/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_done.c | 32 cipher_descriptor[f8->cipher].done(&f8->key);
|
f8_setiv.c | 44 return cipher_descriptor[f8->cipher].ecb_encrypt(IV, f8->IV, &f8->key);
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_done.c | 34 cipher_descriptor[lrw->cipher].done(&lrw->key);
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_done.c | 32 cipher_descriptor[ofb->cipher].done(&ofb->key);
|
ofb_setiv.c | 44 return cipher_descriptor[ofb->cipher].ecb_encrypt(IV, ofb->IV, &ofb->key);
|
/external/dropbear/libtomcrypt/demos/ |
tv_gen.c | 170 for (x = 0; cipher_descriptor[x].name != NULL; x++) { 171 fprintf(out, "Cipher: %s\n", cipher_descriptor[x].name); 177 case 0: kl = cipher_descriptor[x].min_key_length; break; 178 case 1: kl = (cipher_descriptor[x].min_key_length + cipher_descriptor[x].max_key_length)/2; break; 179 case 2: kl = cipher_descriptor[x].max_key_length; break; 181 if ((err = cipher_descriptor[x].keysize(&kl)) != CRYPT_OK) { 198 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) { 203 for (z = 0; (int)z < cipher_descriptor[x].block_length; z++) { 207 cipher_descriptor[x].ecb_encrypt(pt, pt, &skey) [all...] |
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_memory.c | 44 if (cipher_descriptor[cipher].f9_memory != NULL) { 45 return cipher_descriptor[cipher].f9_memory(key, keylen, in, inlen, out, outlen);
|
f9_process.c | 38 if ((f9->blocksize > cipher_descriptor[f9->cipher].block_length) || (f9->blocksize < 0) || 49 cipher_descriptor[f9->cipher].ecb_encrypt(f9->IV, f9->IV, &f9->key); 61 cipher_descriptor[f9->cipher].ecb_encrypt(f9->IV, f9->IV, &f9->key);
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_memory.c | 50 if (cipher_descriptor[cipher].omac_memory != NULL) { 51 return cipher_descriptor[cipher].omac_memory(key, keylen, in, inlen, out, outlen);
|
omac_done.c | 64 if ((err = cipher_descriptor[omac->cipher_idx].ecb_encrypt(omac->block, omac->block, &omac->key)) != CRYPT_OK) { 67 cipher_descriptor[omac->cipher_idx].done(&omac->key);
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_memory.c | 44 if (cipher_descriptor[cipher].xcbc_memory != NULL) { 45 return cipher_descriptor[cipher].xcbc_memory(key, keylen, in, inlen, out, outlen);
|
xcbc_done.c | 37 if ((xcbc->blocksize > cipher_descriptor[xcbc->cipher].block_length) || (xcbc->blocksize < 0) || 57 cipher_descriptor[xcbc->cipher].ecb_encrypt(xcbc->IV, xcbc->IV, &xcbc->key); 58 cipher_descriptor[xcbc->cipher].done(&xcbc->key);
|
xcbc_process.c | 41 if ((xcbc->blocksize > cipher_descriptor[xcbc->cipher].block_length) || (xcbc->blocksize < 0) || 52 cipher_descriptor[xcbc->cipher].ecb_encrypt(xcbc->IV, xcbc->IV, &xcbc->key); 61 cipher_descriptor[xcbc->cipher].ecb_encrypt(xcbc->IV, xcbc->IV, &xcbc->key);
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_setiv.c | 44 return cipher_descriptor[cfb->cipher].ecb_encrypt(IV, cfb->IV, &cfb->key);
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_setiv.c | 48 return cipher_descriptor[ctr->cipher].ecb_encrypt(IV, ctr->pad, &ctr->key);
|
ctr_start.c | 50 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ctr->key)) != CRYPT_OK) { 55 ctr->blocklen = cipher_descriptor[cipher].block_length; 84 return cipher_descriptor[ctr->cipher].ecb_encrypt(ctr->ctr, ctr->pad, &ctr->key);
|
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_decrypt.c | 40 LTC_ARGCHK(cipher_descriptor[ocb->cipher].ecb_decrypt != NULL); 43 if (ocb->block_len != cipher_descriptor[ocb->cipher].block_length) { 54 if ((err = cipher_descriptor[ocb->cipher].ecb_decrypt(tmp, pt, &ocb->key)) != CRYPT_OK) {
|
s_ocb_done.c | 54 if (ocb->block_len != cipher_descriptor[ocb->cipher].block_length || 87 if ((err = cipher_descriptor[ocb->cipher].ecb_encrypt(X, Y, &ocb->key)) != CRYPT_OK) { 118 if ((err = cipher_descriptor[ocb->cipher].ecb_encrypt(ocb->checksum, X, &ocb->key)) != CRYPT_OK) { 121 cipher_descriptor[ocb->cipher].done(&ocb->key);
|
ocb_encrypt.c | 38 if (ocb->block_len != cipher_descriptor[ocb->cipher].block_length) { 54 if ((err = cipher_descriptor[ocb->cipher].ecb_encrypt(tmp, ct, &ocb->key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/hashes/chc/ |
chc.c | 51 kl = cipher_descriptor[cipher].block_length; 59 if ((err = cipher_descriptor[cipher].keysize(&kl)) != CRYPT_OK) { 63 if (kl != cipher_descriptor[cipher].block_length) { 74 hash_descriptor[idx].blocksize = cipher_descriptor[cipher].block_length; 78 cipher_blocksize = cipher_descriptor[cipher].block_length; 100 if (cipher_blocksize != cipher_descriptor[cipher_idx].block_length) { 110 if ((err = cipher_descriptor[cipher_idx].setup(buf, cipher_blocksize, 0, key)) != CRYPT_OK) { 116 cipher_descriptor[cipher_idx].ecb_encrypt(buf, md->chc.state, key); 141 if ((err = cipher_descriptor[cipher_idx].setup(md->chc.state, cipher_blocksize, 0, key)) != CRYPT_OK) { 146 cipher_descriptor[cipher_idx].ecb_encrypt(buf, T[0], key) [all...] |
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_init.c | 50 if (cipher_descriptor[cipher].block_length != 16) { 55 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &gcm->K)) != CRYPT_OK) { 61 if ((err = cipher_descriptor[cipher].ecb_encrypt(B, gcm->H, &gcm->K)) != CRYPT_OK) {
|
gcm_done.c | 65 if ((err = cipher_descriptor[gcm->cipher].ecb_encrypt(gcm->Y_0, gcm->buf, &gcm->K)) != CRYPT_OK) { 73 cipher_descriptor[gcm->cipher].done(&gcm->K);
|
gcm_memory.c | 54 if (cipher_descriptor[cipher].accel_gcm_memory != NULL) { 56 cipher_descriptor[cipher].accel_gcm_memory
|
/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_decrypt.c | 61 if (cipher_descriptor[cbc->cipher].accel_cbc_decrypt != NULL) { 62 return cipher_descriptor[cbc->cipher].accel_cbc_decrypt(ct, pt, len / cbc->blocklen, cbc->IV, &cbc->key); 66 if ((err = cipher_descriptor[cbc->cipher].ecb_decrypt(ct, tmp, &cbc->key)) != CRYPT_OK) {
|
cbc_encrypt.c | 55 if (cipher_descriptor[cbc->cipher].accel_cbc_encrypt != NULL) { 56 return cipher_descriptor[cbc->cipher].accel_cbc_encrypt(pt, ct, len / cbc->blocklen, cbc->IV, &cbc->key); 71 if ((err = cipher_descriptor[cbc->cipher].ecb_encrypt(cbc->IV, ct, &cbc->key)) != CRYPT_OK) {
|