Searched refs:cipher (Results 51 - 75 of 428) sorted by relevance

1234567891011>>

/external/dropbear/libtomcrypt/src/modes/ofb/
H A Dofb_setiv.c34 if ((err = cipher_is_valid(ofb->cipher)) != CRYPT_OK) {
44 return cipher_descriptor[ofb->cipher].ecb_encrypt(IV, ofb->IV, &ofb->key);
/external/dropbear/libtomcrypt/src/mac/f9/
H A Df9_done.c33 if ((err = cipher_is_valid(f9->cipher)) != CRYPT_OK) {
37 if ((f9->blocksize > cipher_descriptor[f9->cipher].block_length) || (f9->blocksize < 0) ||
44 cipher_descriptor[f9->cipher].ecb_encrypt(f9->IV, f9->IV, &f9->key);
52 if ((err = cipher_descriptor[f9->cipher].setup(f9->akey, f9->keylen, 0, &f9->key)) != CRYPT_OK) {
57 cipher_descriptor[f9->cipher].ecb_encrypt(f9->ACC, f9->ACC, &f9->key);
58 cipher_descriptor[f9->cipher].done(&f9->key);
/external/dropbear/libtomcrypt/src/modes/lrw/
H A Dlrw_start.c22 @param cipher The cipher desired, must be a 128-bit block cipher
24 @param key The cipher key
25 @param keylen The length of the cipher key in octets
27 @param num_rounds The number of rounds for the cipher (0 == default)
31 int lrw_start( int cipher, argument
55 /* is cipher valid? */
56 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
59 if (cipher_descriptor[cipher]
[all...]
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/
H A Drijndael-api-fst.h29 #define BITSPERBLOCK 128 /* Default number of bits in a cipher block */
67 /* The structure for cipher information */
86 int rijndael_cipherInit(cipherInstance *cipher, u_int8_t mode, char *IV);
88 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key,
91 int rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key,
94 int rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key,
97 int rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key,
101 int rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key,
H A Drijndael-api-fst.c79 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument
81 cipher->mode = mode;
86 bcopy(IV, cipher->IV, MAX_IV_SIZE);
88 bzero(cipher->IV, MAX_IV_SIZE);
93 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument
98 if (cipher == NULL ||
109 switch (cipher->mode) {
120 bcopy(cipher->IV, block, 16);
127 ((word32*)block)[0] = ((word32*)cipher->IV)[0] ^ ((word32*)input)[0];
128 ((word32*)block)[1] = ((word32*)cipher
207 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument
270 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument
368 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument
460 rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer, int rounds) argument
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/paddings/
H A DPaddedBufferedBlockCipher.java24 * Create a buffered block cipher with the desired padding.
26 * @param cipher the underlying block cipher this buffering object wraps.
30 BlockCipher cipher,
33 this.cipher = cipher;
36 buf = new byte[cipher.getBlockSize()];
41 * Create a buffered block cipher PKCS7 padding
43 * @param cipher the underlying block cipher thi
29 PaddedBufferedBlockCipher( BlockCipher cipher, BlockCipherPadding padding) argument
45 PaddedBufferedBlockCipher( BlockCipher cipher) argument
[all...]
/external/dropbear/libtomcrypt/src/headers/
H A Dtomcrypt_mac.h38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen);
41 int omac_memory(int cipher,
45 int omac_memory_multi(int cipher,
49 int omac_file(int cipher,
65 symmetric_key key; /* scheduled key for cipher */
67 int cipher_idx, /* cipher idx */
72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen);
76 int pmac_memory(int cipher,
81 int pmac_memory_multi(int cipher,
86 int pmac_file(int cipher,
151 int cipher, /* cipher idx */ member in struct:__anon16796
242 int cipher, /* which cipher */ member in struct:__anon16797
320 int cipher, member in struct:__anon16798
353 int cipher, member in struct:__anon16799
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
H A DCFBBlockCipher.java9 * implements a Cipher-FeedBack (CFB) mode on top of a simple cipher.
19 private BlockCipher cipher = null; field in class:CFBBlockCipher
25 * @param cipher the block cipher to be used as the basis of the
30 BlockCipher cipher,
33 this.cipher = cipher;
36 this.IV = new byte[cipher.getBlockSize()];
37 this.cfbV = new byte[cipher.getBlockSize()];
38 this.cfbOutV = new byte[cipher
29 CFBBlockCipher( BlockCipher cipher, int bitBlockSize) argument
[all...]
/external/dropbear/libtomcrypt/src/encauth/gcm/
H A Dgcm_init.c23 @param cipher The index of the cipher to use
28 int gcm_init(gcm_state *gcm, int cipher, argument
46 /* is cipher valid? */
47 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
50 if (cipher_descriptor[cipher].block_length != 16) {
55 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &gcm->K)) != CRYPT_OK) {
61 if ((err = cipher_descriptor[cipher].ecb_encrypt(B, gcm->H, &gcm->K)) != CRYPT_OK) {
68 gcm->cipher = cipher;
[all...]
H A Dgcm_memory.c22 @param cipher Index of cipher to use
37 int gcm_memory( int cipher, argument
50 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
54 if (cipher_descriptor[cipher].accel_gcm_memory != NULL) {
56 cipher_descriptor[cipher].accel_gcm_memory
87 if ((err = gcm_init(gcm, cipher, key, keylen)) != CRYPT_OK) {
/external/chromium_org/third_party/tlslite/tlslite/
H A Dconstants.py119 for cipher in ciphers:
120 if cipher == "aes128":
122 elif cipher == "aes256":
124 elif cipher == "3des":
135 for cipher in ciphers:
136 if cipher == "aes128":
138 elif cipher == "aes256":
140 elif cipher == "3des":
152 for cipher in ciphers:
153 if cipher
[all...]
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/
H A Dx_pkey.c82 ret->cipher.cipher=EVP_get_cipherbyname(
84 if (ret->cipher.cipher == NULL)
99 memcpy(ret->cipher.iv,
103 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
120 ret->cipher.cipher=NULL;
121 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
/external/openssl/crypto/asn1/
H A Dx_pkey.c82 ret->cipher.cipher=EVP_get_cipherbyname(
84 if (ret->cipher.cipher == NULL)
99 memcpy(ret->cipher.iv,
103 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
120 ret->cipher.cipher=NULL;
121 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
/external/openssh/
H A Dcipher.c1 /* $OpenBSD: cipher.c,v 1.82 2009/01/26 09:58:15 markus Exp $ */
49 #include "cipher.h"
169 debug("bad cipher %s [%s]", p, names);
173 debug3("cipher ok: %s [%s]", p, names);
182 * Parses the name of the cipher. Returns the number of the corresponding
183 * cipher, or -1 on error.
206 cipher_init(CipherContext *cc, Cipher *cipher, argument
219 if (cipher->number == SSH_CIPHER_DES) {
228 cc->plaintext = (cipher->number == SSH_CIPHER_NONE);
230 if (keylen < cipher
300 cipher_set_key_string(CipherContext *cc, Cipher *cipher, const char *passphrase, int do_encrypt) argument
[all...]
/external/srtp/
H A DAndroid.mk9 crypto/cipher/cipher.c \
10 crypto/cipher/null_cipher.c \
11 crypto/cipher/aes.c \
12 crypto/cipher/aes_icm.c \
13 crypto/cipher/aes_cbc.c \
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-unwrap.c21 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument
32 os_memcpy(a, cipher, 8);
34 os_memcpy(r, cipher + 8, 8 * n);
/external/wpa_supplicant_8/src/crypto/
H A Daes-unwrap.c21 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument
32 os_memcpy(a, cipher, 8);
34 os_memcpy(r, cipher + 8, 8 * n);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-unwrap.c21 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument
32 os_memcpy(a, cipher, 8);
34 os_memcpy(r, cipher + 8, 8 * n);
/external/dropbear/libtomcrypt/src/encauth/ccm/
H A Dccm_memory.c22 @param cipher The index of the cipher desired
38 int ccm_memory(int cipher, argument
71 /* check cipher input */
72 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
75 if (cipher_descriptor[cipher].block_length != 16) {
91 if (cipher_descriptor[cipher].accel_ccm_memory != NULL) {
92 return cipher_descriptor[cipher].accel_ccm_memory(
132 /* initialize the cipher */
133 if ((err = cipher_descriptor[cipher]
[all...]
/external/dropbear/libtomcrypt/src/prngs/
H A Dyarrow.c44 /* these are the default hash/cipher combo used */
47 prng->yarrow.cipher = register_cipher(&rijndael_enc_desc);
49 prng->yarrow.cipher = register_cipher(&aes_enc_desc);
51 prng->yarrow.cipher = register_cipher(&rijndael_desc);
53 prng->yarrow.cipher = register_cipher(&aes_desc);
56 prng->yarrow.cipher = register_cipher(&blowfish_desc);
58 prng->yarrow.cipher = register_cipher(&twofish_desc);
60 prng->yarrow.cipher = register_cipher(&rc6_desc);
62 prng->yarrow.cipher = register_cipher(&rc5_desc);
64 prng->yarrow.cipher
[all...]
/external/chromium_org/third_party/openssl/openssl/crypto/evp/
H A Devp_test.c146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c),
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument
252 c=EVP_get_cipherbyname(cipher);
359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
368 char *cipher; local
378 cipher=sstrsep(&p,":");
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
397 && !test_digest(cipher,plaintext,pn,ciphertext,cn))
400 if (strstr(cipher, "AES") == cipher)
[all...]
/external/openssl/crypto/evp/
H A Devp_test.c146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c),
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument
252 c=EVP_get_cipherbyname(cipher);
359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
368 char *cipher; local
378 cipher=sstrsep(&p,":");
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
397 && !test_digest(cipher,plaintext,pn,ciphertext,cn))
400 if (strstr(cipher, "AES") == cipher)
[all...]
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
H A DCipherTest.java65 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding");
66 assertNotNull("Received a null Cipher instance", cipher);
81 Cipher cipher = Cipher.getInstance("DES", providers[i].getName());
82 assertNotNull("Cipher.getInstance() returned a null value", cipher);
86 cipher = Cipher.getInstance("DoBeDoBeDo", providers[i]);
122 Cipher cipher = Cipher.getInstance("DES", providers[i]);
123 assertNotNull("Cipher.getInstance() returned a null value", cipher);
138 Cipher cipher = Cipher.getInstance("AES", provider.getName());
139 Provider cipherProvider = cipher.getProvider();
152 Cipher cipher
[all...]
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
H A Dp12_crpt.c70 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de)
96 iter, EVP_CIPHER_key_length(cipher), key, md)) {
102 iter, EVP_CIPHER_iv_length(cipher), iv, md)) {
108 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de);
69 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
/external/dropbear/libtomcrypt/src/encauth/ocb/
H A Docb_decrypt.c23 @param ct The ciphertext (length of the block size of the block cipher)
36 /* check if valid cipher */
37 if ((err = cipher_is_valid(ocb->cipher)) != CRYPT_OK) {
40 LTC_ARGCHK(cipher_descriptor[ocb->cipher].ecb_decrypt != NULL);
43 if (ocb->block_len != cipher_descriptor[ocb->cipher].block_length) {
54 if ((err = cipher_descriptor[ocb->cipher].ecb_decrypt(tmp, pt, &ocb->key)) != CRYPT_OK) {

Completed in 776 milliseconds

1234567891011>>