HomeSort by relevance Sort by last modified time
    Searched defs:cipher (Results 51 - 75 of 176) sorted by null

1 23 4 5 6 7 8

  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
p5_crpt2.c 179 const EVP_CIPHER *cipher; local
207 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm);
209 if(!cipher) {
215 /* Fixup cipher based on AlgorithmIdentifier */
216 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
  /external/openssl/apps/
genpkey.c 82 const EVP_CIPHER *cipher = NULL; local
180 cipher = EVP_get_cipherbyname(*args + 1);
181 if (!cipher)
183 BIO_printf(bio_err, "Unknown cipher %s\n",
204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n");
269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
pkcs8.c 78 const EVP_CIPHER *cipher = NULL; local
111 cipher=EVP_get_cipherbyname(*args);
112 if (!cipher)
115 "Unknown cipher %s\n", *args);
224 BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
225 BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
242 if ((pbe_nid == -1) && !cipher)
311 if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
enc.c 122 const EVP_CIPHER *cipher=NULL,*c; local
152 cipher=EVP_get_cipherbyname(pname);
154 if (!do_zlib && !base64 && (cipher == NULL)
157 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
160 BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
290 cipher=c;
293 cipher=NULL;
318 BIO_printf(bio_err,"Cipher Types\n");
334 if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER
    [all...]
smime.c 98 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_des_ede3_cbc();
154 cipher = EVP_des_cbc();
158 cipher = EVP_seed_cbc();
162 cipher = EVP_rc2_40_cbc();
164 cipher = EVP_rc2_cbc();
166 cipher = EVP_rc2_64_cbc();
170 cipher = EVP_aes_128_cbc();
172 cipher = EVP_aes_192_cbc();
174 cipher = EVP_aes_256_cbc()
    [all...]
  /external/openssl/crypto/evp/
evp_test.c 146 printf("Testing cipher %s%s\n",EVP_CIPHER_name(c),
244 static int test_cipher(const char *cipher,const unsigned char *key,int kn,
252 c=EVP_get_cipherbyname(cipher);
359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
368 char *cipher; local
378 cipher=sstrsep(&p,":");
396 if(!test_cipher(cipher,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
397 && !test_digest(cipher,plaintext,pn,ciphertext,cn))
400 if (strstr(cipher, "AES") == cipher)
    [all...]
p5_crpt2.c 201 const EVP_CIPHER *cipher; local
229 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm);
231 if(!cipher) {
237 /* Fixup cipher based on AlgorithmIdentifier */
238 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
  /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
CipherTest.java 33 import javax.crypto.Cipher;
62 * @tests javax.crypto.Cipher#getInstance(java.lang.String)
65 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local
66 assertNotNull("Received a null Cipher instance", cipher);
70 * @tests javax.crypto.Cipher#getInstance(java.lang.String,
76 Provider[] providers = Security.getProviders("Cipher.DES");
78 assertNotNull("No installed providers support Cipher.DES", providers)
81 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local
122 Cipher cipher = Cipher.getInstance("DES", providers[i]); local
138 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local
152 Cipher cipher = Cipher.getInstance(algorithm); local
163 Cipher cipher = Cipher.getInstance(algorithm); local
173 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local
189 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local
200 Cipher cipher = Cipher.getInstance(algorithm + "\/ECB\/PKCS5Padding"); local
211 Cipher cipher = null; local
237 Cipher cipher = null; local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/
CCMBlockCipher.java 16 * Implements the Counter with Cipher Block Chaining mode (CCM) detailed in
24 private BlockCipher cipher; field in class:CCMBlockCipher
38 * @param c the block cipher to be used.
42 this.cipher = c;
48 throw new IllegalArgumentException("cipher required with a block size of 16.");
53 * return the underlying block cipher that we are wrapping.
55 * @return the underlying block cipher that we are wrapping.
59 return cipher;
108 return cipher.getAlgorithmName() + "/CCM";
150 cipher.reset()
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
CipherTest.java 42 import javax.crypto.Cipher;
89 * javax.crypto.Cipher#getInstance(java.lang.String)
92 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); local
93 assertNotNull("Received a null Cipher instance", cipher);
96 Cipher.getInstance("WrongAlgorithmName");
103 * javax.crypto.Cipher#getInstance(java.lang.String,
109 Provider[] providers = Security.getProviders("Cipher.DES")
114 Cipher cipher = Cipher.getInstance("DES", providers[i].getName()); local
148 Cipher cipher = Cipher.getInstance("DES", providers[i]); local
176 Cipher cipher = Cipher.getInstance("AES", provider.getName()); local
190 Cipher cipher = Cipher.getInstance(algorithm); local
201 Cipher cipher = Cipher.getInstance(algorithm); local
210 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local
233 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local
250 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/ECB\/PKCS5Padding"); local
268 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/CBC\/PKCS5Padding"); local
297 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "\/CBC\/PKCS5Padding"); local
369 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local
1119 Cipher cipher = Cipher.getInstance("DESEDE\/CBC\/PKCS5Padding"); local
    [all...]
  /external/chromium_org/chrome/browser/ui/website_settings/
website_settings.cc 506 const char *key_exchange, *cipher, *mac; local
509 &key_exchange, &cipher, &mac, &is_aead, cipher_suite);
515 ASCIIToUTF16(cipher), ASCIIToUTF16(key_exchange));
519 ASCIIToUTF16(cipher), ASCIIToUTF16(mac), ASCIIToUTF16(key_exchange));
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
dtlstransportchannel_unittest.cc 221 std::string cipher; local
223 bool rv = (*it)->GetSrtpCipher(&cipher);
227 ASSERT_EQ(cipher, expected_cipher);
  /external/chromium_org/third_party/libxslt/libexslt/
crypto.c 378 gcry_cipher_hd_t cipher; local
383 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR,
392 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH);
400 rc = gcry_cipher_encrypt (cipher, (unsigned char *) dest, destlen,
409 gcry_cipher_close (cipher);
417 gcry_cipher_hd_t cipher; local
422 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR,
431 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH);
439 rc = gcry_cipher_decrypt (cipher, (unsigned char *) dest, destlen,
448 gcry_cipher_close (cipher);
    [all...]
  /external/chromium_org/third_party/openssl/openssl/apps/
enc.c 122 const EVP_CIPHER *cipher=NULL,*c; local
152 cipher=EVP_get_cipherbyname(pname);
154 if (!do_zlib && !base64 && (cipher == NULL)
157 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
160 BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
290 cipher=c;
293 cipher=NULL;
318 BIO_printf(bio_err,"Cipher Types\n");
422 if ((str == NULL) && (cipher != NULL) && (hkey == NULL))
429 OBJ_nid2ln(EVP_CIPHER_nid(cipher)),
    [all...]
smime.c 98 const EVP_CIPHER *cipher = NULL; local
152 cipher = EVP_des_ede3_cbc();
154 cipher = EVP_des_cbc();
158 cipher = EVP_seed_cbc();
162 cipher = EVP_rc2_40_cbc();
164 cipher = EVP_rc2_cbc();
166 cipher = EVP_rc2_64_cbc();
170 cipher = EVP_aes_128_cbc();
172 cipher = EVP_aes_192_cbc();
174 cipher = EVP_aes_256_cbc()
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/krb5/
krb5_asn.h 79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
  /external/chromium_org/third_party/openssl/openssl/crypto/pem/
pem_lib.c 276 EVP_CIPHER_INFO cipher; local
295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err;
296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err;
362 /* actually it needs the cipher block size extra... */
440 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen,
451 if (cipher->cipher == NULL) return(1);
466 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher->iv[0])
    [all...]
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
krb5_asn.h 79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
  /external/chromium_org/third_party/openssl/openssl/ssl/
ssl_asn1.c 96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st
143 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0)))
161 a.cipher.type=V_ASN1_OCTET_STRING;
162 a.cipher.data=buf;
164 if (in->cipher == NULL)
167 l=in->cipher->id;
170 a.cipher.length=3;
177 a.cipher.length=2;
287 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING);
333 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING)
    [all...]
  /external/openssl/crypto/krb5/
krb5_asn.h 79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
  /external/openssl/crypto/pem/
pem_lib.c 276 EVP_CIPHER_INFO cipher; local
295 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) goto err;
296 if (!PEM_do_header(&cipher,data,&len,cb,u)) goto err;
362 /* actually it needs the cipher block size extra... */
440 int PEM_do_header(EVP_CIPHER_INFO *cipher, unsigned char *data, long *plen,
451 if (cipher->cipher == NULL) return(1);
466 if (!EVP_BytesToKey(cipher->cipher,EVP_md5(),&(cipher->iv[0])
    [all...]
  /external/openssl/include/openssl/
krb5_asn.h 79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
  /external/openssl/ssl/
ssl_asn1.c 96 ASN1_OCTET_STRING cipher; member in struct:ssl_session_asn1_st
144 if ((in == NULL) || ((in->cipher == NULL) && (in->cipher_id == 0)))
162 a.cipher.type=V_ASN1_OCTET_STRING;
163 a.cipher.data=buf;
165 if (in->cipher == NULL)
168 l=in->cipher->id;
171 a.cipher.length=3;
178 a.cipher.length=2;
295 M_ASN1_I2D_len(&(a.cipher), i2d_ASN1_OCTET_STRING);
343 M_ASN1_I2D_put(&(a.cipher), i2d_ASN1_OCTET_STRING)
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 179 struct crypto_cipher *cipher; local
194 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
195 if (cipher == NULL) {
196 wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
200 if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
202 crypto_cipher_deinit(cipher);
205 crypto_cipher_deinit(cipher);
214 struct crypto_cipher *cipher; local
229 cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
230 if (cipher == NULL)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sake.c 24 u8 cipher[EAP_SAKE_TEK_CIPHER_LEN]; member in struct:eap_sake_data::__anon37358

Completed in 1395 milliseconds

1 23 4 5 6 7 8