Searched refs:ecb (Results 1 – 9 of 9) sorted by relevance
| /optee_os/core/lib/libtomcrypt/src/modes/ecb/ |
| H A D | ecb_encrypt.c | 20 int ecb_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_ECB *ecb) in ecb_encrypt() argument 25 LTC_ARGCHK(ecb != NULL); in ecb_encrypt() 26 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { in ecb_encrypt() 29 if (len % cipher_descriptor[ecb->cipher]->block_length) { in ecb_encrypt() 34 if (cipher_descriptor[ecb->cipher]->accel_ecb_encrypt != NULL) { in ecb_encrypt() 35 …return cipher_descriptor[ecb->cipher]->accel_ecb_encrypt(pt, ct, len / cipher_descriptor[ecb->ciph… in ecb_encrypt() 38 if ((err = cipher_descriptor[ecb->cipher]->ecb_encrypt(pt, ct, &ecb->key)) != CRYPT_OK) { in ecb_encrypt() 41 pt += cipher_descriptor[ecb->cipher]->block_length; in ecb_encrypt() 42 ct += cipher_descriptor[ecb->cipher]->block_length; in ecb_encrypt() 43 len -= cipher_descriptor[ecb->cipher]->block_length; in ecb_encrypt()
|
| H A D | ecb_decrypt.c | 20 int ecb_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_ECB *ecb) in ecb_decrypt() argument 25 LTC_ARGCHK(ecb != NULL); in ecb_decrypt() 26 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { in ecb_decrypt() 29 if (len % cipher_descriptor[ecb->cipher]->block_length) { in ecb_decrypt() 34 if (cipher_descriptor[ecb->cipher]->accel_ecb_decrypt != NULL) { in ecb_decrypt() 35 …return cipher_descriptor[ecb->cipher]->accel_ecb_decrypt(ct, pt, len / cipher_descriptor[ecb->ciph… in ecb_decrypt() 38 if ((err = cipher_descriptor[ecb->cipher]->ecb_decrypt(ct, pt, &ecb->key)) != CRYPT_OK) { in ecb_decrypt() 41 pt += cipher_descriptor[ecb->cipher]->block_length; in ecb_decrypt() 42 ct += cipher_descriptor[ecb->cipher]->block_length; in ecb_decrypt() 43 len -= cipher_descriptor[ecb->cipher]->block_length; in ecb_decrypt()
|
| H A D | ecb_done.c | 16 int ecb_done(symmetric_ECB *ecb) in ecb_done() argument 19 LTC_ARGCHK(ecb != NULL); in ecb_done() 21 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { in ecb_done() 24 cipher_descriptor[ecb->cipher]->done(&ecb->key); in ecb_done()
|
| H A D | ecb_start.c | 22 int ecb_start(int cipher, const unsigned char *key, int keylen, int num_rounds, symmetric_ECB *ecb) in ecb_start() argument 26 LTC_ARGCHK(ecb != NULL); in ecb_start() 31 ecb->cipher = cipher; in ecb_start() 32 ecb->blocklen = cipher_descriptor[cipher]->block_length; in ecb_start() 33 return cipher_descriptor[cipher]->setup(key, keylen, num_rounds, &ecb->key); in ecb_start()
|
| /optee_os/core/crypto/ |
| H A D | aes-cts.c | 35 struct crypto_cipher_ctx *ecb; member 59 res = crypto_cipher_init(c->ecb, mode, key1, key1_len, key2, key2_len, in cts_init() 194 return cbc_cts_update(c->cbc, c->ecb, c->mode, last_block, data, len, in cts_update() 203 crypto_cipher_final(c->ecb); in cts_final() 211 crypto_cipher_free_ctx(c->ecb); in cts_free_ctx() 222 crypto_cipher_copy_state(dst->ecb, src->ecb); in cts_copy_state() 242 res = crypto_aes_ecb_alloc_ctx(&c->ecb); in crypto_aes_cts_alloc_ctx() 254 crypto_cipher_free_ctx(c->ecb); in crypto_aes_cts_alloc_ctx()
|
| H A D | sub.mk | 41 srcs-$(CFG_CRYPTO_ECB) += sm4-ecb.c
|
| /optee_os/core/lib/libtomcrypt/ |
| H A D | ecb.c | 21 unsigned long len, symmetric_ECB *ecb);
|
| H A D | sub.mk | 180 srcs-$(_CFG_CORE_LTC_ECB) += ecb.c 181 srcs-$(_CFG_CORE_LTC_ECB) += src/modes/ecb/ecb_decrypt.c 182 srcs-$(_CFG_CORE_LTC_ECB) += src/modes/ecb/ecb_done.c 183 srcs-$(_CFG_CORE_LTC_ECB) += src/modes/ecb/ecb_encrypt.c 184 srcs-$(_CFG_CORE_LTC_ECB) += src/modes/ecb/ecb_start.c
|
| /optee_os/core/lib/libtomcrypt/src/headers/ |
| H A D | tomcrypt_cipher.h | 892 int keylen, int num_rounds, symmetric_ECB *ecb); 893 int ecb_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_ECB *ecb); 894 int ecb_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_ECB *ecb); 895 int ecb_done(symmetric_ECB *ecb);
|