/external/openssl/crypto/evp/ |
p5_crpt.c | 73 ASN1_TYPE *param, const EVP_CIPHER *cipher, const EVP_MD *md, 129 OPENSSL_assert(EVP_CIPHER_key_length(cipher) <= (int)sizeof(md_tmp)); 130 memcpy(key, md_tmp, EVP_CIPHER_key_length(cipher)); 131 OPENSSL_assert(EVP_CIPHER_iv_length(cipher) <= 16); 132 memcpy(iv, md_tmp + (16 - EVP_CIPHER_iv_length(cipher)), 133 EVP_CIPHER_iv_length(cipher)); 134 if (!EVP_CipherInit_ex(cctx, cipher, NULL, key, iv, en_de))
|
bio_enc.c | 83 EVP_CIPHER_CTX cipher; member in struct:enc_struct 92 BIO_TYPE_CIPHER,"cipher", 114 EVP_CIPHER_CTX_init(&ctx->cipher); 134 EVP_CIPHER_CTX_cleanup(&(b->cipher)); 187 i=EVP_CipherFinal_ex(&(ctx->cipher), 201 EVP_CipherUpdate(&(ctx->cipher), 260 EVP_CipherUpdate(&(ctx->cipher), 301 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, 302 ctx->cipher.encrypt); 335 ret=EVP_CipherFinal_ex(&(ctx->cipher), [all...] |
openbsd_hw.c | 130 static int dev_crypto_init_key(EVP_CIPHER_CTX *ctx,int cipher, 138 assert(ctx->cipher->iv_len <= MAX_HW_IV); 142 CDATA(ctx)->cipher=cipher; 170 assert((inl&(ctx->cipher->block_size-1)) == 0); 174 if(ctx->cipher->iv_len) 178 memcpy(lb,&in[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len); 231 memcpy(ctx->iv,&out[cryp.len-ctx->cipher->iv_len],ctx->cipher->iv_len) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
CipherSpi.java | 18 import javax.crypto.Cipher; 44 private AsymmetricBlockCipher cipher; field in class:CipherSpi 54 cipher = engine; 77 cipher = engine; 92 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue()); 100 return cipher.getInputBlockSize(); 104 throw new IllegalStateException("RSA Cipher not initialised"); 132 return cipher.getOutputBlockSize(); 136 throw new IllegalStateException("RSA Cipher not initialised"); 196 cipher = new RSABlindedEngine() [all...] |
DigestSignatureSpi.java | 52 private AsymmetricBlockCipher cipher; field in class:DigestSignatureSpi 58 AsymmetricBlockCipher cipher) 61 this.cipher = cipher; 69 AsymmetricBlockCipher cipher) 72 this.cipher = cipher; 88 cipher.init(false, param); 104 cipher.init(true, param); 145 return cipher.processBlock(bytes, 0, bytes.length) [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
d1_enc.c | 160 else if ( EVP_CIPHER_block_size(ds->cipher) > 1) 162 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) <= 0) 195 bs=EVP_CIPHER_block_size(ds->cipher); 217 ds->buf_len, ds->cipher->key_len, 219 ds->cipher->iv_len); 221 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
ssl_ciph.c | 112 * ECC cipher suite support in OpenSSL originally developed by 171 const SSL_CIPHER *cipher; member in struct:cipher_order_st 243 * for |s->cipher|. It returns 1 on success and 0 on error. */ 246 const SSL_CIPHER *c = s->cipher; 283 c=s->cipher; 316 /* TODO(fork): enable the stitched cipher modes. */ 343 c=s->cipher; 444 co_list[co_list_num].cipher = c; 501 *ca_curr = ciph_curr->cipher; 510 * or represent a cipher strength value (will be added in any case because algorithms=0) [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
cipher_test.c | 60 #include <openssl/cipher.h> 133 printf("Testing cipher %s%s\n", EVP_CIPHER_name(c), 291 static int test_cipher(const char *cipher, const uint8_t *key, int kn, 298 if (strcmp(cipher, "DES-CBC") == 0) { 300 } else if (strcmp(cipher, "DES-EDE3-CBC") == 0) { 302 } else if (strcmp(cipher, "RC4") == 0) { 304 } else if (strcmp(cipher, "AES-128-ECB") == 0) { 306 } else if (strcmp(cipher, "AES-256-ECB") == 0) { 308 } else if (strcmp(cipher, "AES-128-CBC") == 0) { 310 } else if (strcmp(cipher, "AES-128-GCM") == 0) 355 char *cipher; local [all...] |
e_null.c | 57 #include <openssl/cipher.h>
|
/external/openssl/crypto/pkcs12/ |
p12_p8e.c | 63 X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, 76 if(pbe_nid == -1) pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
BaseStreamCipher.java | 11 import javax.crypto.Cipher; 48 private StreamCipher cipher; field in class:BaseStreamCipher 60 cipher = engine; 70 cipher = new StreamBlockCipher(engine); 185 param = PBE.Util.makePBEParameters(k, params, cipher.getAlgorithmName()); 221 if ((opmode == Cipher.ENCRYPT_MODE) || (opmode == Cipher.WRAP_MODE)) 239 case Cipher.ENCRYPT_MODE: 240 case Cipher.WRAP_MODE: 241 cipher.init(true, param) [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
cipher.h | 70 /* Cipher primitives. 73 * cipher algorithm. */ 90 /* EVP_enc_null returns a 'cipher' that passes plaintext through as 94 /* EVP_rc2_40_cbc returns a cipher that implements 40-bit RC2 in CBC mode. This 96 * files, which often encrypt the certificate chain using this cipher. It is 100 /* EVP_get_cipherbynid returns the cipher corresponding to the given NID, or 101 * NULL if no such cipher is known. */ 105 /* Cipher context allocation. 131 /* Cipher context configuration. */ 134 * |enc| is zero) operation using |cipher|. If |ctx| has been previousl 397 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st 444 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st [all...] |
/external/openssl/crypto/asn1/ |
p5_pbev2.c | 89 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, 100 alg_nid = EVP_CIPHER_type(cipher); 117 if (EVP_CIPHER_iv_length(cipher)) 120 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher)); 121 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0) 128 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0)) 136 /* If prf NID unspecified see if cipher has a preference. 150 keylen = EVP_CIPHER_key_length(cipher); 194 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, 197 return PKCS5_pbe2_set_iv(cipher, iter, salt, saltlen, NULL, -1) [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
p5_pbev2.c | 58 #include <openssl/cipher.h> 113 X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, 124 alg_nid = EVP_CIPHER_nid(cipher); 140 if (EVP_CIPHER_iv_length(cipher)) 143 memcpy(iv, aiv, EVP_CIPHER_iv_length(cipher)); 144 else if (RAND_pseudo_bytes(iv, EVP_CIPHER_iv_length(cipher)) < 0) 151 if (!EVP_CipherInit_ex(&ctx, cipher, NULL, NULL, iv, 0)) 158 /* If prf NID unspecified see if cipher has a preference. 172 keylen = EVP_CIPHER_key_length(cipher); 216 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter [all...] |
/external/chromium_org/third_party/libsrtp/srtp/crypto/ |
Makefile | 76 ciphers = cipher/cipher.o cipher/null_cipher.o \ 77 cipher/aes.o cipher/aes_icm.o \ 78 cipher/aes_cbc.o
|
/external/openssl/android.testssl/ |
testssl | 128 for cipher in `adb shell /system/bin/openssl ciphers "RSA+$protocol" | tr ':' ' '`; do 129 echo "Testing $cipher" 134 $ssltest -cipher $cipher $prot 136 echo "Failed $cipher" 148 $ssltest -v -bio_pair -tls1 -cipher ADH -dhe1024dsa -num 10 -f -time $extra || exit 1 166 $ssltest -tls1 -cipher PSK -psk abc123 $extra || exit 1 169 $ssltest -bio_pair -tls1 -cipher PSK -psk abc123 $extra || exit 1 175 $ssltest -tls1 -cipher SRP -srpuser test -srppass abc123 178 $ssltest -bio_pair -tls1 -cipher SRP -srpuser test -srppass abc12 [all...] |
/external/openssl/ssl/ |
d1_enc.c | 164 else if ( EVP_CIPHER_block_size(ds->cipher) > 1) 166 if (RAND_bytes(rec->input, EVP_CIPHER_block_size(ds->cipher)) <= 0) 199 bs=EVP_CIPHER_block_size(ds->cipher); 226 ds->buf_len, ds->cipher->key_len, 228 ds->cipher->iv_len); 230 for (i=0; i<ds->cipher->iv_len; i++) printf("%02X", ds->iv[i]);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
JCEStreamCipher.java | 18 import javax.crypto.Cipher; 72 private StreamCipher cipher; field in class:JCEStreamCipher 86 cipher = engine; 96 cipher = new StreamBlockCipher(engine); 211 param = PBE.Util.makePBEParameters(k, params, cipher.getAlgorithmName()); 247 if ((opmode == Cipher.ENCRYPT_MODE) || (opmode == Cipher.WRAP_MODE)) 263 case Cipher.ENCRYPT_MODE: 264 case Cipher.WRAP_MODE: 265 cipher.init(true, param) [all...] |
/external/openssl/crypto/cmac/ |
cmac.h | 74 const EVP_CIPHER *cipher, ENGINE *impl);
|
/external/openssl/crypto/pkcs7/ |
pk7_enc.c | 71 PKCS7_cipher(PKCS7 *p7,EVP_CIPHER *cipher);
|
/external/openssl/include/openssl/ |
cmac.h | 74 const EVP_CIPHER *cipher, ENGINE *impl);
|
/external/openssl/apps/ |
enc.c | 124 const EVP_CIPHER *cipher=NULL,*c; local 154 cipher=EVP_get_cipherbyname(pname); 156 if (!do_zlib && !base64 && (cipher == NULL) 159 if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0)) 162 BIO_printf(bio_err,"%s is an unknown cipher\n",pname); 292 cipher=c; 295 cipher=NULL; 320 BIO_printf(bio_err,"Cipher Types\n"); 336 if (cipher && EVP_CIPHER_flags(cipher) & EVP_CIPH_FLAG_AEAD_CIPHER [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/ |
OAEPEncoding.java | 28 AsymmetricBlockCipher cipher) 31 this(cipher, AndroidDigestFactory.getSHA1(), null); 36 AsymmetricBlockCipher cipher, 39 this(cipher, hash, null); 43 AsymmetricBlockCipher cipher, 47 this(cipher, hash, hash, encodingParams); 51 AsymmetricBlockCipher cipher, 56 this.engine = cipher;
|
/external/chromium_org/content/child/webcrypto/openssl/ |
aes_ctr_openssl.cc | 44 Status AesCtrEncrypt128BitCounter(const EVP_CIPHER* cipher, 49 DCHECK(cipher); 60 cipher, 178 const EVP_CIPHER* const cipher = GetAESCipherByKeyLength(raw_key.size()); local 179 if (!cipher) 221 return AesCtrEncrypt128BitCounter(cipher, 240 AesCtrEncrypt128BitCounter(cipher, 253 cipher,
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
x_exten.c | 59 #include <openssl/cipher.h>
|