/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_getiv.c | 15 CBC implementation, get IV, Tom St Denis 24 @param cbc The CBC state 27 int cbc_getiv(unsigned char *IV, unsigned long *len, symmetric_CBC *cbc) 31 LTC_ARGCHK(cbc != NULL); 32 if ((unsigned long)cbc->blocklen > *len) { 33 *len = cbc->blocklen; 36 XMEMCPY(IV, cbc->IV, cbc->blocklen); 37 *len = cbc->blocklen [all...] |
cbc_encrypt.c | 15 CBC implementation, encrypt block, Tom St Denis 22 CBC encrypt 26 @param cbc CBC state 29 int cbc_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CBC *cbc) 35 LTC_ARGCHK(cbc != NULL); 37 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 42 if (cbc->blocklen < 1 || cbc->blocklen > (int)sizeof(cbc->IV)) [all...] |
cbc_done.c | 15 CBC implementation, finish chain, Tom St Denis 21 @param cbc The CBC chain to terminate 24 int cbc_done(symmetric_CBC *cbc) 27 LTC_ARGCHK(cbc != NULL); 29 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 32 cipher_descriptor[cbc->cipher].done(&cbc->key); 40 /* $Source: /cvs/libtom/libtomcrypt/src/modes/cbc/cbc_done.c,v $ */
|
cbc_decrypt.c | 15 CBC implementation, encrypt block, Tom St Denis 22 CBC decrypt 26 @param cbc CBC state 29 int cbc_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CBC *cbc) 41 LTC_ARGCHK(cbc != NULL); 43 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 48 if (cbc->blocklen < 1 || cbc->blocklen > (int)sizeof(cbc->IV)) [all...] |
cbc_setiv.c | 15 CBC implementation, set IV, Tom St Denis 25 @param cbc The CBC state 28 int cbc_setiv(const unsigned char *IV, unsigned long len, symmetric_CBC *cbc) 31 LTC_ARGCHK(cbc != NULL); 32 if (len != (unsigned long)cbc->blocklen) { 35 XMEMCPY(cbc->IV, IV, len); 42 /* $Source: /cvs/libtom/libtomcrypt/src/modes/cbc/cbc_setiv.c,v $ */
|
cbc_start.c | 15 CBC implementation, start chain, Tom St Denis 21 Initialize a CBC context 27 @param cbc The CBC state to initialize 31 int keylen, int num_rounds, symmetric_CBC *cbc) 37 LTC_ARGCHK(cbc != NULL); 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) { 50 cbc->blocklen = cipher_descriptor[cipher].block_length; 51 cbc->cipher = cipher; 52 for (x = 0; x < cbc->blocklen; x++) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
aes-cbc.c | 2 * AES-128 CBC 23 * aes_128_cbc_encrypt - AES-128 CBC encryption 25 * @iv: Encryption IV for CBC mode (16 bytes) 33 u8 cbc[AES_BLOCK_SIZE]; local 40 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 45 cbc[j] ^= pos[j]; 46 aes_encrypt(ctx, cbc, cbc); 47 os_memcpy(pos, cbc, AES_BLOCK_SIZE); 56 * aes_128_cbc_decrypt - AES-128 CBC decryptio 66 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; local [all...] |
aes-omac1.c | 2 * One-key CBC MAC (OMAC1) hash with AES-128 36 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 52 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; local 59 os_memset(cbc, 0, AES_BLOCK_SIZE); 72 cbc[i] ^= *pos++; 80 aes_encrypt(ctx, cbc, cbc); 90 cbc[i] ^= *pos++; 97 cbc[left] ^= 0x80; 102 pad[i] ^= cbc[i] [all...] |
crypto_internal-cipher.c | 32 u8 cbc[32]; member in struct:crypto_cipher::__anon14228::__anon14230 39 u8 cbc[8]; member in struct:crypto_cipher::__anon14228::__anon14231 44 u8 cbc[8]; member in struct:crypto_cipher::__anon14228::__anon14232 72 if (key_len > sizeof(ctx->u.aes.cbc)) { 88 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size); 96 os_memcpy(ctx->u.des3.cbc, iv, 8); 104 os_memcpy(ctx->u.des.cbc, iv, 8); 134 ctx->u.aes.cbc[j] ^= plain[j]; 135 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc, 136 ctx->u.aes.cbc); [all...] |
Makefile | 17 aes-cbc.o \
|
crypto_libtomcrypt.c | 293 symmetric_CBC cbc; member in union:crypto_cipher::__anon14235 344 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc); 370 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); 372 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption " 394 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc); 396 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption " 408 cbc_done(&ctx->u.cbc);
|
/external/dropbear/libtomcrypt/testprof/ |
modes_test.c | 1 /* test CFB/OFB/CBC modes */ 9 symmetric_CBC cbc; local 40 /* test CBC mode */ 42 DO(cbc_start(cipher_idx, iv, key, 16, 0, &cbc)); 44 DO(cbc_getiv(iv2, &l, &cbc)); 49 DO(cbc_encrypt(pt, ct, 64, &cbc)); 52 DO(cbc_setiv(iv2, l, &cbc)); 54 DO(cbc_decrypt(ct, tmp, 64, &cbc)); 56 fprintf(stderr, "CBC failed");
|
/external/wpa_supplicant/ |
aes_wrap.c | 5 * - One-Key CBC MAC (OMAC1) hash with AES-128 8 * - AES-128 CBC 172 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 184 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; local 191 os_memset(cbc, 0, BLOCK_SIZE); 204 cbc[i] ^= *pos++; 212 aes_encrypt(ctx, cbc, cbc); 222 cbc[i] ^= *pos++; 229 cbc[left] ^= 0x80 460 u8 cbc[BLOCK_SIZE]; local 493 u8 cbc[BLOCK_SIZE], tmp[BLOCK_SIZE]; local [all...] |
crypto_internal.c | 239 u8 cbc[32]; member in struct:crypto_cipher::__anon13847::__anon13849 246 u8 cbc[8]; member in struct:crypto_cipher::__anon13847::__anon13850 274 if (key_len > sizeof(ctx->u.aes.cbc)) { 290 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size); 298 os_memcpy(ctx->u.des3.cbc, iv, 8); 328 ctx->u.aes.cbc[j] ^= plain[j]; 329 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc, 330 ctx->u.aes.cbc); 331 os_memcpy(crypt, ctx->u.aes.cbc, 343 ctx->u.des3.cbc[j] ^= plain[j] [all...] |
crypto_libtomcrypt.c | 294 symmetric_CBC cbc; member in union:crypto_cipher::__anon13852 345 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc); 371 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); 373 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption " 395 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc); 397 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption " 409 cbc_done(&ctx->u.cbc);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
aes_wrap.c | 5 * - One-Key CBC MAC (OMAC1, i.e., CMAC) hash with AES-128 8 * - AES-128 CBC 171 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 187 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; local 194 os_memset(cbc, 0, BLOCK_SIZE); 207 cbc[i] ^= *pos++; 215 aes_encrypt(ctx, cbc, cbc); 225 cbc[i] ^= *pos++; 232 cbc[left] ^= 0x80 478 u8 cbc[BLOCK_SIZE]; local 511 u8 cbc[BLOCK_SIZE], tmp[BLOCK_SIZE]; local [all...] |
crypto_internal.c | 240 u8 cbc[32]; member in struct:crypto_cipher::__anon14013::__anon14015 247 u8 cbc[8]; member in struct:crypto_cipher::__anon14013::__anon14016 275 if (key_len > sizeof(ctx->u.aes.cbc)) { 291 os_memcpy(ctx->u.aes.cbc, iv, ctx->u.aes.block_size); 299 os_memcpy(ctx->u.des3.cbc, iv, 8); 329 ctx->u.aes.cbc[j] ^= plain[j]; 330 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc, 331 ctx->u.aes.cbc); 332 os_memcpy(crypt, ctx->u.aes.cbc, 344 ctx->u.des3.cbc[j] ^= plain[j] [all...] |
crypto_libtomcrypt.c | 294 symmetric_CBC cbc; member in union:crypto_cipher::__anon14018 345 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc); 371 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); 373 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption " 395 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc); 397 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption " 409 cbc_done(&ctx->u.cbc);
|
/external/openssl/include/openssl/ |
modes.h | 53 unsigned char ivec[16], cbc128_f cbc); 59 unsigned char ivec[16], cbc128_f cbc);
|
/external/dropbear/libtomcrypt/ |
Android.mk | 56 src/modes/cbc/cbc_decrypt.c src/modes/cbc/cbc_done.c src/modes/cbc/cbc_encrypt.c \ 57 src/modes/cbc/cbc_getiv.c src/modes/cbc/cbc_setiv.c src/modes/cbc/cbc_start.c \
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 237 /** A block cipher CBC structure */ 388 /** Accelerated CBC encryption 398 /** Accelerated CBC decryption 765 int keylen, int num_rounds, symmetric_CBC *cbc); 766 int cbc_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CBC *cbc); 767 int cbc_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CBC *cbc); 768 int cbc_getiv(unsigned char *IV, unsigned long *len, symmetric_CBC *cbc); 769 int cbc_setiv(const unsigned char *IV, unsigned long len, symmetric_CBC *cbc); 770 int cbc_done(symmetric_CBC *cbc);
|
/external/openssl/crypto/des/ |
FILES0 | 36 ede_enc.c - des_ede3_cbc_encrypt() cbc mode des using triple DES.
|
/external/openssl/crypto/bf/asm/ |
bf-586.pl | 6 require "cbc.pl"; 22 &cbc("BF_cbc_encrypt","BF_encrypt","BF_decrypt",1,4,5,3,-1,-1);
|