| /external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
| p5_crpt2.c | 179 const EVP_CIPHER *cipher; local 207 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); 209 if(!cipher) { 215 /* Fixup cipher based on AlgorithmIdentifier */ 216 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
|
| /external/openssl/apps/ |
| genpkey.c | 82 const EVP_CIPHER *cipher = NULL; local 180 cipher = EVP_get_cipherbyname(*args + 1); 181 if (!cipher) 183 BIO_printf(bio_err, "Unknown cipher %s\n", 204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n"); 269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
|
| pkcs8.c | 78 const EVP_CIPHER *cipher = NULL; local 111 cipher=EVP_get_cipherbyname(*args); 112 if (!cipher) 115 "Unknown cipher %s\n", *args); 224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n"); 225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n"); 242 if ((pbe_nid == -1) && !cipher) 311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
| enc.c | 122 const EVP_CIPHER *cipher=NULL,*c; local 152 cipher=EVP_get_cipherbyname(pname); 154 if (!do_zlib && !base64 && (cipher == NULL) 157 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 160 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 290 cipher=c; 293 cipher=NULL; 318 BIO_printf(bio_err,"Cipher Types\n"); 334 if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER [all...] |
| smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher = EVP_aes_256_cbc() [all...] |
| /external/openssl/crypto/evp/ |
| evp_test.c | 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c), 244 static int test_cipher(const char *cipher,const unsigned char *key,int kn, 252 c=EVP_get_cipherbyname(cipher); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if 368 char *cipher; local 378 cipher=sstrsep(&p,":"); 396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 397 && !test_digest(cipher,plaintext,pn,ciphertext,cn)) 400 if (strstr(cipher, "AES") == cipher) [all...] |
| p5_crpt2.c | 201 const EVP_CIPHER *cipher; local 229 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); 231 if(!cipher) { 237 /* Fixup cipher based on AlgorithmIdentifier */ 238 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
|
| /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
| CipherTest.java | 33 import javax.crypto.Cipher; 62 * @tests javax.crypto.Cipher#getInstance(java.lang.String) 65 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local 66 assertNotNull("Received a null Cipher instance", cipher); 70 * @tests javax.crypto.Cipher#getInstance(java.lang.String, 76 Provider[] providers = Security.getProviders("Cipher.DES"); 78 assertNotNull("No installed providers support Cipher.DES", providers) 81 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local 122 Cipher cipher = Cipher.getInstance("DES", providers[i]); local 138 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local 152 Cipher cipher = Cipher.getInstance(algorithm); local 163 Cipher cipher = Cipher.getInstance(algorithm); local 173 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 189 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 200 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local 211 Cipher cipher = null; local 237 Cipher cipher = null; local [all...] |
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
| CCMBlockCipher.java | 16 * Implements the Counter with Cipher Block Chaining mode (CCM) detailed in 24 private BlockCipher cipher; field in class:CCMBlockCipher 38 * @param c the block cipher to be used. 42 this.cipher = c; 48 throw new IllegalArgumentException("cipher required with a block size of 16."); 53 * return the underlying block cipher that we are wrapping. 55 * @return the underlying block cipher that we are wrapping. 59 return cipher; 108 return cipher.getAlgorithmName() + "/CCM"; 150 cipher.reset() [all...] |
| /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
| CipherTest.java | 42 import javax.crypto.Cipher; 89 * javax.crypto.Cipher#getInstance(java.lang.String) 92 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local 93 assertNotNull("Received a null Cipher instance", cipher); 96 Cipher.getInstance("WrongAlgorithmName"); 103 * javax.crypto.Cipher#getInstance(java.lang.String, 109 Provider[] providers = Security.getProviders("Cipher.DES") 114 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local 148 Cipher cipher = Cipher.getInstance("DES", providers[i]); local 176 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local 190 Cipher cipher = Cipher.getInstance(algorithm); local 201 Cipher cipher = Cipher.getInstance(algorithm); local 210 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local 233 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local 250 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local 268 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/CBC\/PKCS5Padding"); local 297 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/CBC\/PKCS5Padding"); local 369 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local 1119 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local [all...] |
| /external/chromium_org/chrome/browser/ui/website_settings/ |
| website_settings.cc | 506 const char *key_exchange, *cipher, *mac; local 509 &key_exchange, &cipher, &mac, &is_aead, cipher_suite); 515 ASCIIToUTF16(cipher), ASCIIToUTF16(key_exchange)); 519 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
|
| /external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
| dtlstransportchannel_unittest.cc | 221 std::string cipher; local 223 bool rv = (*it)->GetSrtpCipher(&cipher); 227 ASSERT_EQ(cipher, expected_cipher);
|
| /external/chromium_org/third_party/libxslt/libexslt/ |
| crypto.c | 378 gcry_cipher_hd_t cipher; local 383 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR, 392 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH); 400 rc = gcry_cipher_encrypt (cipher, (unsigned char *) dest, destlen, 409 gcry_cipher_close (cipher); 417 gcry_cipher_hd_t cipher; local 422 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR, 431 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH); 439 rc = gcry_cipher_decrypt (cipher, (unsigned char *) dest, destlen, 448 gcry_cipher_close (cipher); [all...] |
| /external/chromium_org/third_party/openssl/openssl/apps/ |
| enc.c | 122 const EVP_CIPHER *cipher=NULL,*c; local 152 cipher=EVP_get_cipherbyname(pname); 154 if (!do_zlib && !base64 && (cipher == NULL) 157 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 160 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 290 cipher=c; 293 cipher=NULL; 318 BIO_printf(bio_err,"Cipher Types\n"); 422 if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) 429 OBJ_nid2ln(EVP_CIPHER_nid(cipher)), [all...] |
| smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher = EVP_aes_256_cbc() [all...] |
| /external/chromium_org/third_party/openssl/openssl/crypto/krb5/ |
| krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
| /external/chromium_org/third_party/openssl/openssl/crypto/pem/ |
| pem_lib.c | 276 EVP_CIPHER_INFO cipher; local 295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; 296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; 362 /* actually it needs the cipher block size extra... */ 440 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, 451 if (cipher->cipher == NULL) return(1); 466 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher->iv[0]) [all...] |
| /external/chromium_org/third_party/openssl/openssl/include/openssl/ |
| krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
| /external/chromium_org/third_party/openssl/openssl/ssl/ |
| ssl_asn1.c | 96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st 143 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) 161 a.cipher.type=V_ASN1_OCTET_STRING; 162 a.cipher.data=buf; 164 if (in->cipher == NULL) 167 l=in->cipher->id; 170 a.cipher.length=3; 177 a.cipher.length=2; 287 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); 333 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING) [all...] |
| /external/openssl/crypto/krb5/ |
| krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
| /external/openssl/crypto/pem/ |
| pem_lib.c | 276 EVP_CIPHER_INFO cipher; local 295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err; 296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err; 362 /* actually it needs the cipher block size extra... */ 440 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen, 451 if (cipher->cipher == NULL) return(1); 466 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher->iv[0]) [all...] |
| /external/openssl/include/openssl/ |
| krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
| /external/openssl/ssl/ |
| ssl_asn1.c | 96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st 144 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0))) 162 a.cipher.type=V_ASN1_OCTET_STRING; 163 a.cipher.data=buf; 165 if (in->cipher == NULL) 168 l=in->cipher->id; 171 a.cipher.length=3; 178 a.cipher.length=2; 295 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING); 343 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING) [all...] |
| /external/wpa_supplicant_8/src/eap_common/ |
| ikev2_common.c | 179 struct crypto_cipher *cipher; local 194 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 195 if (cipher == NULL) { 196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher"); 200 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) { 202 crypto_cipher_deinit(cipher); 205 crypto_cipher_deinit(cipher); 214 struct crypto_cipher *cipher; local 229 cipher = crypto_cipher_init(encr_alg, iv, key, key_len); 230 if (cipher == NULL) [all...] |
| /external/wpa_supplicant_8/src/eap_peer/ |
| eap_sake.c | 24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon37358
|