/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
NullCipher.java | 5 package ch.ethz.ssh2.crypto.cipher;
|
/external/openssl/crypto/pkcs12/ |
p12_crpt.c | 70 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, int en_de) 96 iter, EVP_CIPHER_key_length(cipher), key, md)) { 102 iter, EVP_CIPHER_iv_length(cipher), iv, md)) { 108 ret = EVP_CipherInit_ex(ctx, cipher, NULL, key, iv, en_de);
|
p12_p8e.c | 63 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_init.c | 23 @param cipher The index of the desired cipher 32 int eax_init(eax_state *eax, int cipher, 50 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 53 blklen = cipher_descriptor[cipher].block_length; 71 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) { 93 if ((err = omac_init(&eax->headeromac, cipher, key, keylen)) != CRYPT_OK) { 111 if ((err = ctr_start(cipher, eax->N, key, keylen, 0, CTR_COUNTER_BIG_ENDIAN, &eax->ctr)) != CRYPT_OK) { 116 if ((err = omac_init(&eax->ctomac, cipher, key, keylen)) != CRYPT_OK) {
|
eax_encrypt_authenticate_memory.c | 22 @param cipher The index of the cipher desired 36 int eax_encrypt_authenticate_memory(int cipher, 55 if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) {
|
/external/openssl/crypto/evp/ |
p5_crpt.c | 73 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, 129 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); 130 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 131 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); 132 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), 133 EVP_CIPHER_iv_length(cipher)); 134 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de))
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
CipherOutputStream.java | 25 BufferedBlockCipher cipher) 28 this.bufferedBlockCipher = cipher; 29 this.buf = new byte[cipher.getBlockSize()]; 38 StreamCipher cipher) 41 this.streamCipher = cipher; 129 * that have already been processed by the encapsulated cipher object 133 * Any bytes buffered by the encapsulated cipher 135 * if the encapsulated cipher is a block cipher, and the total number of 137 * the cipher's block size, no bytes will be written out [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
CipherSpi.java | 18 import javax.crypto.Cipher; 44 private AsymmetricBlockCipher cipher; field in class:CipherSpi 54 cipher = engine; 77 cipher = engine; 92 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue()); 100 return cipher.getInputBlockSize(); 104 throw new IllegalStateException("RSA Cipher not initialised"); 132 return cipher.getOutputBlockSize(); 136 throw new IllegalStateException("RSA Cipher not initialised"); 196 cipher = new RSABlindedEngine() [all...] |
/libcore/support/src/test/java/tests/security/ |
AlgorithmParameterAsymmetricHelper.java | 27 import javax.crypto.Cipher; 56 Cipher cipher = null; local 58 cipher = Cipher.getInstance(algorithmName); 66 cipher.init(Cipher.ENCRYPT_MODE, keyPair.getPublic(), parameters); 75 bs = cipher.doFinal(plainData.getBytes()); 83 cipher.init(Cipher.DECRYPT_MODE, keyPair.getPrivate(), parameters) [all...] |
AlgorithmParameterSymmetricHelper.java | 26 import javax.crypto.Cipher; 64 Cipher cipher = null; local 71 cipher = Cipher.getInstance(transformation); 79 cipher.init(Cipher.ENCRYPT_MODE, key, parameters); 88 bs = cipher.doFinal(plainData.getBytes()); 96 cipher.init(Cipher.DECRYPT_MODE, key, parameters) [all...] |
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_init.c | 41 @param cipher The index of the desired cipher 44 @param nonce The session nonce (length of the block size of the cipher) 47 int ocb_init(ocb_state *ocb, int cipher, 56 /* valid cipher? */ 57 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 62 ocb->block_len = cipher_descriptor[cipher].block_length; 73 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &ocb->key)) != CRYPT_OK) { 79 if ((err = cipher_descriptor[cipher].ecb_encrypt(ocb->L, ocb->L, &ocb->key)) != CRYPT_OK) { 87 if ((err = cipher_descriptor[cipher].ecb_encrypt(ocb->R, ocb->R, &ocb->key)) != CRYPT_OK) [all...] |
ocb_encrypt.c | 23 @param pt The plaintext (length of the block size of the block cipher) 35 if ((err = cipher_is_valid(ocb->cipher)) != CRYPT_OK) { 38 if (ocb->block_len != cipher_descriptor[ocb->cipher].block_length) { 54 if ((err = cipher_descriptor[ocb->cipher].ecb_encrypt(tmp, ct, &ocb->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_file.c | 22 @param cipher The index of the cipher desired 30 int f9_file(int cipher, 53 if ((err = f9_init(&f9, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_file.c | 22 @param cipher The index of the cipher desired 30 int omac_file(int cipher, 53 if ((err = omac_init(&omac, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_file.c | 22 @param cipher The index of the cipher desired 30 int pmac_file(int cipher, 54 if ((err = pmac_init(&pmac, cipher, key, keylen)) != CRYPT_OK) {
|
pmac_memory.c | 22 @param cipher The index of the cipher desired 31 int pmac_memory(int cipher, 50 if ((err = pmac_init(pmac, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_file.c | 22 @param cipher The index of the cipher desired 30 int xcbc_file(int cipher, 53 if ((err = xcbc_init(&xcbc, cipher, key, keylen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_decrypt.c | 36 if ((err = cipher_is_valid(cfb->cipher)) != CRYPT_OK) { 48 if ((err = cipher_descriptor[cfb->cipher].ecb_encrypt(cfb->pad, cfb->IV, &cfb->key)) != CRYPT_OK) {
|
cfb_encrypt.c | 36 if ((err = cipher_is_valid(cfb->cipher)) != CRYPT_OK) { 48 if ((err = cipher_descriptor[cfb->cipher].ecb_encrypt(cfb->pad, cfb->IV, &cfb->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_encrypt.c | 34 if ((err = cipher_is_valid(ofb->cipher)) != CRYPT_OK) { 46 if ((err = cipher_descriptor[ofb->cipher].ecb_encrypt(ofb->IV, ofb->IV, &ofb->key)) != CRYPT_OK) {
|
/libcore/luni/src/main/java/javax/crypto/ |
SealedObject.java | 35 * instance and encrypts it using a cryptographic cipher. 42 * object itself keeps track of the cipher and corresponding parameters. 49 * The cipher's {@link AlgorithmParameters} in encoded format. 50 * Equivalent to {@code cipher.getParameters().getEncoded()}, 51 * or null if the cipher did not use any parameters. 72 * and sealing it using the specified cipher. 74 * The cipher must be fully initialized. 79 * the cipher to encrypt the object. 83 * if the specified cipher is a block cipher and the length o 159 Cipher cipher = Cipher.getInstance(sealAlg); local 254 Cipher cipher = Cipher.getInstance(sealAlg, provider); local [all...] |
/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_decrypt.c | 43 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 61 if (cipher_descriptor[cbc->cipher].accel_cbc_decrypt != NULL) { 62 return cipher_descriptor[cbc->cipher].accel_cbc_decrypt(ct, pt, len / cbc->blocklen, cbc->IV, &cbc->key); 66 if ((err = cipher_descriptor[cbc->cipher].ecb_decrypt(ct, tmp, &cbc->key)) != CRYPT_OK) {
|
cbc_encrypt.c | 37 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 55 if (cipher_descriptor[cbc->cipher].accel_cbc_encrypt != NULL) { 56 return cipher_descriptor[cbc->cipher].accel_cbc_encrypt(pt, ct, len / cbc->blocklen, cbc->IV, &cbc->key); 71 if ((err = cipher_descriptor[cbc->cipher].ecb_encrypt(cbc->IV, ct, &cbc->key)) != CRYPT_OK) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
BaseStreamCipher.java | 10 import javax.crypto.Cipher; 47 private StreamCipher cipher; field in class:BaseStreamCipher 59 cipher = engine; 69 cipher = new StreamBlockCipher(engine); 184 param = PBE.Util.makePBEParameters(k, params, cipher.getAlgorithmName()); 220 if ((opmode == Cipher.ENCRYPT_MODE) || (opmode == Cipher.WRAP_MODE)) 236 case Cipher.ENCRYPT_MODE: 237 case Cipher.WRAP_MODE: 238 cipher.init(true, param) [all...] |
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_done.c | 41 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) { 65 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y_0, gcm->buf, &gcm->K)) != CRYPT_OK) { 73 cipher_descriptor[gcm->cipher].done(&gcm->K);
|