HomeSort by relevance Sort by last modified time
    Searched defs:cbc (Results 1 - 9 of 9) sorted by null

  /external/openssl/crypto/perlasm/
cbc.pl 15 #&cbc("des_ncbc_encrypt","des_encrypt",0);
16 #&cbc("BF_cbc_encrypt","BF_encrypt","BF_encrypt",
18 #&cbc("des_ncbc_encrypt","des_encrypt","des_encrypt",
20 #&cbc("des_ede3_cbc_encrypt","des_encrypt3","des_decrypt3",
26 sub cbc subroutine
  /external/wpa_supplicant_8/src/crypto/
aes-cbc.c 2 * AES-128 CBC
17 * aes_128_cbc_encrypt - AES-128 CBC encryption
19 * @iv: Encryption IV for CBC mode (16 bytes)
27 u8 cbc[AES_BLOCK_SIZE]; local
34 os_memcpy(cbc, iv, AES_BLOCK_SIZE);
39 cbc[j] ^= pos[j];
40 aes_encrypt(ctx, cbc, cbc);
41 os_memcpy(pos, cbc, AES_BLOCK_SIZE);
50 * aes_128_cbc_decrypt - AES-128 CBC decryptio
60 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; local
    [all...]
aes-omac1.c 2 * One-key CBC MAC (OMAC1) hash with AES-128
30 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128
46 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; local
53 os_memset(cbc, 0, AES_BLOCK_SIZE);
66 cbc[i] ^= *pos++;
74 aes_encrypt(ctx, cbc, cbc);
84 cbc[i] ^= *pos++;
91 cbc[left] ^= 0x80;
96 pad[i] ^= cbc[i]
    [all...]
crypto_internal-cipher.c 26 u8 cbc[32]; member in struct:crypto_cipher::__anon18433::__anon18435
32 u8 cbc[8]; member in struct:crypto_cipher::__anon18433::__anon18436
37 u8 cbc[8]; member in struct:crypto_cipher::__anon18433::__anon18437
76 os_memcpy(ctx->u.aes.cbc, iv, AES_BLOCK_SIZE);
84 os_memcpy(ctx->u.des3.cbc, iv, 8);
92 os_memcpy(ctx->u.des.cbc, iv, 8);
122 ctx->u.aes.cbc[j] ^= plain[j];
123 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc,
124 ctx->u.aes.cbc);
125 os_memcpy(crypt, ctx->u.aes.cbc, AES_BLOCK_SIZE)
    [all...]
crypto_libtomcrypt.c 287 symmetric_CBC cbc; member in union:crypto_cipher::__anon18440
338 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc);
364 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc);
366 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption "
388 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc);
390 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption "
402 cbc_done(&ctx->u.cbc);
  /external/dropbear/libtomcrypt/testprof/
modes_test.c 1 /* test CFB/OFB/CBC modes */
9 symmetric_CBC cbc; local
40 /* test CBC mode */
42 DO(cbc_start(cipher_idx, iv, key, 16, 0, &cbc));
44 DO(cbc_getiv(iv2, &l, &cbc));
49 DO(cbc_encrypt(pt, ct, 64, &cbc));
52 DO(cbc_setiv(iv2, l, &cbc));
54 DO(cbc_decrypt(ct, tmp, 64, &cbc));
56 fprintf(stderr, "CBC failed");
x86_prof.c 367 symmetric_CBC cbc; local
374 cbc_start(x, pt, key, cipher_descriptor[x].min_key_length, 0, &cbc);
382 #define DO1 cbc_encrypt(pt, pt, sizeof(pt), &cbc);
401 #define DO1 cbc_decrypt(pt, pt, sizeof(pt), &cbc);
417 cbc_done(&cbc);
434 int time_cipher2(void) { fprintf(stderr, "NO CBC\n"); return 0; }
    [all...]
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/
KexManager.java 297 BlockCipher cbc; local
302 cbc = BlockCipherFactory.createCipher(kxs.np.enc_algo_client_to_server, true, km.enc_key_client_to_server,
313 tm.changeSendCipher(cbc, mac);
478 BlockCipher cbc; local
483 cbc = BlockCipherFactory.createCipher(kxs.np.enc_algo_server_to_client, false,
494 tm.changeRecvCipher(cbc, mac);
  /external/openssl/crypto/evp/
e_aes.c 68 cbc128_f cbc; member in union:__anon12602::__anon12603
241 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ?
249 dat->stream.cbc = (cbc128_f)aesni_cbc_encrypt;
253 dat->stream.cbc = NULL;
488 BLOCK_CIPHER_generic(nid,keylen,16,16,cbc,cbc,CBC,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \
510 dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt;
519 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ?
528 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE
    [all...]

Completed in 186 milliseconds