/external/srtp/crypto/ |
H A D | Makefile | 69 ciphers = cipher/cipher.o cipher/null_cipher.o \ 70 cipher/aes.o cipher/aes_icm.o \ 71 cipher/aes_cbc.o
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | JCEStreamCipher.java | 72 private StreamCipher cipher; field in class:JCEStreamCipher 86 cipher = engine; 96 cipher = new StreamBlockCipher(engine); 211 param = PBE.Util.makePBEParameters(k, params, cipher.getAlgorithmName()); 265 cipher.init(true, param); 269 cipher.init(false, param); 333 cipher.processBytes(input, inputOffset, inputLen, out, 0); 348 cipher.processBytes(input, inputOffset, inputLen, output, outputOffset); 368 cipher.reset(); 373 cipher [all...] |
/external/openssl/crypto/cmac/ |
H A D | cmac.h | 74 const EVP_CIPHER *cipher, ENGINE *impl);
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_enc.c | 71 PKCS7_cipher(PKCS7 *p7,EVP_CIPHER *cipher);
|
/external/openssl/include/openssl/ |
H A D | cmac.h | 74 const EVP_CIPHER *cipher, ENGINE *impl);
|
/external/openssl/apps/ |
H A D | enc.c | 124 const EVP_CIPHER *cipher=NULL,*c; local 154 cipher=EVP_get_cipherbyname(pname); 156 if (!do_zlib && !base64 && (cipher == NULL) 159 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 162 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 292 cipher=c; 295 cipher=NULL; 336 if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER) 342 if (cipher [all...] |
H A D | smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher [all...] |
H A D | pkey.c | 75 const EVP_CIPHER *cipher = NULL; local 172 cipher = EVP_get_cipherbyname(*args + 1); 173 if (!cipher) 175 BIO_printf(bio_err, "Unknown cipher %s\n", 246 PEM_write_bio_PrivateKey(out, pkey, cipher,
|
/external/openssl/crypto/evp/ |
H A D | openbsd_hw.c | 130 static int dev_crypto_init_key(EVP_CIPHER_CTX *ctx,int cipher, 138 assert(ctx->cipher->iv_len <= MAX_HW_IV); 142 CDATA(ctx)->cipher=cipher; 170 assert((inl&(ctx->cipher->block_size-1)) == 0); 174 if(ctx->cipher->iv_len) 178 memcpy(lb,&in[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len); 231 memcpy(ctx->iv,&out[cryp.len-ctx->cipher->iv_len],ctx->cipher [all...] |
H A D | evp_pbe.c | 71 /* Setup a cipher context from a PBE algorithm */ 158 const EVP_CIPHER *cipher; local 180 cipher = NULL; 183 cipher = EVP_get_cipherbynid(cipher_nid); 184 if (!cipher) 203 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) 257 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, argument 261 if (cipher) 262 cipher_nid = EVP_CIPHER_nid(cipher);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/ |
H A D | OAEPEncoding.java | 28 AsymmetricBlockCipher cipher) 31 this(cipher, AndroidDigestFactory.getSHA1(), null); 36 AsymmetricBlockCipher cipher, 39 this(cipher, hash, null); 43 AsymmetricBlockCipher cipher, 47 this(cipher, hash, hash, encodingParams); 51 AsymmetricBlockCipher cipher, 56 this.engine = cipher; 27 OAEPEncoding( AsymmetricBlockCipher cipher) argument 35 OAEPEncoding( AsymmetricBlockCipher cipher, Digest hash) argument 42 OAEPEncoding( AsymmetricBlockCipher cipher, Digest hash, byte[] encodingParams) argument 50 OAEPEncoding( AsymmetricBlockCipher cipher, Digest hash, Digest mgf1Hash, byte[] encodingParams) argument
|
/external/chromium_org/content/child/webcrypto/openssl/ |
H A D | aes_ctr_openssl.cc | 44 Status AesCtrEncrypt128BitCounter(const EVP_CIPHER* cipher, argument 49 DCHECK(cipher); 60 cipher, 178 const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(raw_key.size()); local 179 if (!cipher) 221 return AesCtrEncrypt128BitCounter(cipher, 240 AesCtrEncrypt128BitCounter(cipher, 253 cipher,
|
H A D | aes_cbc_openssl.cc | 74 const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(raw_key.size()); local 75 DCHECK(cipher); 78 cipher,
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | x_exten.c | 59 #include <openssl/cipher.h>
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_ciph.c | 112 * ECC cipher suite support in OpenSSL originally developed by 171 const SSL_CIPHER *cipher; member in struct:cipher_order_st 243 * for |s->cipher|. It returns 1 on success and 0 on error. */ 246 const SSL_CIPHER *c = s->cipher; 283 c=s->cipher; 316 /* TODO(fork): enable the stitched cipher modes. */ 343 c=s->cipher; 444 co_list[co_list_num].cipher = c; 501 *ca_curr = ciph_curr->cipher; 510 * or represent a cipher strengt 1211 SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) argument 1382 SSL_CIPHER_get_kx_name(const SSL_CIPHER *cipher) argument 1462 ssl_cipher_has_server_public_key(const SSL_CIPHER *cipher) argument 1489 ssl_cipher_requires_server_key_exchange(const SSL_CIPHER *cipher) argument [all...] |
H A D | ssl_test.c | 177 /* Empty cipher lists error at SSL_CTX_set_cipher_list. */ 195 const SSL_CIPHER *cipher = sk_SSL_CIPHER_value(list->ciphers, i); local 204 fprintf(stderr, "%s\n", SSL_CIPHER_get_name(cipher)); 218 fprintf(stderr, "Error testing cipher rule '%s'\n", t->rule); 225 const SSL_CIPHER *cipher = local 227 if (t->expected[i].id != SSL_CIPHER_get_id(cipher) || 229 fprintf(stderr, "Error: cipher rule '%s' evaluted to:\n", t->rule); 236 fprintf(stderr, "Error: cipher rule '%s' evaluted to:\n", t->rule);
|
/external/openssl/crypto/cms/ |
H A D | cms_enc.c | 83 enc = ec->cipher ? 1 : 0; 97 ciph = ec->cipher; 98 /* If not keeping key set cipher to NULL so subsequent calls 102 ec->cipher = NULL; 240 const EVP_CIPHER *cipher, 243 ec->cipher = cipher; 252 if (cipher) 291 if (enc->encryptedContentInfo->cipher && enc->unprotectedAttrs) 239 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument
|
/external/chromium_org/crypto/ |
H A D | encryptor_openssl.cc | 98 const EVP_CIPHER* cipher = GetCipherForKey(key_); local 99 DCHECK(cipher); // Already handled in Init(); 102 DCHECK_EQ(EVP_CIPHER_iv_length(cipher), iv_.length()); 103 DCHECK_EQ(EVP_CIPHER_key_length(cipher), key.length()); 106 if (!EVP_CipherInit_ex(ctx.get(), cipher, NULL,
|
/external/openssl/crypto/pem/ |
H A D | pem_seal.c | 102 EVP_CIPHER_CTX_init(&ctx->cipher); 103 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 137 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i); 167 if (!EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i)) 181 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 406 static int wpa_cipher_valid_group(int cipher) argument 408 return wpa_cipher_valid_pairwise(cipher) || 409 cipher == WPA_CIPHER_WEP104 || 410 cipher == WPA_CIPHER_WEP40 || 411 cipher == WPA_CIPHER_GTK_NOT_USED; 416 int wpa_cipher_valid_mgmt_group(int cipher) argument 418 return cipher == WPA_CIPHER_AES_128_CMAC || 419 cipher == WPA_CIPHER_BIP_GMAC_128 || 420 cipher == WPA_CIPHER_BIP_GMAC_256 || 421 cipher 936 wpa_cipher_txt(int cipher) argument 1146 wpa_cipher_key_len(int cipher) argument 1171 wpa_cipher_rsc_len(int cipher) argument 1189 wpa_cipher_to_alg(int cipher) argument 1218 wpa_cipher_valid_pairwise(int cipher) argument 1228 wpa_cipher_to_suite(int proto, int cipher) argument [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.c | 406 static int wpa_cipher_valid_group(int cipher) argument 408 return wpa_cipher_valid_pairwise(cipher) || 409 cipher == WPA_CIPHER_WEP104 || 410 cipher == WPA_CIPHER_WEP40 || 411 cipher == WPA_CIPHER_GTK_NOT_USED; 416 int wpa_cipher_valid_mgmt_group(int cipher) argument 418 return cipher == WPA_CIPHER_AES_128_CMAC || 419 cipher == WPA_CIPHER_BIP_GMAC_128 || 420 cipher == WPA_CIPHER_BIP_GMAC_256 || 421 cipher 936 wpa_cipher_txt(int cipher) argument 1146 wpa_cipher_key_len(int cipher) argument 1171 wpa_cipher_rsc_len(int cipher) argument 1189 wpa_cipher_to_alg(int cipher) argument 1218 wpa_cipher_valid_pairwise(int cipher) argument 1228 wpa_cipher_to_suite(int proto, int cipher) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 406 static int wpa_cipher_valid_group(int cipher) argument 408 return wpa_cipher_valid_pairwise(cipher) || 409 cipher == WPA_CIPHER_WEP104 || 410 cipher == WPA_CIPHER_WEP40 || 411 cipher == WPA_CIPHER_GTK_NOT_USED; 416 int wpa_cipher_valid_mgmt_group(int cipher) argument 418 return cipher == WPA_CIPHER_AES_128_CMAC || 419 cipher == WPA_CIPHER_BIP_GMAC_128 || 420 cipher == WPA_CIPHER_BIP_GMAC_256 || 421 cipher 936 wpa_cipher_txt(int cipher) argument 1146 wpa_cipher_key_len(int cipher) argument 1171 wpa_cipher_rsc_len(int cipher) argument 1189 wpa_cipher_to_alg(int cipher) argument 1218 wpa_cipher_valid_pairwise(int cipher) argument 1228 wpa_cipher_to_suite(int proto, int cipher) argument [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/pem/ |
H A D | pem_lib.c | 230 EVP_CIPHER_INFO cipher; local 249 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; 250 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; 316 /* actually it needs the cipher block size extra... */ 390 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, argument 401 if (cipher->cipher == NULL) return(1); 412 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher 448 PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cipher) argument [all...] |
/external/openssl/crypto/engine/ |
H A D | eng_openssl.c | 113 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 215 * we're asked for a cipher we don't support (should not happen). 218 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler. 277 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, argument 280 if(!cipher) 286 /* We are being asked for a specific cipher */ 288 *cipher = &test_r4_cipher; 290 *cipher = &test_r4_40_cipher; 297 *cipher = NULL;
|
/external/srtp/ |
H A D | Makefile | 75 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \ 76 crypto/cipher/aes.o crypto/cipher/aes_icm.o \ 77 crypto/cipher/aes_cbc.o
|