Searched refs:cipher (Results 26 - 50 of 324) sorted by relevance

1234567891011>>

/external/chromium_org/third_party/boringssl/src/crypto/x509/
H A Dx_pkey.c84 ret->cipher.cipher=NULL;
87 /*ret->cipher.cipher=EVP_get_cipherbyname(
90 if (ret->cipher.cipher == NULL)
105 memcpy(ret->cipher.iv,
109 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
126 ret->cipher.cipher
[all...]
/external/openssl/crypto/asn1/
H A Dx_pkey.c82 ret->cipher.cipher=EVP_get_cipherbyname(
84 if (ret->cipher.cipher == NULL)
99 memcpy(ret->cipher.iv,
103 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
120 ret->cipher.cipher=NULL;
121 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
H A Dp5_pbev2.c89 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
100 alg_nid = EVP_CIPHER_type(cipher);
117 if (EVP_CIPHER_iv_length(cipher))
120 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher));
121 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0)
128 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0))
136 /* If prf NID unspecified see if cipher has a preference.
150 keylen = EVP_CIPHER_key_length(cipher);
194 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
197 return PKCS5_pbe2_set_iv(cipher, ite
[all...]
/external/srtp/
H A DAndroid.mk9 crypto/cipher/cipher.c \
10 crypto/cipher/null_cipher.c \
11 crypto/cipher/aes.c \
12 crypto/cipher/aes_icm.c \
13 crypto/cipher/aes_cbc.c \
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-unwrap.c22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
35 os_memcpy(a, cipher, 8);
37 os_memcpy(r, cipher + 8, 8 * n);
/external/wpa_supplicant_8/src/crypto/
H A Daes-unwrap.c22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
35 os_memcpy(a, cipher, 8);
37 os_memcpy(r, cipher + 8, 8 * n);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-unwrap.c22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument
35 os_memcpy(a, cipher, 8);
37 os_memcpy(r, cipher + 8, 8 * n);
/external/openssl/crypto/evp/
H A Devp_test.c146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c),
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, argument
252 c=EVP_get_cipherbyname(cipher);
359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
368 char *cipher; local
378 cipher=sstrsep(&p,":");
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
397 && !test_digest(cipher,plaintext,pn,ciphertext,cn))
400 if (strstr(cipher, "AES") == cipher)
[all...]
H A Dp5_crpt.c73 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md,
129 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp));
130 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher));
131 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16);
132 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)),
133 EVP_CIPHER_iv_length(cipher));
134 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de))
72 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
H A Dbio_enc.c83 EVP_CIPHER_CTX cipher; member in struct:enc_struct
92 BIO_TYPE_CIPHER,"cipher",
114 EVP_CIPHER_CTX_init(&ctx->cipher);
134 EVP_CIPHER_CTX_cleanup(&(b->cipher));
187 i=EVP_CipherFinal_ex(&(ctx->cipher),
201 EVP_CipherUpdate(&(ctx->cipher),
260 EVP_CipherUpdate(&(ctx->cipher),
301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL,
302 ctx->cipher.encrypt);
335 ret=EVP_CipherFinal_ex(&(ctx->cipher),
[all...]
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
H A DCipherTest.java65 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding");
66 assertNotNull("Received a null Cipher instance", cipher);
81 Cipher cipher = Cipher.getInstance("DES", providers[i].getName());
82 assertNotNull("Cipher.getInstance() returned a null value", cipher);
86 cipher = Cipher.getInstance("DoBeDoBeDo", providers[i]);
122 Cipher cipher = Cipher.getInstance("DES", providers[i]);
123 assertNotNull("Cipher.getInstance() returned a null value", cipher);
138 Cipher cipher = Cipher.getInstance("AES", provider.getName());
139 Provider cipherProvider = cipher.getProvider();
152 Cipher cipher
[all...]
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/
H A Drijndael-api-fst.c79 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument
81 cipher->mode = mode;
86 bcopy(IV, cipher->IV, MAX_IV_SIZE);
88 bzero(cipher->IV, MAX_IV_SIZE);
93 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, argument
98 if (cipher == NULL ||
109 switch (cipher->mode) {
120 bcopy(cipher->IV, block, 16);
127 ((word32*)block)[0] = ((word32*)cipher->IV)[0] ^ ((word32*)input)[0];
128 ((word32*)block)[1] = ((word32*)cipher
207 rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument
270 rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer) argument
368 rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputOctets, BYTE *outBuffer) argument
460 rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer, int rounds) argument
[all...]
/external/openssl/crypto/pkcs12/
H A Dp12_crpt.c70 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de)
96 iter, EVP_CIPHER_key_length(cipher), key, md)) {
102 iter, EVP_CIPHER_iv_length(cipher), iv, md)) {
108 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de);
69 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
H A Dp12_p8e.c63 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
H A DCipherSpi.java44 private AsymmetricBlockCipher cipher; field in class:CipherSpi
54 cipher = engine;
77 cipher = engine;
92 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue());
100 return cipher.getInputBlockSize();
132 return cipher.getOutputBlockSize();
196 cipher = new RSABlindedEngine();
200 cipher = new PKCS1Encoding(new RSABlindedEngine());
205 // cipher = new ISO9796d1Encoding(new RSABlindedEngine());
309 cipher
[all...]
H A DDigestSignatureSpi.java52 private AsymmetricBlockCipher cipher; field in class:DigestSignatureSpi
58 AsymmetricBlockCipher cipher)
61 this.cipher = cipher;
69 AsymmetricBlockCipher cipher)
72 this.cipher = cipher;
88 cipher.init(false, param);
104 cipher.init(true, param);
145 return cipher
56 DigestSignatureSpi( Digest digest, AsymmetricBlockCipher cipher) argument
66 DigestSignatureSpi( ASN1ObjectIdentifier objId, Digest digest, AsymmetricBlockCipher cipher) argument
[all...]
/external/chromium_org/third_party/boringssl/src/ssl/
H A Dd1_enc.c160 else if ( EVP_CIPHER_block_size(ds->cipher) > 1)
162 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) <= 0)
195 bs=EVP_CIPHER_block_size(ds->cipher);
217 ds->buf_len, ds->cipher->key_len,
219 ds->cipher->iv_len);
221 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
/external/chromium_org/third_party/boringssl/src/crypto/cipher/
H A Dcipher_test.c60 #include <openssl/cipher.h>
133 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c),
291 static int test_cipher(const char *cipher, const uint8_t *key, int kn, argument
298 if (strcmp(cipher, "DES-CBC") == 0) {
300 } else if (strcmp(cipher, "DES-EDE3-CBC") == 0) {
302 } else if (strcmp(cipher, "RC4") == 0) {
304 } else if (strcmp(cipher, "AES-128-ECB") == 0) {
306 } else if (strcmp(cipher, "AES-256-ECB") == 0) {
308 } else if (strcmp(cipher, "AES-128-CBC") == 0) {
310 } else if (strcmp(cipher, "AE
355 char *cipher; local
[all...]
H A De_null.c57 #include <openssl/cipher.h>
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/
H A DBaseStreamCipher.java48 private StreamCipher cipher; field in class:BaseStreamCipher
60 cipher = engine;
70 cipher = new StreamBlockCipher(engine);
185 param = PBE.Util.makePBEParameters(k, params, cipher.getAlgorithmName());
241 cipher.init(true, param);
245 cipher.init(false, param);
314 cipher.processBytes(input, inputOffset, inputLen, out, 0);
329 cipher.processBytes(input, inputOffset, inputLen, output, outputOffset);
348 cipher.reset();
353 cipher
[all...]
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Dcipher.h73 * cipher algorithm. */
90 /* EVP_enc_null returns a 'cipher' that passes plaintext through as
94 /* EVP_rc2_40_cbc returns a cipher that implements 40-bit RC2 in CBC mode. This
96 * files, which often encrypt the certificate chain using this cipher. It is
100 /* EVP_get_cipherbynid returns the cipher corresponding to the given NID, or
101 * NULL if no such cipher is known. */
134 * |enc| is zero) operation using |cipher|. If |ctx| has been previously
135 * configured with a cipher then |cipher|, |key| and |iv| may be |NULL| and
141 const EVP_CIPHER *cipher, ENGIN
397 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
444 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/
H A Dp5_pbev2.c58 #include <openssl/cipher.h>
113 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, argument
124 alg_nid = EVP_CIPHER_nid(cipher);
140 if (EVP_CIPHER_iv_length(cipher))
143 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher));
144 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0)
151 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0))
158 /* If prf NID unspecified see if cipher has a preference.
172 keylen = EVP_CIPHER_key_length(cipher);
216 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, in argument
[all...]
/external/chromium_org/third_party/libsrtp/srtp/crypto/
H A DMakefile76 ciphers = cipher/cipher.o cipher/null_cipher.o \
77 cipher/aes.o cipher/aes_icm.o \
78 cipher/aes_cbc.o
/external/openssl/android.testssl/
H A Dtestssl128 for cipher in `adb shell /system/bin/openssl ciphers "RSA+$protocol" | tr ':' ' '`; do
129 echo "Testing $cipher"
134 $ssltest -cipher $cipher $prot
136 echo "Failed $cipher"
148 $ssltest -v -bio_pair -tls1 -cipher ADH -dhe1024dsa -num 10 -f -time $extra || exit 1
166 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1
169 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1
175 $ssltest -tls1 -cipher SRP -srpuser test -srppass abc123
178 $ssltest -bio_pair -tls1 -cipher SR
[all...]
/external/openssl/ssl/
H A Dd1_enc.c164 else if ( EVP_CIPHER_block_size(ds->cipher) > 1)
166 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) <= 0)
199 bs=EVP_CIPHER_block_size(ds->cipher);
226 ds->buf_len, ds->cipher->key_len,
228 ds->cipher->iv_len);
230 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);

Completed in 2080 milliseconds

1234567891011>>