HomeSort by: relevance | last modified time | path
    Searched defs:ccm (Results 1 - 14 of 14) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/
cipher_aes_ccm.h 45 } ccm; member in struct:prov_aes_ccm_ctx_st
  /src/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/
cipher_aes_ccm.h 45 } ccm; member in struct:prov_aes_ccm_ctx_st
  /src/sys/crypto/aes/
aes_ccm.c 30 * AES-CCM, as defined in:
33 * (CCM)', IETF RFC 3610, September 2003.
73 panic("AES-CCM overflow");
518 struct aes_ccm ccm, *C = &ccm; local
  /src/crypto/external/apache2/openssl/dist/crypto/evp/
e_aria.c 44 /* ARIA CCM context */
56 CCM128_CONTEXT ccm; member in struct:__anon278
200 /* Authenticated cipher modes (GCM/CCM) */
522 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L,
613 if (!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg))
623 if (cctx->ccm.key) {
624 if (cctx->ccm.key != &cctx->ks)
626 cctx_out->ccm.key = &cctx_out->ks;
640 CCM128_CONTEXT *ccm = &cctx->ccm; local
688 CCM128_CONTEXT *ccm = &cctx->ccm; local
    [all...]
e_aes.c 91 CCM128_CONTEXT ccm; member in struct:__anon228
341 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L,
727 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L,
967 * Padding is chosen so that ccm.kmac_param.k overlaps with key.k and
968 * ccm.fc with key.k.rounds. Remember that on s390x, an AES_KEY's
1011 } ccm; member in union:__anon248::__anon249
1802 ctx->aes.ccm.nonce.b[0] &= ~S390X_CCM_AAD_FLAG;
1803 ctx->aes.ccm.nonce.g[1] = mlen;
1804 memcpy(ctx->aes.ccm.nonce.b + 1, nonce, 15 - ctx->aes.ccm.l)
3536 CCM128_CONTEXT *ccm = &cctx->ccm; local
3585 CCM128_CONTEXT *ccm = &cctx->ccm; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
quic_cc_test.c 95 const OSSL_CC_METHOD *ccm; member in struct:net_sim
108 const OSSL_CC_METHOD *ccm, OSSL_CC_DATA *cc,
111 s->ccm = ccm;
187 if (!TEST_true(s->ccm->on_data_sent(s->cc, sz)))
237 if (!TEST_true(s->ccm->on_data_lost(s->cc, &loss_info)))
240 if (!TEST_true(s->ccm->on_data_lost_finished(s->cc, 0)))
252 if (!TEST_true(s->ccm->on_data_acked(s->cc, &ack_info)))
284 static int dump_state(const OSSL_CC_METHOD *ccm, OSSL_CC_DATA *cc,
293 if (!TEST_true(ccm->get_option_uint(cc, OSSL_CC_OPTION_CUR_CWND_SIZE
333 const OSSL_CC_METHOD *ccm = &ossl_cc_newreno_method; local
487 const OSSL_CC_METHOD *ccm = &ossl_cc_newreno_method; local
    [all...]
evp_libctx_test.c 350 int ret = 0, diff, ccm, siv, no_null_key; local
444 /* ccm fails on the second update - this matches OpenSSL 1_1_1 behaviour */
445 ccm = (EVP_CIPHER_get_mode(cipher) == EVP_CIPH_CCM_MODE);
464 ccm ? 0 : 1)
468 ccm || siv ? 0 : 1))))
471 if (ccm == 0) {
  /src/crypto/external/bsd/openssl/dist/crypto/evp/
e_aria.c 44 /* ARIA CCM context */
56 CCM128_CONTEXT ccm; member in struct:__anon1387
197 /* Authenticated cipher modes (GCM/CCM) */
525 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L,
617 if (!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg))
628 if (cctx->ccm.key) {
629 if (cctx->ccm.key != &cctx->ks)
631 cctx_out->ccm.key = &cctx_out->ks;
645 CCM128_CONTEXT *ccm = &cctx->ccm; local
693 CCM128_CONTEXT *ccm = &cctx->ccm; local
    [all...]
e_aes.c 91 CCM128_CONTEXT ccm; member in struct:__anon1337
323 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L,
678 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L,
905 * Padding is chosen so that ccm.kmac_param.k overlaps with key.k and
906 * ccm.fc with key.k.rounds. Remember that on s390x, an AES_KEY's
949 } ccm; member in union:__anon1357::__anon1358
1703 ctx->aes.ccm.nonce.b[0] &= ~S390X_CCM_AAD_FLAG;
1704 ctx->aes.ccm.nonce.g[1] = mlen;
1705 memcpy(ctx->aes.ccm.nonce.b + 1, nonce, 15 - ctx->aes.ccm.l)
3426 CCM128_CONTEXT *ccm = &cctx->ccm; local
3475 CCM128_CONTEXT *ccm = &cctx->ccm; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/evp/
e_aria.c 43 /* ARIA CCM context */
55 CCM128_CONTEXT ccm; member in struct:__anon2029
189 /* Authenticated cipher modes (GCM/CCM) */
515 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L,
607 if (!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg))
618 if (cctx->ccm.key) {
619 if (cctx->ccm.key != &cctx->ks)
621 cctx_out->ccm.key = &cctx_out->ks;
635 CCM128_CONTEXT *ccm = &cctx->ccm; local
682 CCM128_CONTEXT *ccm = &cctx->ccm; local
    [all...]
e_aes.c 73 CCM128_CONTEXT ccm; member in struct:__anon1979
447 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L,
885 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L,
1108 * Padding is chosen so that ccm.kmac_param.k overlaps with key.k and
1109 * ccm.fc with key.k.rounds. Remember that on s390x, an AES_KEY's
1152 } ccm; member in union:__anon1999::__anon2000
1971 ctx->aes.ccm.nonce.b[0] &= ~S390X_CCM_AAD_FLAG;
1972 ctx->aes.ccm.nonce.g[1] = mlen;
1973 memcpy(ctx->aes.ccm.nonce.b + 1, nonce, 15 - ctx->aes.ccm.l)
3651 CCM128_CONTEXT *ccm = &cctx->ccm; local
3699 CCM128_CONTEXT *ccm = &cctx->ccm; local
    [all...]
  /src/sys/dev/sbus/
zx.c 529 const uint8_t *ccm = sc->sc_curcmap; local
536 red[i] = ccm[i + cm->index + 0];
537 green[i] = ccm[i + cm->index + 2];
538 blue[i] = ccm[i + cm->index + 4];
  /src/crypto/external/bsd/openssl/dist/test/
evp_libctx_test.c 316 int ret = 0, diff, ccm, siv, no_null_key; local
350 /* ccm fails on the second update - this matches OpenSSL 1_1_1 behaviour */
351 ccm = (EVP_CIPHER_get_mode(cipher) == EVP_CIPH_CCM_MODE);
371 ccm ? 0 : 1)
375 ccm || siv ? 0 : 1))))
378 if (ccm == 0) {
  /src/external/gpl3/gcc.old/dist/gcc/config/arc/
arc.cc 9491 machine_mode ccm = GET_MODE (XEXP (cond, 0));
9493 if (code == UNKNOWN || ccm == CC_FP_GTmode || ccm == CC_FP_GEmode)
9700 machine_mode ccm = GET_MODE (XEXP (cond, 0));
9702 if (code == UNKNOWN || ccm == CC_FP_GTmode || ccm == CC_FP_GEmode)
9490 machine_mode ccm = GET_MODE (XEXP (cond, 0)); local
9699 machine_mode ccm = GET_MODE (XEXP (cond, 0)); local

Completed in 48 milliseconds