/external/chromium/net/base/ |
ssl_cipher_suite_names_unittest.cc | 13 const char *key_exchange, *cipher, *mac; local 14 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, 0xc001); 16 EXPECT_STREQ(cipher, "NULL"); 19 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, 0xff31); 21 EXPECT_STREQ(cipher, "???");
|
/external/dropbear/libtomcrypt/src/modes/ecb/ |
ecb_start.c | 23 @param cipher The index of the cipher desired 26 @param num_rounds Number of rounds in the cipher desired (0 for default) 30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) 36 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 39 ecb->cipher = cipher; 40 ecb->blocklen = cipher_descriptor[cipher].block_length; 41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
|
ecb_decrypt.c | 24 @param len The number of octets to process (must be multiple of the cipher block size) 34 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 37 if (len % cipher_descriptor[ecb->cipher].block_length) { 42 if (cipher_descriptor[ecb->cipher].accel_ecb_decrypt != NULL) { 43 return cipher_descriptor[ecb->cipher].accel_ecb_decrypt(ct, pt, len / cipher_descriptor[ecb->cipher].block_length, &ecb->key); 46 if ((err = cipher_descriptor[ecb->cipher].ecb_decrypt(ct, pt, &ecb->key)) != CRYPT_OK) { 49 pt += cipher_descriptor[ecb->cipher].block_length; 50 ct += cipher_descriptor[ecb->cipher].block_length; 51 len -= cipher_descriptor[ecb->cipher].block_length [all...] |
ecb_encrypt.c | 24 @param len The number of octets to process (must be multiple of the cipher block size) 34 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 37 if (len % cipher_descriptor[ecb->cipher].block_length) { 42 if (cipher_descriptor[ecb->cipher].accel_ecb_encrypt != NULL) { 43 return cipher_descriptor[ecb->cipher].accel_ecb_encrypt(pt, ct, len / cipher_descriptor[ecb->cipher].block_length, &ecb->key); 46 if ((err = cipher_descriptor[ecb->cipher].ecb_encrypt(pt, ct, &ecb->key)) != CRYPT_OK) { 49 pt += cipher_descriptor[ecb->cipher].block_length; 50 ct += cipher_descriptor[ecb->cipher].block_length; 51 len -= cipher_descriptor[ecb->cipher].block_length [all...] |
ecb_done.c | 29 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 32 cipher_descriptor[ecb->cipher].done(&ecb->key);
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/ |
StreamBlockCipher.java | 10 private BlockCipher cipher; field in class:StreamBlockCipher 17 * @param cipher the block cipher to be wrapped. 18 * @exception IllegalArgumentException if the cipher has a block size other than 22 BlockCipher cipher) 24 if (cipher.getBlockSize() != 1) 26 throw new IllegalArgumentException("block cipher block size != 1."); 29 this.cipher = cipher; 33 * initialise the underlying cipher [all...] |
/external/srtp/doc/ |
crypto_kernel.txt | 14 @brief A generic cipher type enables cipher agility, that is, the 15 ability to write code that runs with multiple cipher types. 24 * @brief Allocates a cipher of a particular type. 28 cipher_type_alloc(cipher_type_t *ctype, cipher_t **cipher, 32 * @brief Initialized a cipher to use a particular key. May 33 * be invoked more than once on the same cipher. 38 cipher_init(cipher_t *cipher, const uint8_t *key); 41 * @brief Sets the initialization vector of a given cipher. 46 cipher_set_iv(cipher_t *cipher, void *iv) [all...] |
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_init.c | 22 @param cipher Index of cipher to use 27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen) 35 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 40 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) { 55 zeromem(f9->IV, cipher_descriptor[cipher].block_length); 56 zeromem(f9->ACC, cipher_descriptor[cipher].block_length); 57 f9->blocksize = cipher_descriptor[cipher].block_length; 58 f9->cipher = cipher [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/macs/ |
CBCBlockCipherMac.java | 10 * standard CBC Block Cipher MAC - if no padding is specified the default of 20 private BlockCipher cipher; field in class:CBCBlockCipherMac 26 * create a standard MAC based on a CBC block cipher. This will produce an 27 * authentication code half the length of the block size of the cipher. 29 * @param cipher the cipher to be used as the basis of the MAC generation. 32 BlockCipher cipher) 34 this(cipher, (cipher.getBlockSize() * 8) / 2, null); 38 * create a standard MAC based on a CBC block cipher. This will produce a [all...] |
/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_start.c | 22 @param cipher The index of the cipher desired 26 @param num_rounds Number of rounds in the cipher desired (0 for default) 30 int cbc_start(int cipher, const unsigned char *IV, const unsigned char *key, 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 44 /* setup cipher */ 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) { 50 cbc->blocklen = cipher_descriptor[cipher].block_length; 51 cbc->cipher = cipher; [all...] |
cbc_done.c | 29 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 32 cipher_descriptor[cbc->cipher].done(&cbc->key);
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_start.c | 23 @param cipher The index of the cipher desired 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 31 int ofb_start(int cipher, const unsigned char *IV, const unsigned char *key, 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 45 ofb->cipher = cipher; 46 ofb->blocklen = cipher_descriptor[cipher].block_length; 51 /* init the cipher */ 53 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ofb->key) [all...] |
ofb_done.c | 29 if ((err = cipher_is_valid(ofb->cipher)) != CRYPT_OK) { 32 cipher_descriptor[ofb->cipher].done(&ofb->key);
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_init.c | 22 @param cipher Index of cipher to use 27 int xcbc_init(xcbc_state *xcbc, int cipher, const unsigned char *key, unsigned long keylen) 36 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 41 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 58 for (x = 0; x < cipher_descriptor[cipher].block_length; x++) { 61 cipher_descriptor[cipher].ecb_encrypt(xcbc->K[y], xcbc->K[y], skey); 65 err = cipher_descriptor[cipher].setup(xcbc->K[0], cipher_descriptor[cipher].block_length, 0, &xcbc->key) [all...] |
/external/dropbear/libtomcrypt/src/misc/crypt/ |
crypt_unregister_cipher.c | 15 Unregister a cipher, Tom St Denis 19 Unregister a cipher from the descriptor table 20 @param cipher The cipher descriptor to remove 23 int unregister_cipher(const struct ltc_cipher_descriptor *cipher) 27 LTC_ARGCHK(cipher != NULL); 32 if (XMEMCMP(&cipher_descriptor[x], cipher, sizeof(struct ltc_cipher_descriptor)) == 0) {
|
crypt_register_cipher.c | 15 Register a cipher, Tom St Denis 19 Register a cipher with the descriptor table 20 @param cipher The cipher you wish to register 23 int register_cipher(const struct ltc_cipher_descriptor *cipher) 27 LTC_ARGCHK(cipher != NULL); 32 if (cipher_descriptor[x].name != NULL && cipher_descriptor[x].ID == cipher->ID) { 41 XMEMCPY(&cipher_descriptor[x], cipher, sizeof(struct ltc_cipher_descriptor));
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_start.c | 23 @param cipher The index of the cipher desired 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 31 int cfb_start(int cipher, const unsigned char *IV, const unsigned char *key, 40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 46 cfb->cipher = cipher; 47 cfb->blocklen = cipher_descriptor[cipher].block_length; 51 /* init the cipher */ 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK) [all...] |
cfb_done.c | 29 if ((err = cipher_is_valid(cfb->cipher)) != CRYPT_OK) { 32 cipher_descriptor[cfb->cipher].done(&cfb->key);
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/ |
OFBBlockCipher.java | 9 * implements a Output-FeedBack (OFB) mode on top of a simple cipher. 19 private final BlockCipher cipher; field in class:OFBBlockCipher 24 * @param cipher the block cipher to be used as the basis of the 29 BlockCipher cipher, 32 this.cipher = cipher; 35 this.IV = new byte[cipher.getBlockSize()]; 36 this.ofbV = new byte[cipher.getBlockSize()]; 37 this.ofbOutV = new byte[cipher.getBlockSize()] [all...] |
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_start.c | 23 @param cipher The index of the cipher desired 29 @param num_rounds Number of rounds in the cipher desired (0 for default) 33 int f8_start( int cipher, const unsigned char *IV, 46 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 51 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 58 f8->cipher = cipher; 59 f8->blocklen = cipher_descriptor[cipher].block_length; 75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) [all...] |
f8_done.c | 29 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) { 32 cipher_descriptor[f8->cipher].done(&f8->key);
|
/external/openssl/crypto/evp/ |
evp_enc.c | 74 /* ctx->cipher=NULL; */ 85 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, 88 if (cipher) 90 return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc); 93 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, 109 if (ctx->engine && ctx->cipher && (!cipher || 110 (cipher && (cipher->nid == ctx->cipher->nid))) [all...] |
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_init.c | 24 @param cipher The index of the desired cipher 29 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen) 37 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 42 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) { 48 switch (cipher_descriptor[cipher].block_length) { 58 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &omac->key)) != CRYPT_OK) { 65 zeromem(omac->Lu[0], cipher_descriptor[cipher].block_length); 66 if ((err = cipher_descriptor[cipher].ecb_encrypt(omac->Lu[0], omac->Lu[0], &omac->key)) != CRYPT_OK) { 88 omac->cipher_idx = cipher; [all...] |
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_done.c | 29 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { 32 cipher_descriptor[ctr->cipher].done(&ctr->key);
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_done.c | 31 if ((err = cipher_is_valid(lrw->cipher)) != CRYPT_OK) { 34 cipher_descriptor[lrw->cipher].done(&lrw->key);
|