/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_wrp.c | 323 IMPLEMENT_cipher(wrap, wrap, WRAP, WRAP_FLAGS, 256, 64, AES_WRAP_NOPAD_IVLEN * 8); 324 IMPLEMENT_cipher(wrap, wrap, WRAP, WRAP_FLAGS, 192, 64, AES_WRAP_NOPAD_IVLEN * 8); 325 IMPLEMENT_cipher(wrap, wrap, WRAP, WRAP_FLAGS, 128, 64, AES_WRAP_NOPAD_IVLEN * 8); 326 IMPLEMENT_cipher(wrap, wrappad, WRAP, WRAP_FLAGS, 256, 64, AES_WRAP_PAD_IVLEN * 8); 327 IMPLEMENT_cipher(wrap, wrappad, WRAP, WRAP_FLAGS, 192, 64, AES_WRAP_PAD_IVLEN * 8); 328 IMPLEMENT_cipher(wrap, wrappad, WRAP, WRAP_FLAGS, 128, 64, AES_WRAP_PAD_IVLEN * 8); 330 IMPLEMENT_cipher(wrap, wrapinv, WRAP, WRAP_FLAGS_INV, 256, 64, AES_WRAP_NOPAD_IVLEN * 8); 331 IMPLEMENT_cipher(wrap, wrapinv, WRAP, WRAP_FLAGS_INV, 192, 64, AES_WRAP_NOPAD_IVLEN * 8); 332 IMPLEMENT_cipher(wrap, wrapinv, WRAP, WRAP_FLAGS_INV, 128, 64, AES_WRAP_NOPAD_IVLEN * 8); 333 IMPLEMENT_cipher(wrap, wrappadinv, WRAP, WRAP_FLAGS_INV, 256, 64, AES_WRAP_PAD_IVLEN * 8); [all …]
|
H A D | cipher_tdes_wrap_hw.c | 20 PROV_CIPHER_HW_tdes_mode(wrap, cbc)
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_aes_wrap.txt | 11 # AES wrap tests from RFC3394 12 Cipher = id-aes128-wrap 17 Cipher = id-aes192-wrap 22 Cipher = id-aes256-wrap 27 Cipher = id-aes192-wrap 32 Cipher = id-aes256-wrap 51 Cipher = id-aes256-wrap 58 # AES wrap tests from RFC5649 59 Cipher = id-aes192-wrap-pad 64 Cipher = id-aes192-wrap-pad [all …]
|
H A D | evpkdf_x942.txt | 19 Ctrl.cekalg = cekalg:id-aes128-wrap 25 Ctrl.cekalg = cekalg:id-aes256-wrap 34 Ctrl.cekalg = cekalg:id-aes256-wrap 41 Ctrl.cekalg = cekalg:id-aes256-wrap 49 Ctrl.cekalg = cekalg:id-aes256-wrap 57 Ctrl.cekalg = cekalg:id-aes256-wrap 64 Ctrl.cekalg = cekalg:id-aes256-wrap 71 Ctrl.cekalg = cekalg:id-aes256-wrap 85 Ctrl.cekalg = cekalg:id-aes128-wrap 97 Ctrl.cekalg = cekalg:id-aes128-wrap [all …]
|
H A D | evpmac_poly1305.txt | 264 # wrap 2^130-5 271 # wrap 2^128
|
/openssl/util/ |
H A D | build.info | 5 SCRIPTS{noinst}=wrap.pl 6 SOURCE[wrap.pl]=wrap.pl.in 7 DEPEND[wrap.pl]=../configdata.pm
|
/openssl/providers/common/der/ |
H A D | wrap.asn1 | 24 id-aes128-wrap OBJECT IDENTIFIER ::= { aes 5 } 25 id-aes192-wrap OBJECT IDENTIFIER ::= { aes 25 } 26 id-aes256-wrap OBJECT IDENTIFIER ::= { aes 45 }
|
H A D | der_wrap_gen.c.in | 16 $OUT = oids_to_c::process_leaves('providers/common/der/wrap.asn1',
|
H A D | build.info | 79 DEPEND[$DER_WRAP_GEN]=oids_to_c.pm wrap.asn1 83 DEPEND[$DER_WRAP_H]=oids_to_c.pm wrap.asn1
|
/openssl/ |
H A D | NOTES-VALGRIND.md | 30 programs. The default wrapper (`util/wrap.pl`) initializes the environment 35 "$(/bin/pwd)/util/wrap.pl valgrind --error-exitcode=1 --leak-check=full -q" 65 $ make test EXE_SHELL="$(/bin/pwd)/util/wrap.pl valgrind --error-exitcode=1 \ 71 $ make test VERBOSE=1 TESTS=test_test EXE_SHELL="$(/bin/pwd)/util/wrap.pl \
|
H A D | README-FIPS.md | 133 $ ./util/wrap.pl -fips apps/openssl list -provider-path providers \ 148 $./util/wrap.pl -fips apps/openssl list -provider-path providers \
|
/openssl/apps/ |
H A D | enc.c | 143 int wrap = 0; in enc_main() local 336 wrap = 1; in enc_main() 606 && wrap == 0) { in enc_main() 633 if (wrap == 1) in enc_main() 647 (hiv == NULL && wrap == 1 ? NULL : iv), enc)) { in enc_main()
|
/openssl/doc/man3/ |
H A D | EVP_aes_128_gcm.pod | 140 AES key wrap with 128, 192 and 256 bit keys, as according to RFC 3394 section 141 2.2.1 ("wrap") and RFC 5649 section 4.1 ("wrap with padding") respectively.
|
H A D | EVP_des_cbc.pod | 84 Triple-DES key wrap according to RFC 3217 Section 3.
|
H A D | CMS_add1_recipient_cert.pod | 58 If B<nid> is set to B<NID_undef> then an AES wrap algorithm will be used
|
H A D | OSSL_trace_enabled.pod | 107 Using OSSL_trace_begin() and OSSL_trace_end() to wrap tracing sections 124 used as follows to wrap a trace section:
|
/openssl/providers/common/include/prov/ |
H A D | der_wrap.h.in | 16 $OUT = oids_to_c::process_leaves('providers/common/der/wrap.asn1',
|
/openssl/doc/man1/ |
H A D | openssl-cms.pod.in | 69 [B<-wrap> I<cipher>] 70 [B<-aes128-wrap>] 71 [B<-aes192-wrap>] 72 [B<-aes256-wrap>] 73 [B<-des3-wrap>] 337 with B<-encrypt> or B<-decrypt> the supplied key is used to wrap or unwrap the 421 =item B<-wrap> I<cipher> 423 Cipher algorithm to use for key wrap when encrypting the message using Key 425 wrap. 427 =item B<-aes128-wrap>, B<-aes192-wrap>, B<-aes256-wrap>, B<-des3-wrap> [all …]
|
H A D | openssl-enc.pod.in | 320 The '*-wrap' ciphers require the input to be a multiple of 8 bytes long, 322 The '*-wrap-pad' ciphers allow any input length. 412 aes-[128|192|256]-wrap key wrapping using 128/192/256 bit AES 413 aes-[128|192|256]-wrap-pad key wrapping with padding using 128/192/256 bit AES 465 openssl enc -e -a -id-aes128-wrap-pad -K 000102030405060708090A0B0C0D0E0F -in file.bin 467 openssl aes128-wrap-pad -e -a -K 000102030405060708090A0B0C0D0E0F -in file.bin
|
/openssl/.github/workflows/ |
H A D | provider-compatibility.yml | 88 ./util/wrap.pl -fips apps/openssl list -provider-path providers \ 166 ./util/wrap.pl -fips apps/openssl list -provider-path providers \ 244 ./util/wrap.pl -fips apps/openssl list -provider-path providers \
|
H A D | prov-compat-label.yml | 84 ./util/wrap.pl -fips apps/openssl list -provider-path providers \ 167 ./util/wrap.pl -fips apps/openssl list -provider-path providers \ 253 ./util/wrap.pl -fips apps/openssl list -provider-path providers \
|
/openssl/crypto/objects/ |
H A D | objects.txt | 1025 aes 5 : id-aes128-wrap 1028 aes 8 : id-aes128-wrap-pad 1036 aes 25 : id-aes192-wrap 1039 aes 28 : id-aes192-wrap-pad 1047 aes 45 : id-aes256-wrap 1050 aes 48 : id-aes256-wrap-pad 1502 id-tc26-algorithms 7 : id-tc26-wrap 1503 id-tc26-wrap 1 : id-tc26-wrap-gostr3412-2015-magma 1505 id-tc26-wrap 2 : id-tc26-wrap-gostr3412-2015-kuznyechik 1562 1 2 392 200011 61 1 1 3 2 : id-camellia128-wrap [all …]
|
/openssl/doc/internal/man3/ |
H A D | evp_keymgmt_newdata.pod | 40 function they wrap around.
|
/openssl/include/openssl/ |
H A D | evp.h | 1916 void EVP_KEM_free(EVP_KEM *wrap); 1917 int EVP_KEM_up_ref(EVP_KEM *wrap); 1918 OSSL_PROVIDER *EVP_KEM_get0_provider(const EVP_KEM *wrap); 1921 int EVP_KEM_is_a(const EVP_KEM *wrap, const char *name); 1922 const char *EVP_KEM_get0_name(const EVP_KEM *wrap); 1923 const char *EVP_KEM_get0_description(const EVP_KEM *wrap); 1925 void (*fn)(EVP_KEM *wrap, void *arg), void *arg); 1926 int EVP_KEM_names_do_all(const EVP_KEM *wrap,
|
/openssl/doc/man7/ |
H A D | evp.pod | 54 encryption is an expensive operation, normally you would wrap
|