HomeSort by relevance Sort by last modified time
    Searched refs:cbc (Results 1 - 25 of 25) sorted by null

  /external/dropbear/libtomcrypt/src/modes/cbc/
cbc_getiv.c 15 CBC implementation, get IV, Tom St Denis
24 @param cbc The CBC state
27 int cbc_getiv(unsigned char *IV, unsigned long *len, symmetric_CBC *cbc)
31 LTC_ARGCHK(cbc != NULL);
32 if ((unsigned long)cbc->blocklen > *len) {
33 *len = cbc->blocklen;
36 XMEMCPY(IV, cbc->IV, cbc->blocklen);
37 *len = cbc->blocklen
    [all...]
cbc_encrypt.c 15 CBC implementation, encrypt block, Tom St Denis
22 CBC encrypt
26 @param cbc CBC state
29 int cbc_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CBC *cbc)
35 LTC_ARGCHK(cbc != NULL);
37 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) {
42 if (cbc->blocklen < 1 || cbc->blocklen > (int)sizeof(cbc->IV))
    [all...]
cbc_done.c 15 CBC implementation, finish chain, Tom St Denis
21 @param cbc The CBC chain to terminate
24 int cbc_done(symmetric_CBC *cbc)
27 LTC_ARGCHK(cbc != NULL);
29 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) {
32 cipher_descriptor[cbc->cipher].done(&cbc->key);
40 /* $Source: /cvs/libtom/libtomcrypt/src/modes/cbc/cbc_done.c,v $ */
cbc_decrypt.c 15 CBC implementation, encrypt block, Tom St Denis
22 CBC decrypt
26 @param cbc CBC state
29 int cbc_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CBC *cbc)
41 LTC_ARGCHK(cbc != NULL);
43 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) {
48 if (cbc->blocklen < 1 || cbc->blocklen > (int)sizeof(cbc->IV))
    [all...]
cbc_setiv.c 15 CBC implementation, set IV, Tom St Denis
25 @param cbc The CBC state
28 int cbc_setiv(const unsigned char *IV, unsigned long len, symmetric_CBC *cbc)
31 LTC_ARGCHK(cbc != NULL);
32 if (len != (unsigned long)cbc->blocklen) {
35 XMEMCPY(cbc->IV, IV, len);
42 /* $Source: /cvs/libtom/libtomcrypt/src/modes/cbc/cbc_setiv.c,v $ */
cbc_start.c 15 CBC implementation, start chain, Tom St Denis
21 Initialize a CBC context
27 @param cbc The CBC state to initialize
31 int keylen, int num_rounds, symmetric_CBC *cbc)
37 LTC_ARGCHK(cbc != NULL);
45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) {
50 cbc->blocklen = cipher_descriptor[cipher].block_length;
51 cbc->cipher = cipher;
52 for (x = 0; x < cbc->blocklen; x++)
    [all...]
  /external/dropbear/libtomcrypt/testprof/
modes_test.c 1 /* test CFB/OFB/CBC modes */
9 symmetric_CBC cbc; local
40 /* test CBC mode */
42 DO(cbc_start(cipher_idx, iv, key, 16, 0, &cbc));
44 DO(cbc_getiv(iv2, &l, &cbc));
49 DO(cbc_encrypt(pt, ct, 64, &cbc));
52 DO(cbc_setiv(iv2, l, &cbc));
54 DO(cbc_decrypt(ct, tmp, 64, &cbc));
56 fprintf(stderr, "CBC failed");
x86_prof.c 367 symmetric_CBC cbc; local
374 cbc_start(x, pt, key, cipher_descriptor[x].min_key_length, 0, &cbc);
382 #define DO1 cbc_encrypt(pt, pt, sizeof(pt), &cbc);
401 #define DO1 cbc_decrypt(pt, pt, sizeof(pt), &cbc);
417 cbc_done(&cbc);
434 int time_cipher2(void) { fprintf(stderr, "NO CBC\n"); return 0; }
    [all...]
  /external/wpa_supplicant/
aes_wrap.c 5 * - One-Key CBC MAC (OMAC1) hash with AES-128
8 * - AES-128 CBC
172 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128
184 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; local
191 os_memset(cbc, 0, BLOCK_SIZE);
204 cbc[i] ^= *pos++;
212 aes_encrypt(ctx, cbc, cbc);
222 cbc[i] ^= *pos++;
229 cbc[left] ^= 0x80
460 u8 cbc[BLOCK_SIZE]; local
493 u8 cbc[BLOCK_SIZE], tmp[BLOCK_SIZE]; local
    [all...]
crypto_internal.c 239 u8 cbc[32]; member in struct:crypto_cipher::__anon8233::__anon8235
246 u8 cbc[8]; member in struct:crypto_cipher::__anon8233::__anon8236
274 if (key_len > sizeof(ctx->u.aes.cbc)) {
290 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size);
298 os_memcpy(ctx->u.des3.cbc, iv, 8);
328 ctx->u.aes.cbc[j] ^= plain[j];
329 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc,
330 ctx->u.aes.cbc);
331 os_memcpy(crypt, ctx->u.aes.cbc,
343 ctx->u.des3.cbc[j] ^= plain[j]
    [all...]
crypto_libtomcrypt.c 294 symmetric_CBC cbc; member in union:crypto_cipher::__anon8238
345 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc);
371 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc);
373 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption "
395 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc);
397 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption "
409 cbc_done(&ctx->u.cbc);
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
aes_wrap.c 5 * - One-Key CBC MAC (OMAC1, i.e., CMAC) hash with AES-128
8 * - AES-128 CBC
171 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128
187 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; local
194 os_memset(cbc, 0, BLOCK_SIZE);
207 cbc[i] ^= *pos++;
215 aes_encrypt(ctx, cbc, cbc);
225 cbc[i] ^= *pos++;
232 cbc[left] ^= 0x80
478 u8 cbc[BLOCK_SIZE]; local
511 u8 cbc[BLOCK_SIZE], tmp[BLOCK_SIZE]; local
    [all...]
crypto_internal.c 240 u8 cbc[32]; member in struct:crypto_cipher::__anon8399::__anon8401
247 u8 cbc[8]; member in struct:crypto_cipher::__anon8399::__anon8402
275 if (key_len > sizeof(ctx->u.aes.cbc)) {
291 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size);
299 os_memcpy(ctx->u.des3.cbc, iv, 8);
329 ctx->u.aes.cbc[j] ^= plain[j];
330 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc,
331 ctx->u.aes.cbc);
332 os_memcpy(crypt, ctx->u.aes.cbc,
344 ctx->u.des3.cbc[j] ^= plain[j]
    [all...]
crypto_libtomcrypt.c 294 symmetric_CBC cbc; member in union:crypto_cipher::__anon8404
345 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc);
371 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc);
373 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption "
395 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc);
397 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption "
409 cbc_done(&ctx->u.cbc);
  /external/openssl/include/openssl/
modes.h 53 unsigned char ivec[16], cbc128_f cbc);
59 unsigned char ivec[16], cbc128_f cbc);
  /external/dropbear/libtomcrypt/
Android.mk 56 src/modes/cbc/cbc_decrypt.c src/modes/cbc/cbc_done.c src/modes/cbc/cbc_encrypt.c \
57 src/modes/cbc/cbc_getiv.c src/modes/cbc/cbc_setiv.c src/modes/cbc/cbc_start.c \
crypt.tex 179 unlike libraries like OpenSSL is not tied to direct routines. For instance, in OpenSSL there are CBC block
    [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_cipher.h 237 /** A block cipher CBC structure */
388 /** Accelerated CBC encryption
398 /** Accelerated CBC decryption
765 int keylen, int num_rounds, symmetric_CBC *cbc);
766 int cbc_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CBC *cbc);
767 int cbc_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CBC *cbc);
768 int cbc_getiv(unsigned char *IV, unsigned long *len, symmetric_CBC *cbc);
769 int cbc_setiv(const unsigned char *IV, unsigned long len, symmetric_CBC *cbc);
770 int cbc_done(symmetric_CBC *cbc);
  /external/openssl/crypto/des/
FILES0 36 ede_enc.c - des_ede3_cbc_encrypt() cbc mode des using triple DES.
  /external/openssl/crypto/bf/asm/
bf-586.pl 6 require "cbc.pl";
22 &cbc("BF_cbc_encrypt","BF_encrypt","BF_decrypt",1,4,5,3,-1,-1);
bf-686.pl 5 require "cbc.pl";
21 &cbc("BF_cbc_encrypt","BF_encrypt","BF_decrypt",1,4,5,3,-1,-1);
  /external/openssl/crypto/evp/
evp_locl.h 152 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \
  /external/openssl/crypto/perlasm/
cbc.pl 15 #&cbc("des_ncbc_encrypt","des_encrypt",0);
16 #&cbc("BF_cbc_encrypt","BF_encrypt","BF_encrypt",
18 #&cbc("des_ncbc_encrypt","des_encrypt","des_encrypt",
20 #&cbc("des_ede3_cbc_encrypt","des_encrypt3","des_decrypt3",
26 sub cbc subroutine
  /external/openssl/crypto/des/asm/
des-586.pl 10 require "cbc.pl";
35 &cbc("DES_ncbc_encrypt","DES_encrypt1","DES_encrypt1",0,4,5,3,5,-1);
36 &cbc("DES_ede3_cbc_encrypt","DES_encrypt3","DES_decrypt3",0,6,7,3,4,5);
  /external/dropbear/
configure     [all...]

Completed in 453 milliseconds