| /third_party/mbedtls/tests/suites/ |
| D | test_suite_aes.cbc.data | 1 AES-128-CBC Encrypt NIST KAT #1 4 AES-128-CBC Encrypt NIST KAT #2 7 AES-128-CBC Encrypt NIST KAT #3 10 AES-128-CBC Encrypt NIST KAT #4 13 AES-128-CBC Encrypt NIST KAT #5 16 AES-128-CBC Encrypt NIST KAT #6 19 AES-128-CBC Encrypt NIST KAT #7 22 AES-128-CBC Encrypt NIST KAT #8 25 AES-128-CBC Encrypt NIST KAT #9 28 AES-128-CBC Encrypt NIST KAT #10 [all …]
|
| D | test_suite_cipher.aes.data | 1 AES-128 CBC - Decrypt empty buffer 5 AES-128 XTS - Decrypt empty buffer 9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding 11 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:0:MBEDTLS_PADDING_PKCS7 13 AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding 15 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:1:MBEDTLS_PADDING_PKCS7 17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding 19 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:2:MBEDTLS_PADDING_PKCS7 21 AES-128 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding 23 enc_dec_buf:MBEDTLS_CIPHER_AES_128_CBC:"AES-128-CBC":128:7:MBEDTLS_PADDING_PKCS7 [all …]
|
| D | test_suite_ssl.data | 52 Test mock non-blocking TCP connection 58 Test mock non-blocking TCP connection (interleaving) 61 Message queue - sanity 64 Message queue - basic test 67 Message queue - overflow/underflow 70 Message queue - interleaved 73 Message queue - insufficient buffer 76 Message transport mock - uninitialized structures 79 Message transport mock - basic test 82 Message transport mock - queue overflow/underflow [all …]
|
| /third_party/openssl/doc/man7/ |
| D | EVP_CIPHER-AES.pod | 5 EVP_CIPHER-AES - The AES EVP_CIPHER implementations 9 Support for AES symmetric encryption using the B<EVP_CIPHER> API. 18 =item "AES-128-CBC", "AES-192-CBC" and "AES-256-CBC" 20 =item "AES-128-CBC-CTS", "AES-192-CBC-CTS" and "AES-256-CBC-CTS" 22 =item "AES-128-CFB", "AES-192-CFB", "AES-256-CFB", 23 "AES-128-CFB1", "AES-192-CFB1", "AES-256-CFB1", 24 "AES-128-CFB8", "AES-192-CFB8" and "AES-256-CFB8" 26 =item "AES-128-CTR", "AES-192-CTR" and "AES-256-CTR" 28 =item "AES-128-ECB", "AES-192-ECB" and "AES-256-ECB" 30 =item "AES-192-OFB", "AES-128-OFB" and "AES-256-OFB" [all …]
|
| /third_party/openssl/providers/implementations/include/prov/ |
| D | names.h | 22 * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] 31 * algorithms together, e.g. MD5-SHA1. 34 * with different sizes (e.g. AES-128-CBC, AES-256-CBC) 39 /*- 41 * ----------------- 43 #define PROV_NAMES_AES_256_ECB "AES-256-ECB:2.16.840.1.101.3.4.1.41" 44 #define PROV_NAMES_AES_192_ECB "AES-192-ECB:2.16.840.1.101.3.4.1.21" 45 #define PROV_NAMES_AES_128_ECB "AES-128-ECB:2.16.840.1.101.3.4.1.1" 46 #define PROV_NAMES_AES_256_CBC "AES-256-CBC:AES256:2.16.840.1.101.3.4.1.42" 47 #define PROV_NAMES_AES_192_CBC "AES-192-CBC:AES192:2.16.840.1.101.3.4.1.22" [all …]
|
| /third_party/node/deps/openssl/openssl/providers/implementations/include/prov/ |
| D | names.h | 22 * ALGNAME[VERSION?][-SUBNAME[VERSION?]?][-SIZE?][-MODE?] 31 * algorithms together, e.g. MD5-SHA1. 34 * with different sizes (e.g. AES-128-CBC, AES-256-CBC) 39 /*- 41 * ----------------- 43 #define PROV_NAMES_AES_256_ECB "AES-256-ECB:2.16.840.1.101.3.4.1.41" 44 #define PROV_NAMES_AES_192_ECB "AES-192-ECB:2.16.840.1.101.3.4.1.21" 45 #define PROV_NAMES_AES_128_ECB "AES-128-ECB:2.16.840.1.101.3.4.1.1" 46 #define PROV_NAMES_AES_256_CBC "AES-256-CBC:AES256:2.16.840.1.101.3.4.1.42" 47 #define PROV_NAMES_AES_192_CBC "AES-192-CBC:AES192:2.16.840.1.101.3.4.1.22" [all …]
|
| /third_party/openssl/test/recipes/30-test_evp_data/ |
| D | evpciph_aes_common.txt | 2 # Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved. 16 Title = AES (from FIPS-197 test vectors) 18 Cipher = AES-128-ECB 24 # AES 192 ECB tests (from FIPS-197 test vectors, encrypt) 26 Cipher = AES-192-ECB 33 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt) 35 Cipher = AES-256-ECB 42 # AES 128 ECB tests (from NIST test vectors, encrypt) 44 #AES-128-ECB:00000000000000000000000000000000::00000000000000000000000000000000:C34C052CC0DA8D73451… 46 # AES 128 ECB tests (from NIST test vectors, decrypt) [all …]
|
| D | evpciph_aes_stitched.txt | 1 Title = AES-128-CBC-HMAC-SHA1 test vectors 3 Cipher = AES-128-CBC-HMAC-SHA1 13 Cipher = AES-128-CBC-HMAC-SHA1 23 Cipher = AES-128-CBC-HMAC-SHA1 33 Title = AES-256-CBC-HMAC-SHA1 test vectors 35 Cipher = AES-256-CBC-HMAC-SHA1 45 Cipher = AES-256-CBC-HMAC-SHA1 55 Cipher = AES-256-CBC-HMAC-SHA1 64 Title = AES-128-CBC-HMAC-SHA256 test vectors 66 Cipher = AES-128-CBC-HMAC-SHA256 [all …]
|
| D | evpciph_aes_cts.txt | 2 # Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved. 10 # These have an IV of all zeros, for a 128 bit AES key. 12 Title = AES CBC Test vectors 14 #------------------------------------------------------ 18 Cipher = AES-128-CBC 25 Cipher = AES-128-CBC 32 Cipher = AES-128-CBC 38 Title = AES CBC CTS1 Test vectors 40 #------------------------------------------------------ 42 # where aligned blocks are the same as CBC mode, and partial lengths [all …]
|
| D | evpkdf_krb5.txt | 2 # Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved. 18 Ctrl.cipher = cipher:DES-EDE3-CBC 24 Ctrl.cipher = cipher:DES-EDE3-CBC 30 Ctrl.cipher = cipher:DES-EDE3-CBC 36 Ctrl.cipher = cipher:DES-EDE3-CBC 42 Ctrl.cipher = cipher:DES-EDE3-CBC 48 Ctrl.cipher = cipher:DES-EDE3-CBC 54 Ctrl.cipher = cipher:DES-EDE3-CBC 60 Ctrl.cipher = cipher:DES-EDE3-CBC 66 Ctrl.cipher = cipher:DES-EDE3-CBC [all …]
|
| /third_party/mbedtls/library/ |
| D | ssl_ciphersuites.c | 7 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 30 * Forward-secure non-PSK > forward-secure PSK > ECJPAKE > other non-PSK > other PSK 32 * ChaCha > AES-256 > Camellia-256 > ARIA-256 > AES-128 > Camellia-128 > ARIA-128 33 * 3. By cipher mode when relevant GCM > CCM > CBC > CCM_8 35 * 5. By key exchange/auth again: EC > non-EC 51 /* Chacha-Poly ephemeral suites */ 56 /* All AES-256 ephemeral suites */ 71 /* All CAMELLIA-256 ephemeral suites */ 80 /* All ARIA-256 ephemeral suites */ 88 /* All AES-128 ephemeral suites */ [all …]
|
| /third_party/openssl/doc/man1/ |
| D | openssl-enc.pod.in | 2 {- OpenSSL::safe::output_do_not_edit_headers(); -} 6 openssl-enc - symmetric cipher routines 11 [B<-I<cipher>>] 12 [B<-help>] 13 [B<-list>] 14 [B<-ciphers>] 15 [B<-in> I<filename>] 16 [B<-out> I<filename>] 17 [B<-pass> I<arg>] 18 [B<-e>] [all …]
|
| D | openssl.pod | 5 openssl - OpenSSL command line program 14 B<openssl> B<no->I<XXX> [ I<options> ] 43 (e.g., L<openssl-x509(1)>). The subcommand L<openssl-list(1)> may be used to list 46 The command B<no->I<XXX> tests whether a command of the 48 returns 0 (success) and prints B<no->I<XXX>; otherwise it returns 1 53 availability of ciphers in the B<openssl> program. (B<no->I<XXX> is 54 not able to detect pseudo-commands such as B<quit>, 55 B<list>, or B<no->I<XXX> itself.) 60 arguments and have a B<-config> option to specify that file. 62 storage area, which can be determined from the L<openssl-version(1)> [all …]
|
| /third_party/openssl/crypto/objects/ |
| D | objects.txt | 1 # CCITT was renamed to ITU-T quite some time ago 2 0 : ITU-T : itu-t 3 !Alias ccitt itu-t 7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t 8 !Alias joint-iso-ccitt joint-iso-itu-t 10 iso 2 : member-body : ISO Member Body 12 iso 3 : identified-organization 18 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5 19 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1 22 identified-organization 36 8 3 3 : x509ExtAdmission : Professional Information or basis for Admissi… [all …]
|
| /third_party/node/deps/openssl/openssl/crypto/objects/ |
| D | objects.txt | 1 # CCITT was renamed to ITU-T quite some time ago 2 0 : ITU-T : itu-t 3 !Alias ccitt itu-t 7 2 : JOINT-ISO-ITU-T : joint-iso-itu-t 8 !Alias joint-iso-ccitt joint-iso-itu-t 10 iso 2 : member-body : ISO Member Body 12 iso 3 : identified-organization 18 identified-organization 6 1 5 5 8 1 1 : HMAC-MD5 : hmac-md5 19 identified-organization 6 1 5 5 8 1 2 : HMAC-SHA1 : hmac-sha1 22 identified-organization 36 8 3 3 : x509ExtAdmission : Professional Information or basis for Admissi… [all …]
|
| /third_party/openssl/providers/implementations/ciphers/ |
| D | cipher_aes.c | 2 * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. 11 * AES low level APIs are deprecated for public use, but still ok for internal 17 /* Dispatch functions for AES cipher modes ecb, cbc, ofb, cfb, ctr */ 47 in->base.hw->copyctx(&ret->base, &in->base); in aes_dupctx() 53 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 256, 128, 0, block) 55 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 192, 128, 0, block) 57 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 128, 128, 0, block) 59 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 256, 128, 128, block) 61 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 192, 128, 128, block) 63 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 128, 128, 128, block) [all …]
|
| /third_party/node/deps/openssl/openssl/providers/implementations/ciphers/ |
| D | cipher_aes.c | 2 * Copyright 2019-2020 The OpenSSL Project Authors. All Rights Reserved. 11 * AES low level APIs are deprecated for public use, but still ok for internal 17 /* Dispatch functions for AES cipher modes ecb, cbc, ofb, cfb, ctr */ 47 in->base.hw->copyctx(&ret->base, &in->base); in aes_dupctx() 53 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 256, 128, 0, block) 55 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 192, 128, 0, block) 57 IMPLEMENT_generic_cipher(aes, AES, ecb, ECB, 0, 128, 128, 0, block) 59 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 256, 128, 128, block) 61 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 192, 128, 128, block) 63 IMPLEMENT_generic_cipher(aes, AES, cbc, CBC, 0, 128, 128, 128, block) [all …]
|
| /third_party/node/test/parallel/ |
| D | test-crypto-cipher-decipher.js | 15 ['Use Cipheriv for counter mode of aes-256-gcm'], 84 const instance = crypto.Cipher('aes-256-cbc', 'secret'); 98 () => crypto.createCipher('aes-256-cbc', null), 105 () => crypto.createCipher('aes-256-cbc', 'secret').update(null), 112 () => crypto.createCipher('aes-256-cbc', 'secret').setAAD(null), 121 const instance = crypto.Decipher('aes-256-cbc', 'secret'); 135 () => crypto.createDecipher('aes-256-cbc', 'secret').setAuthTag(null), 142 () => crypto.createDecipher('aes-256-cbc', null), 150 // https://github.com/nodejs/node-v0.x-archive/issues/4837. 152 const c = crypto.createCipher('aes-256-cbc', 'secret'); [all …]
|
| D | test-crypto-cipheriv-decipheriv.js | 15 const cipher = crypto.createCipheriv('des-ede3-cbc', key, iv); 19 const decipher = crypto.createDecipheriv('des-ede3-cbc', key, iv); 30 const cStream = crypto.createCipheriv('des-ede3-cbc', key, iv); 34 const dStream = crypto.createDecipheriv('des-ede3-cbc', key, iv); 49 const cipher = crypto.createCipheriv('des-ede3-cbc', key, iv); 53 const decipher = crypto.createDecipheriv('des-ede3-cbc', key, iv); 64 // AES Key Wrap test vector comes from RFC3394 67 const cipher = crypto.createCipheriv('id-aes128-wrap', key, iv); 73 const decipher = crypto.createDecipheriv('id-aes128-wrap', key, iv); 86 const instance = Cipheriv('des-ede3-cbc', key, iv); [all …]
|
| /third_party/node/deps/openssl/openssl/apps/ |
| D | progs.pl | 2 # Copyright 1995-2022 The OpenSSL Project Authors. All Rights Reserved. 18 die "Unrecognised option, must be -C or -H\n" 19 unless ($opt eq '-H' || $opt eq '-C'); 22 my $cmdre = qr/^\s*int\s+([a-z_][a-z0-9_]*)_main\(\s*int\s+argc\s*,/; 24 my $YEAR = [gmtime($ENV{SOURCE_DATE_EPOCH} || time())]->[5] + 1900; 30 map { @{$unified_info{sources}->{$_}} } 32 && !$unified_info{attributes}->{sources}->{$apps_openssl}->{$_}->{nocheck} } 33 @{$unified_info{sources}->{$apps_openssl}}; 46 if ($opt eq '-H') { 52 * Copyright 1995-$YEAR The OpenSSL Project Authors. All Rights Reserved. [all …]
|
| /third_party/openssl/apps/ |
| D | progs.pl | 2 # Copyright 1995-2022 The OpenSSL Project Authors. All Rights Reserved. 18 die "Unrecognised option, must be -C or -H\n" 19 unless ($opt eq '-H' || $opt eq '-C'); 22 my $cmdre = qr/^\s*int\s+([a-z_][a-z0-9_]*)_main\(\s*int\s+argc\s*,/; 24 my $YEAR = [gmtime($ENV{SOURCE_DATE_EPOCH} || time())]->[5] + 1900; 30 map { @{$unified_info{sources}->{$_}} } 32 && !$unified_info{attributes}->{sources}->{$apps_openssl}->{$_}->{nocheck} } 33 @{$unified_info{sources}->{$apps_openssl}}; 46 if ($opt eq '-H') { 52 * Copyright 1995-$YEAR The OpenSSL Project Authors. All Rights Reserved. [all …]
|
| /third_party/openssl/doc/man3/ |
| D | EVP_aes_128_gcm.pod | 50 - EVP AES cipher 65 The AES encryption algorithm for EVP. 94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit 95 shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB, and OFB. 100 Authenticated encryption with AES in CBC mode using SHA-1 as HMAC, with keys of 101 128 and 256 bits length respectively. The authentication tag is 160 bits long. 110 Authenticated encryption with AES in CBC mode using SHA256 (SHA-2, 256-bits) as 111 HMAC, with keys of 128 and 256 bits length respectively. The authentication tag 112 is 256 bits long. 128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode [all …]
|
| /third_party/node/deps/openssl/openssl/include/openssl/ |
| D | obj_mac.h | 5 * Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved. 21 #define SN_itu_t "ITU-T" 22 #define LN_itu_t "itu-t" 34 #define SN_joint_iso_itu_t "JOINT-ISO-ITU-T" 35 #define LN_joint_iso_itu_t "joint-iso-itu-t" 42 #define SN_member_body "member-body" 47 #define SN_identified_organization "identified-organization" 56 #define SN_hmac_md5 "HMAC-MD5" 57 #define LN_hmac_md5 "hmac-md5" 61 #define SN_hmac_sha1 "HMAC-SHA1" [all …]
|
| /third_party/openssl/ohos_lite/include/openssl/ |
| D | obj_mac.h | 5 * Copyright 2000-2022 The OpenSSL Project Authors. All Rights Reserved. 17 #define SN_itu_t "ITU-T" 18 #define LN_itu_t "itu-t" 30 #define SN_joint_iso_itu_t "JOINT-ISO-ITU-T" 31 #define LN_joint_iso_itu_t "joint-iso-itu-t" 38 #define SN_member_body "member-body" 43 #define SN_identified_organization "identified-organization" 47 #define SN_hmac_md5 "HMAC-MD5" 48 #define LN_hmac_md5 "hmac-md5" 52 #define SN_hmac_sha1 "HMAC-SHA1" [all …]
|
| /third_party/node/lib/internal/crypto/ |
| D | aes.js | 68 case 'AES-CBC': return `A${length}CBC`; 69 case 'AES-CTR': return `A${length}CTR`; 70 case 'AES-GCM': return `A${length}GCM`; 71 case 'AES-KW': return `A${length}KW`; 76 if (length !== 128 && length !== 192 && length !== 256) 82 case 'AES-CBC': 86 case 256: return kKeyVariantAES_CBC_256; 89 case 'AES-CTR': 93 case 256: return kKeyVariantAES_CTR_256; 96 case 'AES-GCM': [all …]
|