/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
wpa.h | 41 #define DOT11_RC_INVALID_MC_CIPHER 18 /* Invalid multicast cipher */ 42 #define DOT11_RC_INVALID_UC_CIPHER 19 /* Invalid unicast cipher */ 105 /* WPA cipher suites */ 116 #define IS_WPA_CIPHER(cipher) ((cipher) == WPA_CIPHER_NONE || \ 117 (cipher) == WPA_CIPHER_WEP_40 || \ 118 (cipher) == WPA_CIPHER_WEP_104 || \ 119 (cipher) == WPA_CIPHER_TKIP || \ 120 (cipher) == WPA_CIPHER_AES_OCB || \ 121 (cipher) == WPA_CIPHER_AES_CCM || [all...] |
/libcore/support/src/test/java/tests/security/ |
CipherHelper.java | 23 import javax.crypto.Cipher; 43 Cipher cipher = null; local 45 cipher = Cipher.getInstance(algorithmName); 52 cipher.init(mode1, encryptKey); 57 byte[] encrypted = crypt(cipher, plainData.getBytes()); 60 cipher.init(mode2, decryptKey); 65 byte[] decrypted = crypt(cipher, encrypted); 73 public byte[] crypt(Cipher cipher, byte[] input) [all...] |
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_done.c | 33 if ((err = cipher_is_valid(f9->cipher)) != CRYPT_OK) { 37 if ((f9->blocksize > cipher_descriptor[f9->cipher].block_length) || (f9->blocksize < 0) || 44 cipher_descriptor[f9->cipher].ecb_encrypt(f9->IV, f9->IV, &f9->key); 52 if ((err = cipher_descriptor[f9->cipher].setup(f9->akey, f9->keylen, 0, &f9->key)) != CRYPT_OK) { 57 cipher_descriptor[f9->cipher].ecb_encrypt(f9->ACC, f9->ACC, &f9->key); 58 cipher_descriptor[f9->cipher].done(&f9->key);
|
f9_process.c | 34 if ((err = cipher_is_valid(f9->cipher)) != CRYPT_OK) { 38 if ((f9->blocksize > cipher_descriptor[f9->cipher].block_length) || (f9->blocksize < 0) || 49 cipher_descriptor[f9->cipher].ecb_encrypt(f9->IV, f9->IV, &f9->key); 61 cipher_descriptor[f9->cipher].ecb_encrypt(f9->IV, f9->IV, &f9->key);
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_start.c | 22 @param cipher The cipher desired, must be a 128-bit block cipher 24 @param key The cipher key 25 @param keylen The length of the cipher key in octets 27 @param num_rounds The number of rounds for the cipher (0 == default) 31 int lrw_start( int cipher, 55 /* is cipher valid? */ 56 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 59 if (cipher_descriptor[cipher].block_length != 16) [all...] |
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
rijndael-api-fst.h | 29 #define BITSPERBLOCK 128 /* Default number of bits in a cipher block */ 36 #define BAD_CIPHER_STATE -5 /* Cipher in wrong state (e.g., not initialized) */ 67 /* The structure for cipher information */ 86 int rijndael_cipherInit(cipherInstance *cipher, u_int8_t mode, char *IV); 88 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, 91 int rijndael_padEncrypt(cipherInstance *cipher, keyInstance *key, 94 int rijndael_blockDecrypt(cipherInstance *cipher, keyInstance *key, 97 int rijndael_padDecrypt(cipherInstance *cipher, keyInstance *key, 101 int rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key,
|
rijndael-api-fst.c | 79 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { 81 cipher->mode = mode; 86 bcopy(IV, cipher->IV, MAX_IV_SIZE); 88 bzero(cipher->IV, MAX_IV_SIZE); 93 int rijndael_blockEncrypt(cipherInstance *cipher, keyInstance *key, 98 if (cipher == NULL || 109 switch (cipher->mode) { 120 bcopy(cipher->IV, block, 16); 127 ((word32*)block)[0] = ((word32*)cipher->IV)[0] ^ ((word32*)input)[0]; 128 ((word32*)block)[1] = ((word32*)cipher->IV)[1] ^ ((word32*)input)[1] [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/paddings/ |
PaddedBufferedBlockCipher.java | 24 * Create a buffered block cipher with the desired padding. 26 * @param cipher the underlying block cipher this buffering object wraps. 30 BlockCipher cipher, 33 this.cipher = cipher; 36 buf = new byte[cipher.getBlockSize()]; 41 * Create a buffered block cipher PKCS7 padding 43 * @param cipher the underlying block cipher this buffering object wraps [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 38 int omac_init(omac_state *omac, int cipher, const unsigned char *key, unsigned long keylen); 41 int omac_memory(int cipher, 45 int omac_memory_multi(int cipher, 49 int omac_file(int cipher, 65 symmetric_key key; /* scheduled key for cipher */ 67 int cipher_idx, /* cipher idx */ 72 int pmac_init(pmac_state *pmac, int cipher, const unsigned char *key, unsigned long keylen); 76 int pmac_memory(int cipher, 81 int pmac_memory_multi(int cipher, 86 int pmac_file(int cipher, 151 int cipher, \/* cipher idx *\/ member in struct:__anon7176 242 int cipher, \/* which cipher *\/ member in struct:__anon7177 320 int cipher, member in struct:__anon7178 353 int cipher, member in struct:__anon7179 [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CFBBlockCipher.java | 9 * implements a Cipher-FeedBack (CFB) mode on top of a simple cipher. 19 private BlockCipher cipher = null; field in class:CFBBlockCipher 25 * @param cipher the block cipher to be used as the basis of the 30 BlockCipher cipher, 33 this.cipher = cipher; 36 this.IV = new byte[cipher.getBlockSize()]; 37 this.cfbV = new byte[cipher.getBlockSize()] [all...] |
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_init.c | 23 @param cipher The index of the cipher to use 28 int gcm_init(gcm_state *gcm, int cipher, 46 /* is cipher valid? */ 47 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 50 if (cipher_descriptor[cipher].block_length != 16) { 55 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &gcm->K)) != CRYPT_OK) { 61 if ((err = cipher_descriptor[cipher].ecb_encrypt(B, gcm->H, &gcm->K)) != CRYPT_OK) { 68 gcm->cipher = cipher; [all...] |
gcm_memory.c | 22 @param cipher Index of cipher to use 37 int gcm_memory( int cipher, 50 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 54 if (cipher_descriptor[cipher].accel_gcm_memory != NULL) { 56 cipher_descriptor[cipher].accel_gcm_memory 87 if ((err = gcm_init(gcm, cipher, key, keylen)) != CRYPT_OK) {
|
/external/openssl/crypto/asn1/ |
x_pkey.c | 82 ret->cipher.cipher=EVP_get_cipherbyname( 84 if (ret->cipher.cipher == NULL) 99 memcpy(ret->cipher.iv, 103 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH); 120 ret->cipher.cipher=NULL; 121 memset(ret->cipher.iv,0,EVP_MAX_IV_LENGTH);
|
/libcore/luni/src/main/java/javax/crypto/ |
CipherOutputStream.java | 26 * This class wraps an output stream and a cipher so that {@code write} methods 27 * send the data through the cipher before writing them to the underlying output 30 * The cipher must be initialized for the requested operation before being used 31 * by a {@code CipherOutputStream}. For example, if a cipher initialized for 37 private final Cipher cipher; field in class:CipherOutputStream 41 * OutputStream} and a {@code Cipher}. 46 * the cipher to process the data with. 48 public CipherOutputStream(OutputStream os, Cipher c) { 50 cipher = c [all...] |
CipherInputStream.java | 27 * This class wraps an {@code InputStream} and a cipher so that {@code read()} 29 * processed by the cipher. 31 * The cipher must be initialized for the requested operation before being used 32 * by a {@code CipherInputStream}. For example, if a cipher initialized for 40 private final Cipher cipher; field in class:CipherInputStream 49 * InputStream} and a cipher. 58 * the cipher to process the data with. 60 public CipherInputStream(InputStream is, Cipher c) { 62 this.cipher = c [all...] |
/external/openssh/ |
cipher.c | 1 /* $OpenBSD: cipher.c,v 1.82 2009/01/26 09:58:15 markus Exp $ */ 49 #include "cipher.h" 60 struct Cipher { 99 cipher_blocksize(const Cipher *c) 105 cipher_keylen(const Cipher *c) 111 cipher_get_number(const Cipher *c) 117 cipher_is_cbc(const Cipher *c) 134 Cipher * 137 Cipher *c; 144 Cipher * [all...] |
/external/srtp/ |
Android.mk | 9 crypto/cipher/cipher.c \ 10 crypto/cipher/null_cipher.c \ 11 crypto/cipher/aes.c \ 12 crypto/cipher/aes_icm.c \ 13 crypto/cipher/aes_cbc.c \
|
/external/wpa_supplicant_8/src/crypto/ |
aes-unwrap.c | 21 * @cipher: Wrapped key to be unwrapped, (n + 1) * 64 bits 25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) 32 os_memcpy(a, cipher, 8); 34 os_memcpy(r, cipher + 8, 8 * n);
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 22 @param cipher The index of the cipher desired 38 int ccm_memory(int cipher, 71 /* check cipher input */ 72 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 75 if (cipher_descriptor[cipher].block_length != 16) { 91 if (cipher_descriptor[cipher].accel_ccm_memory != NULL) { 92 return cipher_descriptor[cipher].accel_ccm_memory( 132 /* initialize the cipher */ 133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) [all...] |
/external/dropbear/libtomcrypt/src/prngs/ |
yarrow.c | 44 /* these are the default hash/cipher combo used */ 47 prng->yarrow.cipher = register_cipher(&rijndael_enc_desc); 49 prng->yarrow.cipher = register_cipher(&aes_enc_desc); 51 prng->yarrow.cipher = register_cipher(&rijndael_desc); 53 prng->yarrow.cipher = register_cipher(&aes_desc); 56 prng->yarrow.cipher = register_cipher(&blowfish_desc); 58 prng->yarrow.cipher = register_cipher(&twofish_desc); 60 prng->yarrow.cipher = register_cipher(&rc6_desc); 62 prng->yarrow.cipher = register_cipher(&rc5_desc); 64 prng->yarrow.cipher = register_cipher(&saferp_desc) [all...] |
/external/openssl/crypto/evp/ |
evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 33 import javax.crypto.Cipher; 62 * @tests javax.crypto.Cipher#getInstance(java.lang.String) 65 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local 66 assertNotNull("Received a null Cipher instance", cipher); 70 * @tests javax.crypto.Cipher#getInstance(java.lang.String, 76 Provider[] providers = Security.getProviders("Cipher.DES"); 78 assertNotNull("No installed providers support Cipher.DES", providers) 81 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local 122 Cipher cipher = Cipher.getInstance("DES", providers[i]); local 138 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local 152 Cipher cipher = Cipher.getInstance(algorithm); local 163 Cipher cipher = Cipher.getInstance(algorithm); local 173 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 189 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 200 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 211 Cipher cipher = null; local 237 Cipher cipher = null; local [all...] |
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_decrypt.c | 23 @param ct The ciphertext (length of the block size of the block cipher) 36 /* check if valid cipher */ 37 if ((err = cipher_is_valid(ocb->cipher)) != CRYPT_OK) { 40 LTC_ARGCHK(cipher_descriptor[ocb->cipher].ecb_decrypt != NULL); 43 if (ocb->block_len != cipher_descriptor[ocb->cipher].block_length) { 54 if ((err = cipher_descriptor[ocb->cipher].ecb_decrypt(tmp, pt, &ocb->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_done.c | 33 if ((err = cipher_is_valid(xcbc->cipher)) != CRYPT_OK) { 37 if ((xcbc->blocksize > cipher_descriptor[xcbc->cipher].block_length) || (xcbc->blocksize < 0) || 57 cipher_descriptor[xcbc->cipher].ecb_encrypt(xcbc->IV, xcbc->IV, &xcbc->key); 58 cipher_descriptor[xcbc->cipher].done(&xcbc->key);
|
xcbc_process.c | 37 if ((err = cipher_is_valid(xcbc->cipher)) != CRYPT_OK) { 41 if ((xcbc->blocksize > cipher_descriptor[xcbc->cipher].block_length) || (xcbc->blocksize < 0) || 52 cipher_descriptor[xcbc->cipher].ecb_encrypt(xcbc->IV, xcbc->IV, &xcbc->key); 61 cipher_descriptor[xcbc->cipher].ecb_encrypt(xcbc->IV, xcbc->IV, &xcbc->key);
|