/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
CBCBlockCipherMac.java | 10 * standard CBC Block Cipher MAC - if no padding is specified the default of 20 private BlockCipher cipher; field in class:CBCBlockCipherMac 26 * create a standard MAC based on a CBC block cipher. This will produce an 27 * authentication code half the length of the block size of the cipher. 29 * @param cipher the cipher to be used as the basis of the MAC generation. 32 BlockCipher cipher) 34 this(cipher, (cipher.getBlockSize() * 8) / 2, null); 38 * create a standard MAC based on a CBC block cipher. This will produce a [all...] |
/prebuilts/go/darwin-x86/src/crypto/aes/ |
modes.go | 8 "crypto/cipher" 11 // gcmAble is implemented by cipher.Blocks that can provide an optimized 13 // See crypto/cipher/gcm.go. 15 NewGCM(size int) (cipher.AEAD, error) 18 // cbcEncAble is implemented by cipher.Blocks that can provide an optimized 19 // implementation of CBC encryption through the cipher.BlockMode interface. 20 // See crypto/cipher/cbc.go. 22 NewCBCEncrypter(iv []byte) cipher.BlockMode 25 // cbcDecAble is implemented by cipher.Blocks that can provide an optimized 26 // implementation of CBC decryption through the cipher.BlockMode interface [all...] |
modes_test.go | 8 "crypto/cipher" 12 // Check that the optimized implementations of cipher modes will 21 // testBlock implements the cipher.Block interface and any *Able 28 func (*testBlock) NewGCM(int) (cipher.AEAD, error) { 31 func (*testBlock) NewCBCEncrypter([]byte) cipher.BlockMode { 34 func (*testBlock) NewCBCDecrypter([]byte) cipher.BlockMode { 37 func (*testBlock) NewCTR([]byte) cipher.Stream { 41 // testAEAD implements the cipher.AEAD interface. 50 // Test the gcmAble interface is detected correctly by the cipher package. 52 b := cipher.Block(&testBlock{} [all...] |
/prebuilts/go/linux-x86/src/crypto/aes/ |
modes.go | 8 "crypto/cipher" 11 // gcmAble is implemented by cipher.Blocks that can provide an optimized 13 // See crypto/cipher/gcm.go. 15 NewGCM(size int) (cipher.AEAD, error) 18 // cbcEncAble is implemented by cipher.Blocks that can provide an optimized 19 // implementation of CBC encryption through the cipher.BlockMode interface. 20 // See crypto/cipher/cbc.go. 22 NewCBCEncrypter(iv []byte) cipher.BlockMode 25 // cbcDecAble is implemented by cipher.Blocks that can provide an optimized 26 // implementation of CBC decryption through the cipher.BlockMode interface [all...] |
modes_test.go | 8 "crypto/cipher" 12 // Check that the optimized implementations of cipher modes will 21 // testBlock implements the cipher.Block interface and any *Able 28 func (*testBlock) NewGCM(int) (cipher.AEAD, error) { 31 func (*testBlock) NewCBCEncrypter([]byte) cipher.BlockMode { 34 func (*testBlock) NewCBCDecrypter([]byte) cipher.BlockMode { 37 func (*testBlock) NewCTR([]byte) cipher.Stream { 41 // testAEAD implements the cipher.AEAD interface. 50 // Test the gcmAble interface is detected correctly by the cipher package. 52 b := cipher.Block(&testBlock{} [all...] |
/external/fonttools/Lib/fontTools/misc/ |
eexec.py | 8 def _decryptChar(cipher, R): 9 cipher = byteord(cipher) 10 plain = ( (cipher ^ (R>>8)) ) & 0xFF 11 R = ( (cipher + R) * 52845 + 22719 ) & 0xFFFF 16 cipher = ( (plain ^ (R>>8)) ) & 0xFF 17 R = ( (cipher + R) * 52845 + 22719 ) & 0xFFFF 18 return bytechr(cipher), R 23 for cipher in cipherstring: 24 plain, R = _decryptChar(cipher, R [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
StreamBlockCipher.java | 4 * A parent class for block cipher modes that do not require block aligned data to be processed, but can function in 10 private final BlockCipher cipher; field in class:StreamBlockCipher 12 protected StreamBlockCipher(BlockCipher cipher) 14 this.cipher = cipher; 18 * return the underlying block cipher that we are wrapping. 20 * @return the underlying block cipher that we are wrapping. 24 return cipher;
|
BufferedBlockCipher.java | 9 * Note: in the case where the underlying cipher is either a CFB cipher or an 18 protected BlockCipher cipher; field in class:BufferedBlockCipher 31 * Create a buffered block cipher without padding. 33 * @param cipher the underlying block cipher this buffering object wraps. 36 BlockCipher cipher) 38 this.cipher = cipher; 40 buf = new byte[cipher.getBlockSize()] [all...] |
/external/boringssl/src/crypto/cipher/test/ |
make_all_legacy_aead_tests.sh | 5 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 > aes_128_cbc_sha1_tls_tests.txt 6 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 -implicit-iv > aes_128_cbc_sha1_tls_implicit_iv_tests.txt 7 go run make_legacy_aead_tests.go -cipher aes128 -mac sha256 > aes_128_cbc_sha256_tls_tests.txt 9 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 > aes_256_cbc_sha1_tls_tests.txt 10 go run make_legacy_aead_tests.go -cipher aes256 -mac sha1 -implicit-iv > aes_256_cbc_sha1_tls_implicit_iv_tests.txt 11 go run make_legacy_aead_tests.go -cipher aes256 -mac sha256 > aes_256_cbc_sha256_tls_tests.txt 12 go run make_legacy_aead_tests.go -cipher aes256 -mac sha384 > aes_256_cbc_sha384_tls_tests.txt 14 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 > des_ede3_cbc_sha1_tls_tests.txt 15 go run make_legacy_aead_tests.go -cipher 3des -mac sha1 -implicit-iv > des_ede3_cbc_sha1_tls_implicit_iv_tests.txt 17 go run make_legacy_aead_tests.go -cipher aes128 -mac sha1 -ssl3 > aes_128_cbc_sha1_ssl3_tests.tx [all...] |
/external/syslinux/gpxe/src/include/gpxe/ |
crypto.h | 47 /** A cipher algorithm */ 116 static inline int cipher_setkey ( struct cipher_algorithm *cipher, 118 return cipher->setkey ( ctx, key, keylen ); 121 static inline void cipher_setiv ( struct cipher_algorithm *cipher, 123 cipher->setiv ( ctx, iv ); 126 static inline void cipher_encrypt ( struct cipher_algorithm *cipher, 129 cipher->encrypt ( ctx, src, dst, len ); 131 #define cipher_encrypt( cipher, ctx, src, dst, len ) do { \ 132 assert ( ( (len) & ( (cipher)->blocksize - 1 ) ) == 0 ); \ 133 cipher_encrypt ( (cipher), (ctx), (src), (dst), (len) ); [all...] |
/external/boringssl/src/crypto/cipher/ |
cipher.c | 57 #include <openssl/cipher.h> 104 if (c->cipher != NULL) { 105 if (c->cipher->cleanup) { 106 c->cipher->cleanup(c); 108 OPENSSL_cleanse(c->cipher_data, c->cipher->ctx_size); 124 if (in == NULL || in->cipher == NULL) { 125 OPENSSL_PUT_ERROR(CIPHER, CIPHER_R_INPUT_NOT_INITIALIZED); 132 if (in->cipher_data && in->cipher->ctx_size) { 133 out->cipher_data = OPENSSL_malloc(in->cipher->ctx_size); 135 out->cipher = NULL [all...] |
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
AesGcmTest.java | 31 import javax.crypto.Cipher; 136 Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding"); local 137 cipher.init(Cipher.ENCRYPT_MODE, test.key, test.parameters); 150 Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding"); local 151 cipher.init(Cipher.ENCRYPT_MODE, test.key, test.parameters) 171 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local 203 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local 225 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local 249 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local 274 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local 303 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local 333 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local 374 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local 400 Cipher cipher = Cipher.getInstance("AES\/GCM\/NoPadding"); local [all...] |