/external/dropbear/libtomcrypt/src/encauth/gcm/ |
H A D | gcm_process.c | 48 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) { 65 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) { 94 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) { 112 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) { 130 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y, gcm->buf, &gcm->K)) != CRYPT_OK) {
|
/external/openssl/crypto/pem/ |
H A D | pem_seal.c | 101 EVP_CIPHER_CTX_init(&ctx->cipher); 102 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 136 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i); 166 EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i); 179 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
|
/external/openssl/apps/ |
H A D | enc.c | 122 const EVP_CIPHER *cipher=NULL,*c; local 152 cipher=EVP_get_cipherbyname(pname); 154 if (!do_zlib && !base64 && (cipher == NULL) 157 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 160 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 290 cipher=c; 293 cipher=NULL; 422 if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) 429 OBJ_nid2ln(EVP_CIPHER_nid(cipher)), 508 if (cipher ! [all...] |
H A D | smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher [all...] |
H A D | pkey.c | 75 const EVP_CIPHER *cipher = NULL; local 172 cipher = EVP_get_cipherbyname(*args + 1); 173 if (!cipher) 175 BIO_printf(bio_err, "Unknown cipher %s\n", 246 PEM_write_bio_PrivateKey(out, pkey, cipher,
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/ |
H A D | CCMBlockCipher.java | 24 private BlockCipher cipher; field in class:CCMBlockCipher 37 * @param c the block cipher to be used. 41 this.cipher = c; 47 throw new IllegalArgumentException("cipher required with a block size of 16."); 52 * return the underlying block cipher that we are wrapping. 54 * @return the underlying block cipher that we are wrapping. 58 return cipher; 93 return cipher.getAlgorithmName() + "/CCM"; 127 cipher.reset(); 168 throw new IllegalStateException("CCM cipher unitialize [all...] |
H A D | GCMBlockCipher.java | 26 private BlockCipher cipher; field in class:GCMBlockCipher 57 "cipher required with a block size of " + BLOCK_SIZE + "."); 66 this.cipher = c; 72 return cipher; 77 return cipher.getAlgorithmName() + "/GCM"; 131 cipher.init(true, keyParam); 138 cipher.processBlock(ZEROES, 0, H, 0); 269 cipher.processBlock(J0, 0, tag, 0); 323 cipher.reset(); 341 cipher [all...] |
/external/chromium/crypto/ |
H A D | symmetric_key_nss.cc | 86 CK_MECHANISM_TYPE cipher = local 95 ScopedPK11Slot slot(PK11_GetBestSlot(cipher, NULL)); 102 PK11SymKey* sym_key = PK11_ImportSymKey(slot.get(), cipher, PK11_OriginUnwrap,
|
/external/openssh/ |
H A D | Android.mk | 10 canohost.c channels.c cipher.c cipher-acss.c cipher-aes.c \ 11 cipher-bf1.c cipher-ctr.c cipher-3des1.c cleanup.c \
|
H A D | sshconnect1.c | 38 #include "cipher.h" 418 if (options.cipher == SSH_CIPHER_NONE) 453 if (options.cipher == SSH_CIPHER_NONE) 616 if (options.cipher == SSH_CIPHER_NOT_SET) { 618 options.cipher = ssh_cipher_default; 619 } else if (options.cipher == SSH_CIPHER_INVALID || 620 !(cipher_mask_ssh1(1) & (1 << options.cipher))) { 621 logit("No valid SSH1 cipher, using %.100s instead.", 623 options.cipher = ssh_cipher_default; 625 /* Check that the selected cipher i [all...] |
/external/dropbear/libtomcrypt/demos/ |
H A D | encrypt.c | 18 printf("Usage: %s [-d](ecrypt) cipher infile outfile\nCiphers:\n", name); 103 char *infile, *outfile, *cipher; local 116 cipher = argv[2]; 121 cipher = argv[1]; 139 cipher_idx = find_cipher(cipher); 141 printf("Invalid cipher entered on command line.\n");
|
/external/dropbear/libtomcrypt/src/headers/ |
H A D | tomcrypt_cipher.h | 191 /** A block cipher ECB structure */ 193 /** The index of the cipher chosen */ 194 int cipher, member in struct:__anon4550 195 /** The block size of the given cipher */ 203 /** A block cipher CFB structure */ 205 /** The index of the cipher chosen */ 206 int cipher, member in struct:__anon4551 207 /** The block size of the given cipher */ 221 /** A block cipher OFB structure */ 223 /** The index of the cipher chose 224 int cipher, member in struct:__anon4552 240 int cipher, member in struct:__anon4553 255 int cipher, member in struct:__anon4554 276 int cipher; member in struct:__anon4555 301 int cipher, member in struct:__anon4556 [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
H A D | CTRMode.java | 5 package ch.ethz.ssh2.crypto.cipher;
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.h | 178 tls_cipher cipher; member in struct:tls_cipher_suite 188 tls_cipher cipher; member in struct:tls_cipher_data 208 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 209 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
H A D | tlsv1_client.c | 430 * tlsv1_client_get_cipher - Get current cipher name 432 * @buf: Buffer for the cipher name 436 * Get the name of the currently used cipher. 441 char *cipher; local 445 cipher = "RC4-MD5"; 448 cipher = "RC4-SHA"; 451 cipher = "DES-CBC-SHA"; 454 cipher = "DES-CBC3-SHA"; 457 cipher = "ADH-AES-128-SHA"; 460 cipher [all...] |
H A D | tlsv1_server.c | 421 * tlsv1_server_get_cipher - Get current cipher name 423 * @buf: Buffer for the cipher name 427 * Get the name of the currently used cipher. 432 char *cipher; local 436 cipher = "RC4-MD5"; 439 cipher = "RC4-SHA"; 442 cipher = "DES-CBC-SHA"; 445 cipher = "DES-CBC3-SHA"; 448 cipher = "ADH-AES-128-SHA"; 451 cipher [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.h | 216 tls_cipher cipher; member in struct:tls_cipher_suite 226 tls_cipher cipher; member in struct:tls_cipher_data 249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 250 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.h | 216 tls_cipher cipher; member in struct:tls_cipher_suite 226 tls_cipher cipher; member in struct:tls_cipher_data 249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 250 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.h | 216 tls_cipher cipher; member in struct:tls_cipher_suite 226 tls_cipher cipher; member in struct:tls_cipher_data 249 const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher); 250 int tls_server_key_exchange_allowed(tls_cipher cipher);
|
/external/openssl/crypto/pkcs7/ |
H A D | bio_ber.c | 111 BIO_TYPE_CIPHER,"cipher", 302 EVP_CipherUpdate(&(ctx->cipher), 342 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 343 ctx->cipher.berrypt); 379 ret=EVP_CipherFinal_ex(&(ctx->cipher), 404 memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher)); 441 memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX)); 461 EVP_CipherInit_ex(&(ctx->cipher), [all...] |
/external/openssl/crypto/engine/ |
H A D | eng_openssl.c | 113 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 215 * we're asked for a cipher we don't support (should not happen). 218 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler. 277 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 280 if(!cipher) 286 /* We are being asked for a specific cipher */ 288 *cipher = &test_r4_cipher; 290 *cipher = &test_r4_40_cipher; 297 *cipher = NULL;
|
H A D | eng_cryptodev.c | 101 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 257 sess.cipher = ciphers[i].id; 298 sess.cipher = 0; 377 if ((inl % ctx->cipher->block_size) != 0) 391 if (ctx->cipher->iv_len) { 394 iiv = in + inl - ctx->cipher->iv_len; 395 memcpy(save_iv, iiv, ctx->cipher->iv_len); 407 if (ctx->cipher->iv_len) { 409 iiv = out + inl - ctx->cipher->iv_len; 412 memcpy(ctx->iv, iiv, ctx->cipher 423 int cipher = -1, i; local 609 cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, const int **nids, int nid) argument [all...] |
/external/srtp/ |
H A D | Makefile | 75 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \ 76 crypto/cipher/aes.o crypto/cipher/aes_icm.o \ 77 crypto/cipher/aes_cbc.o
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.core.runtime.compatibility.auth_3.2.200.v20100517.jar | ... .String) String keyringPassword
}
org/eclipse/core/internal/runtime/auth/Cipher.class Cipher.java package org.eclipse. ... |
/external/openssl/ssl/ |
H A D | ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 220 const SSL_CIPHER *cipher; member in struct:cipher_order_st 492 c=s->cipher; 809 co_list[co_list_num].cipher = c; 873 *ca_curr = ciph_curr->cipher; 882 * or represent a cipher strength value (will be added in any case because algorithms=0). 960 cp = curr->cipher; 997 /* add the cipher if it has not been added yet. */ 1007 /* Move the added cipher to this location */ 1067 (curr->cipher 1534 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument 1762 SSL_CIPHER_authentication_method(const SSL_CIPHER* cipher) argument [all...] |