/external/chromium_org/third_party/openssl/openssl/crypto/modes/ |
xts128.c | 66 union { u64 u[2]; u32 d[4]; u8 c[16]; } tweak, scratch; local 71 memcpy(tweak.c, iv, 16); 73 (*ctx->block2)(tweak.c,tweak.c,ctx->key2); 80 scratch.u[0] ^= tweak.u[0]; 81 scratch.u[1] ^= tweak.u[1]; 83 scratch.u[0] = ((u64*)inp)[0]^tweak.u[0]; 84 scratch.u[1] = ((u64*)inp)[1]^tweak.u[1]; 88 scratch.u[0] ^= tweak.u[0]; 89 scratch.u[1] ^= tweak.u[1] [all...] |
/external/openssl/crypto/modes/ |
xts128.c | 66 union { u64 u[2]; u32 d[4]; u8 c[16]; } tweak, scratch; local 71 memcpy(tweak.c, iv, 16); 73 (*ctx->block2)(tweak.c,tweak.c,ctx->key2); 80 scratch.u[0] ^= tweak.u[0]; 81 scratch.u[1] ^= tweak.u[1]; 83 scratch.u[0] = ((u64*)inp)[0]^tweak.u[0]; 84 scratch.u[1] = ((u64*)inp)[1]^tweak.u[1]; 88 scratch.u[0] ^= tweak.u[0]; 89 scratch.u[1] ^= tweak.u[1] [all...] |
/external/dropbear/libtomcrypt/demos/ |
tv_gen.c | 703 unsigned char tweak[16], key[16], iv[16], buf[1024]; local 707 /* initialize default key and tweak */ 709 tweak[x] = key[x] = iv[x] = x; 714 if ((err = lrw_start(find_cipher("aes"), iv, key, 16, tweak, 0, &lrw)) != CRYPT_OK) { 742 /* copy new tweak, iv and key */ 746 tweak[y] = buf[(y+32)%x];
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 281 /** the tweak key */ 282 tweak[16], member in struct:__anon17383 284 /** The current pad, it's the product of the first 15 bytes against the tweak key */ 424 @param tweak The LRW tweak 428 int (*accel_lrw_encrypt)(const unsigned char *pt, unsigned char *ct, unsigned long blocks, unsigned char *IV, const unsigned char *tweak, symmetric_key *skey); 435 @param tweak The LRW tweak 439 int (*accel_lrw_decrypt)(const unsigned char *ct, unsigned char *pt, unsigned long blocks, unsigned char *IV, const unsigned char *tweak, symmetric_key *skey); 800 const unsigned char *tweak, [all...] |
/external/chromium_org/third_party/WebKit/Source/devtools/scripts/closure/ |
compiler.jar | |