HomeSort by relevance Sort by last modified time
    Searched refs:cipher (Results 1 - 25 of 404) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/
CBCBlockCipherMac.java 10 * standard CBC Block Cipher MAC - if no padding is specified the default of
20 private BlockCipher cipher; field in class:CBCBlockCipherMac
26 * create a standard MAC based on a CBC block cipher. This will produce an
27 * authentication code half the length of the block size of the cipher.
29 * @param cipher the cipher to be used as the basis of the MAC generation.
32 BlockCipher cipher)
34 this(cipher, (cipher.getBlockSize() * 8) / 2, null);
38 * create a standard MAC based on a CBC block cipher. This will produce a
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/aes/
modes.go 8 "crypto/cipher"
11 // gcmAble is implemented by cipher.Blocks that can provide an optimized
13 // See crypto/cipher/gcm.go.
15 NewGCM(size int) (cipher.AEAD, error)
18 // cbcEncAble is implemented by cipher.Blocks that can provide an optimized
19 // implementation of CBC encryption through the cipher.BlockMode interface.
20 // See crypto/cipher/cbc.go.
22 NewCBCEncrypter(iv []byte) cipher.BlockMode
25 // cbcDecAble is implemented by cipher.Blocks that can provide an optimized
26 // implementation of CBC decryption through the cipher.BlockMode interface
    [all...]
modes_test.go 8 "crypto/cipher"
12 // Check that the optimized implementations of cipher modes will
21 // testBlock implements the cipher.Block interface and any *Able
28 func (*testBlock) NewGCM(int) (cipher.AEAD, error) {
31 func (*testBlock) NewCBCEncrypter([]byte) cipher.BlockMode {
34 func (*testBlock) NewCBCDecrypter([]byte) cipher.BlockMode {
37 func (*testBlock) NewCTR([]byte) cipher.Stream {
41 // testAEAD implements the cipher.AEAD interface.
50 // Test the gcmAble interface is detected correctly by the cipher package.
52 b := cipher.Block(&testBlock{}
    [all...]
  /prebuilts/go/linux-x86/src/crypto/aes/
modes.go 8 "crypto/cipher"
11 // gcmAble is implemented by cipher.Blocks that can provide an optimized
13 // See crypto/cipher/gcm.go.
15 NewGCM(size int) (cipher.AEAD, error)
18 // cbcEncAble is implemented by cipher.Blocks that can provide an optimized
19 // implementation of CBC encryption through the cipher.BlockMode interface.
20 // See crypto/cipher/cbc.go.
22 NewCBCEncrypter(iv []byte) cipher.BlockMode
25 // cbcDecAble is implemented by cipher.Blocks that can provide an optimized
26 // implementation of CBC decryption through the cipher.BlockMode interface
    [all...]
modes_test.go 8 "crypto/cipher"
12 // Check that the optimized implementations of cipher modes will
21 // testBlock implements the cipher.Block interface and any *Able
28 func (*testBlock) NewGCM(int) (cipher.AEAD, error) {
31 func (*testBlock) NewCBCEncrypter([]byte) cipher.BlockMode {
34 func (*testBlock) NewCBCDecrypter([]byte) cipher.BlockMode {
37 func (*testBlock) NewCTR([]byte) cipher.Stream {
41 // testAEAD implements the cipher.AEAD interface.
50 // Test the gcmAble interface is detected correctly by the cipher package.
52 b := cipher.Block(&testBlock{}
    [all...]
  /external/fonttools/Lib/fontTools/misc/
eexec.py 8 def _decryptChar(cipher, R):
9 cipher = byteord(cipher)
10 plain = ( (cipher ^ (R>>8)) ) & 0xFF
11 R = ( (cipher + R) * 52845 + 22719 ) & 0xFFFF
16 cipher = ( (plain ^ (R>>8)) ) & 0xFF
17 R = ( (cipher + R) * 52845 + 22719 ) & 0xFFFF
18 return bytechr(cipher), R
23 for cipher in cipherstring:
24 plain, R = _decryptChar(cipher, R
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
StreamBlockCipher.java 4 * A parent class for block cipher modes that do not require block aligned data to be processed, but can function in
10 private final BlockCipher cipher; field in class:StreamBlockCipher
12 protected StreamBlockCipher(BlockCipher cipher)
14 this.cipher = cipher;
18 * return the underlying block cipher that we are wrapping.
20 * @return the underlying block cipher that we are wrapping.
24 return cipher;
BufferedBlockCipher.java 9 * Note: in the case where the underlying cipher is either a CFB cipher or an
18 protected BlockCipher cipher; field in class:BufferedBlockCipher
31 * Create a buffered block cipher without padding.
33 * @param cipher the underlying block cipher this buffering object wraps.
36 BlockCipher cipher)
38 this.cipher = cipher;
40 buf = new byte[cipher.getBlockSize()]
    [all...]
  /external/boringssl/src/crypto/cipher/test/
make_all_legacy_aead_tests.sh 5 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 > aes_128_cbc_sha1_tls_tests.txt
6 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 -implicit-iv > aes_128_cbc_sha1_tls_implicit_iv_tests.txt
7 go run make_legacy_aead_tests.go -cipher aes128 -mac sha256 > aes_128_cbc_sha256_tls_tests.txt
9 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 > aes_256_cbc_sha1_tls_tests.txt
10 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 -implicit-iv > aes_256_cbc_sha1_tls_implicit_iv_tests.txt
11 go run make_legacy_aead_tests.go -cipher aes256 -mac sha256 > aes_256_cbc_sha256_tls_tests.txt
12 go run make_legacy_aead_tests.go -cipher aes256 -mac sha384 > aes_256_cbc_sha384_tls_tests.txt
14 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 > des_ede3_cbc_sha1_tls_tests.txt
15 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 -implicit-iv > des_ede3_cbc_sha1_tls_implicit_iv_tests.txt
17 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 -ssl3 > aes_128_cbc_sha1_ssl3_tests.tx
    [all...]
  /external/syslinux/gpxe/src/include/gpxe/
crypto.h 47 /** A cipher algorithm */
116 static inline int cipher_setkey ( struct cipher_algorithm *cipher,
118 return cipher->setkey ( ctx, key, keylen );
121 static inline void cipher_setiv ( struct cipher_algorithm *cipher,
123 cipher->setiv ( ctx, iv );
126 static inline void cipher_encrypt ( struct cipher_algorithm *cipher,
129 cipher->encrypt ( ctx, src, dst, len );
131 #define cipher_encrypt( cipher, ctx, src, dst, len ) do { \
132 assert ( ( (len) & ( (cipher)->blocksize - 1 ) ) == 0 ); \
133 cipher_encrypt ( (cipher), (ctx), (src), (dst), (len) );
    [all...]
  /external/boringssl/src/crypto/cipher/
cipher.c 57 #include <openssl/cipher.h>
104 if (c->cipher != NULL) {
105 if (c->cipher->cleanup) {
106 c->cipher->cleanup(c);
108 OPENSSL_cleanse(c->cipher_data, c->cipher->ctx_size);
124 if (in == NULL || in->cipher == NULL) {
125 OPENSSL_PUT_ERROR(CIPHER, CIPHER_R_INPUT_NOT_INITIALIZED);
132 if (in->cipher_data && in->cipher->ctx_size) {
133 out->cipher_data = OPENSSL_malloc(in->cipher->ctx_size);
135 out->cipher = NULL
    [all...]
  /external/wycheproof/java/com/google/security/wycheproof/testcases/
AesGcmTest.java 31 import javax.crypto.Cipher;
136 Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding"); local
137 cipher.init(Cipher.ENCRYPT_MODE, test.key, test.parameters);
150 Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding"); local
151 cipher.init(Cipher.ENCRYPT_MODE, test.key, test.parameters)
171 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local
203 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local
225 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local
249 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local
274 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local
303 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local
333 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local
374 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local
400 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local
    [all...]