/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_getiv.c | 15 CBC implementation, get IV, Tom St Denis 24 @param cbc The CBC state 27 int cbc_getiv(unsigned char *IV, unsigned long *len, symmetric_CBC *cbc) 31 LTC_ARGCHK(cbc != NULL); 32 if ((unsigned long)cbc->blocklen > *len) { 33 *len = cbc->blocklen; 36 XMEMCPY(IV, cbc->IV, cbc->blocklen); 37 *len = cbc->blocklen [all...] |
cbc_encrypt.c | 15 CBC implementation, encrypt block, Tom St Denis 22 CBC encrypt 26 @param cbc CBC state 29 int cbc_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CBC *cbc) 35 LTC_ARGCHK(cbc != NULL); 37 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 42 if (cbc->blocklen < 1 || cbc->blocklen > (int)sizeof(cbc->IV)) [all...] |
cbc_done.c | 15 CBC implementation, finish chain, Tom St Denis 21 @param cbc The CBC chain to terminate 24 int cbc_done(symmetric_CBC *cbc) 27 LTC_ARGCHK(cbc != NULL); 29 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 32 cipher_descriptor[cbc->cipher].done(&cbc->key); 40 /* $Source: /cvs/libtom/libtomcrypt/src/modes/cbc/cbc_done.c,v $ */
|
cbc_decrypt.c | 15 CBC implementation, encrypt block, Tom St Denis 22 CBC decrypt 26 @param cbc CBC state 29 int cbc_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CBC *cbc) 41 LTC_ARGCHK(cbc != NULL); 43 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 48 if (cbc->blocklen < 1 || cbc->blocklen > (int)sizeof(cbc->IV)) [all...] |
cbc_setiv.c | 15 CBC implementation, set IV, Tom St Denis 25 @param cbc The CBC state 28 int cbc_setiv(const unsigned char *IV, unsigned long len, symmetric_CBC *cbc) 31 LTC_ARGCHK(cbc != NULL); 32 if (len != (unsigned long)cbc->blocklen) { 35 XMEMCPY(cbc->IV, IV, len); 42 /* $Source: /cvs/libtom/libtomcrypt/src/modes/cbc/cbc_setiv.c,v $ */
|
cbc_start.c | 15 CBC implementation, start chain, Tom St Denis 21 Initialize a CBC context 27 @param cbc The CBC state to initialize 31 int keylen, int num_rounds, symmetric_CBC *cbc) 37 LTC_ARGCHK(cbc != NULL); 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) { 50 cbc->blocklen = cipher_descriptor[cipher].block_length; 51 cbc->cipher = cipher; 52 for (x = 0; x < cbc->blocklen; x++) [all...] |
/external/dropbear/libtomcrypt/testprof/ |
modes_test.c | 1 /* test CFB/OFB/CBC modes */ 9 symmetric_CBC cbc; local 40 /* test CBC mode */ 42 DO(cbc_start(cipher_idx, iv, key, 16, 0, &cbc)); 44 DO(cbc_getiv(iv2, &l, &cbc)); 49 DO(cbc_encrypt(pt, ct, 64, &cbc)); 52 DO(cbc_setiv(iv2, l, &cbc)); 54 DO(cbc_decrypt(ct, tmp, 64, &cbc)); 56 fprintf(stderr, "CBC failed");
|
x86_prof.c | 367 symmetric_CBC cbc; local 374 cbc_start(x, pt, key, cipher_descriptor[x].min_key_length, 0, &cbc); 382 #define DO1 cbc_encrypt(pt, pt, sizeof(pt), &cbc); 401 #define DO1 cbc_decrypt(pt, pt, sizeof(pt), &cbc); 417 cbc_done(&cbc); 434 int time_cipher2(void) { fprintf(stderr, "NO CBC\n"); return 0; } [all...] |
/external/wpa_supplicant/ |
aes_wrap.c | 5 * - One-Key CBC MAC (OMAC1) hash with AES-128 8 * - AES-128 CBC 172 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 184 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; local 191 os_memset(cbc, 0, BLOCK_SIZE); 204 cbc[i] ^= *pos++; 212 aes_encrypt(ctx, cbc, cbc); 222 cbc[i] ^= *pos++; 229 cbc[left] ^= 0x80 460 u8 cbc[BLOCK_SIZE]; local 493 u8 cbc[BLOCK_SIZE], tmp[BLOCK_SIZE]; local [all...] |
crypto_internal.c | 239 u8 cbc[32]; member in struct:crypto_cipher::__anon8233::__anon8235 246 u8 cbc[8]; member in struct:crypto_cipher::__anon8233::__anon8236 274 if (key_len > sizeof(ctx->u.aes.cbc)) { 290 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size); 298 os_memcpy(ctx->u.des3.cbc, iv, 8); 328 ctx->u.aes.cbc[j] ^= plain[j]; 329 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc, 330 ctx->u.aes.cbc); 331 os_memcpy(crypt, ctx->u.aes.cbc, 343 ctx->u.des3.cbc[j] ^= plain[j] [all...] |
crypto_libtomcrypt.c | 294 symmetric_CBC cbc; member in union:crypto_cipher::__anon8238 345 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc); 371 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); 373 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption " 395 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc); 397 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption " 409 cbc_done(&ctx->u.cbc);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
aes_wrap.c | 5 * - One-Key CBC MAC (OMAC1, i.e., CMAC) hash with AES-128 8 * - AES-128 CBC 171 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 187 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; local 194 os_memset(cbc, 0, BLOCK_SIZE); 207 cbc[i] ^= *pos++; 215 aes_encrypt(ctx, cbc, cbc); 225 cbc[i] ^= *pos++; 232 cbc[left] ^= 0x80 478 u8 cbc[BLOCK_SIZE]; local 511 u8 cbc[BLOCK_SIZE], tmp[BLOCK_SIZE]; local [all...] |
crypto_internal.c | 240 u8 cbc[32]; member in struct:crypto_cipher::__anon8399::__anon8401 247 u8 cbc[8]; member in struct:crypto_cipher::__anon8399::__anon8402 275 if (key_len > sizeof(ctx->u.aes.cbc)) { 291 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size); 299 os_memcpy(ctx->u.des3.cbc, iv, 8); 329 ctx->u.aes.cbc[j] ^= plain[j]; 330 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc, 331 ctx->u.aes.cbc); 332 os_memcpy(crypt, ctx->u.aes.cbc, 344 ctx->u.des3.cbc[j] ^= plain[j] [all...] |
crypto_libtomcrypt.c | 294 symmetric_CBC cbc; member in union:crypto_cipher::__anon8404 345 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc); 371 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); 373 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption " 395 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc); 397 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption " 409 cbc_done(&ctx->u.cbc);
|
/external/openssl/include/openssl/ |
modes.h | 53 unsigned char ivec[16], cbc128_f cbc); 59 unsigned char ivec[16], cbc128_f cbc);
|
/external/dropbear/libtomcrypt/ |
Android.mk | 56 src/modes/cbc/cbc_decrypt.c src/modes/cbc/cbc_done.c src/modes/cbc/cbc_encrypt.c \ 57 src/modes/cbc/cbc_getiv.c src/modes/cbc/cbc_setiv.c src/modes/cbc/cbc_start.c \
|
crypt.tex | 179 unlike libraries like OpenSSL is not tied to direct routines. For instance, in OpenSSL there are CBC block [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 237 /** A block cipher CBC structure */ 388 /** Accelerated CBC encryption 398 /** Accelerated CBC decryption 765 int keylen, int num_rounds, symmetric_CBC *cbc); 766 int cbc_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CBC *cbc); 767 int cbc_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CBC *cbc); 768 int cbc_getiv(unsigned char *IV, unsigned long *len, symmetric_CBC *cbc); 769 int cbc_setiv(const unsigned char *IV, unsigned long len, symmetric_CBC *cbc); 770 int cbc_done(symmetric_CBC *cbc);
|
/external/openssl/crypto/des/ |
FILES0 | 36 ede_enc.c - des_ede3_cbc_encrypt() cbc mode des using triple DES.
|
/external/openssl/crypto/bf/asm/ |
bf-586.pl | 6 require "cbc.pl"; 22 &cbc("BF_cbc_encrypt","BF_encrypt","BF_decrypt",1,4,5,3,-1,-1);
|
bf-686.pl | 5 require "cbc.pl"; 21 &cbc("BF_cbc_encrypt","BF_encrypt","BF_decrypt",1,4,5,3,-1,-1);
|
/external/openssl/crypto/evp/ |
evp_locl.h | 152 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \
|
/external/openssl/crypto/perlasm/ |
cbc.pl | 15 #&cbc("des_ncbc_encrypt","des_encrypt",0); 16 #&cbc("BF_cbc_encrypt","BF_encrypt","BF_encrypt", 18 #&cbc("des_ncbc_encrypt","des_encrypt","des_encrypt", 20 #&cbc("des_ede3_cbc_encrypt","des_encrypt3","des_decrypt3", 26 sub cbc subroutine
|
/external/openssl/crypto/des/asm/ |
des-586.pl | 10 require "cbc.pl"; 35 &cbc("DES_ncbc_encrypt","DES_encrypt1","DES_encrypt1",0,4,5,3,5,-1); 36 &cbc("DES_ede3_cbc_encrypt","DES_encrypt3","DES_decrypt3",0,6,7,3,4,5);
|
/external/dropbear/ |
configure | [all...] |