/external/chromium_org/third_party/openssl/openssl/crypto/bf/ |
bf_ecb.c | 59 #include <openssl/blowfish.h> 63 /* Blowfish as implemented from 'Blowfish: Springer-Verlag paper' 68 const char BF_version[]="Blowfish" OPENSSL_VERSION_PTEXT; 73 return("blowfish(ptr)"); 75 return("blowfish(ptr2)"); 77 return("blowfish(idx)");
|
bf_cfb64.c | 59 #include <openssl/blowfish.h>
|
bf_ofb64.c | 59 #include <openssl/blowfish.h>
|
bf_skey.c | 62 #include <openssl/blowfish.h> 69 fips_cipher_abort(BLOWFISH);
|
bf_enc.c | 59 #include <openssl/blowfish.h> 62 /* Blowfish as implemented from 'Blowfish: Springer-Verlag paper'
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
e_bf.c | 65 #include <openssl/blowfish.h>
|
/external/openssl/crypto/bf/ |
bf_ecb.c | 59 #include <openssl/blowfish.h> 63 /* Blowfish as implemented from 'Blowfish: Springer-Verlag paper' 68 const char BF_version[]="Blowfish" OPENSSL_VERSION_PTEXT; 73 return("blowfish(ptr)"); 75 return("blowfish(ptr2)"); 77 return("blowfish(idx)");
|
bf_cfb64.c | 59 #include <openssl/blowfish.h>
|
bf_ofb64.c | 59 #include <openssl/blowfish.h>
|
bf_skey.c | 62 #include <openssl/blowfish.h> 69 fips_cipher_abort(BLOWFISH);
|
bf_enc.c | 59 #include <openssl/blowfish.h> 62 /* Blowfish as implemented from 'Blowfish: Springer-Verlag paper'
|
/external/openssl/crypto/evp/ |
e_bf.c | 65 #include <openssl/blowfish.h>
|
/external/dropbear/libtomcrypt/src/ciphers/ |
blowfish.c | 12 @file blowfish.c 13 Implementation of the Blowfish block cipher, Tom St Denis 17 #ifdef BLOWFISH 21 "blowfish", 301 Initialize the Blowfish block cipher 336 skey->blowfish.K[x] = ORIG_P[x] ^ A; 342 skey->blowfish.S[x][y] = ORIG_S[x][y]; 355 LOAD32H(skey->blowfish.K[x], &B[0]); 356 LOAD32H(skey->blowfish.K[x+1], &B[4]); 365 LOAD32H(skey->blowfish.S[x][y], &B[0]) [all...] |
/external/openssh/regress/ |
conch-ciphers.sh | 17 cast128-cbc blowfish 3des-cbc ; do
|
putty-ciphers.sh | 14 for c in aes blowfish 3des arcfour aes128-ctr aes192-ctr aes256-ctr ; do
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
version.c | 132 # include <openssl/blowfish.h>
|
speed.c | 172 #include <openssl/blowfish.h> 253 "rc2 cbc","rc5-32/12 cbc","blowfish cbc","cast cbc", 901 else if (strcmp(*argv,"blowfish") == 0) doit[D_CBC_BF]=1; 1126 BIO_printf(bio_err,"blowfish"); [all...] |
/external/openssl/apps/ |
version.c | 132 # include <openssl/blowfish.h>
|
speed.c | 172 #include <openssl/blowfish.h> 253 "rc2 cbc","rc5-32/12 cbc","blowfish cbc","cast cbc", 901 else if (strcmp(*argv,"blowfish") == 0) doit[D_CBC_BF]=1; 1126 BIO_printf(bio_err,"blowfish"); [all...] |
/external/dropbear/libtomcrypt/ |
Android.mk | 9 src/ciphers/aes/aes.c src/ciphers/anubis.c src/ciphers/blowfish.c \
|
crypt.tex | 147 and store data in a format independent of the platform. This means if you encrypt with Blowfish on a PPC it should decrypt 148 on an x86 with zero problems. The consistent API also means that if you learn how to use Blowfish with the library you 425 that you should only used this scheduled key with the intended cipher. For example, if you call \textit{blowfish\_setup()} do not 496 An example snippet that encodes a block with Blowfish in ECB mode. 498 \index{blowfish\_setup()} \index{blowfish\_ecb\_encrypt()} \index{blowfish\_ecb\_decrypt()} \index{blowfish\_done()} 603 \index{blowfish\_desc} \index{xtea\_desc} \index{rc2\_desc} \index{rc5\_desc} \index{rc6\_desc} \index{saferp\_desc} \index{aes\_desc} \index{twofish\_desc} 610 \hline Blowfish & blowfish\_desc & 8 & 8 $\ldots$ 56 & 16 \ [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 6 #ifdef BLOWFISH 148 #ifdef BLOWFISH 149 struct blowfish_key blowfish; member in union:Symmetric_key 535 #ifdef BLOWFISH
|
/external/ipsec-tools/src/racoon/ |
cftoken.l | 438 blowfish { YYD; yylval.num = algtype_blowfish; return(ALGORITHMTYPE); }
|
crypto_openssl.c | 67 #include <openssl/blowfish.h> 1425 * BLOWFISH-CBC [all...] |