/external/dropbear/libtomcrypt/src/modes/ecb/ |
ecb_start.c | 26 @param num_rounds Number of rounds in the cipher desired (0 for default) 30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) 41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
|
/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_start.c | 26 @param num_rounds Number of rounds in the cipher desired (0 for default) 31 int keylen, int num_rounds, symmetric_CBC *cbc) 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_start.c | 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 32 int keylen, int num_rounds, symmetric_CFB *cfb) 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_start.c | 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 32 int keylen, int num_rounds, symmetric_OFB *ofb) 53 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ofb->key);
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 334 @param num_rounds The requested number of rounds (0==default) 338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 536 int blowfish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 546 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 556 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 566 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 576 int saferp_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 586 int safer_k64_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 587 int safer_sk64_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 588 int safer_k128_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) [all...] |
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_start.c | 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 35 int num_rounds, int ctr_mode, 50 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ctr->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_start.c | 29 @param num_rounds Number of rounds in the cipher desired (0 for default) 36 int num_rounds, symmetric_F8 *f8) 75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) { 91 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &f8->key);
|
/external/dropbear/libtomcrypt/src/ciphers/ |
rc5.c | 49 @param num_rounds The number of rounds desired (0 for default) 54 static int _rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 56 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 65 if (num_rounds == 0) { 66 num_rounds = rc5_desc.default_rounds; 69 if (num_rounds < 12 || num_rounds > 24) { 78 skey->rc5.rounds = num_rounds; 96 t = (ulong32)(2 * (num_rounds + 1)); 112 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey [all...] |
rc6.c | 46 @param num_rounds The number of rounds desired (0 for default) 51 static int _rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 53 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 62 if (num_rounds != 0 && num_rounds != 20) { 107 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 110 x = _rc6_setup(key, keylen, num_rounds, skey);
|
xtea.c | 34 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 46 if (num_rounds != 0 && num_rounds != 32) {
|
noekeon.c | 71 @param num_rounds The number of rounds desired (0 for default) 75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 86 if (num_rounds != 16 && num_rounds != 0) {
|
rc2.c | 66 @param num_rounds The number of rounds desired (0 for default) 70 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 84 if (num_rounds != 0 && num_rounds != 16) {
|
skipjack.c | 63 @param num_rounds The number of rounds desired (0 for default) 67 int skipjack_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 78 if (num_rounds != 32 && num_rounds != 0) {
|
cast5.c | 404 @param num_rounds The number of rounds desired (0 for default) 409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 421 if (num_rounds != 12 && num_rounds != 16 && num_rounds != 0) { 425 if (num_rounds == 12 && keylen > 10) { [all...] |
kasumi.c | 195 int kasumi_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 208 if (num_rounds != 0 && num_rounds != 8) {
|
blowfish.c | 304 @param num_rounds The number of rounds desired (0 for default) 308 int blowfish_setup(const unsigned char *key, int keylen, int num_rounds, 323 if (num_rounds != 0 && num_rounds != 16) {
|
kseed.c | 198 @param num_rounds The number of rounds desired (0 for default) 202 int kseed_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 211 if (num_rounds != 16 && num_rounds != 0) {
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_start.c | 27 @param num_rounds The number of rounds for the cipher (0 == default) 35 int num_rounds, 64 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &lrw->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/ciphers/twofish/ |
twofish.c | 341 @param num_rounds The number of rounds desired (0 for default) 346 static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 348 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 362 if (num_rounds != 16 && num_rounds != 0) { 456 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 459 x = _twofish_setup(key, keylen, num_rounds, skey);
|
/external/dropbear/libtomcrypt/src/ciphers/aes/ |
aes.c | 119 @param num_rounds The number of rounds desired (0 for default) 123 int SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 137 if (num_rounds != 0 && num_rounds != (10 + ((keylen/8)-2)*2)) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_i.h | 165 int num_rounds; member in struct:eap_sm
|
eap.c | 130 sm->num_rounds = 0; 168 sm->num_rounds = 0; 230 sm->num_rounds++; 592 else if (sm->num_rounds > EAP_MAX_AUTH_ROUNDS) { 593 if (sm->num_rounds == EAP_MAX_AUTH_ROUNDS + 1) { 597 sm->num_rounds++; [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_i.h | 165 int num_rounds; member in struct:eap_sm
|
eap_server.c | 131 sm->num_rounds = 0; 169 sm->num_rounds = 0; 237 sm->num_rounds++; 608 else if (sm->num_rounds > EAP_MAX_AUTH_ROUNDS) { 609 if (sm->num_rounds == EAP_MAX_AUTH_ROUNDS + 1) { 613 sm->num_rounds++; [all...] |
/external/freetype/src/autofit/ |
aflatin.c | 193 FT_Int num_rounds; local 219 num_rounds = 0; 347 rounds[num_rounds++] = best_y; 354 if ( num_flats == 0 && num_rounds == 0 ) 367 af_sort_pos( num_rounds, rounds ); 379 *blue_shoot = rounds[num_rounds / 2]; 381 else if ( num_rounds == 0 ) 389 *blue_shoot = rounds[num_rounds / 2]; [all...] |