HomeSort by relevance Sort by last modified time
    Searched defs:cbc (Results 1 - 13 of 13) sorted by null

  /external/openssl/crypto/perlasm/
cbc.pl 15 #&cbc("des_ncbc_encrypt","des_encrypt",0);
16 #&cbc("BF_cbc_encrypt","BF_encrypt","BF_encrypt",
18 #&cbc("des_ncbc_encrypt","des_encrypt","des_encrypt",
20 #&cbc("des_ede3_cbc_encrypt","des_encrypt3","des_decrypt3",
26 sub cbc subroutine
  /external/wpa_supplicant_8/src/crypto/
aes-cbc.c 2 * AES-128 CBC
23 * aes_128_cbc_encrypt - AES-128 CBC encryption
25 * @iv: Encryption IV for CBC mode (16 bytes)
33 u8 cbc[AES_BLOCK_SIZE]; local
40 os_memcpy(cbc, iv, AES_BLOCK_SIZE);
45 cbc[j] ^= pos[j];
46 aes_encrypt(ctx, cbc, cbc);
47 os_memcpy(pos, cbc, AES_BLOCK_SIZE);
56 * aes_128_cbc_decrypt - AES-128 CBC decryptio
66 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; local
    [all...]
aes-omac1.c 2 * One-key CBC MAC (OMAC1) hash with AES-128
36 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128
52 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; local
59 os_memset(cbc, 0, AES_BLOCK_SIZE);
72 cbc[i] ^= *pos++;
80 aes_encrypt(ctx, cbc, cbc);
90 cbc[i] ^= *pos++;
97 cbc[left] ^= 0x80;
102 pad[i] ^= cbc[i]
    [all...]
crypto_internal-cipher.c 32 u8 cbc[32]; member in struct:crypto_cipher::__anon14033::__anon14035
39 u8 cbc[8]; member in struct:crypto_cipher::__anon14033::__anon14036
44 u8 cbc[8]; member in struct:crypto_cipher::__anon14033::__anon14037
72 if (key_len > sizeof(ctx->u.aes.cbc)) {
88 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size);
96 os_memcpy(ctx->u.des3.cbc, iv, 8);
104 os_memcpy(ctx->u.des.cbc, iv, 8);
134 ctx->u.aes.cbc[j] ^= plain[j];
135 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc,
136 ctx->u.aes.cbc);
    [all...]
crypto_libtomcrypt.c 293 symmetric_CBC cbc; member in union:crypto_cipher::__anon14040
344 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc);
370 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc);
372 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption "
394 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc);
396 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption "
408 cbc_done(&ctx->u.cbc);
  /external/dropbear/libtomcrypt/testprof/
modes_test.c 1 /* test CFB/OFB/CBC modes */
9 symmetric_CBC cbc; local
40 /* test CBC mode */
42 DO(cbc_start(cipher_idx, iv, key, 16, 0, &cbc));
44 DO(cbc_getiv(iv2, &l, &cbc));
49 DO(cbc_encrypt(pt, ct, 64, &cbc));
52 DO(cbc_setiv(iv2, l, &cbc));
54 DO(cbc_decrypt(ct, tmp, 64, &cbc));
56 fprintf(stderr, "CBC failed");
x86_prof.c 367 symmetric_CBC cbc; local
374 cbc_start(x, pt, key, cipher_descriptor[x].min_key_length, 0, &cbc);
382 #define DO1 cbc_encrypt(pt, pt, sizeof(pt), &cbc);
401 #define DO1 cbc_decrypt(pt, pt, sizeof(pt), &cbc);
417 cbc_done(&cbc);
434 int time_cipher2(void) { fprintf(stderr, "NO CBC\n"); return 0; }
    [all...]
  /external/wpa_supplicant/
aes_wrap.c 5 * - One-Key CBC MAC (OMAC1) hash with AES-128
8 * - AES-128 CBC
172 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128
184 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; local
191 os_memset(cbc, 0, BLOCK_SIZE);
204 cbc[i] ^= *pos++;
212 aes_encrypt(ctx, cbc, cbc);
222 cbc[i] ^= *pos++;
229 cbc[left] ^= 0x80
460 u8 cbc[BLOCK_SIZE]; local
493 u8 cbc[BLOCK_SIZE], tmp[BLOCK_SIZE]; local
    [all...]
crypto_internal.c 239 u8 cbc[32]; member in struct:crypto_cipher::__anon13652::__anon13654
246 u8 cbc[8]; member in struct:crypto_cipher::__anon13652::__anon13655
274 if (key_len > sizeof(ctx->u.aes.cbc)) {
290 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size);
298 os_memcpy(ctx->u.des3.cbc, iv, 8);
328 ctx->u.aes.cbc[j] ^= plain[j];
329 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc,
330 ctx->u.aes.cbc);
331 os_memcpy(crypt, ctx->u.aes.cbc,
343 ctx->u.des3.cbc[j] ^= plain[j]
    [all...]
crypto_libtomcrypt.c 294 symmetric_CBC cbc; member in union:crypto_cipher::__anon13657
345 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc);
371 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc);
373 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption "
395 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc);
397 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption "
409 cbc_done(&ctx->u.cbc);
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
aes_wrap.c 5 * - One-Key CBC MAC (OMAC1, i.e., CMAC) hash with AES-128
8 * - AES-128 CBC
171 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128
187 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; local
194 os_memset(cbc, 0, BLOCK_SIZE);
207 cbc[i] ^= *pos++;
215 aes_encrypt(ctx, cbc, cbc);
225 cbc[i] ^= *pos++;
232 cbc[left] ^= 0x80
478 u8 cbc[BLOCK_SIZE]; local
511 u8 cbc[BLOCK_SIZE], tmp[BLOCK_SIZE]; local
    [all...]
crypto_internal.c 240 u8 cbc[32]; member in struct:crypto_cipher::__anon13818::__anon13820
247 u8 cbc[8]; member in struct:crypto_cipher::__anon13818::__anon13821
275 if (key_len > sizeof(ctx->u.aes.cbc)) {
291 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size);
299 os_memcpy(ctx->u.des3.cbc, iv, 8);
329 ctx->u.aes.cbc[j] ^= plain[j];
330 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc,
331 ctx->u.aes.cbc);
332 os_memcpy(crypt, ctx->u.aes.cbc,
344 ctx->u.des3.cbc[j] ^= plain[j]
    [all...]
crypto_libtomcrypt.c 294 symmetric_CBC cbc; member in union:crypto_cipher::__anon13823
345 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc);
371 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc);
373 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption "
395 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc);
397 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption "
409 cbc_done(&ctx->u.cbc);

Completed in 1250 milliseconds