HomeSort by relevance Sort by last modified time
    Searched refs:ctr (Results 1 - 25 of 84) sorted by null

1 2 3 4

  /external/dropbear/libtomcrypt/src/modes/ctr/
ctr_getiv.c 15 CTR implementation, get IV, Tom St Denis
24 @param ctr The CTR state
27 int ctr_getiv(unsigned char *IV, unsigned long *len, symmetric_CTR *ctr)
31 LTC_ARGCHK(ctr != NULL);
32 if ((unsigned long)ctr->blocklen > *len) {
33 *len = ctr->blocklen;
36 XMEMCPY(IV, ctr->ctr, ctr->blocklen)
    [all...]
ctr_encrypt.c 15 CTR implementation, encrypt data, Tom St Denis
22 CTR encrypt
26 @param ctr CTR state
29 int ctr_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CTR *ctr)
35 LTC_ARGCHK(ctr != NULL);
37 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) {
42 if (ctr->blocklen < 1 || ctr->blocklen > (int)sizeof(ctr->ctr) |
    [all...]
ctr_setiv.c 15 CTR implementation, set IV, Tom St Denis
24 @param ctr The CTR state
27 int ctr_setiv(const unsigned char *IV, unsigned long len, symmetric_CTR *ctr)
32 LTC_ARGCHK(ctr != NULL);
35 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) {
39 if (len != (unsigned long)ctr->blocklen) {
44 XMEMCPY(ctr->ctr, IV, len);
47 ctr->padlen = 0
    [all...]
ctr_start.c 15 CTR implementation, start chain, Tom St Denis
22 Initialize a CTR context
29 @param ctr The CTR state to initialize
36 symmetric_CTR *ctr)
42 LTC_ARGCHK(ctr != NULL);
50 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ctr->key)) != CRYPT_OK) {
54 /* copy ctr */
55 ctr->blocklen = cipher_descriptor[cipher].block_length;
56 ctr->cipher = cipher
    [all...]
ctr_done.c 15 CTR implementation, finish chain, Tom St Denis
21 @param ctr The CTR chain to terminate
24 int ctr_done(symmetric_CTR *ctr)
27 LTC_ARGCHK(ctr != NULL);
29 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) {
32 cipher_descriptor[ctr->cipher].done(&ctr->key);
40 /* $Source: /cvs/libtom/libtomcrypt/src/modes/ctr/ctr_done.c,v $ */
ctr_decrypt.c 15 CTR implementation, decrypt data, Tom St Denis
21 CTR decrypt
25 @param ctr CTR state
28 int ctr_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CTR *ctr)
32 LTC_ARGCHK(ctr != NULL);
34 return ctr_encrypt(ct, pt, len, ctr);
40 /* $Source: /cvs/libtom/libtomcrypt/src/modes/ctr/ctr_decrypt.c,v $ */
  /external/openssl/crypto/
mem_clr.c 67 size_t loop = len, ctr = cleanse_ctr; local
70 *(p++) = (unsigned char)ctr;
71 ctr += (17 + ((size_t)p & 0xF));
73 p=memchr(ptr, (unsigned char)ctr, len);
75 ctr += (63 + (size_t)p);
76 cleanse_ctr = (unsigned char)ctr;
  /external/valgrind/main/none/tests/
threaded-fork.c 17 int ctr; local
40 ctr = 0;
43 ctr++;
44 if (ctr >= 10) {
  /external/dropbear/libtomcrypt/src/encauth/ccm/
ccm_memory.c 48 unsigned char PAD[16], ctr[16], CTRPAD[16], b; local
211 /* setup the ctr counter */
215 ctr[x++] = (unsigned char)L-1;
219 ctr[x++] = nonce[y];
223 ctr[x++] = 0;
236 /* increment the ctr? */
238 ctr[z] = (ctr[z] + 1) & 255;
239 if (ctr[z]) break;
241 if ((err = cipher_descriptor[cipher].ecb_encrypt(ctr, CTRPAD, skey)) != CRYPT_OK)
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/eax/
eax_decrypt.c 43 return ctr_decrypt(ct, pt, length, &eax->ctr);
eax_encrypt.c 38 if ((err = ctr_encrypt(pt, ct, length, &eax->ctr)) != CRYPT_OK) {
  /external/valgrind/main/memcheck/tests/
wrap5.c 18 static int ctr = 0; variable
23 ctr++;
24 if ((ctr % 3) == 1) {
88 printf("allocated %d Lards\n", ctr);
wrap8.c 25 static int ctr = 0; variable
30 ctr++;
31 if ((ctr % 3) == 1) {
95 printf("allocated %d Lards\n", ctr); fflush(stdout);
  /external/oprofile/module/x86/
op_rtc.c 37 if ((sysctl.ctr[0].kernel && usermode)
38 || (sysctl.ctr[0].user && !usermode))
75 target = sysctl.ctr[0].count;
87 sysctl_parms.ctr[0].count = sysctl.ctr[0].count = 1 << exp;
139 int target = sysctl.ctr[0].count;
174 *next = ((ctl_table) { 1, "rtc_value", &sysctl_parms.ctr[0].count, sizeof(int), 0600, NULL, lproc_dointvec, NULL, });
op_model_athlon.c 62 /* avoid a false detection of ctr overflows in NMI handler */
68 if (sysctl.ctr[i].enabled) {
70 CTR_WRITE(sysctl.ctr[i].count, msrs, i);
75 CTRL_SET_USR(low, sysctl.ctr[i].user);
76 CTRL_SET_KERN(low, sysctl.ctr[i].kernel);
77 CTRL_SET_UM(low, sysctl.ctr[i].unit_mask);
78 CTRL_SET_EVENT(low, sysctl.ctr[i].event);
92 if (sysctl.ctr[i].enabled) {
108 if (sysctl.ctr[i].enabled) {
122 if (sysctl.ctr[i].enabled)
    [all...]
op_model_p4.c 379 #define CTR_OVERFLOW_P(ctr) (!((ctr) & 0x80000000))
482 static void pmc_setup_one_p4_counter(unsigned int ctr)
496 counter_bit = 1 << VIRT_CTR(stag, ctr);
499 if (sysctl.ctr[ctr].event <= 0 || sysctl.ctr[ctr].event > NUM_EVENTS) {
502 sysctl.ctr[ctr].event)
627 unsigned long ctr, low, high, stag, real; local
    [all...]
op_model_ppro.c 58 /* avoid a false detection of ctr overflows in NMI handler */
64 if (sysctl.ctr[i].enabled) {
66 CTR_WRITE(sysctl.ctr[i].count, msrs, i);
71 CTRL_SET_USR(low, sysctl.ctr[i].user);
72 CTRL_SET_KERN(low, sysctl.ctr[i].kernel);
73 CTRL_SET_UM(low, sysctl.ctr[i].unit_mask);
74 CTRL_SET_EVENT(low, sysctl.ctr[i].event);
op_nmi.c 123 if (sysctl.ctr[i].enabled)
124 data->ctr_count[i] = sysctl.ctr[i].count;
150 if (!sysctl.ctr[i].enabled)
155 if (!sysctl.ctr[i].user && !sysctl.ctr[i].kernel) {
161 if (check_range(sysctl.ctr[i].count, 1, OP_MAX_PERF_COUNT,
162 "ctr count value %d not in range (%d %ld)\n"))
328 tab[0] = ((ctl_table) { 1, "enabled", &sysctl_parms.ctr[i].enabled, sizeof(int), 0644, NULL, lproc_dointvec, NULL, });
329 tab[1] = ((ctl_table) { 1, "event", &sysctl_parms.ctr[i].event, sizeof(int), 0644, NULL, lproc_dointvec, NULL, });
330 tab[2] = ((ctl_table) { 1, "count", &sysctl_parms.ctr[i].count, sizeof(int), 0644, NULL, lproc_dointvec, NULL, })
    [all...]
  /external/jpeg/
jidctred.c 129 int ctr; local
138 for (ctr = DCTSIZE; ctr > 0; inptr++, quantptr++, wsptr++, ctr--) {
140 if (ctr == DCTSIZE-4)
197 for (ctr = 0; ctr < 4; ctr++) {
198 outptr = output_buf[ctr] + output_col;
281 int ctr; local
    [all...]
jfdctflt.c 65 int ctr; local
70 for (ctr = DCTSIZE-1; ctr >= 0; ctr--) {
120 for (ctr = DCTSIZE-1; ctr >= 0; ctr--) {
jfdctfst.c 120 int ctr; local
126 for (ctr = DCTSIZE-1; ctr >= 0; ctr--) {
176 for (ctr = DCTSIZE-1; ctr >= 0; ctr--) {
jidctflt.c 80 int ctr; local
89 for (ctr = DCTSIZE; ctr > 0; ctr--) {
180 for (ctr = 0; ctr < DCTSIZE; ctr++) {
181 outptr = output_buf[ctr] + output_col;
  /external/oprofile/module/ia64/
op_pmu.c 57 int ctr; local
59 for (ctr = 0 ; ctr < op_nr_counters ; ++ctr) {
60 if (pmd_overflowed(pmc0, ctr)) {
61 op_do_profile(cpu, regs->cr_iip, 1, ctr);
62 set_pmd_neg(oprof_data[cpu].ctr_count[ctr], ctr);
191 if (sysctl.ctr[ii].enabled) {
194 set_pmd_neg(sysctl.ctr[ii].count, ii)
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_pwd_common.c 51 u16 i, ctr, L; local
57 ctr = 0;
60 ctr++; i = htons(ctr);
62 if (ctr > 1)
95 unsigned char pwe_digest[SHA256_DIGEST_LENGTH], *prfbuf = NULL, ctr; local
161 ctr = 0;
163 if (ctr > 10) {
169 ctr++;
181 H_Update(&ctx, &ctr, sizeof(ctr))
    [all...]
  /external/valgrind/main/helgrind/tests/
tc08_hbl2.c 99 int ctr = 0; local
110 ctr++;
111 if (ctr == 2000000) sleep(1);

Completed in 590 milliseconds

1 2 3 4