Searched refs:cipher (Results 51 - 75 of 324) sorted by relevance

1234567891011>>

/external/srtp/crypto/
H A DMakefile69 ciphers = cipher/cipher.o cipher/null_cipher.o \
70 cipher/aes.o cipher/aes_icm.o \
71 cipher/aes_cbc.o
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
H A DJCEStreamCipher.java72 private StreamCipher cipher; field in class:JCEStreamCipher
86 cipher = engine;
96 cipher = new StreamBlockCipher(engine);
211 param = PBE.Util.makePBEParameters(k, params, cipher.getAlgorithmName());
265 cipher.init(true, param);
269 cipher.init(false, param);
333 cipher.processBytes(input, inputOffset, inputLen, out, 0);
348 cipher.processBytes(input, inputOffset, inputLen, output, outputOffset);
368 cipher.reset();
373 cipher
[all...]
/external/openssl/crypto/cmac/
H A Dcmac.h74 const EVP_CIPHER *cipher, ENGINE *impl);
/external/openssl/crypto/pkcs7/
H A Dpk7_enc.c71 PKCS7_cipher(PKCS7 *p7,EVP_CIPHER *cipher);
/external/openssl/include/openssl/
H A Dcmac.h74 const EVP_CIPHER *cipher, ENGINE *impl);
/external/openssl/apps/
H A Denc.c124 const EVP_CIPHER *cipher=NULL,*c; local
154 cipher=EVP_get_cipherbyname(pname);
156 if (!do_zlib && !base64 && (cipher == NULL)
159 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
162 BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
292 cipher=c;
295 cipher=NULL;
336 if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER)
342 if (cipher
[all...]
H A Dsmime.c98 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_des_ede3_cbc();
154 cipher = EVP_des_cbc();
158 cipher = EVP_seed_cbc();
162 cipher = EVP_rc2_40_cbc();
164 cipher = EVP_rc2_cbc();
166 cipher = EVP_rc2_64_cbc();
170 cipher = EVP_aes_128_cbc();
172 cipher = EVP_aes_192_cbc();
174 cipher
[all...]
H A Dpkey.c75 const EVP_CIPHER *cipher = NULL; local
172 cipher = EVP_get_cipherbyname(*args + 1);
173 if (!cipher)
175 BIO_printf(bio_err, "Unknown cipher %s\n",
246 PEM_write_bio_PrivateKey(out, pkey, cipher,
/external/openssl/crypto/evp/
H A Dopenbsd_hw.c130 static int dev_crypto_init_key(EVP_CIPHER_CTX *ctx,int cipher,
138 assert(ctx->cipher->iv_len <= MAX_HW_IV);
142 CDATA(ctx)->cipher=cipher;
170 assert((inl&(ctx->cipher->block_size-1)) == 0);
174 if(ctx->cipher->iv_len)
178 memcpy(lb,&in[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len);
231 memcpy(ctx->iv,&out[cryp.len-ctx->cipher->iv_len],ctx->cipher
[all...]
H A Devp_pbe.c71 /* Setup a cipher context from a PBE algorithm */
158 const EVP_CIPHER *cipher; local
180 cipher = NULL;
183 cipher = EVP_get_cipherbynid(cipher_nid);
184 if (!cipher)
203 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de))
257 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument
261 if (cipher)
262 cipher_nid = EVP_CIPHER_nid(cipher);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/
H A DOAEPEncoding.java28 AsymmetricBlockCipher cipher)
31 this(cipher, AndroidDigestFactory.getSHA1(), null);
36 AsymmetricBlockCipher cipher,
39 this(cipher, hash, null);
43 AsymmetricBlockCipher cipher,
47 this(cipher, hash, hash, encodingParams);
51 AsymmetricBlockCipher cipher,
56 this.engine = cipher;
27 OAEPEncoding( AsymmetricBlockCipher cipher) argument
35 OAEPEncoding( AsymmetricBlockCipher cipher, Digest hash) argument
42 OAEPEncoding( AsymmetricBlockCipher cipher, Digest hash, byte[] encodingParams) argument
50 OAEPEncoding( AsymmetricBlockCipher cipher, Digest hash, Digest mgf1Hash, byte[] encodingParams) argument
/external/chromium_org/content/child/webcrypto/openssl/
H A Daes_ctr_openssl.cc44 Status AesCtrEncrypt128BitCounter(const EVP_CIPHER* cipher, argument
49 DCHECK(cipher);
60 cipher,
178 const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(raw_key.size()); local
179 if (!cipher)
221 return AesCtrEncrypt128BitCounter(cipher,
240 AesCtrEncrypt128BitCounter(cipher,
253 cipher,
H A Daes_cbc_openssl.cc74 const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(raw_key.size()); local
75 DCHECK(cipher);
78 cipher,
/external/chromium_org/third_party/boringssl/src/crypto/x509/
H A Dx_exten.c59 #include <openssl/cipher.h>
/external/chromium_org/third_party/boringssl/src/ssl/
H A Dssl_ciph.c112 * ECC cipher suite support in OpenSSL originally developed by
171 const SSL_CIPHER *cipher; member in struct:cipher_order_st
243 * for |s->cipher|. It returns 1 on success and 0 on error. */
246 const SSL_CIPHER *c = s->cipher;
283 c=s->cipher;
316 /* TODO(fork): enable the stitched cipher modes. */
343 c=s->cipher;
444 co_list[co_list_num].cipher = c;
501 *ca_curr = ciph_curr->cipher;
510 * or represent a cipher strengt
1211 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument
1382 SSL_CIPHER_get_kx_name(const SSL_CIPHER *cipher) argument
1462 ssl_cipher_has_server_public_key(const SSL_CIPHER *cipher) argument
1489 ssl_cipher_requires_server_key_exchange(const SSL_CIPHER *cipher) argument
[all...]
H A Dssl_test.c177 /* Empty cipher lists error at SSL_CTX_set_cipher_list. */
195 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(list->ciphers, i); local
204 fprintf(stderr, "%s\n", SSL_CIPHER_get_name(cipher));
218 fprintf(stderr, "Error testing cipher rule '%s'\n", t->rule);
225 const SSL_CIPHER *cipher = local
227 if (t->expected[i].id != SSL_CIPHER_get_id(cipher) ||
229 fprintf(stderr, "Error: cipher rule '%s' evaluted to:\n", t->rule);
236 fprintf(stderr, "Error: cipher rule '%s' evaluted to:\n", t->rule);
/external/openssl/crypto/cms/
H A Dcms_enc.c83 enc = ec->cipher ? 1 : 0;
97 ciph = ec->cipher;
98 /* If not keeping key set cipher to NULL so subsequent calls
102 ec->cipher = NULL;
240 const EVP_CIPHER *cipher,
243 ec->cipher = cipher;
252 if (cipher)
291 if (enc->encryptedContentInfo->cipher && enc->unprotectedAttrs)
239 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument
/external/chromium_org/crypto/
H A Dencryptor_openssl.cc98 const EVP_CIPHER* cipher = GetCipherForKey(key_); local
99 DCHECK(cipher); // Already handled in Init();
102 DCHECK_EQ(EVP_CIPHER_iv_length(cipher), iv_.length());
103 DCHECK_EQ(EVP_CIPHER_key_length(cipher), key.length());
106 if (!EVP_CipherInit_ex(ctx.get(), cipher, NULL,
/external/openssl/crypto/pem/
H A Dpem_seal.c102 EVP_CIPHER_CTX_init(&ctx->cipher);
103 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk);
137 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i);
167 if (!EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i))
181 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.c406 static int wpa_cipher_valid_group(int cipher) argument
408 return wpa_cipher_valid_pairwise(cipher) ||
409 cipher == WPA_CIPHER_WEP104 ||
410 cipher == WPA_CIPHER_WEP40 ||
411 cipher == WPA_CIPHER_GTK_NOT_USED;
416 int wpa_cipher_valid_mgmt_group(int cipher) argument
418 return cipher == WPA_CIPHER_AES_128_CMAC ||
419 cipher == WPA_CIPHER_BIP_GMAC_128 ||
420 cipher == WPA_CIPHER_BIP_GMAC_256 ||
421 cipher
936 wpa_cipher_txt(int cipher) argument
1146 wpa_cipher_key_len(int cipher) argument
1171 wpa_cipher_rsc_len(int cipher) argument
1189 wpa_cipher_to_alg(int cipher) argument
1218 wpa_cipher_valid_pairwise(int cipher) argument
1228 wpa_cipher_to_suite(int proto, int cipher) argument
[all...]
/external/wpa_supplicant_8/src/common/
H A Dwpa_common.c406 static int wpa_cipher_valid_group(int cipher) argument
408 return wpa_cipher_valid_pairwise(cipher) ||
409 cipher == WPA_CIPHER_WEP104 ||
410 cipher == WPA_CIPHER_WEP40 ||
411 cipher == WPA_CIPHER_GTK_NOT_USED;
416 int wpa_cipher_valid_mgmt_group(int cipher) argument
418 return cipher == WPA_CIPHER_AES_128_CMAC ||
419 cipher == WPA_CIPHER_BIP_GMAC_128 ||
420 cipher == WPA_CIPHER_BIP_GMAC_256 ||
421 cipher
936 wpa_cipher_txt(int cipher) argument
1146 wpa_cipher_key_len(int cipher) argument
1171 wpa_cipher_rsc_len(int cipher) argument
1189 wpa_cipher_to_alg(int cipher) argument
1218 wpa_cipher_valid_pairwise(int cipher) argument
1228 wpa_cipher_to_suite(int proto, int cipher) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_common.c406 static int wpa_cipher_valid_group(int cipher) argument
408 return wpa_cipher_valid_pairwise(cipher) ||
409 cipher == WPA_CIPHER_WEP104 ||
410 cipher == WPA_CIPHER_WEP40 ||
411 cipher == WPA_CIPHER_GTK_NOT_USED;
416 int wpa_cipher_valid_mgmt_group(int cipher) argument
418 return cipher == WPA_CIPHER_AES_128_CMAC ||
419 cipher == WPA_CIPHER_BIP_GMAC_128 ||
420 cipher == WPA_CIPHER_BIP_GMAC_256 ||
421 cipher
936 wpa_cipher_txt(int cipher) argument
1146 wpa_cipher_key_len(int cipher) argument
1171 wpa_cipher_rsc_len(int cipher) argument
1189 wpa_cipher_to_alg(int cipher) argument
1218 wpa_cipher_valid_pairwise(int cipher) argument
1228 wpa_cipher_to_suite(int proto, int cipher) argument
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/pem/
H A Dpem_lib.c230 EVP_CIPHER_INFO cipher; local
249 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err;
250 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err;
316 /* actually it needs the cipher block size extra... */
390 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument
401 if (cipher->cipher == NULL) return(1);
412 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher
448 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument
[all...]
/external/openssl/crypto/engine/
H A Deng_openssl.c113 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher,
215 * we're asked for a cipher we don't support (should not happen).
218 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler.
277 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument
280 if(!cipher)
286 /* We are being asked for a specific cipher */
288 *cipher = &test_r4_cipher;
290 *cipher = &test_r4_40_cipher;
297 *cipher = NULL;
/external/srtp/
H A DMakefile75 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \
76 crypto/cipher/aes.o crypto/cipher/aes_icm.o \
77 crypto/cipher/aes_cbc.o

Completed in 895 milliseconds

1234567891011>>