/external/bouncycastle/src/main/java/org/bouncycastle/crypto/paddings/ |
PaddedBufferedBlockCipher.java | 23 * Create a buffered block cipher with the desired padding. 25 * @param cipher the underlying block cipher this buffering object wraps. 29 BlockCipher cipher, 32 this.cipher = cipher; 35 buf = new byte[cipher.getBlockSize()]; 40 * Create a buffered block cipher PKCS7 padding 42 * @param cipher the underlying block cipher this buffering object wraps [all...] |
/external/dropbear/libtomcrypt/demos/ |
encrypt.c | 18 printf("Usage: %s [-d](ecrypt) cipher infile outfile\nCiphers:\n", name); 103 char *infile, *outfile, *cipher; local 116 cipher = argv[2]; 121 cipher = argv[1]; 139 cipher_idx = find_cipher(cipher); 141 printf("Invalid cipher entered on command line.\n");
|
/external/openssl/apps/ |
pkey.c | 75 const EVP_CIPHER *cipher = NULL; local 172 cipher = EVP_get_cipherbyname(*args + 1); 173 if (!cipher) 175 BIO_printf(bio_err, "Unknown cipher %s\n", 246 PEM_write_bio_PrivateKey(out, pkey, cipher,
|
genpkey.c | 82 const EVP_CIPHER *cipher = NULL; local 180 cipher = EVP_get_cipherbyname(*args + 1); 181 if (!cipher) 183 BIO_printf(bio_err, "Unknown cipher %s\n", 204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n"); 269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
|
pkcs8.c | 78 const EVP_CIPHER *cipher = NULL; local 111 cipher=EVP_get_cipherbyname(*args); 112 if (!cipher) 115 "Unknown cipher %s\n", *args); 224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 242 if ((pbe_nid == -1) && !cipher) 311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
enc.c | 125 const EVP_CIPHER *cipher=NULL,*c; local 154 cipher=EVP_get_cipherbyname(pname); 156 if (!do_zlib && !base64 && (cipher == NULL) 159 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 162 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 290 cipher=c; 293 cipher=NULL; 318 BIO_printf(bio_err,"Cipher Types\n"); 420 if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) 427 OBJ_nid2ln(EVP_CIPHER_nid(cipher)), [all...] |
smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher = EVP_aes_256_cbc() [all...] |
/external/openssl/crypto/evp/ |
bio_enc.c | 83 EVP_CIPHER_CTX cipher; member in struct:enc_struct 92 BIO_TYPE_CIPHER,"cipher", 114 EVP_CIPHER_CTX_init(&ctx->cipher); 134 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 187 i=EVP_CipherFinal_ex(&(ctx->cipher), 201 EVP_CipherUpdate(&(ctx->cipher), 260 EVP_CipherUpdate(&(ctx->cipher), 301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 302 ctx->cipher.encrypt); 335 ret=EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
evp_pbe.c | 70 /* Setup a cipher context from a PBE algorithm */ 153 const EVP_CIPHER *cipher; local 175 cipher = NULL; 178 cipher = EVP_get_cipherbynid(cipher_nid); 179 if (!cipher) 198 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) 252 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, 256 if (cipher) 257 cipher_nid = EVP_CIPHER_type(cipher);
|
evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
p5_crpt2.c | 176 const EVP_CIPHER *cipher; local 205 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); 207 if(!cipher) { 213 /* Fixup cipher based on AlgorithmIdentifier */ 214 EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de);
|
/external/openssl/crypto/pem/ |
pem_info.c | 241 EVP_CIPHER_INFO cipher; local 243 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) 245 if (!PEM_do_header(&cipher,data,&len,cb,u)) 359 EVP_CIPHER_nid(xi->enc_cipher.cipher));
|
pem_lib.c | 276 EVP_CIPHER_INFO cipher; local 295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; 296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; 362 /* actually it needs the cipher block size extra... */ 436 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, 447 if (cipher->cipher == NULL) return(1); 462 EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher->iv[0]) [all...] |
/external/openssl/ssl/ |
s23_clnt.c | 255 SSL_CIPHER *cipher; local 261 cipher = sk_SSL_CIPHER_value(ciphers, i); 262 if (cipher->algorithm_ssl == SSL_SSLV2)
|
ssl_task.c | 66 * SSL_CIPHER Defines a list of cipher specifications the server 140 static char *cipher=NULL; variable 223 * get the preferred cipher list and other initialization 225 if (cipher == NULL) cipher=getenv("SSL_CIPHER"); 226 printf("cipher list: %s\n", cipher ? cipher : "{undefined}" );
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 16 * Implements the Counter with Cipher Block Chaining mode (CCM) detailed in 24 private BlockCipher cipher; field in class:CCMBlockCipher 37 * @param c the block cipher to be used. 41 this.cipher = c; 47 throw new IllegalArgumentException("cipher required with a block size of 16."); 52 * return the underlying block cipher that we are wrapping. 54 * @return the underlying block cipher that we are wrapping. 58 return cipher; 93 return cipher.getAlgorithmName() + "/CCM"; 127 cipher.reset() [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JCERSACipher.java | 16 import javax.crypto.Cipher; 37 private AsymmetricBlockCipher cipher; field in class:JCERSACipher 47 cipher = engine; 70 cipher = engine; 85 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue()); 93 return cipher.getInputBlockSize(); 97 throw new IllegalStateException("RSA Cipher not initialised"); 130 return cipher.getOutputBlockSize(); 134 throw new IllegalStateException("RSA Cipher not initialised"); 194 cipher = new RSABlindedEngine() [all...] |
/external/wpa_supplicant/tests/ |
test_aes.c | 68 u8 cipher[] = { 0x19, 0xDD, 0x5C, 0x4C, 0x93, 0x31, 0x04, 0x9D, local 79 if (memcmp(data, cipher, sizeof(data)) != 0) { 80 printf("AES-128 EAX mode encryption returned invalid cipher " 84 if (memcmp(tag, cipher + sizeof(data), BLOCK_SIZE) != 0) { 110 u8 cipher[32]; member in struct:cbc_test_vector 152 if (memcmp(buf, tv->cipher, tv->len) != 0) { 156 memcpy(buf, tv->cipher, tv->len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.h | 34 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_aes.c | 68 u8 cipher[] = { 0x19, 0xDD, 0x5C, 0x4C, 0x93, 0x31, 0x04, 0x9D, local 79 if (memcmp(data, cipher, sizeof(data)) != 0) { 80 printf("AES-128 EAX mode encryption returned invalid cipher " 84 if (memcmp(tag, cipher + sizeof(data), BLOCK_SIZE) != 0) { 110 u8 cipher[32]; member in struct:cbc_test_vector 152 if (memcmp(buf, tv->cipher, tv->len) != 0) { 156 memcpy(buf, tv->cipher, tv->len);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 55 import javax.crypto.Cipher; 65 @TestTargetClass(Cipher.class) 95 * @tests javax.crypto.Cipher#getInstance(java.lang.String) 120 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local 121 assertNotNull("Received a null Cipher instance", cipher); 124 Cipher.getInstance("WrongAlgorithmName"); 133 * @tests javax.crypto.Cipher#getInstance(java.lang.String 166 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local 230 Cipher cipher = Cipher.getInstance("DES", providers[i]); local 269 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local 289 Cipher cipher = Cipher.getInstance(algorithm); local 315 Cipher cipher = Cipher.getInstance(algorithm); local 340 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 370 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 405 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 430 Cipher cipher = null; local 489 Cipher cipher = null; local 589 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local 1641 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local [all...] |
/build/tools/signapk/ |
SignApk.java | 66 import javax.crypto.Cipher; 135 Cipher cipher = Cipher.getInstance(epkInfo.getAlgName()); local 136 cipher.init(Cipher.DECRYPT_MODE, key, epkInfo.getAlgParameters()); 139 return epkInfo.getKeySpec(cipher);
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen); 41 int omac_memory(int cipher, 45 int omac_memory_multi(int cipher, 49 int omac_file(int cipher, 65 symmetric_key key; /* scheduled key for cipher */ 67 int cipher_idx, /* cipher idx */ 72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen); 76 int pmac_memory(int cipher, 81 int pmac_memory_multi(int cipher, 86 int pmac_file(int cipher, 151 int cipher, \/* cipher idx *\/ member in struct:__anon3294 242 int cipher, \/* which cipher *\/ member in struct:__anon3295 320 int cipher, member in struct:__anon3296 353 int cipher, member in struct:__anon3297 [all...] |
tomcrypt_prng.h | 4 int cipher, hash; member in struct:yarrow_prng
|
/external/openssl/crypto/krb5/ |
krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|