HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 26 - 50 of 225) sorted by null

12 3 4 5 6 7 8 9

  /external/openssl/crypto/evp/
p5_crpt.c 73 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md,
129 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp));
130 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher));
131 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16);
132 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)),
133 EVP_CIPHER_iv_length(cipher));
134 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de))
bio_enc.c 83 EVP_CIPHER_CTX cipher; member in struct:enc_struct
92 BIO_TYPE_CIPHER,"cipher",
114 EVP_CIPHER_CTX_init(&ctx->cipher);
134 EVP_CIPHER_CTX_cleanup(&(b->cipher));
187 i=EVP_CipherFinal_ex(&(ctx->cipher),
201 EVP_CipherUpdate(&(ctx->cipher),
260 EVP_CipherUpdate(&(ctx->cipher),
301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL,
302 ctx->cipher.encrypt);
335 ret=EVP_CipherFinal_ex(&(ctx->cipher),
    [all...]
openbsd_hw.c 130 static int dev_crypto_init_key(EVP_CIPHER_CTX *ctx,int cipher,
138 assert(ctx->cipher->iv_len <= MAX_HW_IV);
142 CDATA(ctx)->cipher=cipher;
170 assert((inl&(ctx->cipher->block_size-1)) == 0);
174 if(ctx->cipher->iv_len)
178 memcpy(lb,&in[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len);
231 memcpy(ctx->iv,&out[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
CipherSpi.java 18 import javax.crypto.Cipher;
44 private AsymmetricBlockCipher cipher; field in class:CipherSpi
54 cipher = engine;
77 cipher = engine;
92 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue());
100 return cipher.getInputBlockSize();
104 throw new IllegalStateException("RSA Cipher not initialised");
132 return cipher.getOutputBlockSize();
136 throw new IllegalStateException("RSA Cipher not initialised");
196 cipher = new RSABlindedEngine()
    [all...]
DigestSignatureSpi.java 52 private AsymmetricBlockCipher cipher; field in class:DigestSignatureSpi
58 AsymmetricBlockCipher cipher)
61 this.cipher = cipher;
69 AsymmetricBlockCipher cipher)
72 this.cipher = cipher;
88 cipher.init(false, param);
104 cipher.init(true, param);
145 return cipher.processBlock(bytes, 0, bytes.length)
    [all...]
  /external/chromium_org/third_party/boringssl/src/ssl/
d1_enc.c 160 else if ( EVP_CIPHER_block_size(ds->cipher) > 1)
162 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) <= 0)
195 bs=EVP_CIPHER_block_size(ds->cipher);
217 ds->buf_len, ds->cipher->key_len,
219 ds->cipher->iv_len);
221 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
ssl_ciph.c 112 * ECC cipher suite support in OpenSSL originally developed by
171 const SSL_CIPHER *cipher; member in struct:cipher_order_st
243 * for |s->cipher|. It returns 1 on success and 0 on error. */
246 const SSL_CIPHER *c = s->cipher;
283 c=s->cipher;
316 /* TODO(fork): enable the stitched cipher modes. */
343 c=s->cipher;
444 co_list[co_list_num].cipher = c;
501 *ca_curr = ciph_curr->cipher;
510 * or represent a cipher strength value (will be added in any case because algorithms=0)
    [all...]
  /external/chromium_org/third_party/boringssl/src/crypto/cipher/
cipher_test.c 60 #include <openssl/cipher.h>
133 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c),
291 static int test_cipher(const char *cipher, const uint8_t *key, int kn,
298 if (strcmp(cipher, "DES-CBC") == 0) {
300 } else if (strcmp(cipher, "DES-EDE3-CBC") == 0) {
302 } else if (strcmp(cipher, "RC4") == 0) {
304 } else if (strcmp(cipher, "AES-128-ECB") == 0) {
306 } else if (strcmp(cipher, "AES-256-ECB") == 0) {
308 } else if (strcmp(cipher, "AES-128-CBC") == 0) {
310 } else if (strcmp(cipher, "AES-128-GCM") == 0)
355 char *cipher; local
    [all...]
e_null.c 57 #include <openssl/cipher.h>
  /external/openssl/crypto/pkcs12/
p12_p8e.c 63 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/
BaseStreamCipher.java 11 import javax.crypto.Cipher;
48 private StreamCipher cipher; field in class:BaseStreamCipher
60 cipher = engine;
70 cipher = new StreamBlockCipher(engine);
185 param = PBE.Util.makePBEParameters(k, params, cipher.getAlgorithmName());
221 if ((opmode == Cipher.ENCRYPT_MODE) || (opmode == Cipher.WRAP_MODE))
239 case Cipher.ENCRYPT_MODE:
240 case Cipher.WRAP_MODE:
241 cipher.init(true, param)
    [all...]
  /external/chromium_org/third_party/boringssl/src/include/openssl/
cipher.h 70 /* Cipher primitives.
73 * cipher algorithm. */
90 /* EVP_enc_null returns a 'cipher' that passes plaintext through as
94 /* EVP_rc2_40_cbc returns a cipher that implements 40-bit RC2 in CBC mode. This
96 * files, which often encrypt the certificate chain using this cipher. It is
100 /* EVP_get_cipherbynid returns the cipher corresponding to the given NID, or
101 * NULL if no such cipher is known. */
105 /* Cipher context allocation.
131 /* Cipher context configuration. */
134 * |enc| is zero) operation using |cipher|. If |ctx| has been previousl
397 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
444 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
    [all...]
  /external/openssl/crypto/asn1/
p5_pbev2.c 89 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
100 alg_nid = EVP_CIPHER_type(cipher);
117 if (EVP_CIPHER_iv_length(cipher))
120 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher));
121 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0)
128 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0))
136 /* If prf NID unspecified see if cipher has a preference.
150 keylen = EVP_CIPHER_key_length(cipher);
194 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter,
197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1)
    [all...]
  /external/chromium_org/third_party/boringssl/src/crypto/pkcs8/
p5_pbev2.c 58 #include <openssl/cipher.h>
113 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter,
124 alg_nid = EVP_CIPHER_nid(cipher);
140 if (EVP_CIPHER_iv_length(cipher))
143 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher));
144 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0)
151 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0))
158 /* If prf NID unspecified see if cipher has a preference.
172 keylen = EVP_CIPHER_key_length(cipher);
216 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter
    [all...]
  /external/chromium_org/third_party/libsrtp/srtp/crypto/
Makefile 76 ciphers = cipher/cipher.o cipher/null_cipher.o \
77 cipher/aes.o cipher/aes_icm.o \
78 cipher/aes_cbc.o
  /external/openssl/android.testssl/
testssl 128 for cipher in `adb shell /system/bin/openssl ciphers "RSA+$protocol" | tr ':' ' '`; do
129 echo "Testing $cipher"
134 $ssltest -cipher $cipher $prot
136 echo "Failed $cipher"
148 $ssltest -v -bio_pair -tls1 -cipher ADH -dhe1024dsa -num 10 -f -time $extra || exit 1
166 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1
169 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1
175 $ssltest -tls1 -cipher SRP -srpuser test -srppass abc123
178 $ssltest -bio_pair -tls1 -cipher SRP -srpuser test -srppass abc12
    [all...]
  /external/openssl/ssl/
d1_enc.c 164 else if ( EVP_CIPHER_block_size(ds->cipher) > 1)
166 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) <= 0)
199 bs=EVP_CIPHER_block_size(ds->cipher);
226 ds->buf_len, ds->cipher->key_len,
228 ds->cipher->iv_len);
230 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
JCEStreamCipher.java 18 import javax.crypto.Cipher;
72 private StreamCipher cipher; field in class:JCEStreamCipher
86 cipher = engine;
96 cipher = new StreamBlockCipher(engine);
211 param = PBE.Util.makePBEParameters(k, params, cipher.getAlgorithmName());
247 if ((opmode == Cipher.ENCRYPT_MODE) || (opmode == Cipher.WRAP_MODE))
263 case Cipher.ENCRYPT_MODE:
264 case Cipher.WRAP_MODE:
265 cipher.init(true, param)
    [all...]
  /external/openssl/crypto/cmac/
cmac.h 74 const EVP_CIPHER *cipher, ENGINE *impl);
  /external/openssl/crypto/pkcs7/
pk7_enc.c 71 PKCS7_cipher(PKCS7 *p7,EVP_CIPHER *cipher);
  /external/openssl/include/openssl/
cmac.h 74 const EVP_CIPHER *cipher, ENGINE *impl);
  /external/openssl/apps/
enc.c 124 const EVP_CIPHER *cipher=NULL,*c; local
154 cipher=EVP_get_cipherbyname(pname);
156 if (!do_zlib && !base64 && (cipher == NULL)
159 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
162 BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
292 cipher=c;
295 cipher=NULL;
320 BIO_printf(bio_err,"Cipher Types\n");
336 if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/
OAEPEncoding.java 28 AsymmetricBlockCipher cipher)
31 this(cipher, AndroidDigestFactory.getSHA1(), null);
36 AsymmetricBlockCipher cipher,
39 this(cipher, hash, null);
43 AsymmetricBlockCipher cipher,
47 this(cipher, hash, hash, encodingParams);
51 AsymmetricBlockCipher cipher,
56 this.engine = cipher;
  /external/chromium_org/content/child/webcrypto/openssl/
aes_ctr_openssl.cc 44 Status AesCtrEncrypt128BitCounter(const EVP_CIPHER* cipher,
49 DCHECK(cipher);
60 cipher,
178 const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(raw_key.size()); local
179 if (!cipher)
221 return AesCtrEncrypt128BitCounter(cipher,
240 AesCtrEncrypt128BitCounter(cipher,
253 cipher,
  /external/chromium_org/third_party/boringssl/src/crypto/x509/
x_exten.c 59 #include <openssl/cipher.h>

Completed in 1317 milliseconds

12 3 4 5 6 7 8 9