/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_getiv.c | 15 CBC implementation, get IV, Tom St Denis 24 @param cbc The CBC state 27 int cbc_getiv(unsigned char *IV, unsigned long *len, symmetric_CBC *cbc) 31 LTC_ARGCHK(cbc != NULL); 32 if ((unsigned long)cbc->blocklen > *len) { 33 *len = cbc->blocklen; 36 XMEMCPY(IV, cbc->IV, cbc->blocklen); 37 *len = cbc->blocklen [all...] |
cbc_encrypt.c | 15 CBC implementation, encrypt block, Tom St Denis 22 CBC encrypt 26 @param cbc CBC state 29 int cbc_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CBC *cbc) 35 LTC_ARGCHK(cbc != NULL); 37 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 42 if (cbc->blocklen < 1 || cbc->blocklen > (int)sizeof(cbc->IV)) [all...] |
cbc_done.c | 15 CBC implementation, finish chain, Tom St Denis 21 @param cbc The CBC chain to terminate 24 int cbc_done(symmetric_CBC *cbc) 27 LTC_ARGCHK(cbc != NULL); 29 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 32 cipher_descriptor[cbc->cipher].done(&cbc->key); 40 /* $Source: /cvs/libtom/libtomcrypt/src/modes/cbc/cbc_done.c,v $ */
|
cbc_decrypt.c | 15 CBC implementation, encrypt block, Tom St Denis 22 CBC decrypt 26 @param cbc CBC state 29 int cbc_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CBC *cbc) 41 LTC_ARGCHK(cbc != NULL); 43 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 48 if (cbc->blocklen < 1 || cbc->blocklen > (int)sizeof(cbc->IV)) [all...] |
cbc_setiv.c | 15 CBC implementation, set IV, Tom St Denis 25 @param cbc The CBC state 28 int cbc_setiv(const unsigned char *IV, unsigned long len, symmetric_CBC *cbc) 31 LTC_ARGCHK(cbc != NULL); 32 if (len != (unsigned long)cbc->blocklen) { 35 XMEMCPY(cbc->IV, IV, len); 42 /* $Source: /cvs/libtom/libtomcrypt/src/modes/cbc/cbc_setiv.c,v $ */
|
cbc_start.c | 15 CBC implementation, start chain, Tom St Denis 21 Initialize a CBC context 27 @param cbc The CBC state to initialize 31 int keylen, int num_rounds, symmetric_CBC *cbc) 37 LTC_ARGCHK(cbc != NULL); 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) { 50 cbc->blocklen = cipher_descriptor[cipher].block_length; 51 cbc->cipher = cipher; 52 for (x = 0; x < cbc->blocklen; x++) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
aes-cbc.c | 2 * AES-128 CBC 17 * aes_128_cbc_encrypt - AES-128 CBC encryption 19 * @iv: Encryption IV for CBC mode (16 bytes) 27 u8 cbc[AES_BLOCK_SIZE]; local 34 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 39 cbc[j] ^= pos[j]; 40 aes_encrypt(ctx, cbc, cbc); 41 os_memcpy(pos, cbc, AES_BLOCK_SIZE); 50 * aes_128_cbc_decrypt - AES-128 CBC decryptio 60 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; local [all...] |
aes-omac1.c | 2 * One-key CBC MAC (OMAC1) hash with AES-128 30 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 46 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; local 53 os_memset(cbc, 0, AES_BLOCK_SIZE); 66 cbc[i] ^= *pos++; 74 aes_encrypt(ctx, cbc, cbc); 84 cbc[i] ^= *pos++; 91 cbc[left] ^= 0x80; 96 pad[i] ^= cbc[i] [all...] |
crypto_internal-cipher.c | 26 u8 cbc[32]; member in struct:crypto_cipher::__anon30608::__anon30610 32 u8 cbc[8]; member in struct:crypto_cipher::__anon30608::__anon30611 37 u8 cbc[8]; member in struct:crypto_cipher::__anon30608::__anon30612 76 os_memcpy(ctx->u.aes.cbc, iv, AES_BLOCK_SIZE); 84 os_memcpy(ctx->u.des3.cbc, iv, 8); 92 os_memcpy(ctx->u.des.cbc, iv, 8); 122 ctx->u.aes.cbc[j] ^= plain[j]; 123 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc, 124 ctx->u.aes.cbc); 125 os_memcpy(crypt, ctx->u.aes.cbc, AES_BLOCK_SIZE) [all...] |
Makefile | 18 aes-cbc.o \
|
crypto_libtomcrypt.c | 287 symmetric_CBC cbc; member in union:crypto_cipher::__anon30615 338 res = cbc_start(idx, iv, key, key_len, 0, &ctx->u.cbc); 364 res = cbc_encrypt(plain, crypt, len, &ctx->u.cbc); 366 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC encryption " 388 res = cbc_decrypt(crypt, plain, len, &ctx->u.cbc); 390 wpa_printf(MSG_DEBUG, "LibTomCrypt: CBC decryption " 402 cbc_done(&ctx->u.cbc);
|
/external/openssh/regress/ |
conch-ciphers.sh | 16 for c in aes256-ctr aes256-cbc aes192-ctr aes192-cbc aes128-ctr aes128-cbc \ 17 cast128-cbc blowfish 3des-cbc ; do
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/ |
padlock.asm | 6 ;xcrypt-cbc
|
/external/dropbear/libtomcrypt/testprof/ |
modes_test.c | 1 /* test CFB/OFB/CBC modes */ 9 symmetric_CBC cbc; local 40 /* test CBC mode */ 42 DO(cbc_start(cipher_idx, iv, key, 16, 0, &cbc)); 44 DO(cbc_getiv(iv2, &l, &cbc)); 49 DO(cbc_encrypt(pt, ct, 64, &cbc)); 52 DO(cbc_setiv(iv2, l, &cbc)); 54 DO(cbc_decrypt(ct, tmp, 64, &cbc)); 56 fprintf(stderr, "CBC failed");
|
/external/chromium_org/net/third_party/nss/patches/ |
applypatches.sh | 39 patch -p4 < $patches_dir/cbc.patch
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
modes.h | 66 unsigned char ivec[16], cbc128_f cbc); 72 unsigned char ivec[16], cbc128_f cbc); 79 unsigned char ivec[16], cbc128_f cbc); 85 unsigned char ivec[16], cbc128_f cbc);
|
/external/openssl/include/openssl/ |
modes.h | 66 unsigned char ivec[16], cbc128_f cbc); 72 unsigned char ivec[16], cbc128_f cbc); 79 unsigned char ivec[16], cbc128_f cbc); 85 unsigned char ivec[16], cbc128_f cbc);
|
/external/dropbear/libtomcrypt/ |
Android.mk | 56 src/modes/cbc/cbc_decrypt.c src/modes/cbc/cbc_done.c src/modes/cbc/cbc_encrypt.c \ 57 src/modes/cbc/cbc_getiv.c src/modes/cbc/cbc_setiv.c src/modes/cbc/cbc_start.c \
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
e_aes.c | 68 cbc128_f cbc; member in union:__anon15541::__anon15542 241 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? 249 dat->stream.cbc = (cbc128_f)aesni_cbc_encrypt; 253 dat->stream.cbc = NULL; 488 BLOCK_CIPHER_generic(nid,keylen,16,16,cbc,cbc,CBC,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ 510 dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt; 519 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? 528 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE [all...] |
/external/openssl/crypto/evp/ |
e_aes.c | 68 cbc128_f cbc; member in union:__anon26010::__anon26011 241 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? 249 dat->stream.cbc = (cbc128_f)aesni_cbc_encrypt; 253 dat->stream.cbc = NULL; 488 BLOCK_CIPHER_generic(nid,keylen,16,16,cbc,cbc,CBC,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ 510 dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt; 519 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? 528 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 237 /** A block cipher CBC structure */ 388 /** Accelerated CBC encryption 398 /** Accelerated CBC decryption 765 int keylen, int num_rounds, symmetric_CBC *cbc); 766 int cbc_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CBC *cbc); 767 int cbc_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CBC *cbc); 768 int cbc_getiv(unsigned char *IV, unsigned long *len, symmetric_CBC *cbc); 769 int cbc_setiv(const unsigned char *IV, unsigned long len, symmetric_CBC *cbc); 770 int cbc_done(symmetric_CBC *cbc);
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
KexManager.java | 297 BlockCipher cbc; local 302 cbc = BlockCipherFactory.createCipher(kxs.np.enc_algo_client_to_server, true, km.enc_key_client_to_server, 313 tm.changeSendCipher(cbc, mac); 478 BlockCipher cbc; local 483 cbc = BlockCipherFactory.createCipher(kxs.np.enc_algo_server_to_client, false, 494 tm.changeRecvCipher(cbc, mac);
|
/external/chromium_org/third_party/openssl/openssl/crypto/des/ |
FILES0 | 36 ede_enc.c - des_ede3_cbc_encrypt() cbc mode des using triple DES.
|
/external/openssl/crypto/des/ |
FILES0 | 36 ede_enc.c - des_ede3_cbc_encrypt() cbc mode des using triple DES.
|
/external/chromium_org/third_party/openssl/openssl/crypto/bf/asm/ |
bf-586.pl | 6 require "cbc.pl"; 22 &cbc("BF_cbc_encrypt","BF_encrypt","BF_decrypt",1,4,5,3,-1,-1);
|