/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_setiv.c | 41 if ((err = cipher_is_valid(lrw->cipher)) != CRYPT_OK) { 49 if (cipher_descriptor[lrw->cipher].accel_lrw_encrypt != NULL && cipher_descriptor[lrw->cipher].accel_lrw_decrypt != NULL) {
|
/libcore/luni/src/main/java/javax/crypto/ |
EncryptedPrivateKeyInfo.java | 227 * The cipher must be initialize in either {@code Cipher.DECRYPT_MODE} or 228 * {@code Cipher.UNWRAP_MODE} with the same parameters and key used for 231 * @param cipher 232 * the cipher initialized for decrypting the encrypted data. 235 * if the specified cipher is not suited to decrypt the 238 * if {@code cipher} is {@code null}. 240 public PKCS8EncodedKeySpec getKeySpec(Cipher cipher) 242 if (cipher == null) 284 Cipher cipher = Cipher.getInstance(algName); local 343 Cipher cipher = Cipher.getInstance(algName, providerName); local 397 Cipher cipher = Cipher.getInstance(algName, provider); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
CipherInputStream.java | 14 * Cipher. The Cipher must be fully initialized before being used by 17 * For example, if the Cipher is initialized for decryption, the 42 BufferedBlockCipher cipher) 46 this.bufferedBlockCipher = cipher; 48 buf = new byte[cipher.getOutputSize(INPUT_BUF_SIZE)]; 54 StreamCipher cipher) 58 this.streamCipher = cipher; 103 maxBuf = 0; // a stream cipher
|
/external/chromium/crypto/ |
encryptor_openssl.cc | 89 const EVP_CIPHER* cipher = GetCipherForKey(key_); local 90 DCHECK(cipher); // Already handled in Init(); 93 DCHECK_EQ(EVP_CIPHER_iv_length(cipher), static_cast<int>(iv_.length())); 94 DCHECK_EQ(EVP_CIPHER_key_length(cipher), static_cast<int>(key.length())); 97 if (!EVP_CipherInit_ex(ctx.get(), cipher, NULL,
|
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
s_ocb_done.c | 51 if ((err = cipher_is_valid(ocb->cipher)) != CRYPT_OK) { 54 if (ocb->block_len != cipher_descriptor[ocb->cipher].block_length || 87 if ((err = cipher_descriptor[ocb->cipher].ecb_encrypt(X, Y, &ocb->key)) != CRYPT_OK) { 118 if ((err = cipher_descriptor[ocb->cipher].ecb_encrypt(ocb->checksum, X, &ocb->key)) != CRYPT_OK) { 121 cipher_descriptor[ocb->cipher].done(&ocb->key);
|
ocb_decrypt_verify_memory.c | 22 @param cipher The index of the cipher desired 25 @param nonce The session nonce (length of the block size of the block cipher) 34 int ocb_decrypt_verify_memory(int cipher, 58 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
|
ocb_encrypt_authenticate_memory.c | 22 @param cipher The index of the cipher desired 33 int ocb_encrypt_authenticate_memory(int cipher, 56 if ((err = ocb_init(ocb, cipher, key, keylen, nonce)) != CRYPT_OK) {
|
/external/openssl/crypto/pkcs7/ |
enc.c | 77 const EVP_CIPHER *cipher=NULL; local 91 if(!(cipher = EVP_get_cipherbyname(argv[2]))) { 92 fprintf(stderr, "Unknown cipher %s\n", argv[2]); 130 if(!cipher) { 132 cipher = EVP_des_ede3_cbc(); 134 fprintf(stderr, "No cipher selected\n"); 139 if (!PKCS7_set_cipher(p7,cipher)) goto err;
|
pk7_enc.c | 71 PKCS7_cipher(PKCS7 *p7,EVP_CIPHER *cipher);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
DigestSignatureSpi.java | 52 private AsymmetricBlockCipher cipher; field in class:DigestSignatureSpi 58 AsymmetricBlockCipher cipher) 61 this.cipher = cipher; 69 AsymmetricBlockCipher cipher) 72 this.cipher = cipher; 88 cipher.init(false, param); 104 cipher.init(true, param); 145 return cipher.processBlock(bytes, 0, bytes.length) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 42 import javax.crypto.Cipher; 89 * javax.crypto.Cipher#getInstance(java.lang.String) 92 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local 93 assertNotNull("Received a null Cipher instance", cipher); 96 Cipher.getInstance("WrongAlgorithmName"); 103 * javax.crypto.Cipher#getInstance(java.lang.String, 109 Provider[] providers = Security.getProviders("Cipher.DES") 114 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local 148 Cipher cipher = Cipher.getInstance("DES", providers[i]); local 176 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local 190 Cipher cipher = Cipher.getInstance(algorithm); local 201 Cipher cipher = Cipher.getInstance(algorithm); local 210 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local 233 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local 250 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local 268 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/CBC\/PKCS5Padding"); local 297 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/CBC\/PKCS5Padding"); local 369 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local 1119 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local [all...] |
/external/openssl/crypto/evp/ |
bio_enc.c | 83 EVP_CIPHER_CTX cipher; member in struct:enc_struct 92 BIO_TYPE_CIPHER,"cipher", 114 EVP_CIPHER_CTX_init(&ctx->cipher); 134 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 187 i=EVP_CipherFinal_ex(&(ctx->cipher), 201 EVP_CipherUpdate(&(ctx->cipher), 260 EVP_CipherUpdate(&(ctx->cipher), 301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 302 ctx->cipher.encrypt); 335 ret=EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
openbsd_hw.c | 130 static int dev_crypto_init_key(EVP_CIPHER_CTX *ctx,int cipher, 138 assert(ctx->cipher->iv_len <= MAX_HW_IV); 142 CDATA(ctx)->cipher=cipher; 170 assert((inl&(ctx->cipher->block_size-1)) == 0); 174 if(ctx->cipher->iv_len) 178 memcpy(lb,&in[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len); 231 memcpy(ctx->iv,&out[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len) [all...] |
/external/openssl/crypto/asn1/ |
p5_pbev2.c | 89 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, 100 alg_nid = EVP_CIPHER_type(cipher); 117 if (EVP_CIPHER_iv_length(cipher)) 120 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher)); 121 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0) 128 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0)) 136 /* If prf NID unspecified see if cipher has a preference. 150 keylen = EVP_CIPHER_key_length(cipher); 194 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1) [all...] |
/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_init.c | 41 @param cipher The index of the desired cipher 46 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen) 54 /* valid cipher? */ 55 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 60 pmac->block_len = cipher_descriptor[cipher].block_length; 78 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &pmac->key)) != CRYPT_OK) { 90 if ((err = cipher_descriptor[cipher].ecb_encrypt(L, L, &pmac->key)) != CRYPT_OK) { 127 pmac->cipher_idx = cipher;
|
/external/openssl/ssl/ |
d1_enc.c | 164 else if ( EVP_CIPHER_block_size(ds->cipher) > 1) 166 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) <= 0) 199 bs=EVP_CIPHER_block_size(ds->cipher); 226 ds->buf_len, ds->cipher->key_len, 228 ds->cipher->iv_len); 230 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
/external/srtp/crypto/ |
Makefile | 69 ciphers = cipher/cipher.o cipher/null_cipher.o \ 70 cipher/aes.o cipher/aes_icm.o \ 71 cipher/aes_cbc.o
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
JCEStreamCipher.java | 18 import javax.crypto.Cipher; 72 private StreamCipher cipher; field in class:JCEStreamCipher 86 cipher = engine; 96 cipher = new StreamBlockCipher(engine); 211 param = PBE.Util.makePBEParameters(k, params, cipher.getAlgorithmName()); 247 if ((opmode == Cipher.ENCRYPT_MODE) || (opmode == Cipher.WRAP_MODE)) 263 case Cipher.ENCRYPT_MODE: 264 case Cipher.WRAP_MODE: 265 cipher.init(true, param) [all...] |
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_encrypt.c | 37 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { 54 if ((ctr->padlen == ctr->blocklen) && cipher_descriptor[ctr->cipher].accel_ctr_encrypt != NULL && (len >= (unsigned long)ctr->blocklen)) { 55 if ((err = cipher_descriptor[ctr->cipher].accel_ctr_encrypt(pt, ct, len/ctr->blocklen, ctr->ctr, ctr->mode, &ctr->key)) != CRYPT_OK) { 84 if ((err = cipher_descriptor[ctr->cipher].ecb_encrypt(ctr->ctr, ctr->pad, &ctr->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_encrypt.c | 35 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) { 49 /* xor of IV, MIV and blockcnt == what goes into cipher */ 55 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) { 70 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) { 82 /* xor of IV, MIV and blockcnt == what goes into cipher */ 88 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) {
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/ |
CryptoWishList.java | 7 import ch.ethz.ssh2.crypto.cipher.BlockCipherFactory;
|
/external/openssl/crypto/cmac/ |
cmac.h | 74 const EVP_CIPHER *cipher, ENGINE *impl);
|
/external/openssl/include/openssl/ |
cmac.h | 74 const EVP_CIPHER *cipher, ENGINE *impl);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/ |
OAEPEncoding.java | 29 AsymmetricBlockCipher cipher) 32 this(cipher, AndroidDigestFactory.getSHA1(), null); 37 AsymmetricBlockCipher cipher, 40 this(cipher, hash, null); 44 AsymmetricBlockCipher cipher, 48 this(cipher, hash, hash, encodingParams); 52 AsymmetricBlockCipher cipher, 57 this.engine = cipher;
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_decrypt_verify_memory.c | 22 @param cipher The index of the cipher desired 37 int eax_decrypt_verify_memory(int cipher, 73 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
|