/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_memory.c | 21 @param cipher Index of cipher to use 30 int f9_memory(int cipher, 38 /* is the cipher valid? */ 39 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 44 if (cipher_descriptor[cipher].f9_memory != NULL) { 45 return cipher_descriptor[cipher].f9_memory(key, keylen, in, inlen, out, outlen); 53 if ((err = f9_init(f9, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_memory.c | 22 @param cipher The index of the desired cipher 31 int omac_memory(int cipher, 44 /* is the cipher valid? */ 45 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 50 if (cipher_descriptor[cipher].omac_memory != NULL) { 51 return cipher_descriptor[cipher].omac_memory(key, keylen, in, inlen, out, outlen); 61 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_memory.c | 21 @param cipher Index of cipher to use 30 int xcbc_memory(int cipher, 38 /* is the cipher valid? */ 39 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 44 if (cipher_descriptor[cipher].xcbc_memory != NULL) { 45 return cipher_descriptor[cipher].xcbc_memory(key, keylen, in, inlen, out, outlen); 53 if ((err = xcbc_init(xcbc, cipher, key, keylen)) != CRYPT_OK) {
|
/external/openssl/crypto/evp/ |
evp_lib.c | 68 if (c->cipher->set_asn1_parameters != NULL) 69 ret=c->cipher->set_asn1_parameters(c,type); 70 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) 81 if (c->cipher->get_asn1_parameters != NULL) 82 ret=c->cipher->get_asn1_parameters(c,type); 83 else if (c->cipher->flags & EVP_CIPH_FLAG_DEFAULT_ASN1) 122 /* Convert the various cipher NIDs and dummies to a proper OID NID */ 188 return ctx->cipher->block_size; 193 return ctx->cipher->do_cipher(ctx,out,in,inl); 198 return ctx->cipher; [all...] |
evp_enc.c | 75 #define M_do_cipher(ctx, out, in, inl) ctx->cipher->do_cipher(ctx, out, in, inl) 84 /* ctx->cipher=NULL; */ 95 int EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, 98 if (cipher) 100 return EVP_CipherInit_ex(ctx,cipher,NULL,key,iv,enc); 103 int EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *cipher, ENGINE *impl, 119 if (ctx->engine && ctx->cipher && (!cipher || 120 (cipher && (cipher->nid == ctx->cipher->nid))) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
BaseBlockCipher.java | 13 import javax.crypto.Cipher; 93 private GenericBlockCipher cipher; field in class:BaseBlockCipher 110 cipher = new BufferedGenericBlockCipher(engine); 119 this.cipher = new BufferedGenericBlockCipher(engine); 129 this.cipher = new BufferedGenericBlockCipher(engine); 152 return cipher.getOutputSize(inputLen); 173 String name = cipher.getUnderlyingCipher().getAlgorithmName(); 204 cipher = new BufferedGenericBlockCipher(baseEngine); 209 cipher = new BufferedGenericBlockCipher( 219 cipher = new BufferedGenericBlockCipher 796 private BufferedBlockCipher cipher; field in class:BaseBlockCipher.BufferedGenericBlockCipher 863 private AEADBlockCipher cipher; field in class:BaseBlockCipher.AEADGenericBlockCipher [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
JCEBlockCipher.java | 19 import javax.crypto.Cipher; 106 private GenericBlockCipher cipher; field in class:JCEBlockCipher 125 cipher = new BufferedGenericBlockCipher(engine); 134 this.cipher = new BufferedGenericBlockCipher(engine); 144 this.cipher = new BufferedGenericBlockCipher(engine); 167 return cipher.getOutputSize(inputLen); 188 String name = cipher.getUnderlyingCipher().getAlgorithmName(); 219 cipher = new BufferedGenericBlockCipher(baseEngine); 224 cipher = new BufferedGenericBlockCipher( 234 cipher = new BufferedGenericBlockCipher 1013 private BufferedBlockCipher cipher; field in class:JCEBlockCipher.BufferedGenericBlockCipher 1080 private AEADBlockCipher cipher; field in class:JCEBlockCipher.AEADGenericBlockCipher [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CBCBlockCipher.java | 10 * implements Cipher-Block-Chaining (CBC) mode on top of a simple cipher. 20 private BlockCipher cipher = null; field in class:CBCBlockCipher 26 * @param cipher the block cipher to be used as the basis of chaining. 29 BlockCipher cipher) 31 this.cipher = cipher; 32 this.blockSize = cipher.getBlockSize(); 40 * return the underlying block cipher that we are wrapping [all...] |
OFBBlockCipher.java | 9 * implements a Output-FeedBack (OFB) mode on top of a simple cipher. 19 private final BlockCipher cipher; field in class:OFBBlockCipher 24 * @param cipher the block cipher to be used as the basis of the 29 BlockCipher cipher, 32 this.cipher = cipher; 35 this.IV = new byte[cipher.getBlockSize()]; 36 this.ofbV = new byte[cipher.getBlockSize()]; 37 this.ofbOutV = new byte[cipher.getBlockSize()] [all...] |
CTSBlockCipher.java | 9 * A Cipher Text Stealing (CTS) mode cipher. CTS allows block ciphers to 10 * be used to produce cipher text which is the same length as the plain text. 18 * Create a buffered block cipher that uses Cipher Text Stealing 20 * @param cipher the underlying block cipher this buffering object wraps. 23 BlockCipher cipher) 25 if ((cipher instanceof OFBBlockCipher) || (cipher instanceof CFBBlockCipher) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SealedObjectTest.java | 39 import javax.crypto.Cipher; 53 public Mock_SealedObject(Serializable object, Cipher c) 91 * SealedObject(Serializable object, Cipher c) method testing. Tests if the 92 * NullPointerException is thrown in the case of null cipher. 99 + "of null cipher."); 109 Cipher cipher = Cipher.getInstance("DES/CBC/PKCS5Padding"); local 110 cipher.init(Cipher.ENCRYPT_MODE, key, ips) 138 Cipher cipher = new NullCipher(); local 160 Cipher cipher = Cipher.getInstance(algorithm); local 180 Cipher cipher = Cipher.getInstance("DES\/CBC\/PKCS5Padding"); local 224 Cipher cipher = Cipher.getInstance("DES\/CBC\/PKCS5Padding"); local 268 Cipher cipher = Cipher.getInstance("DES"); local 302 Cipher cipher = Cipher.getInstance("DES"); local [all...] |
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_start.c | 23 @param cipher The index of the cipher desired 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 32 int ctr_start( int cipher, 45 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 49 /* setup cipher */ 50 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ctr->key)) != CRYPT_OK) { 55 ctr->blocklen = cipher_descriptor[cipher].block_length; 56 ctr->cipher = cipher; [all...] |
ctr_setiv.c | 35 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { 48 return cipher_descriptor[ctr->cipher].ecb_encrypt(IV, ctr->pad, &ctr->key);
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
CipherInputStreamTest.java | 24 import javax.crypto.Cipher; 42 Cipher cipher = Cipher.getInstance("DES"); local 43 cipher.init(Cipher.ENCRYPT_MODE, key); 45 new ByteArrayInputStream(plainText.getBytes("UTF-8")), cipher); 51 Cipher cipher = Cipher.getInstance("DES") local 59 Cipher cipher = Cipher.getInstance("DES"); local [all...] |
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_decrypt.c | 35 if ((err = cipher_is_valid(lrw->cipher)) != CRYPT_OK) { 39 if (cipher_descriptor[lrw->cipher].accel_lrw_decrypt != NULL) { 40 return cipher_descriptor[lrw->cipher].accel_lrw_decrypt(ct, pt, len, lrw->IV, lrw->tweak, &lrw->key);
|
lrw_encrypt.c | 35 if ((err = cipher_is_valid(lrw->cipher)) != CRYPT_OK) { 39 if (cipher_descriptor[lrw->cipher].accel_lrw_encrypt != NULL) { 40 return cipher_descriptor[lrw->cipher].accel_lrw_encrypt(pt, ct, len, lrw->IV, lrw->tweak, &lrw->key);
|
/external/ppp/pppd/ |
pppcrypt.c | 129 DesEncrypt(clear, cipher) 131 u_char *cipher; /* OUT 8 octets */ 140 Collapse(des_input, cipher); 145 DesDecrypt(cipher, clear) 146 u_char *cipher; /* IN 8 octets */ 151 Expand(cipher, des_input); 174 DesEncrypt(clear, cipher) 176 u_char *cipher; /* OUT 8 octets */ 178 des_ecb_encrypt((des_cblock *)clear, (des_cblock *)cipher, 184 DesDecrypt(cipher, clear [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
BufferedBlockCipher.java | 9 * Note: in the case where the underlying cipher is either a CFB cipher or an 18 protected BlockCipher cipher; field in class:BufferedBlockCipher 31 * Create a buffered block cipher without padding. 33 * @param cipher the underlying block cipher this buffering object wraps. 36 BlockCipher cipher) 38 this.cipher = cipher; 40 buf = new byte[cipher.getBlockSize()] [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
BlockCipher.java | 5 package ch.ethz.ssh2.crypto.cipher;
|
/external/wpa_supplicant_8/src/crypto/ |
aes-wrap.c | 22 * @cipher: Wrapped key, (n + 1) * 64 bits 25 int aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher) 31 a = cipher; 32 r = cipher + 8; 50 r = cipher + 8; 65 * These are already in @cipher due to the location of temporary
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
DigitalSignature.java | 29 import javax.crypto.Cipher; 62 private final Cipher cipher; field in class:DigitalSignature 77 cipher = Cipher.getInstance("RSA/ECB/PKCS1Padding"); 82 cipher = null; 85 cipher = null; 106 } else if (cipher != null) { 107 cipher.init(Cipher.ENCRYPT_MODE, key) [all...] |
/external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/ |
Cipher_Impl1Test.java | 25 import javax.crypto.Cipher; 46 * @tests javax.crypto.Cipher#getIV() 47 * @tests javax.crypto.Cipher#init(int, java.security.Key, 57 Cipher cipher = null; local 64 cipher = Cipher.getInstance(algorithm + "/CBC/PKCS5Padding"); 65 cipher.init(Cipher.ENCRYPT_MODE, cipherKey, ap); 67 byte[] cipherIV = cipher.getIV() 85 Cipher cipher = null; local [all...] |
/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_setiv.c | 34 if ((err = cipher_is_valid(cfb->cipher)) != CRYPT_OK) { 44 return cipher_descriptor[cfb->cipher].ecb_encrypt(IV, cfb->IV, &cfb->key);
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_setiv.c | 34 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) { 44 return cipher_descriptor[f8->cipher].ecb_encrypt(IV, f8->IV, &f8->key);
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_setiv.c | 34 if ((err = cipher_is_valid(ofb->cipher)) != CRYPT_OK) { 44 return cipher_descriptor[ofb->cipher].ecb_encrypt(IV, ofb->IV, &ofb->key);
|