/external/dropbear/libtomcrypt/src/modes/ecb/ |
H A D | ecb_start.c | 26 @param num_rounds Number of rounds in the cipher desired (0 for default) 30 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) argument 41 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ecb->key);
|
/external/dropbear/libtomcrypt/src/modes/cbc/ |
H A D | cbc_start.c | 26 @param num_rounds Number of rounds in the cipher desired (0 for default) 31 int keylen, int num_rounds, symmetric_CBC *cbc) 45 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cbc->key)) != CRYPT_OK) { 30 cbc_start(int cipher, const unsigned char *IV, const unsigned char *key, int keylen, int num_rounds, symmetric_CBC *cbc) argument
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
H A D | ofb_start.c | 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 32 int keylen, int num_rounds, symmetric_OFB *ofb) 53 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ofb->key); 31 ofb_start(int cipher, const unsigned char *IV, const unsigned char *key, int keylen, int num_rounds, symmetric_OFB *ofb) argument
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
H A D | cfb_start.c | 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 32 int keylen, int num_rounds, symmetric_CFB *cfb) 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &cfb->key)) != CRYPT_OK) { 31 cfb_start(int cipher, const unsigned char *IV, const unsigned char *key, int keylen, int num_rounds, symmetric_CFB *cfb) argument
|
/external/dropbear/libtomcrypt/src/headers/ |
H A D | tomcrypt_cipher.h | 334 @param num_rounds The requested number of rounds (0==default) 338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 536 int blowfish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 546 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 556 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 566 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 576 int saferp_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 586 int safer_k64_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 587 int safer_sk64_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 588 int safer_k128_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ke [all...] |
/external/dropbear/libtomcrypt/src/modes/f8/ |
H A D | f8_start.c | 29 @param num_rounds Number of rounds in the cipher desired (0 for default) 36 int num_rounds, symmetric_F8 *f8) 75 if ((err = cipher_descriptor[cipher].setup(tkey, keylen, num_rounds, &f8->key)) != CRYPT_OK) { 91 return cipher_descriptor[cipher].setup(key, keylen, num_rounds, &f8->key); 33 f8_start( int cipher, const unsigned char *IV, const unsigned char *key, int keylen, const unsigned char *salt_key, int skeylen, int num_rounds, symmetric_F8 *f8) argument
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
H A D | ctr_start.c | 27 @param num_rounds Number of rounds in the cipher desired (0 for default) 35 int num_rounds, int ctr_mode, 50 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ctr->key)) != CRYPT_OK) { 32 ctr_start( int cipher, const unsigned char *IV, const unsigned char *key, int keylen, int num_rounds, int ctr_mode, symmetric_CTR *ctr) argument
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
H A D | lrw_start.c | 27 @param num_rounds The number of rounds for the cipher (0 == default) 35 int num_rounds, 64 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &lrw->key)) != CRYPT_OK) { 31 lrw_start( int cipher, const unsigned char *IV, const unsigned char *key, int keylen, const unsigned char *tweak, int num_rounds, symmetric_LRW *lrw) argument
|
/external/dropbear/libtomcrypt/src/ciphers/ |
H A D | rc5.c | 49 @param num_rounds The number of rounds desired (0 for default) 54 static int _rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 56 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 65 if (num_rounds == 0) { 66 num_rounds = rc5_desc.default_rounds; 69 if (num_rounds < 12 || num_rounds > 24) { 78 skey->rc5.rounds = num_rounds; 96 t = (ulong32)(2 * (num_rounds + 1)); 112 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_ke argument [all...] |
H A D | rc6.c | 46 @param num_rounds The number of rounds desired (0 for default) 51 static int _rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 53 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 62 if (num_rounds != 0 && num_rounds != 20) { 107 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 110 x = _rc6_setup(key, keylen, num_rounds, skey);
|
H A D | xtea.c | 34 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 46 if (num_rounds != 0 && num_rounds != 32) {
|
H A D | kasumi.c | 195 int kasumi_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 208 if (num_rounds != 0 && num_rounds != 8) {
|
H A D | noekeon.c | 71 @param num_rounds The number of rounds desired (0 for default) 75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 86 if (num_rounds != 16 && num_rounds != 0) {
|
H A D | rc2.c | 66 @param num_rounds The number of rounds desired (0 for default) 70 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 84 if (num_rounds != 0 && num_rounds != 16) {
|
H A D | skipjack.c | 63 @param num_rounds The number of rounds desired (0 for default) 67 int skipjack_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 78 if (num_rounds != 32 && num_rounds != 0) {
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_i.h | 159 int num_rounds; member in struct:eap_sm
|
H A D | eap_server.c | 125 sm->num_rounds = 0; 171 sm->num_rounds = 0; 239 sm->num_rounds++; 621 else if (sm->num_rounds > EAP_MAX_AUTH_ROUNDS) { 622 if (sm->num_rounds == EAP_MAX_AUTH_ROUNDS + 1) { 626 sm->num_rounds++;
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_i.h | 159 int num_rounds; member in struct:eap_sm
|
H A D | eap_server.c | 125 sm->num_rounds = 0; 171 sm->num_rounds = 0; 239 sm->num_rounds++; 621 else if (sm->num_rounds > EAP_MAX_AUTH_ROUNDS) { 622 if (sm->num_rounds == EAP_MAX_AUTH_ROUNDS + 1) { 626 sm->num_rounds++;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_i.h | 159 int num_rounds; member in struct:eap_sm
|
H A D | eap_server.c | 125 sm->num_rounds = 0; 171 sm->num_rounds = 0; 239 sm->num_rounds++; 621 else if (sm->num_rounds > EAP_MAX_AUTH_ROUNDS) { 622 if (sm->num_rounds == EAP_MAX_AUTH_ROUNDS + 1) { 626 sm->num_rounds++;
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_i.h | 342 int num_rounds; member in struct:eap_sm
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_i.h | 342 int num_rounds; member in struct:eap_sm
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_i.h | 342 int num_rounds; member in struct:eap_sm
|
/external/dropbear/libtomcrypt/src/ciphers/twofish/ |
H A D | twofish.c | 341 @param num_rounds The number of rounds desired (0 for default) 346 static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 348 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 362 if (num_rounds != 16 && num_rounds != 0) { 456 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 459 x = _twofish_setup(key, keylen, num_rounds, skey);
|