/external/dropbear/libtomcrypt/src/modes/ofb/ |
H A D | ofb_setiv.c | 34 if ((err = cipher_is_valid(ofb->cipher)) != CRYPT_OK) { 44 return cipher_descriptor[ofb->cipher].ecb_encrypt(IV, ofb->IV, &ofb->key);
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
H A D | f9_done.c | 33 if ((err = cipher_is_valid(f9->cipher)) != CRYPT_OK) { 37 if ((f9->blocksize > cipher_descriptor[f9->cipher].block_length) || (f9->blocksize < 0) || 44 cipher_descriptor[f9->cipher].ecb_encrypt(f9->IV, f9->IV, &f9->key); 52 if ((err = cipher_descriptor[f9->cipher].setup(f9->akey, f9->keylen, 0, &f9->key)) != CRYPT_OK) { 57 cipher_descriptor[f9->cipher].ecb_encrypt(f9->ACC, f9->ACC, &f9->key); 58 cipher_descriptor[f9->cipher].done(&f9->key);
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
H A D | lrw_start.c | 22 @param cipher The cipher desired, must be a 128-bit block cipher 24 @param key The cipher key 25 @param keylen The length of the cipher key in octets 27 @param num_rounds The number of rounds for the cipher (0 == default) 31 int lrw_start( int cipher, argument 55 /* is cipher valid? */ 56 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 59 if (cipher_descriptor[cipher] [all...] |
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
H A D | rijndael-api-fst.h | 29 #define BITSPERBLOCK 128 /* Default number of bits in a cipher block */ 67 /* The structure for cipher information */ 86 int rijndael_cipherInit(cipherInstance *cipher, u_int8_t mode, char *IV); 88 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, 91 int rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, 94 int rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, 97 int rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, 101 int rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key,
|
H A D | rijndael-api-fst.c | 79 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument 81 cipher->mode = mode; 86 bcopy(IV, cipher->IV, MAX_IV_SIZE); 88 bzero(cipher->IV, MAX_IV_SIZE); 93 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument 98 if (cipher == NULL || 109 switch (cipher->mode) { 120 bcopy(cipher->IV, block, 16); 127 ((word32*)block)[0] = ((word32*)cipher->IV)[0] ^ ((word32*)input)[0]; 128 ((word32*)block)[1] = ((word32*)cipher 207 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument 270 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument 368 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument 460 rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer, int rounds) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/paddings/ |
H A D | PaddedBufferedBlockCipher.java | 24 * Create a buffered block cipher with the desired padding. 26 * @param cipher the underlying block cipher this buffering object wraps. 30 BlockCipher cipher, 33 this.cipher = cipher; 36 buf = new byte[cipher.getBlockSize()]; 41 * Create a buffered block cipher PKCS7 padding 43 * @param cipher the underlying block cipher thi 29 PaddedBufferedBlockCipher( BlockCipher cipher, BlockCipherPadding padding) argument 45 PaddedBufferedBlockCipher( BlockCipher cipher) argument [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
H A D | tomcrypt_mac.h | 38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen); 41 int omac_memory(int cipher, 45 int omac_memory_multi(int cipher, 49 int omac_file(int cipher, 65 symmetric_key key; /* scheduled key for cipher */ 67 int cipher_idx, /* cipher idx */ 72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen); 76 int pmac_memory(int cipher, 81 int pmac_memory_multi(int cipher, 86 int pmac_file(int cipher, 151 int cipher, /* cipher idx */ member in struct:__anon16796 242 int cipher, /* which cipher */ member in struct:__anon16797 320 int cipher, member in struct:__anon16798 353 int cipher, member in struct:__anon16799 [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
H A D | CFBBlockCipher.java | 9 * implements a Cipher-FeedBack (CFB) mode on top of a simple cipher. 19 private BlockCipher cipher = null; field in class:CFBBlockCipher 25 * @param cipher the block cipher to be used as the basis of the 30 BlockCipher cipher, 33 this.cipher = cipher; 36 this.IV = new byte[cipher.getBlockSize()]; 37 this.cfbV = new byte[cipher.getBlockSize()]; 38 this.cfbOutV = new byte[cipher 29 CFBBlockCipher( BlockCipher cipher, int bitBlockSize) argument [all...] |
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
H A D | gcm_init.c | 23 @param cipher The index of the cipher to use 28 int gcm_init(gcm_state *gcm, int cipher, argument 46 /* is cipher valid? */ 47 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 50 if (cipher_descriptor[cipher].block_length != 16) { 55 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &gcm->K)) != CRYPT_OK) { 61 if ((err = cipher_descriptor[cipher].ecb_encrypt(B, gcm->H, &gcm->K)) != CRYPT_OK) { 68 gcm->cipher = cipher; [all...] |
H A D | gcm_memory.c | 22 @param cipher Index of cipher to use 37 int gcm_memory( int cipher, argument 50 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 54 if (cipher_descriptor[cipher].accel_gcm_memory != NULL) { 56 cipher_descriptor[cipher].accel_gcm_memory 87 if ((err = gcm_init(gcm, cipher, key, keylen)) != CRYPT_OK) {
|
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | constants.py | 119 for cipher in ciphers: 120 if cipher == "aes128": 122 elif cipher == "aes256": 124 elif cipher == "3des": 135 for cipher in ciphers: 136 if cipher == "aes128": 138 elif cipher == "aes256": 140 elif cipher == "3des": 152 for cipher in ciphers: 153 if cipher [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
H A D | x_pkey.c | 82 ret->cipher.cipher=EVP_get_cipherbyname( 84 if (ret->cipher.cipher == NULL) 99 memcpy(ret->cipher.iv, 103 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH); 120 ret->cipher.cipher=NULL; 121 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
|
/external/openssl/crypto/asn1/ |
H A D | x_pkey.c | 82 ret->cipher.cipher=EVP_get_cipherbyname( 84 if (ret->cipher.cipher == NULL) 99 memcpy(ret->cipher.iv, 103 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH); 120 ret->cipher.cipher=NULL; 121 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
|
/external/openssh/ |
H A D | cipher.c | 1 /* $OpenBSD: cipher.c,v 1.82 2009/01/26 09:58:15 markus Exp $ */ 49 #include "cipher.h" 169 debug("bad cipher %s [%s]", p, names); 173 debug3("cipher ok: %s [%s]", p, names); 182 * Parses the name of the cipher. Returns the number of the corresponding 183 * cipher, or -1 on error. 206 cipher_init(CipherContext *cc, Cipher *cipher, argument 219 if (cipher->number == SSH_CIPHER_DES) { 228 cc->plaintext = (cipher->number == SSH_CIPHER_NONE); 230 if (keylen < cipher 300 cipher_set_key_string(CipherContext *cc, Cipher *cipher, const char *passphrase, int do_encrypt) argument [all...] |
/external/srtp/ |
H A D | Android.mk | 9 crypto/cipher/cipher.c \ 10 crypto/cipher/null_cipher.c \ 11 crypto/cipher/aes.c \ 12 crypto/cipher/aes_icm.c \ 13 crypto/cipher/aes_cbc.c \
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-unwrap.c | 21 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 32 os_memcpy(a, cipher, 8); 34 os_memcpy(r, cipher + 8, 8 * n);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-unwrap.c | 21 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 32 os_memcpy(a, cipher, 8); 34 os_memcpy(r, cipher + 8, 8 * n);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-unwrap.c | 21 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 32 os_memcpy(a, cipher, 8); 34 os_memcpy(r, cipher + 8, 8 * n);
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
H A D | ccm_memory.c | 22 @param cipher The index of the cipher desired 38 int ccm_memory(int cipher, argument 71 /* check cipher input */ 72 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 75 if (cipher_descriptor[cipher].block_length != 16) { 91 if (cipher_descriptor[cipher].accel_ccm_memory != NULL) { 92 return cipher_descriptor[cipher].accel_ccm_memory( 132 /* initialize the cipher */ 133 if ((err = cipher_descriptor[cipher] [all...] |
/external/dropbear/libtomcrypt/src/prngs/ |
H A D | yarrow.c | 44 /* these are the default hash/cipher combo used */ 47 prng->yarrow.cipher = register_cipher(&rijndael_enc_desc); 49 prng->yarrow.cipher = register_cipher(&aes_enc_desc); 51 prng->yarrow.cipher = register_cipher(&rijndael_desc); 53 prng->yarrow.cipher = register_cipher(&aes_desc); 56 prng->yarrow.cipher = register_cipher(&blowfish_desc); 58 prng->yarrow.cipher = register_cipher(&twofish_desc); 60 prng->yarrow.cipher = register_cipher(&rc6_desc); 62 prng->yarrow.cipher = register_cipher(&rc5_desc); 64 prng->yarrow.cipher [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
H A D | evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
/external/openssl/crypto/evp/ |
H A D | evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | CipherTest.java | 65 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); 66 assertNotNull("Received a null Cipher instance", cipher); 81 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); 82 assertNotNull("Cipher.getInstance() returned a null value", cipher); 86 cipher = Cipher.getInstance("DoBeDoBeDo", providers[i]); 122 Cipher cipher = Cipher.getInstance("DES", providers[i]); 123 assertNotNull("Cipher.getInstance() returned a null value", cipher); 138 Cipher cipher = Cipher.getInstance("AES", provider.getName()); 139 Provider cipherProvider = cipher.getProvider(); 152 Cipher cipher [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
H A D | p12_crpt.c | 70 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) 96 iter, EVP_CIPHER_key_length(cipher), key, md)) { 102 iter, EVP_CIPHER_iv_length(cipher), iv, md)) { 108 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de); 69 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
H A D | ocb_decrypt.c | 23 @param ct The ciphertext (length of the block size of the block cipher) 36 /* check if valid cipher */ 37 if ((err = cipher_is_valid(ocb->cipher)) != CRYPT_OK) { 40 LTC_ARGCHK(cipher_descriptor[ocb->cipher].ecb_decrypt != NULL); 43 if (ocb->block_len != cipher_descriptor[ocb->cipher].block_length) { 54 if ((err = cipher_descriptor[ocb->cipher].ecb_decrypt(tmp, pt, &ocb->key)) != CRYPT_OK) {
|