/external/dropbear/libtomcrypt/src/misc/crypt/ |
H A D | crypt_register_cipher.c | 15 Register a cipher, Tom St Denis 19 Register a cipher with the descriptor table 20 @param cipher The cipher you wish to register 23 int register_cipher(const struct ltc_cipher_descriptor *cipher) argument 27 LTC_ARGCHK(cipher != NULL); 32 if (cipher_descriptor[x].name != NULL && cipher_descriptor[x].ID == cipher->ID) { 41 XMEMCPY(&cipher_descriptor[x], cipher, sizeof(struct ltc_cipher_descriptor));
|
H A D | crypt_unregister_cipher.c | 15 Unregister a cipher, Tom St Denis 19 Unregister a cipher from the descriptor table 20 @param cipher The cipher descriptor to remove 23 int unregister_cipher(const struct ltc_cipher_descriptor *cipher) argument 27 LTC_ARGCHK(cipher != NULL); 32 if (XMEMCMP(&cipher_descriptor[x], cipher, sizeof(struct ltc_cipher_descriptor)) == 0) {
|
/external/chromium/net/base/ |
H A D | ssl_cipher_suite_names_unittest.cc | 13 const char *key_exchange, *cipher, *mac; local 14 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, 0xc001); 16 EXPECT_STREQ(cipher, "NULL"); 19 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, 0xff31); 21 EXPECT_STREQ(cipher, "???");
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
H A D | f9_file.c | 22 @param cipher The index of the cipher desired 30 int f9_file(int cipher, argument 53 if ((err = f9_init(&f9, cipher, key, keylen)) != CRYPT_OK) {
|
H A D | f9_init.c | 22 @param cipher Index of cipher to use 27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) argument 35 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 40 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) { 55 zeromem(f9->IV, cipher_descriptor[cipher].block_length); 56 zeromem(f9->ACC, cipher_descriptor[cipher].block_length); 57 f9->blocksize = cipher_descriptor[cipher].block_length; 58 f9->cipher [all...] |
H A D | f9_memory.c | 21 @param cipher Index of cipher to use 30 int f9_memory(int cipher, argument 38 /* is the cipher valid? */ 39 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 44 if (cipher_descriptor[cipher].f9_memory != NULL) { 45 return cipher_descriptor[cipher].f9_memory(key, keylen, in, inlen, out, outlen); 53 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
H A D | omac_file.c | 22 @param cipher The index of the cipher desired 30 int omac_file(int cipher, argument 53 if ((err = omac_init(&omac, cipher, key, keylen)) != CRYPT_OK) {
|
H A D | omac_memory.c | 22 @param cipher The index of the desired cipher 31 int omac_memory(int cipher, argument 44 /* is the cipher valid? */ 45 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 50 if (cipher_descriptor[cipher].omac_memory != NULL) { 51 return cipher_descriptor[cipher].omac_memory(key, keylen, in, inlen, out, outlen); 61 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
H A D | pmac_file.c | 22 @param cipher The index of the cipher desired 30 int pmac_file(int cipher, argument 54 if ((err = pmac_init(&pmac, cipher, key, keylen)) != CRYPT_OK) {
|
H A D | pmac_memory.c | 22 @param cipher The index of the cipher desired 31 int pmac_memory(int cipher, argument 50 if ((err = pmac_init(pmac, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
H A D | xcbc_file.c | 22 @param cipher The index of the cipher desired 30 int xcbc_file(int cipher, argument 53 if ((err = xcbc_init(&xcbc, cipher, key, keylen)) != CRYPT_OK) {
|
H A D | xcbc_init.c | 22 @param cipher Index of cipher to use 27 int xcbc_init(xcbc_state *xcbc, int cipher, const unsigned char *key, unsigned long keylen) argument 36 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 41 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 58 for (x = 0; x < cipher_descriptor[cipher].block_length; x++) { 61 cipher_descriptor[cipher].ecb_encrypt(xcbc->K[y], xcbc->K[y], skey); 65 err = cipher_descriptor[cipher].setup(xcbc->K[0], cipher_descriptor[cipher] [all...] |
H A D | xcbc_memory.c | 21 @param cipher Index of cipher to use 30 int xcbc_memory(int cipher, argument 38 /* is the cipher valid? */ 39 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 44 if (cipher_descriptor[cipher].xcbc_memory != NULL) { 45 return cipher_descriptor[cipher].xcbc_memory(key, keylen, in, inlen, out, outlen); 53 if ((err = xcbc_init(xcbc, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/ecb/ |
H A D | ecb_start.c | 23 @param cipher The index of the cipher desired 26 @param num_rounds Number of rounds in the cipher desired (0 for default) 30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) argument 36 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 39 ecb->cipher = cipher; 40 ecb->blocklen = cipher_descriptor[cipher].block_length; 41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
|
/external/chromium_org/net/ssl/ |
H A D | ssl_cipher_suite_names_unittest.cc | 15 const char *key_exchange, *cipher, *mac; local 18 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xc001); 20 EXPECT_STREQ("NULL", cipher); 24 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x009f); 26 EXPECT_STREQ("AES_256_GCM", cipher); 30 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xff31); 32 EXPECT_STREQ("???", cipher);
|
/external/dropbear/libtomcrypt/src/modes/cbc/ |
H A D | cbc_start.c | 22 @param cipher The index of the cipher desired 26 @param num_rounds Number of rounds in the cipher desired (0 for default) 30 int cbc_start(int cipher, const unsigned char *IV, const unsigned char *key, argument 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 44 /* setup cipher */ 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) { 50 cbc->blocklen = cipher_descriptor[cipher].block_length; 51 cbc->cipher = cipher; [all...] |
/external/dropbear/libtomcrypt/src/modes/cfb/ |
H A D | cfb_start.c | 23 @param cipher The index of the cipher desired 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 31 int cfb_start(int cipher, const unsigned char *IV, const unsigned char *key, argument 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 46 cfb->cipher = cipher; 47 cfb->blocklen = cipher_descriptor[cipher].block_length; 51 /* init the cipher */ 52 if ((err = cipher_descriptor[cipher] [all...] |
/external/dropbear/libtomcrypt/src/modes/ctr/ |
H A D | ctr_start.c | 23 @param cipher The index of the cipher desired 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 32 int ctr_start( int cipher, argument 45 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 49 /* setup cipher */ 50 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ctr->key)) != CRYPT_OK) { 55 ctr->blocklen = cipher_descriptor[cipher].block_length; 56 ctr->cipher = cipher; [all...] |
/external/dropbear/libtomcrypt/src/modes/ofb/ |
H A D | ofb_start.c | 23 @param cipher The index of the cipher desired 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 31 int ofb_start(int cipher, const unsigned char *IV, const unsigned char *key, argument 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 45 ofb->cipher = cipher; 46 ofb->blocklen = cipher_descriptor[cipher].block_length; 51 /* init the cipher */ 53 return cipher_descriptor[cipher] [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
H A D | p12_p8e.c | 63 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
H A D | enc.c | 77 const EVP_CIPHER *cipher=NULL; local 91 if(!(cipher = EVP_get_cipherbyname(argv[2]))) { 92 fprintf(stderr, "Unknown cipher %s\n", argv[2]); 130 if(!cipher) { 132 cipher = EVP_des_ede3_cbc(); 134 fprintf(stderr, "No cipher selected\n"); 139 if (!PKCS7_set_cipher(p7,cipher)) goto err;
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
H A D | eax_encrypt_authenticate_memory.c | 22 @param cipher The index of the cipher desired 36 int eax_encrypt_authenticate_memory(int cipher, argument 55 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
|
H A D | eax_init.c | 23 @param cipher The index of the desired cipher 32 int eax_init(eax_state *eax, int cipher, argument 50 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 53 blklen = cipher_descriptor[cipher].block_length; 71 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) { 93 if ((err = omac_init(&eax->headeromac, cipher, key, keylen)) != CRYPT_OK) { 111 if ((err = ctr_start(cipher, eax->N, key, keylen, 0, CTR_COUNTER_BIG_ENDIAN, &eax->ctr)) != CRYPT_OK) { 116 if ((err = omac_init(&eax->ctomac, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
H A D | gcm_init.c | 23 @param cipher The index of the cipher to use 28 int gcm_init(gcm_state *gcm, int cipher, argument 46 /* is cipher valid? */ 47 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 50 if (cipher_descriptor[cipher].block_length != 16) { 55 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &gcm->K)) != CRYPT_OK) { 61 if ((err = cipher_descriptor[cipher].ecb_encrypt(B, gcm->H, &gcm->K)) != CRYPT_OK) { 68 gcm->cipher = cipher; [all...] |
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
H A D | ocb_decrypt_verify_memory.c | 22 @param cipher The index of the cipher desired 25 @param nonce The session nonce (length of the block size of the block cipher) 34 int ocb_decrypt_verify_memory(int cipher, argument 58 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
|