/optee_os/core/lib/libtomcrypt/ |
A D | aes_accel.c | 102 LTC_ARGCHK(ct); in aes_ecb_encrypt_nblocks() 115 LTC_ARGCHK(ct); in aes_ecb_decrypt_nblocks() 127 return aes_ecb_encrypt_nblocks(pt, ct, 1, skey); in rijndael_ecb_encrypt() 133 return aes_ecb_decrypt_nblocks(ct, pt, 1, skey); in rijndael_ecb_decrypt() 141 LTC_ARGCHK(ct); in aes_cbc_encrypt_nblocks() 156 LTC_ARGCHK(ct); in aes_cbc_decrypt_nblocks() 171 LTC_ARGCHK(ct); in aes_ctr_encrypt_nblocks() 192 LTC_ARGCHK(ct); in aes_xts_encrypt_nblocks() 199 crypto_accel_aes_xts_enc(ct, pt, skey1->rijndael.eK, in aes_xts_encrypt_nblocks() 212 LTC_ARGCHK(ct); in aes_xts_decrypt_nblocks() [all …]
|
/optee_os/core/lib/libtomcrypt/src/headers/ |
A D | tomcrypt_cipher.h | 519 unsigned char *ct, 543 unsigned char *ct, 601 int (*accel_xts_encrypt)(const unsigned char *pt, unsigned char *ct, 616 int (*accel_xts_decrypt)(const unsigned char *ct, unsigned char *pt, 633 int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey); 634 int rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey); 643 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey); 644 int rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey); 654 int rc2_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey); 970 unsigned char *ct, [all …]
|
A D | tomcrypt_mac.h | 270 unsigned char *ct, 277 const unsigned char *ct, unsigned long ctlen, 308 unsigned char *ct, 320 unsigned char *ct, 326 const unsigned char *ct, unsigned long ctlen, 382 unsigned char *ct, 389 const unsigned char *ct, unsigned long ctlen, 435 unsigned char *ct, 447 unsigned char *ct, 514 unsigned char *ct, [all …]
|
/optee_os/core/lib/libtomcrypt/src/ciphers/ |
A D | skipjack.c | 152 LTC_ARGCHK(ct != NULL); in _skipjack_ecb_encrypt() 182 ct[0] = (w1>>8)&255; ct[1] = w1&255; in _skipjack_ecb_encrypt() 183 ct[2] = (w2>>8)&255; ct[3] = w2&255; in _skipjack_ecb_encrypt() 184 ct[4] = (w3>>8)&255; ct[5] = w3&255; in _skipjack_ecb_encrypt() 185 ct[6] = (w4>>8)&255; ct[7] = w4&255; in _skipjack_ecb_encrypt() 216 LTC_ARGCHK(ct != NULL); in _skipjack_ecb_decrypt() 220 w1 = ((unsigned)ct[0]<<8)|ct[1]; in _skipjack_ecb_decrypt() 221 w2 = ((unsigned)ct[2]<<8)|ct[3]; in _skipjack_ecb_decrypt() 222 w3 = ((unsigned)ct[4]<<8)|ct[5]; in _skipjack_ecb_decrypt() 223 w4 = ((unsigned)ct[6]<<8)|ct[7]; in _skipjack_ecb_decrypt() [all …]
|
A D | rc2.c | 162 LTC_ARGCHK(ct != NULL); in _rc2_ecb_encrypt() 193 ct[0] = (unsigned char)x10; in _rc2_ecb_encrypt() 194 ct[1] = (unsigned char)(x10 >> 8); in _rc2_ecb_encrypt() 195 ct[2] = (unsigned char)x32; in _rc2_ecb_encrypt() 197 ct[4] = (unsigned char)x54; in _rc2_ecb_encrypt() 199 ct[6] = (unsigned char)x76; in _rc2_ecb_encrypt() 241 LTC_ARGCHK(ct != NULL); in _rc2_ecb_decrypt() 246 x76 = ((unsigned)ct[7] << 8) + (unsigned)ct[6]; in _rc2_ecb_decrypt() 247 x54 = ((unsigned)ct[5] << 8) + (unsigned)ct[4]; in _rc2_ecb_decrypt() 248 x32 = ((unsigned)ct[3] << 8) + (unsigned)ct[2]; in _rc2_ecb_decrypt() [all …]
|
A D | noekeon.c | 114 int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in _noekeon_ecb_encrypt() 122 LTC_ARGCHK(ct != NULL); in _noekeon_ecb_encrypt() 143 STORE32H(a,&ct[0]); STORE32H(b,&ct[4]); in _noekeon_ecb_encrypt() 144 STORE32H(c,&ct[8]); STORE32H(d,&ct[12]); in _noekeon_ecb_encrypt() 152 int err = _noekeon_ecb_encrypt(pt, ct, skey); in noekeon_ecb_encrypt() 176 LTC_ARGCHK(ct != NULL); in _noekeon_ecb_decrypt() 178 LOAD32H(a,&ct[0]); LOAD32H(b,&ct[4]); in _noekeon_ecb_decrypt() 179 LOAD32H(c,&ct[8]); LOAD32H(d,&ct[12]); in _noekeon_ecb_decrypt() 205 int err = _noekeon_ecb_decrypt(ct, pt, skey); in noekeon_ecb_decrypt() 222 unsigned char key[16], pt[16], ct[16]; in noekeon_test() [all …]
|
A D | rc6.c | 124 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in _rc6_ecb_encrypt() 133 LTC_ARGCHK(ct != NULL); in _rc6_ecb_encrypt() 157 STORE32L(a,&ct[0]);STORE32L(b,&ct[4]);STORE32L(c,&ct[8]);STORE32L(d,&ct[12]); in _rc6_ecb_encrypt() 162 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in rc6_ecb_encrypt() argument 164 int err = _rc6_ecb_encrypt(pt, ct, skey); in rc6_ecb_encrypt() 179 int rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, const symmetric_key *skey) in _rc6_ecb_decrypt() 188 LTC_ARGCHK(ct != NULL); in _rc6_ecb_decrypt() 190 LOAD32L(a,&ct[0]);LOAD32L(b,&ct[4]);LOAD32L(c,&ct[8]);LOAD32L(d,&ct[12]); in _rc6_ecb_decrypt() 221 int err = _rc6_ecb_decrypt(ct, pt, skey); in rc6_ecb_decrypt() 238 unsigned char key[32], pt[16], ct[16]; in rc6_test() [all …]
|
A D | blowfish.c | 392 int blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in _blowfish_ecb_encrypt() 402 LTC_ARGCHK(ct != NULL); in _blowfish_ecb_encrypt() 429 STORE32H(R, &ct[0]); in _blowfish_ecb_encrypt() 430 STORE32H(L, &ct[4]); in _blowfish_ecb_encrypt() 438 int err = _blowfish_ecb_encrypt(pt, ct, skey); in blowfish_ecb_encrypt() 464 LTC_ARGCHK(ct != NULL); in _blowfish_ecb_decrypt() 475 LOAD32H(R, &ct[0]); in _blowfish_ecb_decrypt() 476 LOAD32H(L, &ct[4]); in _blowfish_ecb_decrypt() 499 int err = _blowfish_ecb_decrypt(ct, pt, skey); in blowfish_ecb_decrypt() 518 unsigned char key[8], pt[8], ct[8]; in blowfish_test() [all …]
|
A D | rc5.c | 130 int rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in _rc5_ecb_encrypt() 138 LTC_ARGCHK(ct != NULL); in _rc5_ecb_encrypt() 161 STORE32L(A, &ct[0]); in _rc5_ecb_encrypt() 162 STORE32L(B, &ct[4]); in _rc5_ecb_encrypt() 170 int err = _rc5_ecb_encrypt(pt, ct, skey); in rc5_ecb_encrypt() 194 LTC_ARGCHK(ct != NULL); in _rc5_ecb_decrypt() 196 LOAD32L(A, &ct[0]); in _rc5_ecb_decrypt() 197 LOAD32L(B, &ct[4]); in _rc5_ecb_decrypt() 227 int err = _rc5_ecb_decrypt(ct, pt, skey); in rc5_ecb_decrypt() 243 unsigned char key[16], pt[8], ct[8]; in rc5_test() [all …]
|
A D | kseed.c | 258 int kseed_ecb_encrypt(const unsigned char *pt, unsigned char *ct, const symmetric_key *skey) in kseed_ecb_encrypt() argument 266 STORE32H(P[2], ct); in kseed_ecb_encrypt() 267 STORE32H(P[3], ct+4); in kseed_ecb_encrypt() 268 STORE32H(P[0], ct+8); in kseed_ecb_encrypt() 269 STORE32H(P[1], ct+12); in kseed_ecb_encrypt() 283 LOAD32H(P[0], ct); in kseed_ecb_decrypt() 284 LOAD32H(P[1], ct+4); in kseed_ecb_decrypt() 285 LOAD32H(P[2], ct+8); in kseed_ecb_decrypt() 286 LOAD32H(P[3], ct+12); in kseed_ecb_decrypt() 313 unsigned char pt[16], ct[16], key[16]; in kseed_test() [all …]
|
A D | multi2.c | 156 LTC_ARGCHK(ct != NULL); in multi2_ecb_encrypt() 161 STORE32H(p[0], ct); in multi2_ecb_encrypt() 162 STORE32H(p[1], ct+4); in multi2_ecb_encrypt() 177 LTC_ARGCHK(ct != NULL); in multi2_ecb_decrypt() 179 LOAD32H(p[0], ct); in multi2_ecb_decrypt() 180 LOAD32H(p[1], ct+4); in multi2_ecb_decrypt() 195 unsigned char pt[8], ct[8]; in multi2_test() member 260 if (compare_testvector(buf, 8, tests[x].ct, 8, "Multi2 Encrypt", x)) { in multi2_test() 273 unsigned char ct[8]; in multi2_test() local 278 if ((err = multi2_ecb_encrypt(tests[0].pt, ct, &skey)) != CRYPT_OK) { in multi2_test() [all …]
|
/optee_os/core/lib/libtomcrypt/src/ciphers/safer/ |
A D | saferp.c | 348 LTC_ARGCHK(ct != NULL); in saferp_ecb_encrypt() 355 ROUND(b, 0); LT(b, ct); in saferp_ecb_encrypt() 356 ROUND(ct, 2); LT(ct, b); in saferp_ecb_encrypt() 357 ROUND(b, 4); LT(b, ct); in saferp_ecb_encrypt() 358 ROUND(ct, 6); LT(ct, b); in saferp_ecb_encrypt() 360 ROUND(ct, 10); LT(ct, b); in saferp_ecb_encrypt() 362 ROUND(ct, 14); LT(ct, b); in saferp_ecb_encrypt() 366 ROUND(ct, 18); LT(ct, b); in saferp_ecb_encrypt() 368 ROUND(ct, 22); LT(ct, b); in saferp_ecb_encrypt() 373 ROUND(ct, 26); LT(ct, b); in saferp_ecb_encrypt() [all …]
|
A D | safer.c | 251 unsigned char *ct, in _safer_ecb_encrypt() argument 263 LTC_ARGCHK(ct != NULL); in _safer_ecb_encrypt() 285 ct[0] = a & 0xFF; ct[1] = b & 0xFF; in _safer_ecb_encrypt() 286 ct[2] = c & 0xFF; ct[3] = d & 0xFF; in _safer_ecb_encrypt() 287 ct[4] = e & 0xFF; ct[5] = f & 0xFF; in _safer_ecb_encrypt() 288 ct[6] = g & 0xFF; ct[7] = h & 0xFF; in _safer_ecb_encrypt() 308 int safer_ecb_decrypt(const unsigned char *ct, in _safer_ecb_decrypt() 316 LTC_ARGCHK(ct != NULL); in _safer_ecb_decrypt() 321 a = ct[0]; b = ct[1]; c = ct[2]; d = ct[3]; in _safer_ecb_decrypt() 322 e = ct[4]; f = ct[5]; g = ct[6]; h = ct[7]; in _safer_ecb_decrypt() [all …]
|
/optee_os/core/lib/libtomcrypt/src/modes/lrw/ |
A D | lrw_process.c | 28 int lrw_process(const unsigned char *pt, unsigned char *ct, unsigned long len, int mode, symmetric_… in lrw_process() argument 37 LTC_ARGCHK(ct != NULL); in lrw_process() 77 …*(LTC_FAST_TYPE_PTR_CAST(ct + x)) = *(LTC_FAST_TYPE_PTR_CAST(pt + x)) ^ *(LTC_FAST_TYPE_PTR_CAST(p… in lrw_process() 81 ct[x] = pt[x] ^ prod[x]; in lrw_process() 87 if ((err = cipher_descriptor[lrw->cipher]->ecb_encrypt(ct, ct, &lrw->key)) != CRYPT_OK) { in lrw_process() 91 if ((err = cipher_descriptor[lrw->cipher]->ecb_decrypt(ct, ct, &lrw->key)) != CRYPT_OK) { in lrw_process() 99 …*(LTC_FAST_TYPE_PTR_CAST(ct + x)) = *(LTC_FAST_TYPE_PTR_CAST(ct + x)) ^ *(LTC_FAST_TYPE_PTR_CAST(p… in lrw_process() 103 ct[x] = ct[x] ^ prod[x]; in lrw_process() 109 ct += 16; in lrw_process()
|
/optee_os/core/lib/libtomcrypt/src/stream/chacha/ |
A D | chacha_test.c | 31 …unsigned char ct[] = { 0x6E, 0x2E, 0x35, 0x9A, 0x25, 0x68, 0xF9, 0x80, 0x41, 0xBA, 0x07, 0x28, 0xD… in chacha_test() 53 …if (compare_testvector(out, len, ct, sizeof(ct), "CHACHA-TV1", 1)) return CRY… in chacha_test() 59 …if (compare_testvector(out, len, ct, sizeof(ct), "CHACHA-TV2", 1)) return CRY… in chacha_test() 65 …if (compare_testvector(out, len, ct, sizeof(ct), "CHACHA-TV3", 1)) return CRY… in chacha_test() 70 …if (compare_testvector(out, len, ct, sizeof(ct), "CHACHA-TV4", 1)) return CRY… in chacha_test() 75 …if (compare_testvector(out, len, ct, sizeof(ct), "CHACHA-TV5", 1)) return CRY… in chacha_test()
|
/optee_os/core/lib/libtomcrypt/src/modes/ctr/ |
A D | ctr_encrypt.c | 48 static int _ctr_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CT… in _ctr_encrypt() argument 64 …*(LTC_FAST_TYPE_PTR_CAST((unsigned char *)ct + x)) = *(LTC_FAST_TYPE_PTR_CAST((unsigned char *)pt … in _ctr_encrypt() 68 ct += ctr->blocklen; in _ctr_encrypt() 74 *ct++ = *pt++ ^ ctr->pad[ctr->padlen++]; in _ctr_encrypt() 93 int ctr_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CTR *ctr) in ctr_encrypt() argument 99 LTC_ARGCHK(ct != NULL); in ctr_encrypt() 125 ct += (len / ctr->blocklen) * ctr->blocklen; in ctr_encrypt() 134 if ((err = _ctr_encrypt(pt, ct, incr, ctr)) != CRYPT_OK) { in ctr_encrypt() 138 ct += incr; in ctr_encrypt() 140 return ctr_encrypt(pt, ct, len, ctr); in ctr_encrypt() [all …]
|
/optee_os/core/lib/libtomcrypt/src/stream/rc4/ |
A D | rc4_test.c | 24 const unsigned char ct[] = { 0x75, 0xb7, 0x87, 0x80, 0x99, 0xe0, 0xc5, 0x96 }; in rc4_stream_test() 29 …if (compare_testvector(buf, sizeof(ct), ct, sizeof(ct), "RC4-TV1", 0)) return CRYPT_FAIL_TESTVECT… in rc4_stream_test() 34 …if (compare_testvector(buf, sizeof(ct), ct, sizeof(ct), "RC4-TV2", 0)) return CRYPT_FAIL_TESTVECT… in rc4_stream_test()
|
/optee_os/core/lib/libtomcrypt/src/encauth/chachapoly/ |
A D | chacha20poly1305_test.c | 40 unsigned char ct[1000], pt[1000], emac[16], dmac[16]; in chacha20poly1305_test() 48 …if ((err = chacha20poly1305_encrypt(&st1, (unsigned char *)m, 25, ct)) != CRYPT_OK) re… in chacha20poly1305_test() 57 …if (compare_testvector(ct, mlen, enc, sizeof(enc), "ENC-CT", 1) != 0) return CRYPT_FAIL_TESTVECTOR; in chacha20poly1305_test() 64 if ((err = chacha20poly1305_decrypt(&st2, ct, 21, pt)) != CRYPT_OK) return err; in chacha20poly1305_test() 65 if ((err = chacha20poly1305_decrypt(&st2, ct + 21, mlen - 21, pt + 21)) != CRYPT_OK) return err; in chacha20poly1305_test() 76 …if (compare_testvector(ct, mlen, enc, sizeof(enc), "ENC-CT2", 1) != 0) return CRYPT_FAIL_TESTVECTO… in chacha20poly1305_test() 90 if ((err = chacha20poly1305_encrypt(&st1, rfc7905_pt, 16, ct)) != CRYPT_OK) return err; in chacha20poly1305_test() 94 if (compare_testvector(ct, 16, rfc7905_enc, 16, "ENC-CT3", 1) != 0) return CRYPT_FAIL_TESTVECTOR; in chacha20poly1305_test() 101 if ((err = chacha20poly1305_decrypt(&st1, ct, 16, pt)) != CRYPT_OK) return err; in chacha20poly1305_test() 112 if ((err = chacha20poly1305_encrypt(&st1, (unsigned char *)m, mlen, ct)) != CRYPT_OK) return err; in chacha20poly1305_test() [all …]
|
/optee_os/core/lib/libtomcrypt/src/modes/cbc/ |
A D | cbc_encrypt.c | 28 int cbc_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CBC *cbc) in cbc_encrypt() argument 33 LTC_ARGCHK(ct != NULL); in cbc_encrypt() 55 …return cipher_descriptor[cbc->cipher]->accel_cbc_encrypt(pt, ct, len / cbc->blocklen, cbc->IV, &cb… in cbc_encrypt() 70 if ((err = cipher_descriptor[cbc->cipher]->ecb_encrypt(cbc->IV, ct, &cbc->key)) != CRYPT_OK) { in cbc_encrypt() 77 …_TYPE_PTR_CAST((unsigned char *)cbc->IV + x)) = *(LTC_FAST_TYPE_PTR_CAST((unsigned char *)ct + x)); in cbc_encrypt() 81 cbc->IV[x] = ct[x]; in cbc_encrypt() 85 ct += cbc->blocklen; in cbc_encrypt()
|
A D | cbc_decrypt.c | 28 int cbc_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CBC *cbc) in cbc_decrypt() argument 39 LTC_ARGCHK(ct != NULL); in cbc_decrypt() 61 …return cipher_descriptor[cbc->cipher]->accel_cbc_decrypt(ct, pt, len / cbc->blocklen, cbc->IV, &cb… in cbc_decrypt() 65 if ((err = cipher_descriptor[cbc->cipher]->ecb_decrypt(ct, tmp, &cbc->key)) != CRYPT_OK) { in cbc_decrypt() 73 …_TYPE_PTR_CAST((unsigned char *)cbc->IV + x)) = *(LTC_FAST_TYPE_PTR_CAST((unsigned char *)ct + x)); in cbc_decrypt() 79 cbc->IV[x] = ct[x]; in cbc_decrypt() 84 ct += cbc->blocklen; in cbc_decrypt()
|
/optee_os/core/lib/libtomcrypt/src/stream/sosemanuk/ |
A D | sosemanuk_test.c | 27 …unsigned char ct[] = { 0x7e, 0xfe, 0x2e, 0x6f, 0x8f, 0x77, 0x15, 0x72, 0x6a, 0x88, 0x14, 0xa6, 0x5… in sosemanuk_test() 40 …if (compare_testvector(out, len, ct, sizeof(ct), "SOSEMANUK-TV1", 1)) return … in sosemanuk_test() 46 …if (compare_testvector(out, len, ct, sizeof(ct), "SOSEMANUK-TV2", 1)) return CRYPT_FAIL_TEST… in sosemanuk_test() 51 …if (compare_testvector(out, len, ct, sizeof(ct), "SOSEMANUK-TV3", 1)) return CRYPT_FAIL_TEST… in sosemanuk_test()
|
/optee_os/core/lib/libtomcrypt/src/modes/xts/ |
A D | xts_decrypt.c | 60 int xts_decrypt(const unsigned char *ct, unsigned long ptlen, unsigned char *pt, unsigned char *twe… in xts_decrypt() argument 69 LTC_ARGCHK(ct != NULL); in xts_decrypt() 96 …if ((err = cipher_descriptor[xts->cipher]->accel_xts_decrypt(ct, pt, lim, tweak, &xts->key1, &xts-… in xts_decrypt() 100 ct += lim * 16; in xts_decrypt() 112 if ((err = _tweak_uncrypt(ct, pt, T, xts)) != CRYPT_OK) { in xts_decrypt() 115 ct += 16; in xts_decrypt() 126 if ((err = _tweak_uncrypt(ct, PP, CC, xts)) != CRYPT_OK) { in xts_decrypt() 132 CC[i] = ct[16 + i]; in xts_decrypt()
|
A D | xts_encrypt.c | 62 int xts_encrypt(const unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *twe… in xts_encrypt() argument 71 LTC_ARGCHK(ct != NULL); in xts_encrypt() 98 …if ((err = cipher_descriptor[xts->cipher]->accel_xts_encrypt(pt, ct, lim, tweak, &xts->key1, &xts-… in xts_encrypt() 102 ct += lim * 16; in xts_encrypt() 115 if ((err = _tweak_crypt(pt, ct, T, xts)) != CRYPT_OK) { in xts_encrypt() 118 ct += 16; in xts_encrypt() 133 ct[16 + i] = CC[i]; in xts_encrypt() 141 if ((err = _tweak_crypt(PP, ct, T, xts)) != CRYPT_OK) { in xts_encrypt()
|
/optee_os/core/lib/libtomcrypt/src/encauth/gcm/ |
A D | gcm_process.c | 30 unsigned char *ct, in gcm_process() argument 40 LTC_ARGCHK(ct != NULL); in gcm_process() 93 …*(LTC_FAST_TYPE_PTR_CAST(&ct[x + y])) = *(LTC_FAST_TYPE_PTR_CAST(&pt[x+y])) ^ *(LTC_FAST_TYPE_PTR_… in gcm_process() 94 *(LTC_FAST_TYPE_PTR_CAST(&gcm->X[y])) ^= *(LTC_FAST_TYPE_PTR_CAST(&ct[x+y])); in gcm_process() 111 *(LTC_FAST_TYPE_PTR_CAST(&gcm->X[y])) ^= *(LTC_FAST_TYPE_PTR_CAST(&ct[x+y])); in gcm_process() 112 …*(LTC_FAST_TYPE_PTR_CAST(&pt[x + y])) = *(LTC_FAST_TYPE_PTR_CAST(&ct[x+y])) ^ *(LTC_FAST_TYPE_PTR_… in gcm_process() 146 b = ct[x] = pt[x] ^ gcm->buf[gcm->buflen]; in gcm_process() 148 b = ct[x]; in gcm_process() 149 pt[x] = ct[x] ^ gcm->buf[gcm->buflen]; in gcm_process()
|
/optee_os/core/lib/libtomcrypt/src/modes/cfb/ |
A D | cfb_decrypt.c | 27 int cfb_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CFB *cfb) in cfb_decrypt() argument 32 LTC_ARGCHK(ct != NULL); in cfb_decrypt() 52 cfb->pad[cfb->padlen] = *ct; in cfb_decrypt() 53 *pt = *ct ^ cfb->IV[cfb->padlen]; in cfb_decrypt() 55 ++ct; in cfb_decrypt()
|