/external/openssl/crypto/evp/ |
evp_pbe.c | 71 /* Setup a cipher context from a PBE algorithm */ 158 const EVP_CIPHER *cipher; local 180 cipher = NULL; 183 cipher = EVP_get_cipherbynid(cipher_nid); 184 if (!cipher) 203 if (!keygen(ctx, pass, passlen, param, cipher, md, en_de)) 257 int EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, 261 if (cipher) 262 cipher_nid = EVP_CIPHER_type(cipher);
|
/libcore/luni/src/main/java/javax/crypto/ |
SealedObject.java | 37 * instance and encrypts it using a cryptographic cipher. 44 * object itself keeps track of the cipher and corresponding parameters. 51 * The cipher's {@link AlgorithmParameters} in encoded format. 52 * Equivalent to {@code cipher.getParameters().getEncoded()}, 53 * or null if the cipher did not use any parameters. 81 * and sealing it using the specified cipher. 83 * The cipher must be fully initialized. 88 * the cipher to encrypt the object. 92 * if the specified cipher is a block cipher and the length o 173 Cipher cipher = Cipher.getInstance(sealAlg); local 261 Cipher cipher = Cipher.getInstance(sealAlg, provider); local [all...] |
/external/chromium_org/crypto/ |
encryptor_openssl.cc | 99 const EVP_CIPHER* cipher = GetCipherForKey(key_); local 100 DCHECK(cipher); // Already handled in Init(); 103 DCHECK_EQ(EVP_CIPHER_iv_length(cipher), static_cast<int>(iv_.length())); 104 DCHECK_EQ(EVP_CIPHER_key_length(cipher), static_cast<int>(key.length())); 107 if (!EVP_CipherInit_ex(ctx.get(), cipher, NULL,
|
/external/chromium_org/third_party/openssl/openssl/android.testssl/ |
testssl | 128 for cipher in `adb shell /system/bin/openssl ciphers "RSA+$protocol" | tr ':' ' '`; do 129 echo "Testing $cipher" 134 $ssltest -cipher $cipher $prot 136 echo "Failed $cipher" 148 $ssltest -v -bio_pair -tls1 -cipher ADH -dhe1024dsa -num 10 -f -time $extra || exit 1 166 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1 169 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1 175 $ssltest -tls1 -cipher SRP -srpuser test -srppass abc123 178 $ssltest -bio_pair -tls1 -cipher SRP -srpuser test -srppass abc12 [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pem/ |
pem_seal.c | 102 EVP_CIPHER_CTX_init(&ctx->cipher); 103 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 137 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i); 167 if (!EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i)) 181 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
|
/external/openssl/android.testssl/ |
testssl | 128 for cipher in `adb shell /system/bin/openssl ciphers "RSA+$protocol" | tr ':' ' '`; do 129 echo "Testing $cipher" 134 $ssltest -cipher $cipher $prot 136 echo "Failed $cipher" 148 $ssltest -v -bio_pair -tls1 -cipher ADH -dhe1024dsa -num 10 -f -time $extra || exit 1 166 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1 169 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1 175 $ssltest -tls1 -cipher SRP -srpuser test -srppass abc123 178 $ssltest -bio_pair -tls1 -cipher SRP -srpuser test -srppass abc12 [all...] |
/external/openssl/apps/ |
enc.c | 122 const EVP_CIPHER *cipher=NULL,*c; local 152 cipher=EVP_get_cipherbyname(pname); 154 if (!do_zlib && !base64 && (cipher == NULL) 157 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 160 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 290 cipher=c; 293 cipher=NULL; 318 BIO_printf(bio_err,"Cipher Types\n"); 334 if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER [all...] |
smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher = EVP_aes_256_cbc() [all...] |
pkey.c | 75 const EVP_CIPHER *cipher = NULL; local 172 cipher = EVP_get_cipherbyname(*args + 1); 173 if (!cipher) 175 BIO_printf(bio_err, "Unknown cipher %s\n", 246 PEM_write_bio_PrivateKey(out, pkey, cipher,
|
/external/openssl/crypto/pem/ |
pem_seal.c | 102 EVP_CIPHER_CTX_init(&ctx->cipher); 103 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 137 EVP_EncryptUpdate(&ctx->cipher,buffer,&j,in,i); 167 if (!EVP_EncryptFinal_ex(&ctx->cipher,s,(int *)&i)) 181 EVP_CIPHER_CTX_cleanup(&ctx->cipher);
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 406 static int wpa_cipher_valid_group(int cipher) 408 return wpa_cipher_valid_pairwise(cipher) || 409 cipher == WPA_CIPHER_WEP104 || 410 cipher == WPA_CIPHER_WEP40 || 411 cipher == WPA_CIPHER_GTK_NOT_USED; 416 int wpa_cipher_valid_mgmt_group(int cipher) 418 return cipher == WPA_CIPHER_AES_128_CMAC || 419 cipher == WPA_CIPHER_BIP_GMAC_128 || 420 cipher == WPA_CIPHER_BIP_GMAC_256 || 421 cipher == WPA_CIPHER_BIP_CMAC_256 [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
enc.c | 122 const EVP_CIPHER *cipher=NULL,*c; local 152 cipher=EVP_get_cipherbyname(pname); 154 if (!do_zlib && !base64 && (cipher == NULL) 157 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 160 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 290 cipher=c; 293 cipher=NULL; 318 BIO_printf(bio_err,"Cipher Types\n"); 422 if ((str == NULL) && (cipher != NULL) && (hkey == NULL)) 429 OBJ_nid2ln(EVP_CIPHER_nid(cipher)), [all...] |
smime.c | 98 const EVP_CIPHER *cipher = NULL; local 152 cipher = EVP_des_ede3_cbc(); 154 cipher = EVP_des_cbc(); 158 cipher = EVP_seed_cbc(); 162 cipher = EVP_rc2_40_cbc(); 164 cipher = EVP_rc2_cbc(); 166 cipher = EVP_rc2_64_cbc(); 170 cipher = EVP_aes_128_cbc(); 172 cipher = EVP_aes_192_cbc(); 174 cipher = EVP_aes_256_cbc() [all...] |
pkey.c | 75 const EVP_CIPHER *cipher = NULL; local 172 cipher = EVP_get_cipherbyname(*args + 1); 173 if (!cipher) 175 BIO_printf(bio_err, "Unknown cipher %s\n", 246 PEM_write_bio_PrivateKey(out, pkey, cipher,
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
bio_ber.c | 111 BIO_TYPE_CIPHER,"cipher", 302 EVP_CipherUpdate(&(ctx->cipher), 342 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 343 ctx->cipher.berrypt); 379 ret=EVP_CipherFinal_ex(&(ctx->cipher), 404 memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher)); 441 memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX)); 461 EVP_CipherInit_ex(&(ctx->cipher),c,NULL,k,i,e) [all...] |
/external/openssl/crypto/pkcs7/ |
bio_ber.c | 111 BIO_TYPE_CIPHER,"cipher", 302 EVP_CipherUpdate(&(ctx->cipher), 342 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 343 ctx->cipher.berrypt); 379 ret=EVP_CipherFinal_ex(&(ctx->cipher), 404 memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher)); 441 memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX)); 461 EVP_CipherInit_ex(&(ctx->cipher),c,NULL,k,i,e) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/engine/ |
eng_openssl.c | 113 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 215 * we're asked for a cipher we don't support (should not happen). 218 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler. 277 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 280 if(!cipher) 286 /* We are being asked for a specific cipher */ 288 *cipher = &test_r4_cipher; 290 *cipher = &test_r4_40_cipher; 297 *cipher = NULL;
|
eng_cryptodev.c | 101 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 257 sess.cipher = ciphers[i].id; 298 sess.cipher = 0; 377 if ((inl % ctx->cipher->block_size) != 0) 391 if (ctx->cipher->iv_len) { 394 iiv = in + inl - ctx->cipher->iv_len; 395 memcpy(save_iv, iiv, ctx->cipher->iv_len); 407 if (ctx->cipher->iv_len) { 409 iiv = out + inl - ctx->cipher->iv_len; 412 memcpy(ctx->iv, iiv, ctx->cipher->iv_len) 423 int cipher = -1, i; local [all...] |
/external/openssl/crypto/engine/ |
eng_openssl.c | 113 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 215 * we're asked for a cipher we don't support (should not happen). 218 * TEST_ENG_OPENSSL_RC4_P_CIPHER - ditto for the "cipher" handler. 277 static int openssl_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 280 if(!cipher) 286 /* We are being asked for a specific cipher */ 288 *cipher = &test_r4_cipher; 290 *cipher = &test_r4_40_cipher; 297 *cipher = NULL;
|
eng_cryptodev.c | 101 static int cryptodev_engine_ciphers(ENGINE *e, const EVP_CIPHER **cipher, 257 sess.cipher = ciphers[i].id; 298 sess.cipher = 0; 377 if ((inl % ctx->cipher->block_size) != 0) 391 if (ctx->cipher->iv_len) { 394 iiv = in + inl - ctx->cipher->iv_len; 395 memcpy(save_iv, iiv, ctx->cipher->iv_len); 407 if (ctx->cipher->iv_len) { 409 iiv = out + inl - ctx->cipher->iv_len; 412 memcpy(ctx->iv, iiv, ctx->cipher->iv_len) 423 int cipher = -1, i; local [all...] |
/external/srtp/ |
Makefile | 75 ciphers = crypto/cipher/cipher.o crypto/cipher/null_cipher.o \ 76 crypto/cipher/aes.o crypto/cipher/aes_icm.o \ 77 crypto/cipher/aes_cbc.o
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.core.runtime.compatibility.auth_3.2.200.v20100517.jar | |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 16 * Implements the Counter with Cipher Block Chaining mode (CCM) detailed in 24 private BlockCipher cipher; field in class:CCMBlockCipher 38 * @param c the block cipher to be used. 42 this.cipher = c; 48 throw new IllegalArgumentException("cipher required with a block size of 16."); 53 * return the underlying block cipher that we are wrapping. 55 * @return the underlying block cipher that we are wrapping. 59 return cipher; 108 return cipher.getAlgorithmName() + "/CCM"; 150 cipher.reset() [all...] |
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 220 const SSL_CIPHER *cipher; member in struct:cipher_order_st 514 * for |s->cipher|. It returns 1 on success and 0 on error. */ 517 const SSL_CIPHER *c = s->cipher; 547 c=s->cipher; 851 co_list[co_list_num].cipher = c; 915 *ca_curr = ciph_curr->cipher; 924 * or represent a cipher strength value (will be added in any case because algorithms=0). 1002 cp = curr->cipher; [all...] |
/external/openssl/ssl/ |
ssl_ciph.c | 113 * ECC cipher suite support in OpenSSL originally developed by 220 const SSL_CIPHER *cipher; member in struct:cipher_order_st 493 c=s->cipher; 810 co_list[co_list_num].cipher = c; 874 *ca_curr = ciph_curr->cipher; 883 * or represent a cipher strength value (will be added in any case because algorithms=0). 961 cp = curr->cipher; 998 /* add the cipher if it has not been added yet. */ 1008 /* Move the added cipher to this location */ [all...] |