/external/openssl/crypto/evp/ |
evp_pbe.c | 71 /* Setup a cipher context from a PBE algorithm */ 158 const EVP_CIPHER *cipher; local 180 cipher = NULL; 183 cipher = EVP_get_cipherbynid(cipher_nid); 184 if (!cipher) 203 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) 257 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, 261 if (cipher) 262 cipher_nid = EVP_CIPHER_type(cipher);
|
evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
p5_crpt2.c | 179 const EVP_CIPHER *cipher; local 207 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); 209 if(!cipher) { 215 /* Fixup cipher based on AlgorithmIdentifier */ 216 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
|
/external/openssl/crypto/pem/ |
pem_info.c | 241 EVP_CIPHER_INFO cipher; local 243 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) 245 if (!PEM_do_header(&cipher,data,&len,cb,u)) 359 EVP_CIPHER_nid(xi->enc_cipher.cipher));
|
/external/openssl/ssl/ |
s23_clnt.c | 259 SSL_CIPHER *cipher; local 265 cipher = sk_SSL_CIPHER_value(ciphers, i); 266 if (cipher->algorithm_ssl == SSL_SSLV2)
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 16 * Implements the Counter with Cipher Block Chaining mode (CCM) detailed in 24 private BlockCipher cipher; field in class:CCMBlockCipher 38 * @param c the block cipher to be used. 42 this.cipher = c; 48 throw new IllegalArgumentException("cipher required with a block size of 16."); 53 * return the underlying block cipher that we are wrapping. 55 * @return the underlying block cipher that we are wrapping. 59 return cipher; 99 return cipher.getAlgorithmName() + "/CCM"; 144 cipher.reset() [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
CipherSpi.java | 18 import javax.crypto.Cipher; 44 private AsymmetricBlockCipher cipher; field in class:CipherSpi 54 cipher = engine; 77 cipher = engine; 92 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue()); 100 return cipher.getInputBlockSize(); 104 throw new IllegalStateException("RSA Cipher not initialised"); 132 return cipher.getOutputBlockSize(); 136 throw new IllegalStateException("RSA Cipher not initialised"); 196 cipher = new RSABlindedEngine() [all...] |
DigestSignatureSpi.java | 52 private AsymmetricBlockCipher cipher; field in class:DigestSignatureSpi 58 AsymmetricBlockCipher cipher) 61 this.cipher = cipher; 69 AsymmetricBlockCipher cipher) 72 this.cipher = cipher; 88 cipher.init(false, param); 104 cipher.init(true, param); 145 return cipher.processBlock(bytes, 0, bytes.length) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SealedObjectTest.java | 39 import javax.crypto.Cipher; 53 public Mock_SealedObject(Serializable object, Cipher c) 91 * SealedObject(Serializable object, Cipher c) method testing. Tests if the 92 * NullPointerException is thrown in the case of null cipher. 99 + "of null cipher."); 109 Cipher cipher = Cipher.getInstance("DES/CBC/PKCS5Padding"); local 110 cipher.init(Cipher.ENCRYPT_MODE, key, ips) 138 Cipher cipher = new NullCipher(); local 160 Cipher cipher = Cipher.getInstance(algorithm); local 180 Cipher cipher = Cipher.getInstance("DES\/CBC\/PKCS5Padding"); local 224 Cipher cipher = Cipher.getInstance("DES\/CBC\/PKCS5Padding"); local 268 Cipher cipher = Cipher.getInstance("DES"); local 302 Cipher cipher = Cipher.getInstance("DES"); local [all...] |
CipherTest.java | 42 import javax.crypto.Cipher; 89 * javax.crypto.Cipher#getInstance(java.lang.String) 92 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local 93 assertNotNull("Received a null Cipher instance", cipher); 96 Cipher.getInstance("WrongAlgorithmName"); 103 * javax.crypto.Cipher#getInstance(java.lang.String, 109 Provider[] providers = Security.getProviders("Cipher.DES") 114 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local 148 Cipher cipher = Cipher.getInstance("DES", providers[i]); local 176 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local 190 Cipher cipher = Cipher.getInstance(algorithm); local 201 Cipher cipher = Cipher.getInstance(algorithm); local 210 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local 233 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local 250 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local 268 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/CBC\/PKCS5Padding"); local 297 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/CBC\/PKCS5Padding"); local 369 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local 1119 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
genpkey.c | 82 const EVP_CIPHER *cipher = NULL; local 180 cipher = EVP_get_cipherbyname(*args + 1); 181 if (!cipher) 183 BIO_printf(bio_err, "Unknown cipher %s\n", 204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n"); 269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
|
pkcs8.c | 78 const EVP_CIPHER *cipher = NULL; local 111 cipher=EVP_get_cipherbyname(*args); 112 if (!cipher) 115 "Unknown cipher %s\n", *args); 224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 242 if ((pbe_nid == -1) && !cipher) 311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
p5_crpt2.c | 179 const EVP_CIPHER *cipher; local 207 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); 209 if(!cipher) { 215 /* Fixup cipher based on AlgorithmIdentifier */ 216 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
CipherInputStream.java | 5 package ch.ethz.ssh2.crypto.cipher;
|
CipherOutputStream.java | 5 package ch.ethz.ssh2.crypto.cipher;
|
DES.java | 1 package ch.ethz.ssh2.crypto.cipher; 48 * initialise a DES cipher. 53 * the parameters required to set up the cipher.
|
/external/openssl/apps/ |
genpkey.c | 82 const EVP_CIPHER *cipher = NULL; local 180 cipher = EVP_get_cipherbyname(*args + 1); 181 if (!cipher) 183 BIO_printf(bio_err, "Unknown cipher %s\n", 204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n"); 269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
|
pkcs8.c | 78 const EVP_CIPHER *cipher = NULL; local 111 cipher=EVP_get_cipherbyname(*args); 112 if (!cipher) 115 "Unknown cipher %s\n", *args); 224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 242 if ((pbe_nid == -1) && !cipher) 311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.h | 28 int cipher; /* Selected cipher (WPA_CIPHER_*) */ member in struct:wpa_peerkey
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 33 import javax.crypto.Cipher; 62 * @tests javax.crypto.Cipher#getInstance(java.lang.String) 65 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local 66 assertNotNull("Received a null Cipher instance", cipher); 70 * @tests javax.crypto.Cipher#getInstance(java.lang.String, 76 Provider[] providers = Security.getProviders("Cipher.DES"); 78 assertNotNull("No installed providers support Cipher.DES", providers) 81 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local 122 Cipher cipher = Cipher.getInstance("DES", providers[i]); local 138 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local 152 Cipher cipher = Cipher.getInstance(algorithm); local 163 Cipher cipher = Cipher.getInstance(algorithm); local 173 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 189 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 200 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 211 Cipher cipher = null; local 237 Cipher cipher = null; local [all...] |
/external/chromium/net/socket/ |
ssl_client_socket_openssl.cc | 47 unsigned long SSL_CIPHER_get_id(const SSL_CIPHER* cipher) { return cipher->id; } 155 // server after receiving ClientHello if there's no common supported cipher. 496 // directly remove a cipher by ID. 503 // appended to the cipher removal |command|. 505 const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(ciphers, i); local 506 const uint16 id = SSL_CIPHER_get_id(cipher); 511 bool disable = SSL_CIPHER_get_bits(cipher, NULL) < 80; 518 const char* name = SSL_CIPHER_get_name(cipher); 519 DVLOG(3) << "Found cipher to remove: '" << name << "', ID: " << i [all...] |
/external/chromium_org/chrome/browser/ui/website_settings/ |
website_settings.cc | 426 const char *key_exchange, *cipher, *mac; local 429 &key_exchange, &cipher, &mac, &is_aead, cipher_suite); 435 ASCIIToUTF16(cipher), ASCIIToUTF16(key_exchange)); 439 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
dtlstransportchannel_unittest.cc | 188 std::string cipher; local 190 bool rv = (*it)->GetSrtpCipher(&cipher); 194 ASSERT_EQ(cipher, expected_cipher);
|
/external/chromium_org/third_party/libxslt/libexslt/ |
crypto.c | 378 gcry_cipher_hd_t cipher; local 383 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR, 392 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH); 400 rc = gcry_cipher_encrypt (cipher, (unsigned char *) dest, destlen, 409 gcry_cipher_close (cipher); 417 gcry_cipher_hd_t cipher; local 422 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR, 431 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH); 439 rc = gcry_cipher_decrypt (cipher, (unsigned char *) dest, destlen, 448 gcry_cipher_close (cipher); [all...] |