/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/ |
BcKeyStoreSpi.java | 31 import javax.crypto.Cipher; 151 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount); local 152 CipherOutputStream cOut = new CipherOutputStream(dOut, cipher); 229 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount); local 231 CipherInputStream cIn = new CipherInputStream(dIn, cipher); 248 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount) 468 Cipher cipher = Cipher.getInstance(algorithm, BouncyCastleProvider.PROVIDER_NAME); local 990 Cipher cipher = this.makePBECipher(cipherAlg, Cipher.DECRYPT_MODE, password, salt, iterationCount); local 1017 Cipher cipher; local [all...] |
/external/chromium_org/net/ssl/ |
ssl_cipher_suite_names.cc | 15 // redundancy and break each cipher suite into a key exchange method, cipher 22 // <5 bits> cipher 255 // 7 is reserved to indicate an AEAD cipher suite. 296 const int cipher = (cs->encoded >> 3) & 0x1f; local 300 *cipher_str = kCipherNames[cipher].name; 364 const int cipher = (cs->encoded >> 3) & 0x1f; local 377 switch (cipher) {
|
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
internal.h | 70 /* type contains a NID identifing the cipher. (For example, NID_rc4.) */ 73 /* block_size contains the block size, in bytes, of the cipher, or 1 for a 74 * stream cipher. */ 77 /* key_len contains the key size, in bytes, for the cipher. If the cipher 85 * cipher. */ 97 int (*cipher)(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, member in struct:evp_cipher_st
|
cipher_error.c | 17 #include <openssl/cipher.h>
|
derive_key.c | 57 #include <openssl/cipher.h>
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
x509_txt.c | 59 #include <openssl/cipher.h>
|
x_info.c | 75 ret->enc_cipher.cipher=NULL;
|
/external/chromium_org/third_party/webrtc/base/ |
nssstreamadapter.h | 74 virtual bool GetDtlsSrtpCipher(std::string* cipher); 104 std::vector<PRUint16> srtp_ciphers_; // SRTP cipher list
|
sslstreamadapter.h | 149 virtual bool GetDtlsSrtpCipher(std::string* cipher) {
|
opensslstreamadapter.h | 95 virtual bool GetDtlsSrtpCipher(std::string* cipher);
|
/external/openssl/apps/ |
genpkey.c | 82 const EVP_CIPHER *cipher = NULL; local 180 cipher = EVP_get_cipherbyname(*args + 1); 181 if (!cipher) 183 BIO_printf(bio_err, "Unknown cipher %s\n", 204 BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n"); 269 rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
|
/external/openssl/crypto/asn1/ |
x_info.c | 76 ret->enc_cipher.cipher=NULL;
|
/external/openssl/crypto/evp/ |
p5_crpt2.c | 201 const EVP_CIPHER *cipher; local 229 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); 231 if(!cipher) { 237 /* Fixup cipher based on AlgorithmIdentifier */ 238 if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, en_de))
|
evp.h | 322 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 350 /* cipher has its own additional copying logic */ 358 /* Allow non FIPS cipher in FIPS mode */ 360 /* Cipher handles any and all padding logic as well 387 /* AEAD cipher deduces payload length and returns number of byte 407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
evp_locl.h | 59 /* Macros to code block cipher wrappers */ 61 /* Wrapper functions for each cipher mode */ 65 bl = ctx->cipher->block_size;\ 257 #define IMPLEMENT_CFBR(cipher,cprefix,kstruct,ksched,keysize,cbits,iv_len) \ 258 BLOCK_CIPHER_func_cfb(cipher##_##keysize,cprefix,cbits,kstruct,ksched) \ 259 BLOCK_CIPHER_def_cfb(cipher##_##keysize,kstruct, \ 260 NID_##cipher##_##keysize, keysize/8, iv_len, cbits, \ 261 0, cipher##_init_key, NULL, \
|
/external/chromium_org/third_party/libxslt/libexslt/ |
crypto.c | 378 gcry_cipher_hd_t cipher; local 383 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR, 392 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH); 400 rc = gcry_cipher_encrypt (cipher, (unsigned char *) dest, destlen, 409 gcry_cipher_close (cipher); 417 gcry_cipher_hd_t cipher; local 422 rc = gcry_cipher_open (&cipher, GCRY_CIPHER_ARCFOUR, 431 rc = gcry_cipher_setkey (cipher, key, RC4_KEY_LENGTH); 439 rc = gcry_cipher_decrypt (cipher, (unsigned char *) dest, destlen, 448 gcry_cipher_close (cipher); [all...] |
/external/openssl/include/openssl/ |
evp.h | 322 /* Values for cipher flags */ 336 /* Set if variable length cipher */ 338 /* Set if the iv handling should be done by the cipher itself */ 340 /* Set if the cipher's init() function should be called if key is NULL */ 342 /* Call ctrl() to init cipher parameters */ 348 /* cipher handles random key generation */ 350 /* cipher has its own additional copying logic */ 358 /* Allow non FIPS cipher in FIPS mode */ 360 /* Cipher handles any and all padding logic as well 387 /* AEAD cipher deduces payload length and returns number of byte 407 const EVP_CIPHER *cipher; member in struct:evp_cipher_info_st 413 const EVP_CIPHER *cipher; member in struct:evp_cipher_ctx_st [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
t1_enc.c | 344 /* mac_key_and_key is used to merge the MAC and cipher keys for an AEAD 345 * which simulates pre-AEAD cipher suites. It needs to be large enough 352 * cipher suites). */ 402 /* tls1_change_cipher_state_cipher performs the work needed to switch cipher 414 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local 470 EVP_CipherInit_ex(cipher_ctx, cipher, NULL /* engine */, key, iv, !is_read); 493 const EVP_CIPHER *cipher = s->s3->tmp.new_sym_enc; local 511 * cipher suites) the key length reported by 523 key_len = EVP_CIPHER_key_length(cipher); 524 iv_len = EVP_CIPHER_iv_length(cipher); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/ |
PKCS1Encoding.java | 40 * @param cipher 43 AsymmetricBlockCipher cipher) 45 this.engine = cipher;
|
/external/chromium_org/third_party/boringssl/src/crypto/pem/ |
pem_info.c | 239 EVP_CIPHER_INFO cipher; local 241 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) 243 if (!PEM_do_header(&cipher,data,&len,cb,u)) 359 EVP_CIPHER_nid(xi->enc_cipher.cipher));
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
pkcs8.h | 112 * encodes as two NUL bytes.) The |cipher| argument is ignored. */ 113 OPENSSL_EXPORT X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher,
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
transportchannel.h | 108 // Finds out which DTLS-SRTP cipher was negotiated 109 virtual bool GetSrtpCipher(std::string* cipher) = 0;
|
transportchannelproxy.h | 77 virtual bool GetSrtpCipher(std::string* cipher);
|
/external/openssl/crypto/krb5/ |
krb5_asn.h | 79 ** cipher[2] OCTET STRING -- ciphertext 86 ASN1_OCTET_STRING *cipher; member in struct:krb5_encdata_st
|
/external/openssl/crypto/pem/ |
pem_info.c | 242 EVP_CIPHER_INFO cipher; local 244 if (!PEM_get_EVP_CIPHER_INFO(header,&cipher)) 246 if (!PEM_do_header(&cipher,data,&len,cb,u)) 360 EVP_CIPHER_nid(xi->enc_cipher.cipher));
|