HomeSort by relevance Sort by last modified time
    Searched defs:cipher (Results 26 - 50 of 105) sorted by null

12 3 4 5

  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/paddings/
PaddedBufferedBlockCipher.java 23 * Create a buffered block cipher with the desired padding.
25 * @param cipher the underlying block cipher this buffering object wraps.
29 BlockCipher cipher,
32 this.cipher = cipher;
35 buf = new byte[cipher.getBlockSize()];
40 * Create a buffered block cipher PKCS7 padding
42 * @param cipher the underlying block cipher this buffering object wraps
    [all...]
  /external/dropbear/libtomcrypt/demos/
encrypt.c 18 printf("Usage: %s [-d](ecrypt) cipher infile outfile\nCiphers:\n", name);
103 char *infile, *outfile, *cipher; local
116 cipher = argv[2];
121 cipher = argv[1];
139 cipher_idx = find_cipher(cipher);
141 printf("Invalid cipher entered on command line.\n");
  /external/openssl/apps/
pkey.c 75 const EVP_CIPHER *cipher = NULL; local
172 cipher = EVP_get_cipherbyname(*args + 1);
173 if (!cipher)
175 BIO_printf(bio_err, "Unknown cipher %s\n",
246 PEM_write_bio_PrivateKey(out, pkey, cipher,
genpkey.c 82 const EVP_CIPHER *cipher = NULL; local
180 cipher = EVP_get_cipherbyname(*args + 1);
181 if (!cipher)
183 BIO_printf(bio_err, "Unknown cipher %s\n",
204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n");
269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
pkcs8.c 78 const EVP_CIPHER *cipher = NULL; local
111 cipher=EVP_get_cipherbyname(*args);
112 if (!cipher)
115 "Unknown cipher %s\n", *args);
224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
242 if ((pbe_nid == -1) && !cipher)
311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
enc.c 125 const EVP_CIPHER *cipher=NULL,*c; local
154 cipher=EVP_get_cipherbyname(pname);
156 if (!do_zlib && !base64 && (cipher == NULL)
159 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
162 BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
290 cipher=c;
293 cipher=NULL;
318 BIO_printf(bio_err,"Cipher Types\n");
420 if ((str == NULL) && (cipher != NULL) && (hkey == NULL))
427 OBJ_nid2ln(EVP_CIPHER_nid(cipher)),
    [all...]
smime.c 98 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_des_ede3_cbc();
154 cipher = EVP_des_cbc();
158 cipher = EVP_seed_cbc();
162 cipher = EVP_rc2_40_cbc();
164 cipher = EVP_rc2_cbc();
166 cipher = EVP_rc2_64_cbc();
170 cipher = EVP_aes_128_cbc();
172 cipher = EVP_aes_192_cbc();
174 cipher = EVP_aes_256_cbc()
    [all...]
  /external/openssl/crypto/evp/
bio_enc.c 83 EVP_CIPHER_CTX cipher; member in struct:enc_struct
92 BIO_TYPE_CIPHER,"cipher",
114 EVP_CIPHER_CTX_init(&ctx->cipher);
134 EVP_CIPHER_CTX_cleanup(&(b->cipher));
187 i=EVP_CipherFinal_ex(&(ctx->cipher),
201 EVP_CipherUpdate(&(ctx->cipher),
260 EVP_CipherUpdate(&(ctx->cipher),
301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL,
302 ctx->cipher.encrypt);
335 ret=EVP_CipherFinal_ex(&(ctx->cipher),
    [all...]
evp_pbe.c 70 /* Setup a cipher context from a PBE algorithm */
153 const EVP_CIPHER *cipher; local
175 cipher = NULL;
178 cipher = EVP_get_cipherbynid(cipher_nid);
179 if (!cipher)
198 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de))
252 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md,
256 if (cipher)
257 cipher_nid = EVP_CIPHER_type(cipher);
evp_test.c 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c),
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn,
252 c=EVP_get_cipherbyname(cipher);
359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
368 char *cipher; local
378 cipher=sstrsep(&p,":");
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
397 && !test_digest(cipher,plaintext,pn,ciphertext,cn))
400 if (strstr(cipher, "AES") == cipher)
    [all...]
p5_crpt2.c 176 const EVP_CIPHER *cipher; local
205 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm);
207 if(!cipher) {
213 /* Fixup cipher based on AlgorithmIdentifier */
214 EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de);
  /external/openssl/crypto/pem/
pem_info.c 241 EVP_CIPHER_INFO cipher; local
243 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher))
245 if (!PEM_do_header(&cipher,data,&len,cb,u))
359 EVP_CIPHER_nid(xi->enc_cipher.cipher));
pem_lib.c 276 EVP_CIPHER_INFO cipher; local
295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err;
296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err;
362 /* actually it needs the cipher block size extra... */
436 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen,
447 if (cipher->cipher == NULL) return(1);
462 EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher->iv[0])
    [all...]
  /external/openssl/ssl/
s23_clnt.c 255 SSL_CIPHER *cipher; local
261 cipher = sk_SSL_CIPHER_value(ciphers, i);
262 if (cipher->algorithm_ssl == SSL_SSLV2)
ssl_task.c 66 * SSL_CIPHER Defines a list of cipher specifications the server
140 static char *cipher=NULL; variable
223 * get the preferred cipher list and other initialization
225 if (cipher == NULL) cipher=getenv("SSL_CIPHER");
226 printf("cipher list: %s\n", cipher ? cipher : "{undefined}" );
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/
CCMBlockCipher.java 16 * Implements the Counter with Cipher Block Chaining mode (CCM) detailed in
24 private BlockCipher cipher; field in class:CCMBlockCipher
37 * @param c the block cipher to be used.
41 this.cipher = c;
47 throw new IllegalArgumentException("cipher required with a block size of 16.");
52 * return the underlying block cipher that we are wrapping.
54 * @return the underlying block cipher that we are wrapping.
58 return cipher;
93 return cipher.getAlgorithmName() + "/CCM";
127 cipher.reset()
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
JCERSACipher.java 16 import javax.crypto.Cipher;
37 private AsymmetricBlockCipher cipher; field in class:JCERSACipher
47 cipher = engine;
70 cipher = engine;
85 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue());
93 return cipher.getInputBlockSize();
97 throw new IllegalStateException("RSA Cipher not initialised");
130 return cipher.getOutputBlockSize();
134 throw new IllegalStateException("RSA Cipher not initialised");
194 cipher = new RSABlindedEngine()
    [all...]
  /external/wpa_supplicant/tests/
test_aes.c 68 u8 cipher[] = { 0x19, 0xDD, 0x5C, 0x4C, 0x93, 0x31, 0x04, 0x9D, local
79 if (memcmp(data, cipher, sizeof(data)) != 0) {
80 printf("AES-128 EAX mode encryption returned invalid cipher "
84 if (memcmp(tag, cipher + sizeof(data), BLOCK_SIZE) != 0) {
110 u8 cipher[32]; member in struct:cbc_test_vector
152 if (memcmp(buf, tv->cipher, tv->len) != 0) {
156 memcpy(buf, tv->cipher, tv->len);
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.h 34 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_aes.c 68 u8 cipher[] = { 0x19, 0xDD, 0x5C, 0x4C, 0x93, 0x31, 0x04, 0x9D, local
79 if (memcmp(data, cipher, sizeof(data)) != 0) {
80 printf("AES-128 EAX mode encryption returned invalid cipher "
84 if (memcmp(tag, cipher + sizeof(data), BLOCK_SIZE) != 0) {
110 u8 cipher[32]; member in struct:cbc_test_vector
152 if (memcmp(buf, tv->cipher, tv->len) != 0) {
156 memcpy(buf, tv->cipher, tv->len);
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
CipherTest.java 55 import javax.crypto.Cipher;
65 @TestTargetClass(Cipher.class)
95 * @tests javax.crypto.Cipher#getInstance(java.lang.String)
120 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local
121 assertNotNull("Received a null Cipher instance", cipher);
124 Cipher.getInstance("WrongAlgorithmName");
133 * @tests javax.crypto.Cipher#getInstance(java.lang.String
166 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local
230 Cipher cipher = Cipher.getInstance("DES", providers[i]); local
269 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local
289 Cipher cipher = Cipher.getInstance(algorithm); local
315 Cipher cipher = Cipher.getInstance(algorithm); local
340 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local
370 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local
405 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local
430 Cipher cipher = null; local
489 Cipher cipher = null; local
589 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local
1641 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local
    [all...]
  /build/tools/signapk/
SignApk.java 66 import javax.crypto.Cipher;
135 Cipher cipher = Cipher.getInstance(epkInfo.getAlgName()); local
136 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters());
139 return epkInfo.getKeySpec(cipher);
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_mac.h 38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen);
41 int omac_memory(int cipher,
45 int omac_memory_multi(int cipher,
49 int omac_file(int cipher,
65 symmetric_key key; /* scheduled key for cipher */
67 int cipher_idx, /* cipher idx */
72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen);
76 int pmac_memory(int cipher,
81 int pmac_memory_multi(int cipher,
86 int pmac_file(int cipher,
151 int cipher, \/* cipher idx *\/ member in struct:__anon3294
242 int cipher, \/* which cipher *\/ member in struct:__anon3295
320 int cipher, member in struct:__anon3296
353 int cipher, member in struct:__anon3297
    [all...]
tomcrypt_prng.h 4 int cipher, hash; member in struct:yarrow_prng
  /external/openssl/crypto/krb5/
krb5_asn.h 79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st

Completed in 1445 milliseconds

12 3 4 5