party/openssl/doc/man3/
DEVP_aes_128_gcm.pod50 - EVP AES cipher
65 The AES encryption algorithm for EVP.
94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit
95 shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB, and OFB.
100 Authenticated encryption with AES in CBC mode using SHA-1 as HMAC, with keys of
101 128 and 256 bits length respectively. The authentication tag is 160 bits long.
110 Authenticated encryption with AES in CBC mode using SHA256 (SHA-2, 256-bits) as
111 HMAC, with keys of 128 and 256 bits length respectively. The authentication tag
112 is 256 bits long.
128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode
[all …]
/third_party/node/deps/openssl/openssl/include/openssl/
Dobj_mac.h5 * Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved.
21 #define SN_itu_t "ITU-T"
22 #define LN_itu_t "itu-t"
34 #define SN_joint_iso_itu_t "JOINT-ISO-ITU-T"
35 #define LN_joint_iso_itu_t "joint-iso-itu-t"
42 #define SN_member_body "member-body"
47 #define SN_identified_organization "identified-organization"
56 #define SN_hmac_md5 "HMAC-MD5"
57 #define LN_hmac_md5 "hmac-md5"
61 #define SN_hmac_sha1 "HMAC-SHA1"
[all …]
/third_party/openssl/ohos_lite/include/openssl/
Dobj_mac.h5 * Copyright 2000-2022 The OpenSSL Project Authors. All Rights Reserved.
17 #define SN_itu_t "ITU-T"
18 #define LN_itu_t "itu-t"
30 #define SN_joint_iso_itu_t "JOINT-ISO-ITU-T"
31 #define LN_joint_iso_itu_t "joint-iso-itu-t"
38 #define SN_member_body "member-body"
43 #define SN_identified_organization "identified-organization"
47 #define SN_hmac_md5 "HMAC-MD5"
48 #define LN_hmac_md5 "hmac-md5"
52 #define SN_hmac_sha1 "HMAC-SHA1"
[all …]
/third_party/node/lib/internal/crypto/
Daes.js68 case 'AES-CBC': return `A${length}CBC`;
69 case 'AES-CTR': return `A${length}CTR`;
70 case 'AES-GCM': return `A${length}GCM`;
71 case 'AES-KW': return `A${length}KW`;
76 if (length !== 128 && length !== 192 && length !== 256)
82 case 'AES-CBC':
86 case 256: return kKeyVariantAES_CBC_256;
89 case 'AES-CTR':
93 case 256: return kKeyVariantAES_CTR_256;
96 case 'AES-GCM':
[all …]

12345678910>>...18