HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 1 - 25 of 295) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium/net/base/
ssl_cipher_suite_names_unittest.cc 13 const char *key_exchange, *cipher, *mac; local
14 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, 0xc001);
16 EXPECT_STREQ(cipher, "NULL");
19 SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, 0xff31);
21 EXPECT_STREQ(cipher, "???");
  /external/dropbear/libtomcrypt/src/modes/ecb/
ecb_start.c 23 @param cipher The index of the cipher desired
26 @param num_rounds Number of rounds in the cipher desired (0 for default)
30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb)
36 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
39 ecb->cipher = cipher;
40 ecb->blocklen = cipher_descriptor[cipher].block_length;
41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
ecb_decrypt.c 24 @param len The number of octets to process (must be multiple of the cipher block size)
34 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) {
37 if (len % cipher_descriptor[ecb->cipher].block_length) {
42 if (cipher_descriptor[ecb->cipher].accel_ecb_decrypt != NULL) {
43 return cipher_descriptor[ecb->cipher].accel_ecb_decrypt(ct, pt, len / cipher_descriptor[ecb->cipher].block_length, &ecb->key);
46 if ((err = cipher_descriptor[ecb->cipher].ecb_decrypt(ct, pt, &ecb->key)) != CRYPT_OK) {
49 pt += cipher_descriptor[ecb->cipher].block_length;
50 ct += cipher_descriptor[ecb->cipher].block_length;
51 len -= cipher_descriptor[ecb->cipher].block_length
    [all...]
ecb_encrypt.c 24 @param len The number of octets to process (must be multiple of the cipher block size)
34 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) {
37 if (len % cipher_descriptor[ecb->cipher].block_length) {
42 if (cipher_descriptor[ecb->cipher].accel_ecb_encrypt != NULL) {
43 return cipher_descriptor[ecb->cipher].accel_ecb_encrypt(pt, ct, len / cipher_descriptor[ecb->cipher].block_length, &ecb->key);
46 if ((err = cipher_descriptor[ecb->cipher].ecb_encrypt(pt, ct, &ecb->key)) != CRYPT_OK) {
49 pt += cipher_descriptor[ecb->cipher].block_length;
50 ct += cipher_descriptor[ecb->cipher].block_length;
51 len -= cipher_descriptor[ecb->cipher].block_length
    [all...]
ecb_done.c 29 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) {
32 cipher_descriptor[ecb->cipher].done(&ecb->key);
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/
StreamBlockCipher.java 10 private BlockCipher cipher; field in class:StreamBlockCipher
17 * @param cipher the block cipher to be wrapped.
18 * @exception IllegalArgumentException if the cipher has a block size other than
22 BlockCipher cipher)
24 if (cipher.getBlockSize() != 1)
26 throw new IllegalArgumentException("block cipher block size != 1.");
29 this.cipher = cipher;
33 * initialise the underlying cipher
    [all...]
  /external/srtp/doc/
crypto_kernel.txt 14 @brief A generic cipher type enables cipher agility, that is, the
15 ability to write code that runs with multiple cipher types.
24 * @brief Allocates a cipher of a particular type.
28 cipher_type_alloc(cipher_type_t *ctype, cipher_t **cipher,
32 * @brief Initialized a cipher to use a particular key. May
33 * be invoked more than once on the same cipher.
38 cipher_init(cipher_t *cipher, const uint8_t *key);
41 * @brief Sets the initialization vector of a given cipher.
46 cipher_set_iv(cipher_t *cipher, void *iv)
    [all...]
  /external/dropbear/libtomcrypt/src/mac/f9/
f9_init.c 22 @param cipher Index of cipher to use
27 int f9_init(f9_state *f9, int cipher, const unsigned char *key, unsigned long keylen)
35 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
40 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) {
45 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &f9->key)) != CRYPT_OK) {
55 zeromem(f9->IV, cipher_descriptor[cipher].block_length);
56 zeromem(f9->ACC, cipher_descriptor[cipher].block_length);
57 f9->blocksize = cipher_descriptor[cipher].block_length;
58 f9->cipher = cipher
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/macs/
CBCBlockCipherMac.java 10 * standard CBC Block Cipher MAC - if no padding is specified the default of
20 private BlockCipher cipher; field in class:CBCBlockCipherMac
26 * create a standard MAC based on a CBC block cipher. This will produce an
27 * authentication code half the length of the block size of the cipher.
29 * @param cipher the cipher to be used as the basis of the MAC generation.
32 BlockCipher cipher)
34 this(cipher, (cipher.getBlockSize() * 8) / 2, null);
38 * create a standard MAC based on a CBC block cipher. This will produce a
    [all...]
  /external/dropbear/libtomcrypt/src/modes/cbc/
cbc_start.c 22 @param cipher The index of the cipher desired
26 @param num_rounds Number of rounds in the cipher desired (0 for default)
30 int cbc_start(int cipher, const unsigned char *IV, const unsigned char *key,
40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
44 /* setup cipher */
45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) {
50 cbc->blocklen = cipher_descriptor[cipher].block_length;
51 cbc->cipher = cipher;
    [all...]
cbc_done.c 29 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) {
32 cipher_descriptor[cbc->cipher].done(&cbc->key);
  /external/dropbear/libtomcrypt/src/modes/ofb/
ofb_start.c 23 @param cipher The index of the cipher desired
27 @param num_rounds Number of rounds in the cipher desired (0 for default)
31 int ofb_start(int cipher, const unsigned char *IV, const unsigned char *key,
40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
45 ofb->cipher = cipher;
46 ofb->blocklen = cipher_descriptor[cipher].block_length;
51 /* init the cipher */
53 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ofb->key)
    [all...]
ofb_done.c 29 if ((err = cipher_is_valid(ofb->cipher)) != CRYPT_OK) {
32 cipher_descriptor[ofb->cipher].done(&ofb->key);
  /external/dropbear/libtomcrypt/src/mac/xcbc/
xcbc_init.c 22 @param cipher Index of cipher to use
27 int xcbc_init(xcbc_state *xcbc, int cipher, const unsigned char *key, unsigned long keylen)
36 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
41 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) {
52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
58 for (x = 0; x < cipher_descriptor[cipher].block_length; x++) {
61 cipher_descriptor[cipher].ecb_encrypt(xcbc->K[y], xcbc->K[y], skey);
65 err = cipher_descriptor[cipher].setup(xcbc->K[0], cipher_descriptor[cipher].block_length, 0, &xcbc->key)
    [all...]
  /external/dropbear/libtomcrypt/src/misc/crypt/
crypt_unregister_cipher.c 15 Unregister a cipher, Tom St Denis
19 Unregister a cipher from the descriptor table
20 @param cipher The cipher descriptor to remove
23 int unregister_cipher(const struct ltc_cipher_descriptor *cipher)
27 LTC_ARGCHK(cipher != NULL);
32 if (XMEMCMP(&cipher_descriptor[x], cipher, sizeof(struct ltc_cipher_descriptor)) == 0) {
crypt_register_cipher.c 15 Register a cipher, Tom St Denis
19 Register a cipher with the descriptor table
20 @param cipher The cipher you wish to register
23 int register_cipher(const struct ltc_cipher_descriptor *cipher)
27 LTC_ARGCHK(cipher != NULL);
32 if (cipher_descriptor[x].name != NULL && cipher_descriptor[x].ID == cipher->ID) {
41 XMEMCPY(&cipher_descriptor[x], cipher, sizeof(struct ltc_cipher_descriptor));
  /external/dropbear/libtomcrypt/src/modes/cfb/
cfb_start.c 23 @param cipher The index of the cipher desired
27 @param num_rounds Number of rounds in the cipher desired (0 for default)
31 int cfb_start(int cipher, const unsigned char *IV, const unsigned char *key,
40 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
46 cfb->cipher = cipher;
47 cfb->blocklen = cipher_descriptor[cipher].block_length;
51 /* init the cipher */
52 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK)
    [all...]
cfb_done.c 29 if ((err = cipher_is_valid(cfb->cipher)) != CRYPT_OK) {
32 cipher_descriptor[cfb->cipher].done(&cfb->key);
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/modes/
OFBBlockCipher.java 9 * implements a Output-FeedBack (OFB) mode on top of a simple cipher.
19 private final BlockCipher cipher; field in class:OFBBlockCipher
24 * @param cipher the block cipher to be used as the basis of the
29 BlockCipher cipher,
32 this.cipher = cipher;
35 this.IV = new byte[cipher.getBlockSize()];
36 this.ofbV = new byte[cipher.getBlockSize()];
37 this.ofbOutV = new byte[cipher.getBlockSize()]
    [all...]
  /external/dropbear/libtomcrypt/src/modes/f8/
f8_start.c 23 @param cipher The index of the cipher desired
29 @param num_rounds Number of rounds in the cipher desired (0 for default)
33 int f8_start( int cipher, const unsigned char *IV,
46 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
51 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) {
58 f8->cipher = cipher;
59 f8->blocklen = cipher_descriptor[cipher].block_length;
75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK)
    [all...]
f8_done.c 29 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) {
32 cipher_descriptor[f8->cipher].done(&f8->key);
  /external/openssl/crypto/evp/
evp_enc.c 74 /* ctx->cipher=NULL; */
85 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher,
88 if (cipher)
90 return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc);
93 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl,
109 if (ctx->engine && ctx->cipher && (!cipher ||
110 (cipher && (cipher->nid == ctx->cipher->nid)))
    [all...]
  /external/dropbear/libtomcrypt/src/mac/omac/
omac_init.c 24 @param cipher The index of the desired cipher
29 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen)
37 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
42 if (cipher_descriptor[cipher].block_length % sizeof(LTC_FAST_TYPE)) {
48 switch (cipher_descriptor[cipher].block_length) {
58 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &omac->key)) != CRYPT_OK) {
65 zeromem(omac->Lu[0], cipher_descriptor[cipher].block_length);
66 if ((err = cipher_descriptor[cipher].ecb_encrypt(omac->Lu[0], omac->Lu[0], &omac->key)) != CRYPT_OK) {
88 omac->cipher_idx = cipher;
    [all...]
  /external/dropbear/libtomcrypt/src/modes/ctr/
ctr_done.c 29 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) {
32 cipher_descriptor[ctr->cipher].done(&ctr->key);
  /external/dropbear/libtomcrypt/src/modes/lrw/
lrw_done.c 31 if ((err = cipher_is_valid(lrw->cipher)) != CRYPT_OK) {
34 cipher_descriptor[lrw->cipher].done(&lrw->key);

Completed in 613 milliseconds

1 2 3 4 5 6 7 8 91011>>