HomeSort by relevance Sort by last modified time
    Searched refs:tweak (Results 1 - 17 of 17) sorted by null

  /external/openssl/crypto/modes/
xts128.c 66 union { u64 u[2]; u32 d[4]; u8 c[16]; } tweak, scratch; local
71 memcpy(tweak.c, iv, 16);
73 (*ctx->block2)(tweak.c,tweak.c,ctx->key2);
80 scratch.u[0] ^= tweak.u[0];
81 scratch.u[1] ^= tweak.u[1];
83 scratch.u[0] = ((u64*)inp)[0]^tweak.u[0];
84 scratch.u[1] = ((u64*)inp)[1]^tweak.u[1];
88 scratch.u[0] ^= tweak.u[0];
89 scratch.u[1] ^= tweak.u[1]
    [all...]
  /external/dropbear/libtomcrypt/src/modes/lrw/
lrw_start.c 26 @param tweak The tweak value (second key), must be 128-bits
34 const unsigned char *tweak,
46 LTC_ARGCHK(tweak != NULL);
69 /* copy the IV and tweak */
70 XMEMCPY(lrw->tweak, tweak, 16);
78 gcm_gf_mult(tweak, B, &lrw->PC[0][y][0]);
lrw_decrypt.c 40 return cipher_descriptor[lrw->cipher].accel_lrw_decrypt(ct, pt, len, lrw->IV, lrw->tweak, &lrw->key);
lrw_encrypt.c 40 return cipher_descriptor[lrw->cipher].accel_lrw_encrypt(pt, ct, len, lrw->IV, lrw->tweak, &lrw->key);
lrw_setiv.c 69 gcm_gf_mult(lrw->tweak, IV, lrw->pad);
lrw_process.c 72 gcm_gf_mult(lrw->tweak, lrw->IV, lrw->pad);
lrw_test.c 30 unsigned char key[16], tweak[16], IV[16], P[16], expected_tweak[16], C[16];
86 if ((err = lrw_start(idx, tests[x].IV, tests[x].key, 16, tests[x].tweak, 0, &lrw)) != CRYPT_OK) {
90 /* check pad against expected tweak */
  /external/openssl/crypto/aes/asm/
aesni-x86_64.pl     [all...]
aesni-x86.pl 1025 { my ($tweak,$twtmp,$twres,$twmask)=($rndkey1,$rndkey0,$inout0,$inout1);
1029 &mov ($inp,&wparam(5)); # clear-text tweak
1055 &movdqa ($tweak,$inout0);
1058 &pcmpgtd($twtmp,$tweak); # broadcast upper bits
1074 &movdqa (&QWP(16*$i,"esp"),$tweak);
1075 &paddq ($tweak,$tweak); # &psllq($tweak,1);
1077 &pcmpgtd ($twtmp,$tweak); # broadcast upper bits
1078 &pxor ($tweak,$twres)
    [all...]
aes-s390x.pl     [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_cipher.h 281 /** the tweak key */
282 tweak[16], member in struct:__anon7169
284 /** The current pad, it's the product of the first 15 bytes against the tweak key */
424 @param tweak The LRW tweak
428 int (*accel_lrw_encrypt)(const unsigned char *pt, unsigned char *ct, unsigned long blocks, unsigned char *IV, const unsigned char *tweak, symmetric_key *skey);
435 @param tweak The LRW tweak
439 int (*accel_lrw_decrypt)(const unsigned char *ct, unsigned char *pt, unsigned long blocks, unsigned char *IV, const unsigned char *tweak, symmetric_key *skey);
800 const unsigned char *tweak,
    [all...]
  /external/dropbear/libtomcrypt/demos/
tv_gen.c 703 unsigned char tweak[16], key[16], iv[16], buf[1024]; local
707 /* initialize default key and tweak */
709 tweak[x] = key[x] = iv[x] = x;
714 if ((err = lrw_start(find_cipher("aes"), iv, key, 16, tweak, 0, &lrw)) != CRYPT_OK) {
742 /* copy new tweak, iv and key */
746 tweak[y] = buf[(y+32)%x];
  /external/ceres-solver/docs/
build.tex 224 \item You may have to tweak some more settings to generate a MSVC project.
  /external/elfutils/
elfutils.spec 369 - elfcmp: little usability tweak, name and index of differing section is
  /external/dropbear/libtomcrypt/
crypt.tex     [all...]
  /external/dropbear/libtommath/
bn.tex 158 To make the system more powerful you can tweak the build process. Classes are defined in the file
180 A tweak is an algorithm ``alternative''. For example, to provide tradeoffs (usually between size and space).
    [all...]
  /external/iproute2/doc/
ip-cref.tex 758 There is a tweak in \verb|/proc/sys/net/ipv4/conf/<dev>/promote_secondaries|
762 This tweak is available in linux 2.6.15 and later.
    [all...]

Completed in 222 milliseconds