/external/chromium_org/net/ssl/ |
H A D | ssl_cipher_suite_names_unittest.cc | 15 const char *key_exchange, *cipher, *mac; local 18 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xc001); 20 EXPECT_STREQ("NULL", cipher); 24 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x009f); 26 EXPECT_STREQ("AES_256_GCM", cipher); 30 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xff31); 32 EXPECT_STREQ("???", cipher); 60 // Picked some random cipher suites. 67 // Non-existent cipher suite.
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_p8e.c | 63 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, argument 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
|
H A D | p12_crpt.c | 70 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) 96 iter, EVP_CIPHER_key_length(cipher), key, md)) { 102 iter, EVP_CIPHER_iv_length(cipher), iv, md)) { 108 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de); 69 PKCS12_PBE_keyivgen(EVP_CIPHER_CTX *ctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-unwrap.c | 22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 35 os_memcpy(a, cipher, 8); 37 os_memcpy(r, cipher + 8, 8 * n);
|
H A D | aes-wrap.c | 23 * @cipher: Wrapped key, (n + 1) * 64 bits 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 33 a = cipher; 34 r = cipher + 8; 52 r = cipher + 8; 71 * These are already in @cipher due to the location of temporary
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-unwrap.c | 22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 35 os_memcpy(a, cipher, 8); 37 os_memcpy(r, cipher + 8, 8 * n);
|
H A D | aes-wrap.c | 23 * @cipher: Wrapped key, (n + 1) * 64 bits 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 33 a = cipher; 34 r = cipher + 8; 52 r = cipher + 8; 71 * These are already in @cipher due to the location of temporary
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-unwrap.c | 22 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, argument 35 os_memcpy(a, cipher, 8); 37 os_memcpy(r, cipher + 8, 8 * n);
|
H A D | aes-wrap.c | 23 * @cipher: Wrapped key, (n + 1) * 64 bits 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 33 a = cipher; 34 r = cipher + 8; 52 r = cipher + 8; 71 * These are already in @cipher due to the location of temporary
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
H A D | StreamBlockCipher.java | 10 private BlockCipher cipher; field in class:StreamBlockCipher 17 * @param cipher the block cipher to be wrapped. 18 * @exception IllegalArgumentException if the cipher has a block size other than 22 BlockCipher cipher) 24 if (cipher.getBlockSize() != 1) 26 throw new IllegalArgumentException("block cipher block size != 1."); 29 this.cipher = cipher; 33 * initialise the underlying cipher 21 StreamBlockCipher( BlockCipher cipher) argument [all...] |
H A D | BufferedBlockCipher.java | 9 * Note: in the case where the underlying cipher is either a CFB cipher or an 18 protected BlockCipher cipher; field in class:BufferedBlockCipher 31 * Create a buffered block cipher without padding. 33 * @param cipher the underlying block cipher this buffering object wraps. 36 BlockCipher cipher) 38 this.cipher = cipher; 40 buf = new byte[cipher 35 BufferedBlockCipher( BlockCipher cipher) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
H A D | CTSBlockCipher.java | 9 * A Cipher Text Stealing (CTS) mode cipher. CTS allows block ciphers to 10 * be used to produce cipher text which is the same length as the plain text. 18 * Create a buffered block cipher that uses Cipher Text Stealing 20 * @param cipher the underlying block cipher this buffering object wraps. 23 BlockCipher cipher) 25 if ((cipher instanceof OFBBlockCipher) || (cipher instanceof CFBBlockCipher) || (cipher instanceof SICBlockCipher)) 27 // TODO: This is broken - need to introduce marker interface to differentiate block cipher primitiv 22 CTSBlockCipher( BlockCipher cipher) argument [all...] |
H A D | CBCBlockCipher.java | 10 * implements Cipher-Block-Chaining (CBC) mode on top of a simple cipher. 20 private BlockCipher cipher = null; field in class:CBCBlockCipher 26 * @param cipher the block cipher to be used as the basis of chaining. 29 BlockCipher cipher) 31 this.cipher = cipher; 32 this.blockSize = cipher.getBlockSize(); 40 * return the underlying block cipher that we are wrapping. 42 * @return the underlying block cipher tha 28 CBCBlockCipher( BlockCipher cipher) argument [all...] |
H A D | CFBBlockCipher.java | 10 * implements a Cipher-FeedBack (CFB) mode on top of a simple cipher. 20 private BlockCipher cipher = null; field in class:CFBBlockCipher 26 * @param cipher the block cipher to be used as the basis of the 31 BlockCipher cipher, 34 this.cipher = cipher; 37 this.IV = new byte[cipher.getBlockSize()]; 38 this.cfbV = new byte[cipher.getBlockSize()]; 39 this.cfbOutV = new byte[cipher 30 CFBBlockCipher( BlockCipher cipher, int bitBlockSize) argument [all...] |
H A D | OFBBlockCipher.java | 9 * implements a Output-FeedBack (OFB) mode on top of a simple cipher. 19 private final BlockCipher cipher; field in class:OFBBlockCipher 24 * @param cipher the block cipher to be used as the basis of the 29 BlockCipher cipher, 32 this.cipher = cipher; 35 this.IV = new byte[cipher.getBlockSize()]; 36 this.ofbV = new byte[cipher.getBlockSize()]; 37 this.ofbOutV = new byte[cipher 28 OFBBlockCipher( BlockCipher cipher, int blockSize) argument [all...] |
H A D | SICBlockCipher.java | 10 * block cipher. This mode is also known as CTR mode. 15 private final BlockCipher cipher; field in class:SICBlockCipher 26 * @param c the block cipher to be used. 30 this.cipher = c; 31 this.blockSize = cipher.getBlockSize(); 39 * return the underlying block cipher that we are wrapping. 41 * @return the underlying block cipher that we are wrapping. 45 return cipher; 65 cipher.init(true, ivParam.getParameters()); 76 return cipher [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/paddings/ |
H A D | PaddedBufferedBlockCipher.java | 24 * Create a buffered block cipher with the desired padding. 26 * @param cipher the underlying block cipher this buffering object wraps. 30 BlockCipher cipher, 33 this.cipher = cipher; 36 buf = new byte[cipher.getBlockSize()]; 41 * Create a buffered block cipher PKCS7 padding 43 * @param cipher the underlying block cipher thi 29 PaddedBufferedBlockCipher( BlockCipher cipher, BlockCipherPadding padding) argument 45 PaddedBufferedBlockCipher( BlockCipher cipher) argument [all...] |
/external/chromium_org/content/child/webcrypto/openssl/ |
H A D | aes_cbc_openssl.cc | 74 const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(raw_key.size()); local 75 DCHECK(cipher); 78 cipher,
|
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
H A D | internal.h | 70 /* type contains a NID identifing the cipher. (For example, NID_rc4.) */ 73 /* block_size contains the block size, in bytes, of the cipher, or 1 for a 74 * stream cipher. */ 77 /* key_len contains the key size, in bytes, for the cipher. If the cipher 85 * cipher. */ 97 int (*cipher)(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, member in struct:evp_cipher_st
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/ |
H A D | PKCS1Encoding.java | 40 * @param cipher 43 AsymmetricBlockCipher cipher) 45 this.engine = cipher; 42 PKCS1Encoding( AsymmetricBlockCipher cipher) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
H A D | CBCBlockCipherMac.java | 20 private BlockCipher cipher; field in class:CBCBlockCipherMac 26 * create a standard MAC based on a CBC block cipher. This will produce an 27 * authentication code half the length of the block size of the cipher. 29 * @param cipher the cipher to be used as the basis of the MAC generation. 32 BlockCipher cipher) 34 this(cipher, (cipher.getBlockSize() * 8) / 2, null); 38 * create a standard MAC based on a CBC block cipher. This will produce an 39 * authentication code half the length of the block size of the cipher 31 CBCBlockCipherMac( BlockCipher cipher) argument 44 CBCBlockCipherMac( BlockCipher cipher, BlockCipherPadding padding) argument 64 CBCBlockCipherMac( BlockCipher cipher, int macSizeInBits) argument 85 CBCBlockCipherMac( BlockCipher cipher, int macSizeInBits, BlockCipherPadding padding) argument [all...] |
/external/chromium_org/crypto/ |
H A D | symmetric_key_nss.cc | 108 CK_MECHANISM_TYPE cipher = local 124 PK11SymKey* sym_key = PK11_ImportSymKey(slot.get(), cipher, PK11_OriginUnwrap,
|
/external/openssl/apps/ |
H A D | pkey.c | 75 const EVP_CIPHER *cipher = NULL; local 172 cipher = EVP_get_cipherbyname(*args + 1); 173 if (!cipher) 175 BIO_printf(bio_err, "Unknown cipher %s\n", 246 PEM_write_bio_PrivateKey(out, pkey, cipher,
|
/external/openssl/crypto/cms/ |
H A D | cms_enc.c | 83 enc = ec->cipher ? 1 : 0; 97 ciph = ec->cipher; 98 /* If not keeping key set cipher to NULL so subsequent calls 102 ec->cipher = NULL; 240 const EVP_CIPHER *cipher, 243 ec->cipher = cipher; 252 if (cipher) 291 if (enc->encryptedContentInfo->cipher && enc->unprotectedAttrs) 239 cms_EncryptedContent_init(CMS_EncryptedContentInfo *ec, const EVP_CIPHER *cipher, const unsigned char *key, size_t keylen) argument
|
/external/openssl/crypto/evp/ |
H A D | p5_crpt.c | 73 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, 129 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); 130 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 131 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); 132 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), 133 EVP_CIPHER_iv_length(cipher)); 134 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de)) 72 PKCS5_PBE_keyivgen(EVP_CIPHER_CTX *cctx, const char *pass, int passlen, ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) argument
|