/external/dropbear/libtomcrypt/src/encauth/gcm/ |
H A D | gcm_reset.c | 22 @param gcm The GCM state to reset 25 int gcm_reset(gcm_state *gcm) argument 27 LTC_ARGCHK(gcm != NULL); 29 zeromem(gcm->buf, sizeof(gcm->buf)); 30 zeromem(gcm->X, sizeof(gcm->X)); 31 gcm->mode = GCM_MODE_IV; 32 gcm->ivmode = 0; 33 gcm [all...] |
H A D | gcm_add_aad.c | 22 @param gcm The GCM state 27 int gcm_add_aad(gcm_state *gcm, argument 36 LTC_ARGCHK(gcm != NULL); 41 if (gcm->buflen > 16 || gcm->buflen < 0) { 45 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) { 50 if (gcm->mode == GCM_MODE_IV) { 52 if (gcm->ivmode || gcm->buflen != 12) { 53 for (x = 0; x < (unsigned long)gcm [all...] |
H A D | gcm_add_iv.c | 22 @param gcm The GCM state 27 int gcm_add_iv(gcm_state *gcm, argument 33 LTC_ARGCHK(gcm != NULL); 39 if (gcm->mode != GCM_MODE_IV) { 43 if (gcm->buflen >= 16 || gcm->buflen < 0) { 47 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) { 53 if (IVlen + gcm->buflen > 12) { 54 gcm->ivmode |= 1; 59 if (gcm [all...] |
H A D | gcm_done.c | 22 @param gcm The GCM state 27 int gcm_done(gcm_state *gcm, argument 33 LTC_ARGCHK(gcm != NULL); 37 if (gcm->buflen > 16 || gcm->buflen < 0) { 41 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) { 46 if (gcm->mode != GCM_MODE_TEXT) { 51 if (gcm->buflen) { 52 gcm->pttotlen += gcm [all...] |
H A D | gcm_mult_h.c | 21 @param gcm The GCM state which holds the H value 24 void gcm_mult_h(gcm_state *gcm, unsigned char *I) argument 30 asm("movdqa (%0),%%xmm0"::"r"(&gcm->PC[0][I[0]][0])); 32 asm("pxor (%0),%%xmm0"::"r"(&gcm->PC[x][I[x]][0])); 36 XMEMCPY(T, &gcm->PC[0][I[0]][0], 16); 40 *((LTC_FAST_TYPE *)(T + y)) ^= *((LTC_FAST_TYPE *)(&gcm->PC[x][I[x]][y])); 44 T[y] ^= gcm->PC[x][I[x]][y]; 50 gcm_gf_mult(gcm->H, I, T); 56 /* $Source: /cvs/libtom/libtomcrypt/src/encauth/gcm/gcm_mult_h.c,v $ */
|
H A D | gcm_process.c | 22 @param gcm The GCM state 29 int gcm_process(gcm_state *gcm, argument 38 LTC_ARGCHK(gcm != NULL); 44 if (gcm->buflen > 16 || gcm->buflen < 0) { 48 if ((err = cipher_is_valid(gcm->cipher)) != CRYPT_OK) { 53 if (gcm->mode == GCM_MODE_AAD) { 55 if (gcm->buflen) { 56 gcm->totlen += gcm [all...] |
H A D | gcm_init.c | 22 @param gcm The GCM state to initialize 28 int gcm_init(gcm_state *gcm, int cipher, argument 37 LTC_ARGCHK(gcm != NULL); 55 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, &gcm->K)) != CRYPT_OK) { 61 if ((err = cipher_descriptor[cipher].ecb_encrypt(B, gcm->H, &gcm->K)) != CRYPT_OK) { 66 zeromem(gcm->buf, sizeof(gcm->buf)); 67 zeromem(gcm->X, sizeof(gcm [all...] |
H A D | gcm_memory.c | 47 gcm_state *gcm; local 69 orig = gcm = XMALLOC(sizeof(*gcm)); 71 orig = gcm = XMALLOC(sizeof(*gcm) + 16); 73 if (gcm == NULL) { 78 * note that we only modify gcm and keep orig intact. This code is not portable 82 if ((unsigned long)gcm & 15) { 83 gcm = (gcm_state *)((unsigned long)gcm [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/gcm/ |
H A D | GCMMultiplier.java | 1 package org.bouncycastle.crypto.modes.gcm;
|
H A D | GCMExponentiator.java | 1 package org.bouncycastle.crypto.modes.gcm;
|
H A D | Tables1kGCMExponentiator.java | 1 package org.bouncycastle.crypto.modes.gcm;
|
H A D | Tables8kGCMMultiplier.java | 1 package org.bouncycastle.crypto.modes.gcm;
|
H A D | GCMUtil.java | 1 package org.bouncycastle.crypto.modes.gcm;
|
/external/dropbear/libtomcrypt/testprof/ |
H A D | x86_prof.c | 1384 gcm_state gcm local 1390 if ((err = gcm_init(&gcm, cipher_idx, key, 16)) != CRYPT_OK) { fprintf(stderr, "gcm_init: %s\n", error_to_string(err)); exit(EXIT_FAILURE); } 1396 if ((err = gcm_reset(&gcm)) != CRYPT_OK) { 1400 if ((err = gcm_add_iv(&gcm, IV, 16)) != CRYPT_OK) { 1404 if ((err = gcm_add_aad(&gcm, NULL, 0)) != CRYPT_OK) { 1408 if ((err = gcm_process(&gcm, buf, MAC_SIZE*1024, buf, GCM_ENCRYPT)) != CRYPT_OK) { 1413 if ((err = gcm_done(&gcm, tag, &z)) != CRYPT_OK) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
H A D | e_aes.c | 78 GCM128_CONTEXT gcm; member in struct:__anon13144 314 CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, 324 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 333 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 680 OPENSSL_cleanse(&gctx->gcm, sizeof(gctx->gcm)); 772 CRYPTO_gcm128_setiv(&gctx->gcm, gctx->iv, gctx->ivlen); 788 CRYPTO_gcm128_setiv(&gctx->gcm, gctx->iv, gctx->ivlen); 829 CRYPTO_gcm128_init(&gctx->gcm,&gctx->ks, 840 CRYPTO_gcm128_init(&gctx->gcm, [all...] |
/external/openssl/crypto/evp/ |
H A D | e_aes.c | 78 GCM128_CONTEXT gcm; member in struct:__anon23610 314 CRYPTO_gcm128_init(&gctx->gcm, &gctx->ks, 324 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 333 CRYPTO_gcm128_setiv(&gctx->gcm, iv, gctx->ivlen); 680 OPENSSL_cleanse(&gctx->gcm, sizeof(gctx->gcm)); 772 CRYPTO_gcm128_setiv(&gctx->gcm, gctx->iv, gctx->ivlen); 788 CRYPTO_gcm128_setiv(&gctx->gcm, gctx->iv, gctx->ivlen); 829 CRYPTO_gcm128_init(&gctx->gcm,&gctx->ks, 840 CRYPTO_gcm128_init(&gctx->gcm, [all...] |