/external/openssl/crypto/perlasm/ |
cbc.pl | 15 #&cbc("des_ncbc_encrypt","des_encrypt",0); 16 #&cbc("BF_cbc_encrypt","BF_encrypt","BF_encrypt", 18 #&cbc("des_ncbc_encrypt","des_encrypt","des_encrypt", 20 #&cbc("des_ede3_cbc_encrypt","des_encrypt3","des_decrypt3", 26 sub cbc subroutine
|
/external/wpa_supplicant_8/src/crypto/ |
aes-cbc.c | 2 * AES-128 CBC 23 * aes_128_cbc_encrypt - AES-128 CBC encryption 25 * @iv: Encryption IV for CBC mode (16 bytes) 33 u8 cbc[AES_BLOCK_SIZE]; local 40 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 45 cbc[j] ^= pos[j]; 46 aes_encrypt(ctx, cbc, cbc); 47 os_memcpy(pos, cbc, AES_BLOCK_SIZE); 56 * aes_128_cbc_decrypt - AES-128 CBC decryptio 66 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; local [all...] |
aes-omac1.c | 2 * One-key CBC MAC (OMAC1) hash with AES-128 36 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 52 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; local 59 os_memset(cbc, 0, AES_BLOCK_SIZE); 72 cbc[i] ^= *pos++; 80 aes_encrypt(ctx, cbc, cbc); 90 cbc[i] ^= *pos++; 97 cbc[left] ^= 0x80; 102 pad[i] ^= cbc[i] [all...] |
crypto_internal-cipher.c | 32 u8 cbc[32]; member in struct:crypto_cipher::__anon14033::__anon14035 39 u8 cbc[8]; member in struct:crypto_cipher::__anon14033::__anon14036 44 u8 cbc[8]; member in struct:crypto_cipher::__anon14033::__anon14037 72 if (key_len > sizeof(ctx->u.aes.cbc)) { 88 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size); 96 os_memcpy(ctx->u.des3.cbc, iv, 8); 104 os_memcpy(ctx->u.des.cbc, iv, 8); 134 ctx->u.aes.cbc[j] ^= plain[j]; 135 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc, 136 ctx->u.aes.cbc); [all...] |
crypto_libtomcrypt.c | 293 symmetric_CBC cbc; member in union:crypto_cipher::__anon14040 344 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc); 370 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); 372 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption " 394 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc); 396 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption " 408 cbc_done(&ctx->u.cbc);
|
/external/dropbear/libtomcrypt/testprof/ |
modes_test.c | 1 /* test CFB/OFB/CBC modes */ 9 symmetric_CBC cbc; local 40 /* test CBC mode */ 42 DO(cbc_start(cipher_idx, iv, key, 16, 0, &cbc)); 44 DO(cbc_getiv(iv2, &l, &cbc)); 49 DO(cbc_encrypt(pt, ct, 64, &cbc)); 52 DO(cbc_setiv(iv2, l, &cbc)); 54 DO(cbc_decrypt(ct, tmp, 64, &cbc)); 56 fprintf(stderr, "CBC failed");
|
x86_prof.c | 367 symmetric_CBC cbc; local 374 cbc_start(x, pt, key, cipher_descriptor[x].min_key_length, 0, &cbc); 382 #define DO1 cbc_encrypt(pt, pt, sizeof(pt), &cbc); 401 #define DO1 cbc_decrypt(pt, pt, sizeof(pt), &cbc); 417 cbc_done(&cbc); 434 int time_cipher2(void) { fprintf(stderr, "NO CBC\n"); return 0; } [all...] |
/external/wpa_supplicant/ |
aes_wrap.c | 5 * - One-Key CBC MAC (OMAC1) hash with AES-128 8 * - AES-128 CBC 172 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 184 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; local 191 os_memset(cbc, 0, BLOCK_SIZE); 204 cbc[i] ^= *pos++; 212 aes_encrypt(ctx, cbc, cbc); 222 cbc[i] ^= *pos++; 229 cbc[left] ^= 0x80 460 u8 cbc[BLOCK_SIZE]; local 493 u8 cbc[BLOCK_SIZE], tmp[BLOCK_SIZE]; local [all...] |
crypto_internal.c | 239 u8 cbc[32]; member in struct:crypto_cipher::__anon13652::__anon13654 246 u8 cbc[8]; member in struct:crypto_cipher::__anon13652::__anon13655 274 if (key_len > sizeof(ctx->u.aes.cbc)) { 290 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size); 298 os_memcpy(ctx->u.des3.cbc, iv, 8); 328 ctx->u.aes.cbc[j] ^= plain[j]; 329 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc, 330 ctx->u.aes.cbc); 331 os_memcpy(crypt, ctx->u.aes.cbc, 343 ctx->u.des3.cbc[j] ^= plain[j] [all...] |
crypto_libtomcrypt.c | 294 symmetric_CBC cbc; member in union:crypto_cipher::__anon13657 345 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc); 371 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); 373 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption " 395 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc); 397 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption " 409 cbc_done(&ctx->u.cbc);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
aes_wrap.c | 5 * - One-Key CBC MAC (OMAC1, i.e., CMAC) hash with AES-128 8 * - AES-128 CBC 171 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 187 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; local 194 os_memset(cbc, 0, BLOCK_SIZE); 207 cbc[i] ^= *pos++; 215 aes_encrypt(ctx, cbc, cbc); 225 cbc[i] ^= *pos++; 232 cbc[left] ^= 0x80 478 u8 cbc[BLOCK_SIZE]; local 511 u8 cbc[BLOCK_SIZE], tmp[BLOCK_SIZE]; local [all...] |
crypto_internal.c | 240 u8 cbc[32]; member in struct:crypto_cipher::__anon13818::__anon13820 247 u8 cbc[8]; member in struct:crypto_cipher::__anon13818::__anon13821 275 if (key_len > sizeof(ctx->u.aes.cbc)) { 291 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size); 299 os_memcpy(ctx->u.des3.cbc, iv, 8); 329 ctx->u.aes.cbc[j] ^= plain[j]; 330 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc, 331 ctx->u.aes.cbc); 332 os_memcpy(crypt, ctx->u.aes.cbc, 344 ctx->u.des3.cbc[j] ^= plain[j] [all...] |
crypto_libtomcrypt.c | 294 symmetric_CBC cbc; member in union:crypto_cipher::__anon13823 345 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc); 371 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); 373 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption " 395 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc); 397 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption " 409 cbc_done(&ctx->u.cbc);
|