HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 51 - 75 of 297) sorted by null

1 23 4 5 6 7 8 91011>>

  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
wpa.h 41 #define DOT11_RC_INVALID_MC_CIPHER 18 /* Invalid multicast cipher */
42 #define DOT11_RC_INVALID_UC_CIPHER 19 /* Invalid unicast cipher */
105 /* WPA cipher suites */
116 #define IS_WPA_CIPHER(cipher) ((cipher) == WPA_CIPHER_NONE || \
117 (cipher) == WPA_CIPHER_WEP_40 || \
118 (cipher) == WPA_CIPHER_WEP_104 || \
119 (cipher) == WPA_CIPHER_TKIP || \
120 (cipher) == WPA_CIPHER_AES_OCB || \
121 (cipher) == WPA_CIPHER_AES_CCM ||
    [all...]
  /libcore/support/src/test/java/tests/security/
CipherHelper.java 23 import javax.crypto.Cipher;
43 Cipher cipher = null; local
45 cipher = Cipher.getInstance(algorithmName);
52 cipher.init(mode1, encryptKey);
57 byte[] encrypted = crypt(cipher, plainData.getBytes());
60 cipher.init(mode2, decryptKey);
65 byte[] decrypted = crypt(cipher, encrypted);
73 public byte[] crypt(Cipher cipher, byte[] input)
    [all...]
  /external/dropbear/libtomcrypt/src/mac/f9/
f9_done.c 33 if ((err = cipher_is_valid(f9->cipher)) != CRYPT_OK) {
37 if ((f9->blocksize > cipher_descriptor[f9->cipher].block_length) || (f9->blocksize < 0) ||
44 cipher_descriptor[f9->cipher].ecb_encrypt(f9->IV, f9->IV, &f9->key);
52 if ((err = cipher_descriptor[f9->cipher].setup(f9->akey, f9->keylen, 0, &f9->key)) != CRYPT_OK) {
57 cipher_descriptor[f9->cipher].ecb_encrypt(f9->ACC, f9->ACC, &f9->key);
58 cipher_descriptor[f9->cipher].done(&f9->key);
f9_process.c 34 if ((err = cipher_is_valid(f9->cipher)) != CRYPT_OK) {
38 if ((f9->blocksize > cipher_descriptor[f9->cipher].block_length) || (f9->blocksize < 0) ||
49 cipher_descriptor[f9->cipher].ecb_encrypt(f9->IV, f9->IV, &f9->key);
61 cipher_descriptor[f9->cipher].ecb_encrypt(f9->IV, f9->IV, &f9->key);
  /external/dropbear/libtomcrypt/src/modes/lrw/
lrw_start.c 22 @param cipher The cipher desired, must be a 128-bit block cipher
24 @param key The cipher key
25 @param keylen The length of the cipher key in octets
27 @param num_rounds The number of rounds for the cipher (0 == default)
31 int lrw_start( int cipher,
55 /* is cipher valid? */
56 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
59 if (cipher_descriptor[cipher].block_length != 16)
    [all...]
  /external/ipsec-tools/src/racoon/missing/crypto/rijndael/
rijndael-api-fst.h 29 #define BITSPERBLOCK 128 /* Default number of bits in a cipher block */
36 #define BAD_CIPHER_STATE -5 /* Cipher in wrong state (e.g., not initialized) */
67 /* The structure for cipher information */
86 int rijndael_cipherInit(cipherInstance *cipher, u_int8_t mode, char *IV);
88 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key,
91 int rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key,
94 int rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key,
97 int rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key,
101 int rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key,
rijndael-api-fst.c 79 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) {
81 cipher->mode = mode;
86 bcopy(IV, cipher->IV, MAX_IV_SIZE);
88 bzero(cipher->IV, MAX_IV_SIZE);
93 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key,
98 if (cipher == NULL ||
109 switch (cipher->mode) {
120 bcopy(cipher->IV, block, 16);
127 ((word32*)block)[0] = ((word32*)cipher->IV)[0] ^ ((word32*)input)[0];
128 ((word32*)block)[1] = ((word32*)cipher->IV)[1] ^ ((word32*)input)[1]
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/paddings/
PaddedBufferedBlockCipher.java 24 * Create a buffered block cipher with the desired padding.
26 * @param cipher the underlying block cipher this buffering object wraps.
30 BlockCipher cipher,
33 this.cipher = cipher;
36 buf = new byte[cipher.getBlockSize()];
41 * Create a buffered block cipher PKCS7 padding
43 * @param cipher the underlying block cipher this buffering object wraps
    [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_mac.h 38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen);
41 int omac_memory(int cipher,
45 int omac_memory_multi(int cipher,
49 int omac_file(int cipher,
65 symmetric_key key; /* scheduled key for cipher */
67 int cipher_idx, /* cipher idx */
72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen);
76 int pmac_memory(int cipher,
81 int pmac_memory_multi(int cipher,
86 int pmac_file(int cipher,
151 int cipher, \/* cipher idx *\/ member in struct:__anon7176
242 int cipher, \/* which cipher *\/ member in struct:__anon7177
320 int cipher, member in struct:__anon7178
353 int cipher, member in struct:__anon7179
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
CFBBlockCipher.java 9 * implements a Cipher-FeedBack (CFB) mode on top of a simple cipher.
19 private BlockCipher cipher = null; field in class:CFBBlockCipher
25 * @param cipher the block cipher to be used as the basis of the
30 BlockCipher cipher,
33 this.cipher = cipher;
36 this.IV = new byte[cipher.getBlockSize()];
37 this.cfbV = new byte[cipher.getBlockSize()]
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/gcm/
gcm_init.c 23 @param cipher The index of the cipher to use
28 int gcm_init(gcm_state *gcm, int cipher,
46 /* is cipher valid? */
47 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
50 if (cipher_descriptor[cipher].block_length != 16) {
55 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &gcm->K)) != CRYPT_OK) {
61 if ((err = cipher_descriptor[cipher].ecb_encrypt(B, gcm->H, &gcm->K)) != CRYPT_OK) {
68 gcm->cipher = cipher;
    [all...]
gcm_memory.c 22 @param cipher Index of cipher to use
37 int gcm_memory( int cipher,
50 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
54 if (cipher_descriptor[cipher].accel_gcm_memory != NULL) {
56 cipher_descriptor[cipher].accel_gcm_memory
87 if ((err = gcm_init(gcm, cipher, key, keylen)) != CRYPT_OK) {
  /external/openssl/crypto/asn1/
x_pkey.c 82 ret->cipher.cipher=EVP_get_cipherbyname(
84 if (ret->cipher.cipher == NULL)
99 memcpy(ret->cipher.iv,
103 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
120 ret->cipher.cipher=NULL;
121 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
  /libcore/luni/src/main/java/javax/crypto/
CipherOutputStream.java 26 * This class wraps an output stream and a cipher so that {@code write} methods
27 * send the data through the cipher before writing them to the underlying output
30 * The cipher must be initialized for the requested operation before being used
31 * by a {@code CipherOutputStream}. For example, if a cipher initialized for
37 private final Cipher cipher; field in class:CipherOutputStream
41 * OutputStream} and a {@code Cipher}.
46 * the cipher to process the data with.
48 public CipherOutputStream(OutputStream os, Cipher c) {
50 cipher = c
    [all...]
CipherInputStream.java 27 * This class wraps an {@code InputStream} and a cipher so that {@code read()}
29 * processed by the cipher.
31 * The cipher must be initialized for the requested operation before being used
32 * by a {@code CipherInputStream}. For example, if a cipher initialized for
40 private final Cipher cipher; field in class:CipherInputStream
49 * InputStream} and a cipher.
58 * the cipher to process the data with.
60 public CipherInputStream(InputStream is, Cipher c) {
62 this.cipher = c
    [all...]
  /external/openssh/
cipher.c 1 /* $OpenBSD: cipher.c,v 1.82 2009/01/26 09:58:15 markus Exp $ */
49 #include "cipher.h"
60 struct Cipher {
99 cipher_blocksize(const Cipher *c)
105 cipher_keylen(const Cipher *c)
111 cipher_get_number(const Cipher *c)
117 cipher_is_cbc(const Cipher *c)
134 Cipher *
137 Cipher *c;
144 Cipher *
    [all...]
  /external/srtp/
Android.mk 9 crypto/cipher/cipher.c \
10 crypto/cipher/null_cipher.c \
11 crypto/cipher/aes.c \
12 crypto/cipher/aes_icm.c \
13 crypto/cipher/aes_cbc.c \
  /external/wpa_supplicant_8/src/crypto/
aes-unwrap.c 21 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits
25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain)
32 os_memcpy(a, cipher, 8);
34 os_memcpy(r, cipher + 8, 8 * n);
  /external/dropbear/libtomcrypt/src/encauth/ccm/
ccm_memory.c 22 @param cipher The index of the cipher desired
38 int ccm_memory(int cipher,
71 /* check cipher input */
72 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) {
75 if (cipher_descriptor[cipher].block_length != 16) {
91 if (cipher_descriptor[cipher].accel_ccm_memory != NULL) {
92 return cipher_descriptor[cipher].accel_ccm_memory(
132 /* initialize the cipher */
133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK)
    [all...]
  /external/dropbear/libtomcrypt/src/prngs/
yarrow.c 44 /* these are the default hash/cipher combo used */
47 prng->yarrow.cipher = register_cipher(&rijndael_enc_desc);
49 prng->yarrow.cipher = register_cipher(&aes_enc_desc);
51 prng->yarrow.cipher = register_cipher(&rijndael_desc);
53 prng->yarrow.cipher = register_cipher(&aes_desc);
56 prng->yarrow.cipher = register_cipher(&blowfish_desc);
58 prng->yarrow.cipher = register_cipher(&twofish_desc);
60 prng->yarrow.cipher = register_cipher(&rc6_desc);
62 prng->yarrow.cipher = register_cipher(&rc5_desc);
64 prng->yarrow.cipher = register_cipher(&saferp_desc)
    [all...]
  /external/openssl/crypto/evp/
evp_test.c 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c),
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn,
252 c=EVP_get_cipherbyname(cipher);
359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
368 char *cipher; local
378 cipher=sstrsep(&p,":");
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
397 && !test_digest(cipher,plaintext,pn,ciphertext,cn))
400 if (strstr(cipher, "AES") == cipher)
    [all...]
  /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
CipherTest.java 33 import javax.crypto.Cipher;
62 * @tests javax.crypto.Cipher#getInstance(java.lang.String)
65 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local
66 assertNotNull("Received a null Cipher instance", cipher);
70 * @tests javax.crypto.Cipher#getInstance(java.lang.String,
76 Provider[] providers = Security.getProviders("Cipher.DES");
78 assertNotNull("No installed providers support Cipher.DES", providers)
81 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local
122 Cipher cipher = Cipher.getInstance("DES", providers[i]); local
138 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local
152 Cipher cipher = Cipher.getInstance(algorithm); local
163 Cipher cipher = Cipher.getInstance(algorithm); local
173 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local
189 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local
200 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local
211 Cipher cipher = null; local
237 Cipher cipher = null; local
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/ocb/
ocb_decrypt.c 23 @param ct The ciphertext (length of the block size of the block cipher)
36 /* check if valid cipher */
37 if ((err = cipher_is_valid(ocb->cipher)) != CRYPT_OK) {
40 LTC_ARGCHK(cipher_descriptor[ocb->cipher].ecb_decrypt != NULL);
43 if (ocb->block_len != cipher_descriptor[ocb->cipher].block_length) {
54 if ((err = cipher_descriptor[ocb->cipher].ecb_decrypt(tmp, pt, &ocb->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/mac/xcbc/
xcbc_done.c 33 if ((err = cipher_is_valid(xcbc->cipher)) != CRYPT_OK) {
37 if ((xcbc->blocksize > cipher_descriptor[xcbc->cipher].block_length) || (xcbc->blocksize < 0) ||
57 cipher_descriptor[xcbc->cipher].ecb_encrypt(xcbc->IV, xcbc->IV, &xcbc->key);
58 cipher_descriptor[xcbc->cipher].done(&xcbc->key);
xcbc_process.c 37 if ((err = cipher_is_valid(xcbc->cipher)) != CRYPT_OK) {
41 if ((xcbc->blocksize > cipher_descriptor[xcbc->cipher].block_length) || (xcbc->blocksize < 0) ||
52 cipher_descriptor[xcbc->cipher].ecb_encrypt(xcbc->IV, xcbc->IV, &xcbc->key);
61 cipher_descriptor[xcbc->cipher].ecb_encrypt(xcbc->IV, xcbc->IV, &xcbc->key);

Completed in 699 milliseconds

1 23 4 5 6 7 8 91011>>