/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | x_pkey.c | 84 ret->cipher.cipher=NULL; 87 /*ret->cipher.cipher=EVP_get_cipherbyname( 90 if (ret->cipher.cipher == NULL) 105 memcpy(ret->cipher.iv, 109 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH); 126 ret->cipher.cipher [all...] |
/external/openssl/crypto/asn1/ |
H A D | x_pkey.c | 82 ret->cipher.cipher=EVP_get_cipherbyname( 84 if (ret->cipher.cipher == NULL) 99 memcpy(ret->cipher.iv, 103 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH); 120 ret->cipher.cipher=NULL; 121 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
|
H A D | p5_pbev2.c | 89 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, 100 alg_nid = EVP_CIPHER_type(cipher); 117 if (EVP_CIPHER_iv_length(cipher)) 120 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher)); 121 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0) 128 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0)) 136 /* If prf NID unspecified see if cipher has a preference. 150 keylen = EVP_CIPHER_key_length(cipher); 194 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 197 return PKCS5_pbe2_set_iv(cipher, ite [all...] |
/external/srtp/ |
H A D | Android.mk | 9 crypto/cipher/cipher.c \ 10 crypto/cipher/null_cipher.c \ 11 crypto/cipher/aes.c \ 12 crypto/cipher/aes_icm.c \ 13 crypto/cipher/aes_cbc.c \
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-unwrap.c | 22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 35 os_memcpy(a, cipher, 8); 37 os_memcpy(r, cipher + 8, 8 * n);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-unwrap.c | 22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 35 os_memcpy(a, cipher, 8); 37 os_memcpy(r, cipher + 8, 8 * n);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-unwrap.c | 22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 35 os_memcpy(a, cipher, 8); 37 os_memcpy(r, cipher + 8, 8 * n);
|
/external/openssl/crypto/evp/ |
H A D | evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
H A D | p5_crpt.c | 73 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, 129 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); 130 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 131 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); 132 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), 133 EVP_CIPHER_iv_length(cipher)); 134 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de)) 72 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | bio_enc.c | 83 EVP_CIPHER_CTX cipher; member in struct:enc_struct 92 BIO_TYPE_CIPHER,"cipher", 114 EVP_CIPHER_CTX_init(&ctx->cipher); 134 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 187 i=EVP_CipherFinal_ex(&(ctx->cipher), 201 EVP_CipherUpdate(&(ctx->cipher), 260 EVP_CipherUpdate(&(ctx->cipher), 301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 302 ctx->cipher.encrypt); 335 ret=EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | CipherTest.java | 65 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); 66 assertNotNull("Received a null Cipher instance", cipher); 81 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); 82 assertNotNull("Cipher.getInstance() returned a null value", cipher); 86 cipher = Cipher.getInstance("DoBeDoBeDo", providers[i]); 122 Cipher cipher = Cipher.getInstance("DES", providers[i]); 123 assertNotNull("Cipher.getInstance() returned a null value", cipher); 138 Cipher cipher = Cipher.getInstance("AES", provider.getName()); 139 Provider cipherProvider = cipher.getProvider(); 152 Cipher cipher [all...] |
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
H A D | rijndael-api-fst.c | 79 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument 81 cipher->mode = mode; 86 bcopy(IV, cipher->IV, MAX_IV_SIZE); 88 bzero(cipher->IV, MAX_IV_SIZE); 93 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument 98 if (cipher == NULL || 109 switch (cipher->mode) { 120 bcopy(cipher->IV, block, 16); 127 ((word32*)block)[0] = ((word32*)cipher->IV)[0] ^ ((word32*)input)[0]; 128 ((word32*)block)[1] = ((word32*)cipher 207 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument 270 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument 368 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument 460 rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer, int rounds) argument [all...] |
/external/openssl/crypto/pkcs12/ |
H A D | p12_crpt.c | 70 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) 96 iter, EVP_CIPHER_key_length(cipher), key, md)) { 102 iter, EVP_CIPHER_iv_length(cipher), iv, md)) { 108 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de); 69 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
H A D | p12_p8e.c | 63 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
H A D | CipherSpi.java | 44 private AsymmetricBlockCipher cipher; field in class:CipherSpi 54 cipher = engine; 77 cipher = engine; 92 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue()); 100 return cipher.getInputBlockSize(); 132 return cipher.getOutputBlockSize(); 196 cipher = new RSABlindedEngine(); 200 cipher = new PKCS1Encoding(new RSABlindedEngine()); 205 // cipher = new ISO9796d1Encoding(new RSABlindedEngine()); 309 cipher [all...] |
H A D | DigestSignatureSpi.java | 52 private AsymmetricBlockCipher cipher; field in class:DigestSignatureSpi 58 AsymmetricBlockCipher cipher) 61 this.cipher = cipher; 69 AsymmetricBlockCipher cipher) 72 this.cipher = cipher; 88 cipher.init(false, param); 104 cipher.init(true, param); 145 return cipher 56 DigestSignatureSpi( Digest digest, AsymmetricBlockCipher cipher) argument 66 DigestSignatureSpi( ASN1ObjectIdentifier objId, Digest digest, AsymmetricBlockCipher cipher) argument [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | d1_enc.c | 160 else if ( EVP_CIPHER_block_size(ds->cipher) > 1) 162 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) <= 0) 195 bs=EVP_CIPHER_block_size(ds->cipher); 217 ds->buf_len, ds->cipher->key_len, 219 ds->cipher->iv_len); 221 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
H A D | cipher_test.c | 60 #include <openssl/cipher.h> 133 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c), 291 static int test_cipher(const char *cipher, const uint8_t *key, int kn, argument 298 if (strcmp(cipher, "DES-CBC") == 0) { 300 } else if (strcmp(cipher, "DES-EDE3-CBC") == 0) { 302 } else if (strcmp(cipher, "RC4") == 0) { 304 } else if (strcmp(cipher, "AES-128-ECB") == 0) { 306 } else if (strcmp(cipher, "AES-256-ECB") == 0) { 308 } else if (strcmp(cipher, "AES-128-CBC") == 0) { 310 } else if (strcmp(cipher, "AE 355 char *cipher; local [all...] |
H A D | e_null.c | 57 #include <openssl/cipher.h>
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
H A D | BaseStreamCipher.java | 48 private StreamCipher cipher; field in class:BaseStreamCipher 60 cipher = engine; 70 cipher = new StreamBlockCipher(engine); 185 param = PBE.Util.makePBEParameters(k, params, cipher.getAlgorithmName()); 241 cipher.init(true, param); 245 cipher.init(false, param); 314 cipher.processBytes(input, inputOffset, inputLen, out, 0); 329 cipher.processBytes(input, inputOffset, inputLen, output, outputOffset); 348 cipher.reset(); 353 cipher [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | cipher.h | 73 * cipher algorithm. */ 90 /* EVP_enc_null returns a 'cipher' that passes plaintext through as 94 /* EVP_rc2_40_cbc returns a cipher that implements 40-bit RC2 in CBC mode. This 96 * files, which often encrypt the certificate chain using this cipher. It is 100 /* EVP_get_cipherbynid returns the cipher corresponding to the given NID, or 101 * NULL if no such cipher is known. */ 134 * |enc| is zero) operation using |cipher|. If |ctx| has been previously 135 * configured with a cipher then |cipher|, |key| and |iv| may be |NULL| and 141 const EVP_CIPHER *cipher, ENGIN 397 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st 444 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
H A D | p5_pbev2.c | 58 #include <openssl/cipher.h> 113 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, argument 124 alg_nid = EVP_CIPHER_nid(cipher); 140 if (EVP_CIPHER_iv_length(cipher)) 143 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher)); 144 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0) 151 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0)) 158 /* If prf NID unspecified see if cipher has a preference. 172 keylen = EVP_CIPHER_key_length(cipher); 216 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, in argument [all...] |
/external/chromium_org/third_party/libsrtp/srtp/crypto/ |
H A D | Makefile | 76 ciphers = cipher/cipher.o cipher/null_cipher.o \ 77 cipher/aes.o cipher/aes_icm.o \ 78 cipher/aes_cbc.o
|
/external/openssl/android.testssl/ |
H A D | testssl | 128 for cipher in `adb shell /system/bin/openssl ciphers "RSA+$protocol" | tr ':' ' '`; do 129 echo "Testing $cipher" 134 $ssltest -cipher $cipher $prot 136 echo "Failed $cipher" 148 $ssltest -v -bio_pair -tls1 -cipher ADH -dhe1024dsa -num 10 -f -time $extra || exit 1 166 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1 169 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1 175 $ssltest -tls1 -cipher SRP -srpuser test -srppass abc123 178 $ssltest -bio_pair -tls1 -cipher SR [all...] |
/external/openssl/ssl/ |
H A D | d1_enc.c | 164 else if ( EVP_CIPHER_block_size(ds->cipher) > 1) 166 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) <= 0) 199 bs=EVP_CIPHER_block_size(ds->cipher); 226 ds->buf_len, ds->cipher->key_len, 228 ds->cipher->iv_len); 230 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|