HomeSort by relevance Sort by last modified time
    Searched refs:num_rounds (Results 1 - 25 of 37) sorted by null

1 2

  /external/dropbear/libtomcrypt/src/modes/ecb/
ecb_start.c 26 @param num_rounds Number of rounds in the cipher desired (0 for default)
30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb)
41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
  /external/dropbear/libtomcrypt/src/modes/cbc/
cbc_start.c 26 @param num_rounds Number of rounds in the cipher desired (0 for default)
31 int keylen, int num_rounds, symmetric_CBC *cbc)
45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/modes/ofb/
ofb_start.c 27 @param num_rounds Number of rounds in the cipher desired (0 for default)
32 int keylen, int num_rounds, symmetric_OFB *ofb)
53 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ofb->key);
  /external/dropbear/libtomcrypt/src/modes/cfb/
cfb_start.c 27 @param num_rounds Number of rounds in the cipher desired (0 for default)
32 int keylen, int num_rounds, symmetric_CFB *cfb)
52 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_cipher.h 334 @param num_rounds The requested number of rounds (0==default)
338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
536 int blowfish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
546 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
556 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
566 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
576 int saferp_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
586 int safer_k64_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
587 int safer_sk64_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
588 int safer_k128_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
    [all...]
  /external/dropbear/libtomcrypt/src/modes/f8/
f8_start.c 29 @param num_rounds Number of rounds in the cipher desired (0 for default)
36 int num_rounds, symmetric_F8 *f8)
75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) {
91 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &f8->key);
  /external/dropbear/libtomcrypt/src/modes/ctr/
ctr_start.c 27 @param num_rounds Number of rounds in the cipher desired (0 for default)
35 int num_rounds, int ctr_mode,
50 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ctr->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/modes/lrw/
lrw_start.c 27 @param num_rounds The number of rounds for the cipher (0 == default)
35 int num_rounds,
64 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &lrw->key)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/ciphers/
rc5.c 49 @param num_rounds The number of rounds desired (0 for default)
54 static int _rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
56 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
65 if (num_rounds == 0) {
66 num_rounds = rc5_desc.default_rounds;
69 if (num_rounds < 12 || num_rounds > 24) {
78 skey->rc5.rounds = num_rounds;
96 t = (ulong32)(2 * (num_rounds + 1));
112 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey
    [all...]
rc6.c 46 @param num_rounds The number of rounds desired (0 for default)
51 static int _rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
53 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
62 if (num_rounds != 0 && num_rounds != 20) {
107 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
110 x = _rc6_setup(key, keylen, num_rounds, skey);
xtea.c 34 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
46 if (num_rounds != 0 && num_rounds != 32) {
kasumi.c 195 int kasumi_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
208 if (num_rounds != 0 && num_rounds != 8) {
noekeon.c 71 @param num_rounds The number of rounds desired (0 for default)
75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
86 if (num_rounds != 16 && num_rounds != 0) {
rc2.c 66 @param num_rounds The number of rounds desired (0 for default)
70 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
84 if (num_rounds != 0 && num_rounds != 16) {
skipjack.c 63 @param num_rounds The number of rounds desired (0 for default)
67 int skipjack_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
78 if (num_rounds != 32 && num_rounds != 0) {
cast5.c 404 @param num_rounds The number of rounds desired (0 for default)
409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
421 if (num_rounds != 12 && num_rounds != 16 && num_rounds != 0) {
425 if (num_rounds == 12 && keylen > 10) {
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_i.h 165 int num_rounds; member in struct:eap_sm
eap.c 130 sm->num_rounds = 0;
168 sm->num_rounds = 0;
230 sm->num_rounds++;
592 else if (sm->num_rounds > EAP_MAX_AUTH_ROUNDS) {
593 if (sm->num_rounds == EAP_MAX_AUTH_ROUNDS + 1) {
597 sm->num_rounds++;
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_i.h 165 int num_rounds; member in struct:eap_sm
eap_server.c 131 sm->num_rounds = 0;
169 sm->num_rounds = 0;
237 sm->num_rounds++;
608 else if (sm->num_rounds > EAP_MAX_AUTH_ROUNDS) {
609 if (sm->num_rounds == EAP_MAX_AUTH_ROUNDS + 1) {
613 sm->num_rounds++;
    [all...]
  /external/wpa_supplicant/
eap_i.h 336 int num_rounds; member in struct:eap_sm
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_i.h 332 int num_rounds; member in struct:eap_sm
eap.c 168 sm->num_rounds = 0;
181 sm->num_rounds = 0;
208 sm->num_rounds++;
712 else if (sm->num_rounds > EAP_MAX_AUTH_ROUNDS) {
721 if (sm->num_rounds == EAP_MAX_AUTH_ROUNDS + 1) {
725 sm->num_rounds++;
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_i.h 332 int num_rounds; member in struct:eap_sm
  /external/dropbear/libtomcrypt/src/ciphers/twofish/
twofish.c 341 @param num_rounds The number of rounds desired (0 for default)
346 static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
348 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
362 if (num_rounds != 16 && num_rounds != 0) {
456 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
459 x = _twofish_setup(key, keylen, num_rounds, skey);

Completed in 421 milliseconds

1 2