HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 76 - 100 of 225) sorted by null

1 2 34 5 6 7 8 9

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
BcKeyStoreSpi.java 31 import javax.crypto.Cipher;
151 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); local
152 CipherOutputStream cOut = new CipherOutputStream(dOut, cipher);
229 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); local
231 CipherInputStream cIn = new CipherInputStream(dIn, cipher);
248 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount)
468 Cipher cipher = Cipher.getInstance(algorithm, BouncyCastleProvider.PROVIDER_NAME); local
990 Cipher cipher = this.makePBECipher(cipherAlg, Cipher.DECRYPT_MODE, password, salt, iterationCount); local
1017 Cipher cipher; local
    [all...]
  /external/chromium_org/net/ssl/
ssl_cipher_suite_names.cc 15 // redundancy and break each cipher suite into a key exchange method, cipher
22 // <5 bits> cipher
255 // 7 is reserved to indicate an AEAD cipher suite.
296 const int cipher = (cs->encoded >> 3) & 0x1f; local
300 *cipher_str = kCipherNames[cipher].name;
364 const int cipher = (cs->encoded >> 3) & 0x1f; local
377 switch (cipher) {
  /external/chromium_org/third_party/boringssl/src/crypto/cipher/
internal.h 70 /* type contains a NID identifing the cipher. (For example, NID_rc4.) */
73 /* block_size contains the block size, in bytes, of the cipher, or 1 for a
74 * stream cipher. */
77 /* key_len contains the key size, in bytes, for the cipher. If the cipher
85 * cipher. */
97 int (*cipher)(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, member in struct:evp_cipher_st
cipher_error.c 17 #include <openssl/cipher.h>
derive_key.c 57 #include <openssl/cipher.h>
  /external/chromium_org/third_party/boringssl/src/crypto/x509/
x509_txt.c 59 #include <openssl/cipher.h>
x_info.c 75 ret->enc_cipher.cipher=NULL;
  /external/chromium_org/third_party/webrtc/base/
nssstreamadapter.h 74 virtual bool GetDtlsSrtpCipher(std::string* cipher);
104 std::vector<PRUint16> srtp_ciphers_; // SRTP cipher list
sslstreamadapter.h 149 virtual bool GetDtlsSrtpCipher(std::string* cipher) {
opensslstreamadapter.h 95 virtual bool GetDtlsSrtpCipher(std::string* cipher);
  /external/openssl/apps/
genpkey.c 82 const EVP_CIPHER *cipher = NULL; local
180 cipher = EVP_get_cipherbyname(*args + 1);
181 if (!cipher)
183 BIO_printf(bio_err, "Unknown cipher %s\n",
204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n");
269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
  /external/openssl/crypto/asn1/
x_info.c 76 ret->enc_cipher.cipher=NULL;
  /external/openssl/crypto/evp/
p5_crpt2.c 201 const EVP_CIPHER *cipher; local
229 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm);
231 if(!cipher) {
237 /* Fixup cipher based on AlgorithmIdentifier */
238 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
evp.h 322 /* Values for cipher flags */
336 /* Set if variable length cipher */
338 /* Set if the iv handling should be done by the cipher itself */
340 /* Set if the cipher's init() function should be called if key is NULL */
342 /* Call ctrl() to init cipher parameters */
348 /* cipher handles random key generation */
350 /* cipher has its own additional copying logic */
358 /* Allow non FIPS cipher in FIPS mode */
360 /* Cipher handles any and all padding logic as well
387 /* AEAD cipher deduces payload length and returns number of byte
407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
    [all...]
evp_locl.h 59 /* Macros to code block cipher wrappers */
61 /* Wrapper functions for each cipher mode */
65 bl = ctx->cipher->block_size;\
257 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \
258 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \
259 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \
260 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \
261 0, cipher##_init_key, NULL, \
  /external/chromium_org/third_party/libxslt/libexslt/
crypto.c 378 gcry_cipher_hd_t cipher; local
383 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR,
392 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH);
400 rc = gcry_cipher_encrypt (cipher, (unsigned char *) dest, destlen,
409 gcry_cipher_close (cipher);
417 gcry_cipher_hd_t cipher; local
422 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR,
431 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH);
439 rc = gcry_cipher_decrypt (cipher, (unsigned char *) dest, destlen,
448 gcry_cipher_close (cipher);
    [all...]
  /external/openssl/include/openssl/
evp.h 322 /* Values for cipher flags */
336 /* Set if variable length cipher */
338 /* Set if the iv handling should be done by the cipher itself */
340 /* Set if the cipher's init() function should be called if key is NULL */
342 /* Call ctrl() to init cipher parameters */
348 /* cipher handles random key generation */
350 /* cipher has its own additional copying logic */
358 /* Allow non FIPS cipher in FIPS mode */
360 /* Cipher handles any and all padding logic as well
387 /* AEAD cipher deduces payload length and returns number of byte
407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st
413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st
    [all...]
  /external/chromium_org/third_party/boringssl/src/ssl/
t1_enc.c 344 /* mac_key_and_key is used to merge the MAC and cipher keys for an AEAD
345 * which simulates pre-AEAD cipher suites. It needs to be large enough
352 * cipher suites). */
402 /* tls1_change_cipher_state_cipher performs the work needed to switch cipher
414 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local
470 EVP_CipherInit_ex(cipher_ctx, cipher, NULL /* engine */, key, iv, !is_read);
493 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local
511 * cipher suites) the key length reported by
523 key_len = EVP_CIPHER_key_length(cipher);
524 iv_len = EVP_CIPHER_iv_length(cipher);
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/
PKCS1Encoding.java 40 * @param cipher
43 AsymmetricBlockCipher cipher)
45 this.engine = cipher;
  /external/chromium_org/third_party/boringssl/src/crypto/pem/
pem_info.c 239 EVP_CIPHER_INFO cipher; local
241 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher))
243 if (!PEM_do_header(&cipher,data,&len,cb,u))
359 EVP_CIPHER_nid(xi->enc_cipher.cipher));
  /external/chromium_org/third_party/boringssl/src/include/openssl/
pkcs8.h 112 * encodes as two NUL bytes.) The |cipher| argument is ignored. */
113 OPENSSL_EXPORT X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
transportchannel.h 108 // Finds out which DTLS-SRTP cipher was negotiated
109 virtual bool GetSrtpCipher(std::string* cipher) = 0;
transportchannelproxy.h 77 virtual bool GetSrtpCipher(std::string* cipher);
  /external/openssl/crypto/krb5/
krb5_asn.h 79 ** cipher[2] OCTET STRING -- ciphertext
86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
  /external/openssl/crypto/pem/
pem_info.c 242 EVP_CIPHER_INFO cipher; local
244 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher))
246 if (!PEM_do_header(&cipher,data,&len,cb,u))
360 EVP_CIPHER_nid(xi->enc_cipher.cipher));

Completed in 824 milliseconds

1 2 34 5 6 7 8 9