Searched refs:AEAD (Results 1 - 7 of 7) sorted by relevance
/fuchsia/zircon/system/utest/crypto/ |
H A D | aead.cpp | 24 OP(Test, AEAD, AES128_GCM) \ 25 OP(Test, AEAD, AES128_GCM_SIV) 29 EXPECT_ZX(AEAD::GetKeyLen(AEAD::kUninitialized, &key_len), ZX_ERR_INVALID_ARGS); 32 EXPECT_ZX(AEAD::GetIVLen(AEAD::kUninitialized, &iv_len), ZX_ERR_INVALID_ARGS); 38 EXPECT_ZX(AEAD::GetKeyLen(AEAD::kAES128_GCM, nullptr), ZX_ERR_INVALID_ARGS); 39 EXPECT_OK(AEAD::GetKeyLen(AEAD [all...] |
H A D | utils.cpp | 96 zx_status_t GenerateKeyMaterial(AEAD::Algorithm cipher, Secret* key, Bytes* iv) { 101 if ((rc = AEAD::GetKeyLen(cipher, &key_len)) != ZX_OK || 107 if ((rc = AEAD::GetIVLen(cipher, &iv_len)) != ZX_OK ||
|
H A D | utils.h | 72 // Fills the given |key|, |iv| with as much random data as indicated by |AEAD::GetKeyLen| and 73 //|AEAD::GetIVLen| for the given |aead|. |iv| may be null. 74 zx_status_t GenerateKeyMaterial(AEAD::Algorithm aead, Secret* key, Bytes* iv);
|
/fuchsia/zircon/system/ulib/crypto/ |
H A D | aead.cpp | 26 struct AEAD::Context { 37 zx_status_t GetAEAD(AEAD::Algorithm aead, const EVP_AEAD** out) { 39 case AEAD::kUninitialized: 43 case AEAD::kAES128_GCM: 47 case AEAD::kAES128_GCM_SIV: 61 zx_status_t AEAD::GetKeyLen(Algorithm algo, size_t* out) { 77 zx_status_t AEAD::GetIVLen(Algorithm algo, size_t* out) { 93 zx_status_t AEAD::GetTagLen(Algorithm algo, size_t* out) { 109 AEAD::AEAD() function in class:crypto::AEAD [all...] |
/fuchsia/zircon/system/ulib/crypto/include/crypto/ |
H A D | aead.h | 16 // |crypto::AEAD| is an authenticated encryption and decryption cipher. It differs from |Cipher| in 18 // as a result. The ciphertext produced by an AEAD is the same length as its plaintext, excluding 23 class AEAD final { 32 AEAD(); 33 ~AEAD(); 45 // Sets up the AEAD to use the algorithm indicated by |aead| to encrypt data using the given 51 // Sets up the AEAD to use the algorithm indicated by |aead| to decrypt data using the given 58 // |iv| used; |iv| will be resized and filled automatically. The AEAD tag is stored at the end 69 // Decryption can only succeed if the |iv| matches those produced by |Seal| and the AEAD tag is 83 DISALLOW_COPY_ASSIGN_AND_MOVE(AEAD); [all...] |
/fuchsia/zircon/system/ulib/zxcrypt/ |
H A D | volume.cpp | 47 // slots" The key slots are data cipher key material encrypted with a wrapping crypto::AEAD key 444 aead_ = crypto::AEAD::kAES128_GCM_SIV; 457 (rc = crypto::AEAD::GetTagLen(aead_, &tag_len)) != ZX_OK || 483 if ((rc = crypto::AEAD::GetKeyLen(aead_, &len)) != ZX_OK || 490 if ((rc = crypto::AEAD::GetIVLen(aead_, &len)) != ZX_OK || 502 aead_ = crypto::AEAD::kUninitialized; 598 crypto::AEAD aead; 673 crypto::AEAD aead;
|
/fuchsia/zircon/system/ulib/zxcrypt/include/zxcrypt/ |
H A D | volume.h | 186 // A copy of the entire header, used as AAD for the AEAD. 189 // The algorithm, lengths, and buffers for the key-wrapping AEAD. 190 crypto::AEAD::Algorithm aead_;
|
Completed in 103 milliseconds