/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_getiv.c | 15 CBC implementation, get IV, Tom St Denis 22 @param IV [out] The destination of the initial vector 27 int cbc_getiv(unsigned char *IV, unsigned long *len, symmetric_CBC *cbc) 29 LTC_ARGCHK(IV != NULL); 36 XMEMCPY(IV, cbc->IV, cbc->blocklen);
|
cbc_setiv.c | 15 CBC implementation, set IV, Tom St Denis 23 @param IV The initial vector 28 int cbc_setiv(const unsigned char *IV, unsigned long len, symmetric_CBC *cbc) 30 LTC_ARGCHK(IV != NULL); 35 XMEMCPY(cbc->IV, IV, len);
|
cbc_start.c | 23 @param IV The initial vector 30 int cbc_start(int cipher, const unsigned char *IV, const unsigned char *key, 35 LTC_ARGCHK(IV != NULL); 49 /* copy IV */ 53 cbc->IV[x] = IV[x];
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_getiv.c | 15 CFB implementation, get IV, Tom St Denis 22 @param IV [out] The destination of the initial vector 27 int cfb_getiv(unsigned char *IV, unsigned long *len, symmetric_CFB *cfb) 29 LTC_ARGCHK(IV != NULL); 36 XMEMCPY(IV, cfb->IV, cfb->blocklen);
|
cfb_setiv.c | 15 CFB implementation, set IV, Tom St Denis 22 @param IV The initial vector 27 int cfb_setiv(const unsigned char *IV, unsigned long len, symmetric_CFB *cfb) 31 LTC_ARGCHK(IV != NULL); 44 return cipher_descriptor[cfb->cipher].ecb_encrypt(IV, cfb->IV, &cfb->key);
|
cfb_start.c | 24 @param IV The initial vector 31 int cfb_start(int cipher, const unsigned char *IV, const unsigned char *key, 36 LTC_ARGCHK(IV != NULL); 49 cfb->IV[x] = IV[x]; 56 /* encrypt the IV */ 58 return cipher_descriptor[cfb->cipher].ecb_encrypt(cfb->IV, cfb->IV, &cfb->key);
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_getiv.c | 15 F8 implementation, get IV, Tom St Denis 22 @param IV [out] The destination of the initial vector 27 int f8_getiv(unsigned char *IV, unsigned long *len, symmetric_F8 *f8) 29 LTC_ARGCHK(IV != NULL); 36 XMEMCPY(IV, f8->IV, f8->blocklen);
|
f8_setiv.c | 15 F8 implementation, set IV, Tom St Denis 22 @param IV The initial vector 27 int f8_setiv(const unsigned char *IV, unsigned long len, symmetric_F8 *f8) 31 LTC_ARGCHK(IV != NULL); 44 return cipher_descriptor[f8->cipher].ecb_encrypt(IV, f8->IV, &f8->key);
|
f8_encrypt.c | 40 if (f8->blocklen < 0 || f8->blocklen > (int)sizeof(f8->IV) || 41 f8->padlen < 0 || f8->padlen > (int)sizeof(f8->IV)) { 49 /* xor of IV, MIV and blockcnt == what goes into cipher */ 53 f8->IV[x] ^= f8->MIV[x] ^ buf[x]; 55 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) { 67 *((LTC_FAST_TYPE*)(&ct[x])) = *((LTC_FAST_TYPE*)(&pt[x])) ^ *((LTC_FAST_TYPE*)(&f8->IV[x])); 68 *((LTC_FAST_TYPE*)(&f8->IV[x])) ^= *((LTC_FAST_TYPE*)(&f8->MIV[x])) ^ *((LTC_FAST_TYPE*)(&buf[x])); 70 if ((err = cipher_descriptor[f8->cipher].ecb_encrypt(f8->IV, f8->IV, &f8->key)) != CRYPT_OK) [all...] |
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_getiv.c | 15 LRW_MODE implementation, Retrieve the current IV, Tom St Denis 21 Get the IV for LRW 22 @param IV [out] The IV, must be 16 octets 27 int lrw_getiv(unsigned char *IV, unsigned long *len, symmetric_LRW *lrw) 29 LTC_ARGCHK(IV != NULL); 37 XMEMCPY(IV, lrw->IV, 16);
|
lrw_setiv.c | 15 LRW_MODE implementation, Set the current IV, Tom St Denis 21 Set the IV for LRW 22 @param IV The IV, must be 16 octets 27 int lrw_setiv(const unsigned char *IV, unsigned long len, symmetric_LRW *lrw) 34 LTC_ARGCHK(IV != NULL); 45 /* copy the IV */ 46 XMEMCPY(lrw->IV, IV, 16); 55 XMEMCPY(T, &lrw->PC[0][IV[0]][0], 16) [all...] |
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_getiv.c | 15 OFB implementation, get IV, Tom St Denis 22 @param IV [out] The destination of the initial vector 27 int ofb_getiv(unsigned char *IV, unsigned long *len, symmetric_OFB *ofb) 29 LTC_ARGCHK(IV != NULL); 36 XMEMCPY(IV, ofb->IV, ofb->blocklen);
|
ofb_setiv.c | 15 OFB implementation, set IV, Tom St Denis 22 @param IV The initial vector 27 int ofb_setiv(const unsigned char *IV, unsigned long len, symmetric_OFB *ofb) 31 LTC_ARGCHK(IV != NULL); 44 return cipher_descriptor[ofb->cipher].ecb_encrypt(IV, ofb->IV, &ofb->key);
|
ofb_start.c | 24 @param IV The initial vector 31 int ofb_start(int cipher, const unsigned char *IV, const unsigned char *key, 36 LTC_ARGCHK(IV != NULL); 48 ofb->IV[x] = IV[x];
|
ofb_encrypt.c | 39 if (ofb->blocklen < 0 || ofb->blocklen > (int)sizeof(ofb->IV) || 40 ofb->padlen < 0 || ofb->padlen > (int)sizeof(ofb->IV)) { 46 if ((err = cipher_descriptor[ofb->cipher].ecb_encrypt(ofb->IV, ofb->IV, &ofb->key)) != CRYPT_OK) { 51 *ct++ = *pt++ ^ ofb->IV[(ofb->padlen)++];
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_setiv.c | 15 CTR implementation, set IV, Tom St Denis 22 @param IV The initial vector 27 int ctr_setiv(const unsigned char *IV, unsigned long len, symmetric_CTR *ctr) 31 LTC_ARGCHK(IV != NULL); 43 /* set IV */ 44 XMEMCPY(ctr->ctr, IV, len); 48 return cipher_descriptor[ctr->cipher].ecb_encrypt(IV, ctr->pad, &ctr->key);
|
ctr_getiv.c | 15 CTR implementation, get IV, Tom St Denis 22 @param IV [out] The destination of the initial vector 27 int ctr_getiv(unsigned char *IV, unsigned long *len, symmetric_CTR *ctr) 29 LTC_ARGCHK(IV != NULL); 36 XMEMCPY(IV, ctr->ctr, ctr->blocklen);
|
/external/chromium_org/third_party/tlslite/tlslite/utils/ |
OpenSSL_AES.py | 8 def new(key, mode, IV): 9 return OpenSSL_AES(key, mode, IV) 13 def __init__(self, key, mode, IV): 14 AES.__init__(self, key, mode, IV, "openssl") 16 self.IV = IV 26 m2.cipher_init(context, cipherType, self.key, self.IV, encrypt) 34 self.IV = ciphertext[-self.block_size:] 48 self.IV = ciphertext[-self.block_size:]
|
OpenSSL_TripleDES.py | 8 def new(key, mode, IV): 9 return OpenSSL_TripleDES(key, mode, IV) 13 def __init__(self, key, mode, IV): 14 TripleDES.__init__(self, key, mode, IV, "openssl") 16 self.IV = IV 21 m2.cipher_init(context, cipherType, self.key, self.IV, encrypt) 29 self.IV = ciphertext[-self.block_size:] 43 self.IV = ciphertext[-self.block_size:]
|
cipherfactory.py | 34 def createAES(key, IV, implList=None): 40 @type IV: str 41 @param IV: A 16 byte string 51 return Cryptlib_AES.new(key, 2, IV) 53 return OpenSSL_AES.new(key, 2, IV) 55 return PyCrypto_AES.new(key, 2, IV) 57 return Python_AES.new(key, 2, IV) 60 def createRC4(key, IV, implList=None): 66 @type IV: object 67 @param IV: Ignored, whatever it is [all...] |
PyCrypto_AES.py | 9 def new(key, mode, IV): 10 return PyCrypto_AES(key, mode, IV) 14 def __init__(self, key, mode, IV): 15 AES.__init__(self, key, mode, IV, "pycrypto") 16 self.context = Crypto.Cipher.AES.new(key, mode, IV)
|
PyCrypto_TripleDES.py | 9 def new(key, mode, IV): 10 return PyCrypto_TripleDES(key, mode, IV) 14 def __init__(self, key, mode, IV): 15 TripleDES.__init__(self, key, mode, IV, "pycrypto") 16 self.context = Crypto.Cipher.DES3.new(key, mode, IV)
|
Python_AES.py | 8 def new(key, mode, IV): 9 return Python_AES(key, mode, IV) 12 def __init__(self, key, mode, IV): 13 AES.__init__(self, key, mode, IV, "python") 15 self.IV = IV 21 chainBytes = stringToBytes(self.IV) 42 self.IV = bytesToString(chainBytes) 49 chainBytes = stringToBytes(self.IV) 67 self.IV = bytesToString(chainBytes [all...] |
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_process.c | 47 *((LTC_FAST_TYPE*)&(f9->IV[x])) ^= *((LTC_FAST_TYPE*)&(in[x])); 49 cipher_descriptor[f9->cipher].ecb_encrypt(f9->IV, f9->IV, &f9->key); 51 *((LTC_FAST_TYPE*)&(f9->ACC[x])) ^= *((LTC_FAST_TYPE*)&(f9->IV[x])); 61 cipher_descriptor[f9->cipher].ecb_encrypt(f9->IV, f9->IV, &f9->key); 63 f9->ACC[x] ^= f9->IV[x]; 67 f9->IV[f9->buflen++] ^= *in++;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
OFBBlockCipher.java | 14 private byte[] IV; 35 this.IV = new byte[cipher.getBlockSize()]; 51 * Initialise the cipher and, possibly, the initialisation vector (IV). 52 * If an IV isn't passed as part of the parameter, the IV will be all zeros. 53 * An IV which is too short is handled in FIPS compliant fashion. 69 byte[] iv = ivParam.getIV(); 71 if (iv.length < IV.length) 73 // prepend the supplied IV with zeros (per FIPS PUB 81 [all...] |