/external/clang/test/SemaCXX/ |
convert-to-bool.cpp | 14 void test_conv_to_bool(ConvToBool ctb, ConvToInt cti, ExplicitConvToBool ecb) { 17 if (ecb) { } 20 for (; ecb; ) { } 23 while (ecb) { } 26 do { } while (ecb); 30 if (!ecb) { } 32 bool b1 = !ecb; 33 if (ctb && ecb) { } 34 bool b2 = ctb && ecb; 35 if (ctb || ecb) { } [all...] |
/external/dropbear/libtomcrypt/src/modes/ecb/ |
ecb_decrypt.c | 15 ECB implementation, decrypt a block, Tom St Denis 21 ECB decrypt 25 @param ecb ECB state 28 int ecb_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_ECB *ecb) 33 LTC_ARGCHK(ecb != NULL); 34 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 37 if (len % cipher_descriptor[ecb->cipher].block_length) { 42 if (cipher_descriptor[ecb->cipher].accel_ecb_decrypt != NULL) { 43 return cipher_descriptor[ecb->cipher].accel_ecb_decrypt(ct, pt, len / cipher_descriptor[ecb->cipher].block_length, &ecb->key) [all...] |
ecb_encrypt.c | 15 ECB implementation, encrypt a block, Tom St Denis 21 ECB encrypt 25 @param ecb ECB state 28 int ecb_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_ECB *ecb) 33 LTC_ARGCHK(ecb != NULL); 34 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 37 if (len % cipher_descriptor[ecb->cipher].block_length) { 42 if (cipher_descriptor[ecb->cipher].accel_ecb_encrypt != NULL) { 43 return cipher_descriptor[ecb->cipher].accel_ecb_encrypt(pt, ct, len / cipher_descriptor[ecb->cipher].block_length, &ecb->key) [all...] |
ecb_done.c | 15 ECB implementation, finish chain, Tom St Denis 21 @param ecb The ECB chain to terminate 24 int ecb_done(symmetric_ECB *ecb) 27 LTC_ARGCHK(ecb != NULL); 29 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 32 cipher_descriptor[ecb->cipher].done(&ecb->key); 40 /* $Source: /cvs/libtom/libtomcrypt/src/modes/ecb/ecb_done.c,v $ */
|
ecb_start.c | 15 ECB implementation, start chain, Tom St Denis 22 Initialize a ECB context 27 @param ecb The ECB state to initialize 30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) 34 LTC_ARGCHK(ecb != NULL); 39 ecb->cipher = cipher; 40 ecb->blocklen = cipher_descriptor[cipher].block_length; 41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key); 46 /* $Source: /cvs/libtom/libtomcrypt/src/modes/ecb/ecb_start.c,v $ * [all...] |
/external/llvm/lib/Support/ |
IntEqClasses.cpp | 35 unsigned ecb = EC[b]; local 39 while (eca != ecb) 40 if (eca < ecb) 41 EC[b] = eca, b = ecb, ecb = EC[b]; 43 EC[a] = ecb, a = eca, eca = EC[a];
|
/external/quake/quake/src/WinQuake/ |
net_ipx.cpp | 95 } ECB;
101 ECB ecb;
member in struct:__anon13333 123 static ECB *readlist[IPXSOCKETS];
171 static void IPX_ListenForPacket(ECB *ecb)
176 regs.x.es = ptr2real(ecb) >> 4;
177 regs.x.si = ptr2real(ecb) & 0xf;
203 ECB *ecb;
local 449 ECB *ecb; local [all...] |
/external/openssl/crypto/des/times/ |
alpha.cc | 4 options des ecb/s
|
hpux.cc | 3 options des ecb/s
|
aix.cc | 12 options des ecb/s
|
usparc.cc | 17 options des ecb/s
|
/external/libnfc-nci/src/nfa/ee/ |
nfa_ee_main.c | 109 nfa_ee_cb.ecb[xx].nfcee_id = NFA_EE_INVALID; 110 nfa_ee_cb.ecb[xx].ee_status = NFC_NFCEE_STATUS_INACTIVE; 113 nfa_ee_cb.ecb[NFA_EE_CB_4_DH].ee_status = NFC_NFCEE_STATUS_ACTIVE; 114 nfa_ee_cb.ecb[NFA_EE_CB_4_DH].nfcee_id = NFC_DH_ID; 217 p_cb = nfa_ee_cb.ecb; 274 p_cb = nfa_ee_cb.ecb; 344 ** Description Given a ecb, return the bit mask to be used in nfa_ee_cb.ee_cfged 346 ** Returns the bitmask for the given ecb. 354 index = (UINT8) (p_cb - nfa_ee_cb.ecb); 364 ** Description Return the ecb associated with the given nfcee_i [all...] |
nfa_ee_act.c | 158 p_ecb = &nfa_ee_cb.ecb[NFA_EE_CB_4_DH]; 186 p_ecb = &nfa_ee_cb.ecb[yy]; 745 p_cb = nfa_ee_cb.ecb; 773 p_cb = nfa_ee_cb.ecb; 788 /* if the removes ECB entried are not at the end, move the entries up */ 789 p_cb_end = &nfa_ee_cb.ecb[nfa_ee_cb.cur_ee - 1]; 790 p_cb = &nfa_ee_cb.ecb[first_removed]; 854 p_cb = &nfa_ee_cb.ecb[nfa_ee_cb.cur_ee]; 926 p_cb = &nfa_ee_cb.ecb[nfa_ee_cb.cur_ee++]; [all...] |
nfa_ee_api.c | 95 tNFA_EE_ECB *p_cb = nfa_ee_cb.ecb; 239 p_cb = nfa_ee_cb.ecb;
|
/external/dropbear/libtomcrypt/ |
Android.mk | 62 src/modes/ecb/ecb_decrypt.c src/modes/ecb/ecb_done.c src/modes/ecb/ecb_encrypt.c \ 63 src/modes/ecb/ecb_start.c src/modes/f8/f8_decrypt.c src/modes/f8/f8_done.c src/modes/f8/f8_encrypt.c \
|
crypt.tex | 183 the key setup, ECB decrypt and encrypt and test vector routines. After that all five chaining mode routines 403 LibTomCrypt provides several block ciphers with an ECB block mode interface. It is important to first note that you 404 should never use the ECB modes directly to encrypt data. Instead you should use the ECB functions to make a chaining mode, 405 or use one of the provided chaining modes. All of the ciphers are written as ECB interfaces since it allows the rest of 431 \subsection{ECB Encryption and Decryption} 432 To encrypt or decrypt a block in ECB mode there are these two functions per cipher: 496 An example snippet that encodes a block with Blowfish in ECB mode. [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 191 /** A block cipher ECB structure */ 370 /** Accelerated ECB encryption 379 /** Accelerated ECB decryption 737 int keylen, int num_rounds, symmetric_ECB *ecb); 738 int ecb_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_ECB *ecb); 739 int ecb_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_ECB *ecb); 740 int ecb_done(symmetric_ECB *ecb);
|
/external/openssl/crypto/evp/ |
evp_locl.h | 172 BLOCK_CIPHER_def1(cname, ecb, ecb, ECB, kstruct, nid, block_size, key_len, \
|
e_aes.c | 489 BLOCK_CIPHER_generic(nid,keylen,16,0,ecb,ecb,ECB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ [all...] |
/external/libnfc-nci/src/nfa/int/ |
nfa_ee_int.h | 376 tNFA_EE_ECB ecb[NFA_EE_NUM_ECBS]; /* control block for DH and NFCEEs */ member in struct:__anon9265
|
/external/dropbear/libtomcrypt/testprof/ |
x86_prof.c | 295 symmetric_ECB ecb; local 302 ecb_start(x, key, cipher_descriptor[x].min_key_length, 0, &ecb); 310 #define DO1 ecb_encrypt(pt, pt, sizeof(pt), &ecb); 329 #define DO1 ecb_decrypt(pt, pt, sizeof(pt), &ecb); 345 ecb_done(&ecb); [all...] |
/external/openssl/crypto/aes/asm/ |
bsaes-x86_64.pl | 44 # (*) Comparison is not completely fair, because "this" is ECB, 112 my $ecb=0; # suppress unreferenced ECB subroutines, spare some space... 1097 if ($ecb) { [all...] |
/external/dropbear/ |
configure | [all...] |
/ndk/sources/host-tools/sed-4.2.1/build-aux/ |
texinfo.tex | [all...] |