/external/dropbear/libtomcrypt/src/modes/cbc/ |
D | cbc_encrypt.c | 29 int cbc_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CBC *cbc) in cbc_encrypt() argument 35 LTC_ARGCHK(cbc != NULL); in cbc_encrypt() 37 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { in cbc_encrypt() 42 if (cbc->blocklen < 1 || cbc->blocklen > (int)sizeof(cbc->IV)) { in cbc_encrypt() 46 if (len % cbc->blocklen) { in cbc_encrypt() 50 if (cbc->blocklen % sizeof(LTC_FAST_TYPE)) { in cbc_encrypt() 55 if (cipher_descriptor[cbc->cipher].accel_cbc_encrypt != NULL) { in cbc_encrypt() 56 …return cipher_descriptor[cbc->cipher].accel_cbc_encrypt(pt, ct, len / cbc->blocklen, cbc->IV, &cbc… in cbc_encrypt() 61 for (x = 0; x < cbc->blocklen; x += sizeof(LTC_FAST_TYPE)) { in cbc_encrypt() 62 … *((LTC_FAST_TYPE*)((unsigned char *)cbc->IV + x)) ^= *((LTC_FAST_TYPE*)((unsigned char *)pt + x)); in cbc_encrypt() [all …]
|
D | cbc_decrypt.c | 29 int cbc_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CBC *cbc) in cbc_decrypt() argument 41 LTC_ARGCHK(cbc != NULL); in cbc_decrypt() 43 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { in cbc_decrypt() 48 if (cbc->blocklen < 1 || cbc->blocklen > (int)sizeof(cbc->IV)) { in cbc_decrypt() 52 if (len % cbc->blocklen) { in cbc_decrypt() 56 if (cbc->blocklen % sizeof(LTC_FAST_TYPE)) { in cbc_decrypt() 61 if (cipher_descriptor[cbc->cipher].accel_cbc_decrypt != NULL) { in cbc_decrypt() 62 …return cipher_descriptor[cbc->cipher].accel_cbc_decrypt(ct, pt, len / cbc->blocklen, cbc->IV, &cbc… in cbc_decrypt() 66 if ((err = cipher_descriptor[cbc->cipher].ecb_decrypt(ct, tmp, &cbc->key)) != CRYPT_OK) { in cbc_decrypt() 72 for (x = 0; x < cbc->blocklen; x += sizeof(LTC_FAST_TYPE)) { in cbc_decrypt() [all …]
|
D | cbc_getiv.c | 27 int cbc_getiv(unsigned char *IV, unsigned long *len, symmetric_CBC *cbc) in cbc_getiv() argument 31 LTC_ARGCHK(cbc != NULL); in cbc_getiv() 32 if ((unsigned long)cbc->blocklen > *len) { in cbc_getiv() 33 *len = cbc->blocklen; in cbc_getiv() 36 XMEMCPY(IV, cbc->IV, cbc->blocklen); in cbc_getiv() 37 *len = cbc->blocklen; in cbc_getiv()
|
D | cbc_start.c | 31 int keylen, int num_rounds, symmetric_CBC *cbc) in cbc_start() argument 37 LTC_ARGCHK(cbc != NULL); in cbc_start() 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) { in cbc_start() 50 cbc->blocklen = cipher_descriptor[cipher].block_length; in cbc_start() 51 cbc->cipher = cipher; in cbc_start() 52 for (x = 0; x < cbc->blocklen; x++) { in cbc_start() 53 cbc->IV[x] = IV[x]; in cbc_start()
|
D | cbc_done.c | 24 int cbc_done(symmetric_CBC *cbc) in cbc_done() argument 27 LTC_ARGCHK(cbc != NULL); in cbc_done() 29 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { in cbc_done() 32 cipher_descriptor[cbc->cipher].done(&cbc->key); in cbc_done()
|
D | cbc_setiv.c | 28 int cbc_setiv(const unsigned char *IV, unsigned long len, symmetric_CBC *cbc) in cbc_setiv() argument 31 LTC_ARGCHK(cbc != NULL); in cbc_setiv() 32 if (len != (unsigned long)cbc->blocklen) { in cbc_setiv() 35 XMEMCPY(cbc->IV, IV, len); in cbc_setiv()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_internal-cipher.c | 26 u8 cbc[32]; member 32 u8 cbc[8]; member 37 u8 cbc[8]; member 76 os_memcpy(ctx->u.aes.cbc, iv, AES_BLOCK_SIZE); in crypto_cipher_init() 84 os_memcpy(ctx->u.des3.cbc, iv, 8); in crypto_cipher_init() 92 os_memcpy(ctx->u.des.cbc, iv, 8); in crypto_cipher_init() 122 ctx->u.aes.cbc[j] ^= plain[j]; in crypto_cipher_encrypt() 123 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc, in crypto_cipher_encrypt() 124 ctx->u.aes.cbc); in crypto_cipher_encrypt() 125 os_memcpy(crypt, ctx->u.aes.cbc, AES_BLOCK_SIZE); in crypto_cipher_encrypt() [all …]
|
D | aes-cbc.c | 27 u8 cbc[AES_BLOCK_SIZE]; in aes_128_cbc_encrypt() local 34 os_memcpy(cbc, iv, AES_BLOCK_SIZE); in aes_128_cbc_encrypt() 39 cbc[j] ^= pos[j]; in aes_128_cbc_encrypt() 40 aes_encrypt(ctx, cbc, cbc); in aes_128_cbc_encrypt() 41 os_memcpy(pos, cbc, AES_BLOCK_SIZE); in aes_128_cbc_encrypt() 60 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; in aes_128_cbc_decrypt() local 67 os_memcpy(cbc, iv, AES_BLOCK_SIZE); in aes_128_cbc_decrypt() 74 pos[j] ^= cbc[j]; in aes_128_cbc_decrypt() 75 os_memcpy(cbc, tmp, AES_BLOCK_SIZE); in aes_128_cbc_decrypt()
|
D | aes-omac1.c | 46 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; in omac1_aes_128_vector() local 53 os_memset(cbc, 0, AES_BLOCK_SIZE); in omac1_aes_128_vector() 66 cbc[i] ^= *pos++; in omac1_aes_128_vector() 74 aes_encrypt(ctx, cbc, cbc); in omac1_aes_128_vector() 84 cbc[i] ^= *pos++; in omac1_aes_128_vector() 91 cbc[left] ^= 0x80; in omac1_aes_128_vector() 96 pad[i] ^= cbc[i]; in omac1_aes_128_vector()
|
/external/openssh/regress/ |
D | conch-ciphers.sh | 16 for c in aes256-ctr aes256-cbc aes192-ctr aes192-cbc aes128-ctr aes128-cbc \ 17 cast128-cbc blowfish 3des-cbc ; do
|
/external/dropbear/libtomcrypt/testprof/ |
D | modes_test.c | 9 symmetric_CBC cbc; in modes_test() local 42 DO(cbc_start(cipher_idx, iv, key, 16, 0, &cbc)); in modes_test() 44 DO(cbc_getiv(iv2, &l, &cbc)); in modes_test() 49 DO(cbc_encrypt(pt, ct, 64, &cbc)); in modes_test() 52 DO(cbc_setiv(iv2, l, &cbc)); in modes_test() 54 DO(cbc_decrypt(ct, tmp, 64, &cbc)); in modes_test()
|
/external/tcpdump/tests/ |
D | esp-secrets.txt | 3 0x12345678@192.1.2.45 3des-cbc-hmac96:0x43434545464649494a4a4c4c4f4f51515252545457575840 4 0xabcdabcd@192.0.1.1 3des-cbc-hmac96:0x434545464649494a4a4c4c4f4f5151525254545757584043 5 0xd1234567@192.1.2.45 aes256-cbc-hmac96:0xaaaabbbbccccdddd4043434545464649494a4a4c4c4f4f51515252545…
|
D | esp2.gdbinit | 1 …-E "0x12345678@192.1.2.45 3des-cbc-hmac96:0x43434545464649494a4a4c4c4f4f51515252545457575840,0xabc…
|
D | esp3.gdbinit | 1 set args -t -n -E "3des-cbc-hmac96:0x43434545464649494a4a4c4c4f4f51515252545457575840" -r 08-sunris…
|
D | esp1.gdbinit | 1 set args -t -n -E "0x12345678@192.1.2.45 3des-cbc-hmac96:0x4043434545464649494a4a4c4c4f4f5151525254…
|
/external/chromium_org/third_party/openssl/openssl/crypto/perlasm/ |
D | readme | 102 There is also a cbc mode function generator in cbc.pl 104 &cbc( $name, 120 &cbc("BF_cbc_encrypt","BF_encrypt","BF_encrypt",1,4,5,3,-1,-1); 122 &cbc("des_ncbc_encrypt","des_encrypt","des_encrypt",0,4,5,3,5,-1); 123 &cbc("des_ede3_cbc_encrypt","des_encrypt3","des_decrypt3",0,6,7,3,4,5);
|
/external/openssl/crypto/perlasm/ |
D | readme | 102 There is also a cbc mode function generator in cbc.pl 104 &cbc( $name, 120 &cbc("BF_cbc_encrypt","BF_encrypt","BF_encrypt",1,4,5,3,-1,-1); 122 &cbc("des_ncbc_encrypt","des_encrypt","des_encrypt",0,4,5,3,5,-1); 123 &cbc("des_ede3_cbc_encrypt","des_encrypt3","des_decrypt3",0,6,7,3,4,5);
|
/external/openssl/include/openssl/ |
D | modes.h | 66 unsigned char ivec[16], cbc128_f cbc); 72 unsigned char ivec[16], cbc128_f cbc); 79 unsigned char ivec[16], cbc128_f cbc); 85 unsigned char ivec[16], cbc128_f cbc);
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
D | modes.h | 66 unsigned char ivec[16], cbc128_f cbc); 72 unsigned char ivec[16], cbc128_f cbc); 79 unsigned char ivec[16], cbc128_f cbc); 85 unsigned char ivec[16], cbc128_f cbc);
|
/external/dropbear/libtomcrypt/ |
D | Android.mk | 56 src/modes/cbc/cbc_decrypt.c src/modes/cbc/cbc_done.c src/modes/cbc/cbc_encrypt.c \ 57 src/modes/cbc/cbc_getiv.c src/modes/cbc/cbc_setiv.c src/modes/cbc/cbc_start.c \
|
/external/openssh/ |
D | ssh_config | 40 # Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc
|
/external/openssl/crypto/evp/ |
D | e_aes.c | 68 cbc128_f cbc; member 241 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? in aesni_init_key() 249 dat->stream.cbc = (cbc128_f)aesni_cbc_encrypt; in aesni_init_key() 253 dat->stream.cbc = NULL; in aesni_init_key() 488 BLOCK_CIPHER_generic(nid,keylen,16,16,cbc,cbc,CBC,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ 510 dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt; in aes_init_key() 519 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? in aes_init_key() 528 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? in aes_init_key() 547 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? in aes_init_key() 556 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? in aes_init_key() [all …]
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/ |
D | KexManager.java | 297 BlockCipher cbc; in finishKex() local 302 …cbc = BlockCipherFactory.createCipher(kxs.np.enc_algo_client_to_server, true, km.enc_key_client_to… in finishKex() 313 tm.changeSendCipher(cbc, mac); in finishKex() 478 BlockCipher cbc; in handleMessage() local 483 cbc = BlockCipherFactory.createCipher(kxs.np.enc_algo_server_to_client, false, in handleMessage() 494 tm.changeRecvCipher(cbc, mac); in handleMessage()
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_cipher.h | 765 int keylen, int num_rounds, symmetric_CBC *cbc); 766 int cbc_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CBC *cbc); 767 int cbc_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CBC *cbc); 768 int cbc_getiv(unsigned char *IV, unsigned long *len, symmetric_CBC *cbc); 769 int cbc_setiv(const unsigned char *IV, unsigned long len, symmetric_CBC *cbc); 770 int cbc_done(symmetric_CBC *cbc);
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
D | e_aes.c | 68 cbc128_f cbc; member 241 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? in aesni_init_key() 249 dat->stream.cbc = (cbc128_f)aesni_cbc_encrypt; in aesni_init_key() 253 dat->stream.cbc = NULL; in aesni_init_key() 488 BLOCK_CIPHER_generic(nid,keylen,16,16,cbc,cbc,CBC,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ 510 dat->stream.cbc = (cbc128_f)bsaes_cbc_encrypt; in aes_init_key() 519 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? in aes_init_key() 528 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? in aes_init_key() 547 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? in aes_init_key() 556 dat->stream.cbc = mode==EVP_CIPH_CBC_MODE ? in aes_init_key() [all …]
|