Searched refs:cipher (Results 126 - 150 of 349) sorted by relevance

1234567891011>>

/external/dropbear/libtomcrypt/src/encauth/gcm/
H A Dgcm_process.c48 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) {
65 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) {
94 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) {
112 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) {
130 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) {
/external/openssl/crypto/pem/
H A Dpem_seal.c101 EVP_CIPHER_CTX_init(&ctx->cipher);
102 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk);
136 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i);
166 EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i);
179 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
/external/openssl/apps/
H A Denc.c122 const EVP_CIPHER *cipher=NULL,*c; local
152 cipher=EVP_get_cipherbyname(pname);
154 if (!do_zlib && !base64 && (cipher == NULL)
157 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
160 BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
290 cipher=c;
293 cipher=NULL;
422 if ((str == NULL) && (cipher != NULL) && (hkey == NULL))
429 OBJ_nid2ln(EVP_CIPHER_nid(cipher)),
508 if (cipher !
[all...]
H A Dsmime.c98 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_des_ede3_cbc();
154 cipher = EVP_des_cbc();
158 cipher = EVP_seed_cbc();
162 cipher = EVP_rc2_40_cbc();
164 cipher = EVP_rc2_cbc();
166 cipher = EVP_rc2_64_cbc();
170 cipher = EVP_aes_128_cbc();
172 cipher = EVP_aes_192_cbc();
174 cipher
[all...]
H A Dpkey.c75 const EVP_CIPHER *cipher = NULL; local
172 cipher = EVP_get_cipherbyname(*args + 1);
173 if (!cipher)
175 BIO_printf(bio_err, "Unknown cipher %s\n",
246 PEM_write_bio_PrivateKey(out, pkey, cipher,
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/
H A DCCMBlockCipher.java24 private BlockCipher cipher; field in class:CCMBlockCipher
37 * @param c the block cipher to be used.
41 this.cipher = c;
47 throw new IllegalArgumentException("cipher required with a block size of 16.");
52 * return the underlying block cipher that we are wrapping.
54 * @return the underlying block cipher that we are wrapping.
58 return cipher;
93 return cipher.getAlgorithmName() + "/CCM";
127 cipher.reset();
168 throw new IllegalStateException("CCM cipher unitialize
[all...]
H A DGCMBlockCipher.java26 private BlockCipher cipher; field in class:GCMBlockCipher
57 "cipher required with a block size of " + BLOCK_SIZE + ".");
66 this.cipher = c;
72 return cipher;
77 return cipher.getAlgorithmName() + "/GCM";
131 cipher.init(true, keyParam);
138 cipher.processBlock(ZEROES, 0, H, 0);
269 cipher.processBlock(J0, 0, tag, 0);
323 cipher.reset();
341 cipher
[all...]
/external/chromium/crypto/
H A Dsymmetric_key_nss.cc86 CK_MECHANISM_TYPE cipher = local
95 ScopedPK11Slot slot(PK11_GetBestSlot(cipher, NULL));
102 PK11SymKey* sym_key = PK11_ImportSymKey(slot.get(), cipher, PK11_OriginUnwrap,
/external/openssh/
H A DAndroid.mk10 canohost.c channels.c cipher.c cipher-acss.c cipher-aes.c \
11 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \
H A Dsshconnect1.c38 #include "cipher.h"
418 if (options.cipher == SSH_CIPHER_NONE)
453 if (options.cipher == SSH_CIPHER_NONE)
616 if (options.cipher == SSH_CIPHER_NOT_SET) {
618 options.cipher = ssh_cipher_default;
619 } else if (options.cipher == SSH_CIPHER_INVALID ||
620 !(cipher_mask_ssh1(1) & (1 << options.cipher))) {
621 logit("No valid SSH1 cipher, using %.100s instead.",
623 options.cipher = ssh_cipher_default;
625 /* Check that the selected cipher i
[all...]
/external/dropbear/libtomcrypt/demos/
H A Dencrypt.c18 printf("Usage: %s [-d](ecrypt) cipher infile outfile\nCiphers:\n", name);
103 char *infile, *outfile, *cipher; local
116 cipher = argv[2];
121 cipher = argv[1];
139 cipher_idx = find_cipher(cipher);
141 printf("Invalid cipher entered on command line.\n");
/external/dropbear/libtomcrypt/src/headers/
H A Dtomcrypt_cipher.h191 /** A block cipher ECB structure */
193 /** The index of the cipher chosen */
194 int cipher, member in struct:__anon4550
195 /** The block size of the given cipher */
203 /** A block cipher CFB structure */
205 /** The index of the cipher chosen */
206 int cipher, member in struct:__anon4551
207 /** The block size of the given cipher */
221 /** A block cipher OFB structure */
223 /** The index of the cipher chose
224 int cipher, member in struct:__anon4552
240 int cipher, member in struct:__anon4553
255 int cipher, member in struct:__anon4554
276 int cipher; member in struct:__anon4555
301 int cipher, member in struct:__anon4556
[all...]
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/
H A DCTRMode.java5 package ch.ethz.ssh2.crypto.cipher;
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_common.h178 tls_cipher cipher; member in struct:tls_cipher_suite
188 tls_cipher cipher; member in struct:tls_cipher_data
208 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
209 int tls_server_key_exchange_allowed(tls_cipher cipher);
H A Dtlsv1_client.c430 * tlsv1_client_get_cipher - Get current cipher name
432 * @buf: Buffer for the cipher name
436 * Get the name of the currently used cipher.
441 char *cipher; local
445 cipher = "RC4-MD5";
448 cipher = "RC4-SHA";
451 cipher = "DES-CBC-SHA";
454 cipher = "DES-CBC3-SHA";
457 cipher = "ADH-AES-128-SHA";
460 cipher
[all...]
H A Dtlsv1_server.c421 * tlsv1_server_get_cipher - Get current cipher name
423 * @buf: Buffer for the cipher name
427 * Get the name of the currently used cipher.
432 char *cipher; local
436 cipher = "RC4-MD5";
439 cipher = "RC4-SHA";
442 cipher = "DES-CBC-SHA";
445 cipher = "DES-CBC3-SHA";
448 cipher = "ADH-AES-128-SHA";
451 cipher
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_common.h216 tls_cipher cipher; member in struct:tls_cipher_suite
226 tls_cipher cipher; member in struct:tls_cipher_data
249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
250 int tls_server_key_exchange_allowed(tls_cipher cipher);
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_common.h216 tls_cipher cipher; member in struct:tls_cipher_suite
226 tls_cipher cipher; member in struct:tls_cipher_data
249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
250 int tls_server_key_exchange_allowed(tls_cipher cipher);
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_common.h216 tls_cipher cipher; member in struct:tls_cipher_suite
226 tls_cipher cipher; member in struct:tls_cipher_data
249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
250 int tls_server_key_exchange_allowed(tls_cipher cipher);
/external/openssl/crypto/pkcs7/
H A Dbio_ber.c111 BIO_TYPE_CIPHER,"cipher",
302 EVP_CipherUpdate(&(ctx->cipher),
342 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL,
343 ctx->cipher.berrypt);
379 ret=EVP_CipherFinal_ex(&(ctx->cipher),
404 memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher));
441 memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX));
461 EVP_CipherInit_ex(&(ctx->cipher),
[all...]
/external/openssl/crypto/engine/
H A Deng_openssl.c113 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
215 * we're asked for a cipher we don't support (should not happen).
218 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler.
277 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument
280 if(!cipher)
286 /* We are being asked for a specific cipher */
288 *cipher = &test_r4_cipher;
290 *cipher = &test_r4_40_cipher;
297 *cipher = NULL;
H A Deng_cryptodev.c101 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
257 sess.cipher = ciphers[i].id;
298 sess.cipher = 0;
377 if ((inl % ctx->cipher->block_size) != 0)
391 if (ctx->cipher->iv_len) {
394 iiv = in + inl - ctx->cipher->iv_len;
395 memcpy(save_iv, iiv, ctx->cipher->iv_len);
407 if (ctx->cipher->iv_len) {
409 iiv = out + inl - ctx->cipher->iv_len;
412 memcpy(ctx->iv, iiv, ctx->cipher
423 int cipher = -1, i; local
609 cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) argument
[all...]
/external/srtp/
H A DMakefile75 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \
76 crypto/cipher/aes.o crypto/cipher/aes_icm.o \
77 crypto/cipher/aes_cbc.o
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.core.runtime.compatibility.auth_3.2.200.v20100517.jar ... .String) String keyringPassword } org/eclipse/core/internal/runtime/auth/Cipher.class Cipher.java package org.eclipse. ...
/external/openssl/ssl/
H A Dssl_ciph.c113 * ECC cipher suite support in OpenSSL originally developed by
220 const SSL_CIPHER *cipher; member in struct:cipher_order_st
492 c=s->cipher;
809 co_list[co_list_num].cipher = c;
873 *ca_curr = ciph_curr->cipher;
882 * or represent a cipher strength value (will be added in any case because algorithms=0).
960 cp = curr->cipher;
997 /* add the cipher if it has not been added yet. */
1007 /* Move the added cipher to this location */
1067 (curr->cipher
1534 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument
1762 SSL_CIPHER_authentication_method(const SSL_CIPHER* cipher) argument
[all...]

Completed in 387 milliseconds

1234567891011>>