/external/wpa_supplicant_8/src/crypto/ |
aes-cbc.c | 27 u8 cbc[AES_BLOCK_SIZE]; 34 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 36 blocks = data_len / AES_BLOCK_SIZE; 38 for (j = 0; j < AES_BLOCK_SIZE; j++) 41 os_memcpy(pos, cbc, AES_BLOCK_SIZE); 42 pos += AES_BLOCK_SIZE; 60 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; 67 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 69 blocks = data_len / AES_BLOCK_SIZE; [all...] |
aes-ctr.c | 31 u8 counter[AES_BLOCK_SIZE], buf[AES_BLOCK_SIZE]; 36 os_memcpy(counter, nonce, AES_BLOCK_SIZE); 41 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; 47 for (i = AES_BLOCK_SIZE - 1; i >= 0; i--) {
|
aes-omac1.c | 21 for (i = 0; i < AES_BLOCK_SIZE - 1; i++) 23 pad[AES_BLOCK_SIZE - 1] <<= 1; 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 46 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; 53 os_memset(cbc, 0, AES_BLOCK_SIZE); 64 while (left >= AES_BLOCK_SIZE) { 65 for (i = 0; i < AES_BLOCK_SIZE; i++) { 73 if (left > AES_BLOCK_SIZE) 75 left -= AES_BLOCK_SIZE; [all...] |
aes-ccm.c | 32 u8 aad_buf[2 * AES_BLOCK_SIZE]; 33 u8 b[AES_BLOCK_SIZE]; 41 WPA_PUT_BE16(&b[AES_BLOCK_SIZE - L], plain_len); 43 wpa_hexdump_key(MSG_EXCESSIVE, "CCM B_0", b, AES_BLOCK_SIZE); 56 if (aad_len > AES_BLOCK_SIZE - 2) { 57 xor_aes_block(&aad_buf[AES_BLOCK_SIZE], x); 59 aes_encrypt(aes, &aad_buf[AES_BLOCK_SIZE], x); 66 size_t last = len % AES_BLOCK_SIZE; 69 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { 72 data += AES_BLOCK_SIZE; [all...] |
aes-eax.c | 34 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 35 data_mac[AES_BLOCK_SIZE]; 69 for (i = 0; i < AES_BLOCK_SIZE; i++) 98 u8 nonce_mac[AES_BLOCK_SIZE], hdr_mac[AES_BLOCK_SIZE], 99 data_mac[AES_BLOCK_SIZE]; 139 for (i = 0; i < AES_BLOCK_SIZE; i++) {
|
aes.h | 12 #define AES_BLOCK_SIZE 16
|
crypto_internal-cipher.c | 76 os_memcpy(ctx->u.aes.cbc, iv, AES_BLOCK_SIZE); 117 if (len % AES_BLOCK_SIZE) 119 blocks = len / AES_BLOCK_SIZE; 121 for (j = 0; j < AES_BLOCK_SIZE; j++) 125 os_memcpy(crypt, ctx->u.aes.cbc, AES_BLOCK_SIZE); 126 plain += AES_BLOCK_SIZE; 127 crypt += AES_BLOCK_SIZE; 181 if (len % AES_BLOCK_SIZE) 183 blocks = len / AES_BLOCK_SIZE; 185 os_memcpy(tmp, crypt, AES_BLOCK_SIZE); [all...] |
aes-gcm.c | 19 val = WPA_GET_BE32(block + AES_BLOCK_SIZE - 4); 21 WPA_PUT_BE32(block + AES_BLOCK_SIZE - 4, val); 146 u8 cb[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; 155 os_memcpy(cb, icb, AES_BLOCK_SIZE); 160 xpos += AES_BLOCK_SIZE; 161 ypos += AES_BLOCK_SIZE; 184 os_memset(H, 0, AES_BLOCK_SIZE); 187 H, AES_BLOCK_SIZE); 199 os_memset(J0 + iv_len, 0, AES_BLOCK_SIZE - iv_len) [all...] |
/external/openssl/crypto/aes/ |
aes_ige.c | 57 #define N_WORDS (AES_BLOCK_SIZE / sizeof(unsigned long)) 73 #define load_block(d, s) memcpy((d).data, (s), AES_BLOCK_SIZE) 74 #define store_block(d, s) memcpy((d), (s).data, AES_BLOCK_SIZE) 88 OPENSSL_assert((length%AES_BLOCK_SIZE) == 0); 90 len = length / AES_BLOCK_SIZE; 98 aes_block_t *iv2p = (aes_block_t *)(ivec + AES_BLOCK_SIZE); 113 in += AES_BLOCK_SIZE; 114 out += AES_BLOCK_SIZE; 116 memcpy(ivec, ivp->data, AES_BLOCK_SIZE); 117 memcpy(ivec + AES_BLOCK_SIZE, iv2p->data, AES_BLOCK_SIZE) [all...] |
aes_ctr.c | 57 unsigned char ivec[AES_BLOCK_SIZE], 58 unsigned char ecount_buf[AES_BLOCK_SIZE],
|
aes.h | 69 #define AES_BLOCK_SIZE 16 122 unsigned char ivec[AES_BLOCK_SIZE], 123 unsigned char ecount_buf[AES_BLOCK_SIZE],
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/common/ |
FwdLockGlue.c | 115 size_t padding = AES_BLOCK_SIZE - (decryptedKeyLength % AES_BLOCK_SIZE); 145 return ((plaintextKeyLength / AES_BLOCK_SIZE) + 2) * AES_BLOCK_SIZE; 155 unsigned char initVector[AES_BLOCK_SIZE]; 156 if (FwdLockGlue_GetRandomNumber(initVector, AES_BLOCK_SIZE)) { 157 size_t padding = AES_BLOCK_SIZE - (plaintextKeyLength % AES_BLOCK_SIZE); 158 size_t dataLength = encryptedKeyLength - AES_BLOCK_SIZE; 161 memcpy((unsigned char *)pEncryptedKey + dataLength, initVector, AES_BLOCK_SIZE); [all...] |
/external/openssh/ |
cipher-ctr.c | 42 u_char aes_counter[AES_BLOCK_SIZE]; 66 u_char buf[AES_BLOCK_SIZE]; 76 ssh_ctr_inc(c->aes_counter, AES_BLOCK_SIZE); 79 n = (n + 1) % AES_BLOCK_SIZE; 98 memcpy(c->aes_counter, iv, AES_BLOCK_SIZE); 135 aes_ctr.block_size = AES_BLOCK_SIZE; 136 aes_ctr.iv_len = AES_BLOCK_SIZE;
|
/external/qemu/ |
aes.h | 5 #define AES_BLOCK_SIZE 16
|
aes.c | [all...] |
/external/openssl/include/openssl/ |
aes.h | 69 #define AES_BLOCK_SIZE 16 122 unsigned char ivec[AES_BLOCK_SIZE], 123 unsigned char ecount_buf[AES_BLOCK_SIZE],
|
/external/openssl/crypto/evp/ |
e_aes_cbc_hmac_sha1.c | 187 if (len%AES_BLOCK_SIZE) return 0; 192 else if (len!=((plen+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE)) 195 iv = AES_BLOCK_SIZE; 252 len -= AES_BLOCK_SIZE; 253 iv = AES_BLOCK_SIZE; 323 len -= AES_BLOCK_SIZE; 330 return (int)(((len+SHA_DIGEST_LENGTH+AES_BLOCK_SIZE)&-AES_BLOCK_SIZE)
|
e_aes.c | 145 const unsigned char ivec[AES_BLOCK_SIZE]); 1127 if (!out || !in || len<AES_BLOCK_SIZE) [all...] |
/external/chromium/crypto/ |
encryptor_nss.cc | 32 if (iv.size() != AES_BLOCK_SIZE) 60 size_t ciphertext_len = plaintext.size() + AES_BLOCK_SIZE;
|
encryptor_openssl.cc | 60 if (iv.size() != AES_BLOCK_SIZE)
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/decoder/ |
FwdLockFile.c | 41 #define KEY_SIZE AES_BLOCK_SIZE 71 unsigned char keyStream[AES_BLOCK_SIZE]; 229 for (; i < AES_BLOCK_SIZE; ++i) { 243 uint64_t blockIndex = pSession->filePos / AES_BLOCK_SIZE; 244 uint64_t blockOffset = pSession->filePos % AES_BLOCK_SIZE; 247 unsigned char counter[AES_BLOCK_SIZE];
|
/external/openssh/openbsd-compat/ |
openssl-compat.h | 56 # define AES_BLOCK_SIZE 16
|
/frameworks/av/drm/libdrmframework/plugins/forward-lock/internal-format/converter/ |
FwdLockConv.c | 46 #define KEY_SIZE AES_BLOCK_SIZE 149 unsigned char counter[AES_BLOCK_SIZE]; 150 unsigned char keyStream[AES_BLOCK_SIZE]; 817 while ((++pSession->counter[i] == 0) && (++i < AES_BLOCK_SIZE)) [all...] |
/system/security/keystore/ |
keystore.cpp | 282 uint8_t vector[AES_BLOCK_SIZE]; 287 uint8_t value[VALUE_SIZE + AES_BLOCK_SIZE]; 350 if (!entropy->generate_random_data(mBlob.vector, AES_BLOCK_SIZE)) { 356 // pad data to the AES_BLOCK_SIZE 357 size_t digestedLength = ((dataLength + AES_BLOCK_SIZE - 1) 358 / AES_BLOCK_SIZE * AES_BLOCK_SIZE); 369 uint8_t vector[AES_BLOCK_SIZE]; 370 memcpy(vector, mBlob.vector, AES_BLOCK_SIZE); 401 // the AES_BLOCK_SIZE [all...] |