/external/dropbear/libtomcrypt/src/modes/ecb/ |
ecb_start.c | 23 @param cipher The index of the cipher desired 26 @param num_rounds Number of rounds in the cipher desired (0 for default) 30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) 36 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 39 ecb->cipher = cipher; 40 ecb->blocklen = cipher_descriptor[cipher].block_length; 41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
|
ecb_decrypt.c | 24 @param len The number of octets to process (must be multiple of the cipher block size) 34 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 37 if (len % cipher_descriptor[ecb->cipher].block_length) { 42 if (cipher_descriptor[ecb->cipher].accel_ecb_decrypt != NULL) { 43 return cipher_descriptor[ecb->cipher].accel_ecb_decrypt(ct, pt, len / cipher_descriptor[ecb->cipher].block_length, &ecb->key); 46 if ((err = cipher_descriptor[ecb->cipher].ecb_decrypt(ct, pt, &ecb->key)) != CRYPT_OK) { 49 pt += cipher_descriptor[ecb->cipher].block_length; 50 ct += cipher_descriptor[ecb->cipher].block_length; 51 len -= cipher_descriptor[ecb->cipher].block_length [all...] |
ecb_encrypt.c | 24 @param len The number of octets to process (must be multiple of the cipher block size) 34 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 37 if (len % cipher_descriptor[ecb->cipher].block_length) { 42 if (cipher_descriptor[ecb->cipher].accel_ecb_encrypt != NULL) { 43 return cipher_descriptor[ecb->cipher].accel_ecb_encrypt(pt, ct, len / cipher_descriptor[ecb->cipher].block_length, &ecb->key); 46 if ((err = cipher_descriptor[ecb->cipher].ecb_encrypt(pt, ct, &ecb->key)) != CRYPT_OK) { 49 pt += cipher_descriptor[ecb->cipher].block_length; 50 ct += cipher_descriptor[ecb->cipher].block_length; 51 len -= cipher_descriptor[ecb->cipher].block_length [all...] |
ecb_done.c | 29 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 32 cipher_descriptor[ecb->cipher].done(&ecb->key);
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/ |
StreamBlockCipher.java | 10 private BlockCipher cipher; field in class:StreamBlockCipher 17 * @param cipher the block cipher to be wrapped. 18 * @exception IllegalArgumentException if the cipher has a block size other than 22 BlockCipher cipher) 24 if (cipher.getBlockSize() != 1) 26 throw new IllegalArgumentException("block cipher block size != 1."); 29 this.cipher = cipher; 33 * initialise the underlying cipher [all...] |
BufferedAsymmetricBlockCipher.java | 4 * a buffer wrapper for an asymmetric block cipher, allowing input 12 private final AsymmetricBlockCipher cipher; field in class:BufferedAsymmetricBlockCipher 17 * @param cipher the cipher this buffering object wraps. 20 AsymmetricBlockCipher cipher) 22 this.cipher = cipher; 26 * return the underlying cipher for the buffer. 28 * @return the underlying cipher for the buffer. 32 return cipher; [all...] |
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_init.c | 22 @param cipher Index of cipher to use 27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) 35 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 40 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) { 55 zeromem(f9->IV, cipher_descriptor[cipher].block_length); 56 zeromem(f9->ACC, cipher_descriptor[cipher].block_length); 57 f9->blocksize = cipher_descriptor[cipher].block_length; 58 f9->cipher = cipher [all...] |
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/macs/ |
CBCBlockCipherMac.java | 10 * standard CBC Block Cipher MAC - if no padding is specified the default of 20 private BlockCipher cipher; field in class:CBCBlockCipherMac 26 * create a standard MAC based on a CBC block cipher. This will produce an 27 * authentication code half the length of the block size of the cipher. 29 * @param cipher the cipher to be used as the basis of the MAC generation. 32 BlockCipher cipher) 34 this(cipher, (cipher.getBlockSize() * 8) / 2, null); 38 * create a standard MAC based on a CBC block cipher. This will produce a [all...] |
BlockCipherMac.java | 15 private BlockCipher cipher; field in class:BlockCipherMac 20 * create a standard MAC based on a block cipher. This will produce an 21 * authentication code half the length of the block size of the cipher. 23 * @param cipher the cipher to be used as the basis of the MAC generation. 27 BlockCipher cipher) 29 this(cipher, (cipher.getBlockSize() * 8) / 2); 33 * create a standard MAC based on a block cipher with the size of the 37 * and in general should be less than the size of the block cipher as it reduce [all...] |
ISO9797Alg3Mac.java | 12 * DES based CBC Block Cipher MAC according to ISO9797, algorithm 3 (ANSI X9.19 Retail MAC) 25 private BlockCipher cipher; field in class:ISO9797Alg3Mac 33 * create a Retail-MAC based on a CBC block cipher. This will produce an 34 * authentication code of the length of the block size of the cipher. 36 * @param cipher the cipher to be used as the basis of the MAC generation. This must 40 BlockCipher cipher) 42 this(cipher, cipher.getBlockSize() * 8, null); 46 * create a Retail-MAC based on a CBC block cipher. This will produce a [all...] |
CFBBlockCipherMac.java | 11 * implements a Cipher-FeedBack (CFB) mode on top of a simple cipher. 20 private BlockCipher cipher = null; field in class:MacCFBBlockCipher 25 * @param cipher the block cipher to be used as the basis of the 30 BlockCipher cipher, 33 this.cipher = cipher; 36 this.IV = new byte[cipher.getBlockSize()]; 37 this.cfbV = new byte[cipher.getBlockSize()] 175 private MacCFBBlockCipher cipher; field in class:CFBBlockCipherMac [all...] |
/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_start.c | 22 @param cipher The index of the cipher desired 26 @param num_rounds Number of rounds in the cipher desired (0 for default) 30 int cbc_start(int cipher, const unsigned char *IV, const unsigned char *key, 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 44 /* setup cipher */ 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) { 50 cbc->blocklen = cipher_descriptor[cipher].block_length; 51 cbc->cipher = cipher; [all...] |
cbc_done.c | 29 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 32 cipher_descriptor[cbc->cipher].done(&cbc->key);
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_start.c | 23 @param cipher The index of the cipher desired 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 31 int ofb_start(int cipher, const unsigned char *IV, const unsigned char *key, 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 45 ofb->cipher = cipher; 46 ofb->blocklen = cipher_descriptor[cipher].block_length; 51 /* init the cipher */ 53 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ofb->key) [all...] |
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_init.c | 22 @param cipher Index of cipher to use 27 int xcbc_init(xcbc_state *xcbc, int cipher, const unsigned char *key, unsigned long keylen) 36 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 41 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 58 for (x = 0; x < cipher_descriptor[cipher].block_length; x++) { 61 cipher_descriptor[cipher].ecb_encrypt(xcbc->K[y], xcbc->K[y], skey); 65 err = cipher_descriptor[cipher].setup(xcbc->K[0], cipher_descriptor[cipher].block_length, 0, &xcbc->key) [all...] |
/external/dropbear/libtomcrypt/src/misc/crypt/ |
crypt_unregister_cipher.c | 15 Unregister a cipher, Tom St Denis 19 Unregister a cipher from the descriptor table 20 @param cipher The cipher descriptor to remove 23 int unregister_cipher(const struct ltc_cipher_descriptor *cipher) 27 LTC_ARGCHK(cipher != NULL); 32 if (XMEMCMP(&cipher_descriptor[x], cipher, sizeof(struct ltc_cipher_descriptor)) == 0) {
|
crypt_register_cipher.c | 15 Register a cipher, Tom St Denis 19 Register a cipher with the descriptor table 20 @param cipher The cipher you wish to register 23 int register_cipher(const struct ltc_cipher_descriptor *cipher) 27 LTC_ARGCHK(cipher != NULL); 32 if (cipher_descriptor[x].name != NULL && cipher_descriptor[x].ID == cipher->ID) { 41 XMEMCPY(&cipher_descriptor[x], cipher, sizeof(struct ltc_cipher_descriptor));
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_start.c | 23 @param cipher The index of the cipher desired 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 31 int cfb_start(int cipher, const unsigned char *IV, const unsigned char *key, 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 46 cfb->cipher = cipher; 47 cfb->blocklen = cipher_descriptor[cipher].block_length; 51 /* init the cipher */ 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK) [all...] |
cfb_done.c | 29 if ((err = cipher_is_valid(cfb->cipher)) != CRYPT_OK) { 32 cipher_descriptor[cfb->cipher].done(&cfb->key);
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/modes/ |
OFBBlockCipher.java | 9 * implements a Output-FeedBack (OFB) mode on top of a simple cipher. 19 private final BlockCipher cipher; field in class:OFBBlockCipher 24 * @param cipher the block cipher to be used as the basis of the 29 BlockCipher cipher, 32 this.cipher = cipher; 35 this.IV = new byte[cipher.getBlockSize()]; 36 this.ofbV = new byte[cipher.getBlockSize()]; 37 this.ofbOutV = new byte[cipher.getBlockSize()] [all...] |
/external/openssl/crypto/evp/ |
enc_min.c | 75 /* ctx->cipher=NULL; */ 86 { FIPS_ERROR_IGNORED("Cipher init"); return 0;} 90 { FIPS_ERROR_IGNORED("Cipher update"); return 0;} 95 { FIPS_ERROR_IGNORED("Cipher set_asn1"); return 0;} 97 { FIPS_ERROR_IGNORED("Cipher get_asn1"); return 0;} 99 { FIPS_ERROR_IGNORED("Cipher ctrl"); return 0;} 175 /* We'll use the ENGINE's private cipher definition */ 178 * 'cipher' came from an ENGINE and we need to release 191 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, 206 ctx->cipher = &bad_cipher [all...] |
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_start.c | 23 @param cipher The index of the cipher desired 29 @param num_rounds Number of rounds in the cipher desired (0 for default) 33 int f8_start( int cipher, const unsigned char *IV, 46 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 51 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 58 f8->cipher = cipher; 59 f8->blocklen = cipher_descriptor[cipher].block_length; 75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) [all...] |
f8_done.c | 29 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) { 32 cipher_descriptor[f8->cipher].done(&f8->key);
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_init.c | 24 @param cipher The index of the desired cipher 29 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen) 37 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 42 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 48 switch (cipher_descriptor[cipher].block_length) { 58 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &omac->key)) != CRYPT_OK) { 65 zeromem(omac->Lu[0], cipher_descriptor[cipher].block_length); 66 if ((err = cipher_descriptor[cipher].ecb_encrypt(omac->Lu[0], omac->Lu[0], &omac->key)) != CRYPT_OK) { 88 omac->cipher_idx = cipher; [all...] |
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_done.c | 29 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { 32 cipher_descriptor[ctr->cipher].done(&ctr->key);
|