/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_getiv.c | 15 CTR implementation, get IV, Tom St Denis 24 @param ctr The CTR state 27 int ctr_getiv(unsigned char *IV, unsigned long *len, symmetric_CTR *ctr) 31 LTC_ARGCHK(ctr != NULL); 32 if ((unsigned long)ctr->blocklen > *len) { 33 *len = ctr->blocklen; 36 XMEMCPY(IV, ctr->ctr, ctr->blocklen) [all...] |
ctr_encrypt.c | 15 CTR implementation, encrypt data, Tom St Denis 22 CTR encrypt 26 @param ctr CTR state 29 int ctr_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CTR *ctr) 35 LTC_ARGCHK(ctr != NULL); 37 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { 42 if (ctr->blocklen < 1 || ctr->blocklen > (int)sizeof(ctr->ctr) | [all...] |
ctr_setiv.c | 15 CTR implementation, set IV, Tom St Denis 24 @param ctr The CTR state 27 int ctr_setiv(const unsigned char *IV, unsigned long len, symmetric_CTR *ctr) 32 LTC_ARGCHK(ctr != NULL); 35 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { 39 if (len != (unsigned long)ctr->blocklen) { 44 XMEMCPY(ctr->ctr, IV, len); 47 ctr->padlen = 0 [all...] |
ctr_start.c | 15 CTR implementation, start chain, Tom St Denis 22 Initialize a CTR context 29 @param ctr The CTR state to initialize 36 symmetric_CTR *ctr) 42 LTC_ARGCHK(ctr != NULL); 50 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ctr->key)) != CRYPT_OK) { 54 /* copy ctr */ 55 ctr->blocklen = cipher_descriptor[cipher].block_length; 56 ctr->cipher = cipher [all...] |
ctr_done.c | 15 CTR implementation, finish chain, Tom St Denis 21 @param ctr The CTR chain to terminate 24 int ctr_done(symmetric_CTR *ctr) 27 LTC_ARGCHK(ctr != NULL); 29 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { 32 cipher_descriptor[ctr->cipher].done(&ctr->key); 40 /* $Source: /cvs/libtom/libtomcrypt/src/modes/ctr/ctr_done.c,v $ */
|
ctr_decrypt.c | 15 CTR implementation, decrypt data, Tom St Denis 21 CTR decrypt 25 @param ctr CTR state 28 int ctr_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CTR *ctr) 32 LTC_ARGCHK(ctr != NULL); 34 return ctr_encrypt(ct, pt, len, ctr); 40 /* $Source: /cvs/libtom/libtomcrypt/src/modes/ctr/ctr_decrypt.c,v $ */
|
/external/chromium_org/third_party/openssl/openssl/crypto/ |
mem_clr.c | 67 size_t loop = len, ctr = cleanse_ctr; local 70 *(p++) = (unsigned char)ctr; 71 ctr += (17 + ((size_t)p & 0xF)); 73 p=memchr(ptr, (unsigned char)ctr, len); 75 ctr += (63 + (size_t)p); 76 cleanse_ctr = (unsigned char)ctr;
|
/external/openssl/crypto/ |
mem_clr.c | 67 size_t loop = len, ctr = cleanse_ctr; local 70 *(p++) = (unsigned char)ctr; 71 ctr += (17 + ((size_t)p & 0xF)); 73 p=memchr(ptr, (unsigned char)ctr, len); 75 ctr += (63 + (size_t)p); 76 cleanse_ctr = (unsigned char)ctr;
|
/external/valgrind/main/drd/tests/ |
threaded-fork.c | 19 int ctr; local 42 ctr = 0; 45 ctr++; 46 if (ctr >= 10) {
|
/external/valgrind/main/none/tests/ |
threaded-fork.c | 17 int ctr; local 40 ctr = 0; 43 ctr++; 44 if (ctr >= 10) {
|
/external/openssh/regress/ |
conch-ciphers.sh | 16 for c in aes256-ctr aes256-cbc aes192-ctr aes192-cbc aes128-ctr aes128-cbc \
|
putty-ciphers.sh | 14 for c in aes blowfish 3des arcfour aes128-ctr aes192-ctr aes256-ctr ; do
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/ |
padlock.asm | 8 ;xcrypt-ctr
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 48 unsigned char PAD[16], ctr[16], CTRPAD[16], b; local 211 /* setup the ctr counter */ 215 ctr[x++] = (unsigned char)L-1; 219 ctr[x++] = nonce[y]; 223 ctr[x++] = 0; 236 /* increment the ctr? */ 238 ctr[z] = (ctr[z] + 1) & 255; 239 if (ctr[z]) break; 241 if ((err = cipher_descriptor[cipher].ecb_encrypt(ctr, CTRPAD, skey)) != CRYPT_OK) [all...] |
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_decrypt.c | 43 return ctr_decrypt(ct, pt, length, &eax->ctr);
|
eax_encrypt.c | 38 if ((err = ctr_encrypt(pt, ct, length, &eax->ctr)) != CRYPT_OK) {
|
/external/valgrind/main/memcheck/tests/ |
wrap5.c | 18 static int ctr = 0; variable 23 ctr++; 24 if ((ctr % 3) == 1) { 88 printf("allocated %d Lards\n", ctr);
|
/external/oprofile/module/x86/ |
op_rtc.c | 37 if ((sysctl.ctr[0].kernel && usermode) 38 || (sysctl.ctr[0].user && !usermode)) 75 target = sysctl.ctr[0].count; 87 sysctl_parms.ctr[0].count = sysctl.ctr[0].count = 1 << exp; 139 int target = sysctl.ctr[0].count; 174 *next = ((ctl_table) { 1, "rtc_value", &sysctl_parms.ctr[0].count, sizeof(int), 0600, NULL, lproc_dointvec, NULL, });
|
op_model_athlon.c | 62 /* avoid a false detection of ctr overflows in NMI handler */ 68 if (sysctl.ctr[i].enabled) { 70 CTR_WRITE(sysctl.ctr[i].count, msrs, i); 75 CTRL_SET_USR(low, sysctl.ctr[i].user); 76 CTRL_SET_KERN(low, sysctl.ctr[i].kernel); 77 CTRL_SET_UM(low, sysctl.ctr[i].unit_mask); 78 CTRL_SET_EVENT(low, sysctl.ctr[i].event); 92 if (sysctl.ctr[i].enabled) { 108 if (sysctl.ctr[i].enabled) { 122 if (sysctl.ctr[i].enabled) [all...] |
op_model_p4.c | 379 #define CTR_OVERFLOW_P(ctr) (!((ctr) & 0x80000000)) 482 static void pmc_setup_one_p4_counter(unsigned int ctr) 496 counter_bit = 1 << VIRT_CTR(stag, ctr); 499 if (sysctl.ctr[ctr].event <= 0 || sysctl.ctr[ctr].event > NUM_EVENTS) { 502 sysctl.ctr[ctr].event) 627 unsigned long ctr, low, high, stag, real; local [all...] |
/external/jpeg/ |
jidctred.c | 129 int ctr; local 138 for (ctr = DCTSIZE; ctr > 0; inptr++, quantptr++, wsptr++, ctr--) { 140 if (ctr == DCTSIZE-4) 197 for (ctr = 0; ctr < 4; ctr++) { 198 outptr = output_buf[ctr] + output_col; 281 int ctr; local [all...] |
jfdctflt.c | 65 int ctr; local 70 for (ctr = DCTSIZE-1; ctr >= 0; ctr--) { 120 for (ctr = DCTSIZE-1; ctr >= 0; ctr--) {
|
jfdctfst.c | 120 int ctr; local 126 for (ctr = DCTSIZE-1; ctr >= 0; ctr--) { 176 for (ctr = DCTSIZE-1; ctr >= 0; ctr--) {
|
/external/qemu/distrib/jpeg-6b/ |
jidctred.c | 129 int ctr; local 138 for (ctr = DCTSIZE; ctr > 0; inptr++, quantptr++, wsptr++, ctr--) { 140 if (ctr == DCTSIZE-4) 197 for (ctr = 0; ctr < 4; ctr++) { 198 outptr = output_buf[ctr] + output_col; 281 int ctr; local [all...] |
/external/oprofile/module/ia64/ |
op_pmu.c | 57 int ctr; local 59 for (ctr = 0 ; ctr < op_nr_counters ; ++ctr) { 60 if (pmd_overflowed(pmc0, ctr)) { 61 op_do_profile(cpu, regs->cr_iip, 1, ctr); 62 set_pmd_neg(oprof_data[cpu].ctr_count[ctr], ctr); 191 if (sysctl.ctr[ii].enabled) { 194 set_pmd_neg(sysctl.ctr[ii].count, ii) [all...] |