/external/chromium/net/base/ |
H A D | ssl_cipher_suite_names_unittest.cc | 13 const char *key_exchange, *cipher, *mac; local 14 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, 0xc001); 16 EXPECT_STREQ(cipher, "NULL"); 19 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, 0xff31); 21 EXPECT_STREQ(cipher, "???");
|
/external/dropbear/libtomcrypt/src/modes/ecb/ |
H A D | ecb_start.c | 23 @param cipher The index of the cipher desired 26 @param num_rounds Number of rounds in the cipher desired (0 for default) 30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) argument 36 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 39 ecb->cipher = cipher; 40 ecb->blocklen = cipher_descriptor[cipher].block_length; 41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
|
H A D | ecb_decrypt.c | 24 @param len The number of octets to process (must be multiple of the cipher block size) 34 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 37 if (len % cipher_descriptor[ecb->cipher].block_length) { 42 if (cipher_descriptor[ecb->cipher].accel_ecb_decrypt != NULL) { 43 return cipher_descriptor[ecb->cipher].accel_ecb_decrypt(ct, pt, len / cipher_descriptor[ecb->cipher].block_length, &ecb->key); 46 if ((err = cipher_descriptor[ecb->cipher].ecb_decrypt(ct, pt, &ecb->key)) != CRYPT_OK) { 49 pt += cipher_descriptor[ecb->cipher].block_length; 50 ct += cipher_descriptor[ecb->cipher].block_length; 51 len -= cipher_descriptor[ecb->cipher] [all...] |
H A D | ecb_encrypt.c | 24 @param len The number of octets to process (must be multiple of the cipher block size) 34 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 37 if (len % cipher_descriptor[ecb->cipher].block_length) { 42 if (cipher_descriptor[ecb->cipher].accel_ecb_encrypt != NULL) { 43 return cipher_descriptor[ecb->cipher].accel_ecb_encrypt(pt, ct, len / cipher_descriptor[ecb->cipher].block_length, &ecb->key); 46 if ((err = cipher_descriptor[ecb->cipher].ecb_encrypt(pt, ct, &ecb->key)) != CRYPT_OK) { 49 pt += cipher_descriptor[ecb->cipher].block_length; 50 ct += cipher_descriptor[ecb->cipher].block_length; 51 len -= cipher_descriptor[ecb->cipher] [all...] |
H A D | ecb_done.c | 29 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 32 cipher_descriptor[ecb->cipher].done(&ecb->key);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
H A D | StreamBlockCipher.java | 10 private BlockCipher cipher; field in class:StreamBlockCipher 17 * @param cipher the block cipher to be wrapped. 18 * @exception IllegalArgumentException if the cipher has a block size other than 22 BlockCipher cipher) 24 if (cipher.getBlockSize() != 1) 26 throw new IllegalArgumentException("block cipher block size != 1."); 29 this.cipher = cipher; 33 * initialise the underlying cipher 21 StreamBlockCipher( BlockCipher cipher) argument [all...] |
/external/srtp/doc/ |
H A D | crypto_kernel.txt | 14 @brief A generic cipher type enables cipher agility, that is, the 15 ability to write code that runs with multiple cipher types. 24 * @brief Allocates a cipher of a particular type. 28 cipher_type_alloc(cipher_type_t *ctype, cipher_t **cipher, 32 * @brief Initialized a cipher to use a particular key. May 33 * be invoked more than once on the same cipher. 38 cipher_init(cipher_t *cipher, const uint8_t *key); 41 * @brief Sets the initialization vector of a given cipher. 46 cipher_set_iv(cipher_t *cipher, voi [all...] |
/external/dropbear/libtomcrypt/src/mac/f9/ |
H A D | f9_init.c | 22 @param cipher Index of cipher to use 27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) argument 35 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 40 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) { 55 zeromem(f9->IV, cipher_descriptor[cipher].block_length); 56 zeromem(f9->ACC, cipher_descriptor[cipher].block_length); 57 f9->blocksize = cipher_descriptor[cipher].block_length; 58 f9->cipher [all...] |
H A D | f9_memory.c | 21 @param cipher Index of cipher to use 30 int f9_memory(int cipher, argument 38 /* is the cipher valid? */ 39 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 44 if (cipher_descriptor[cipher].f9_memory != NULL) { 45 return cipher_descriptor[cipher].f9_memory(key, keylen, in, inlen, out, outlen); 53 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
H A D | CBCBlockCipherMac.java | 20 private BlockCipher cipher; field in class:CBCBlockCipherMac 26 * create a standard MAC based on a CBC block cipher. This will produce an 27 * authentication code half the length of the block size of the cipher. 29 * @param cipher the cipher to be used as the basis of the MAC generation. 32 BlockCipher cipher) 34 this(cipher, (cipher.getBlockSize() * 8) / 2, null); 38 * create a standard MAC based on a CBC block cipher. This will produce an 39 * authentication code half the length of the block size of the cipher 31 CBCBlockCipherMac( BlockCipher cipher) argument 44 CBCBlockCipherMac( BlockCipher cipher, BlockCipherPadding padding) argument 64 CBCBlockCipherMac( BlockCipher cipher, int macSizeInBits) argument 85 CBCBlockCipherMac( BlockCipher cipher, int macSizeInBits, BlockCipherPadding padding) argument [all...] |
/external/dropbear/libtomcrypt/src/modes/cbc/ |
H A D | cbc_start.c | 22 @param cipher The index of the cipher desired 26 @param num_rounds Number of rounds in the cipher desired (0 for default) 30 int cbc_start(int cipher, const unsigned char *IV, const unsigned char *key, argument 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 44 /* setup cipher */ 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) { 50 cbc->blocklen = cipher_descriptor[cipher].block_length; 51 cbc->cipher = cipher; [all...] |
H A D | cbc_done.c | 29 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 32 cipher_descriptor[cbc->cipher].done(&cbc->key);
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
H A D | ofb_start.c | 23 @param cipher The index of the cipher desired 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 31 int ofb_start(int cipher, const unsigned char *IV, const unsigned char *key, argument 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 45 ofb->cipher = cipher; 46 ofb->blocklen = cipher_descriptor[cipher].block_length; 51 /* init the cipher */ 53 return cipher_descriptor[cipher] [all...] |
H A D | ofb_done.c | 29 if ((err = cipher_is_valid(ofb->cipher)) != CRYPT_OK) { 32 cipher_descriptor[ofb->cipher].done(&ofb->key);
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
H A D | xcbc_init.c | 22 @param cipher Index of cipher to use 27 int xcbc_init(xcbc_state *xcbc, int cipher, const unsigned char *key, unsigned long keylen) argument 36 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 41 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 58 for (x = 0; x < cipher_descriptor[cipher].block_length; x++) { 61 cipher_descriptor[cipher].ecb_encrypt(xcbc->K[y], xcbc->K[y], skey); 65 err = cipher_descriptor[cipher].setup(xcbc->K[0], cipher_descriptor[cipher] [all...] |
/external/dropbear/libtomcrypt/src/misc/crypt/ |
H A D | crypt_unregister_cipher.c | 15 Unregister a cipher, Tom St Denis 19 Unregister a cipher from the descriptor table 20 @param cipher The cipher descriptor to remove 23 int unregister_cipher(const struct ltc_cipher_descriptor *cipher) argument 27 LTC_ARGCHK(cipher != NULL); 32 if (XMEMCMP(&cipher_descriptor[x], cipher, sizeof(struct ltc_cipher_descriptor)) == 0) {
|
H A D | crypt_register_cipher.c | 15 Register a cipher, Tom St Denis 19 Register a cipher with the descriptor table 20 @param cipher The cipher you wish to register 23 int register_cipher(const struct ltc_cipher_descriptor *cipher) argument 27 LTC_ARGCHK(cipher != NULL); 32 if (cipher_descriptor[x].name != NULL && cipher_descriptor[x].ID == cipher->ID) { 41 XMEMCPY(&cipher_descriptor[x], cipher, sizeof(struct ltc_cipher_descriptor));
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
H A D | cfb_start.c | 23 @param cipher The index of the cipher desired 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 31 int cfb_start(int cipher, const unsigned char *IV, const unsigned char *key, argument 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 46 cfb->cipher = cipher; 47 cfb->blocklen = cipher_descriptor[cipher].block_length; 51 /* init the cipher */ 52 if ((err = cipher_descriptor[cipher] [all...] |
H A D | cfb_done.c | 29 if ((err = cipher_is_valid(cfb->cipher)) != CRYPT_OK) { 32 cipher_descriptor[cfb->cipher].done(&cfb->key);
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
H A D | f8_start.c | 23 @param cipher The index of the cipher desired 29 @param num_rounds Number of rounds in the cipher desired (0 for default) 33 int f8_start( int cipher, const unsigned char *IV, argument 46 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 51 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 58 f8->cipher = cipher; 59 f8->blocklen = cipher_descriptor[cipher].block_length; 75 if ((err = cipher_descriptor[cipher] [all...] |
H A D | f8_done.c | 29 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) { 32 cipher_descriptor[f8->cipher].done(&f8->key);
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
H A D | omac_init.c | 24 @param cipher The index of the desired cipher 29 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen) argument 37 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 42 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 48 switch (cipher_descriptor[cipher].block_length) { 58 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &omac->key)) != CRYPT_OK) { 65 zeromem(omac->Lu[0], cipher_descriptor[cipher].block_length); 66 if ((err = cipher_descriptor[cipher].ecb_encrypt(omac->Lu[0], omac->Lu[0], &omac->key)) != CRYPT_OK) { 88 omac->cipher_idx = cipher; [all...] |
/external/dropbear/libtomcrypt/src/modes/ctr/ |
H A D | ctr_done.c | 29 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { 32 cipher_descriptor[ctr->cipher].done(&ctr->key);
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
H A D | lrw_done.c | 31 if ((err = cipher_is_valid(lrw->cipher)) != CRYPT_OK) { 34 cipher_descriptor[lrw->cipher].done(&lrw->key);
|
/external/apache-harmony/crypto/src/test/api/java.injected/javax/crypto/ |
H A D | SealedObjectTest.java | 72 * NullPointerException is thrown in the case of null cipher. 79 + "of null cipher."); 97 Cipher cipher = new NullCipher(); 98 SealedObject so1 = new SealedObject(secret, cipher); 103 .getObject(cipher)); 119 Cipher cipher = Cipher.getInstance(algorithm); 120 cipher.init(Cipher.ENCRYPT_MODE, key); 121 SealedObject so = new SealedObject(secret, cipher); 124 + "in cipher.", algorithm, so.getAlgorithm()); 139 Cipher cipher [all...] |