| /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/ |
| cipher_aes_ccm.h | 45 } ccm; member in struct:prov_aes_ccm_ctx_st
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/ |
| cipher_aes_ccm.h | 45 } ccm; member in struct:prov_aes_ccm_ctx_st
|
| /src/sys/crypto/aes/ |
| aes_ccm.c | 30 * AES-CCM, as defined in: 33 * (CCM)', IETF RFC 3610, September 2003. 73 panic("AES-CCM overflow"); 518 struct aes_ccm ccm, *C = &ccm; local
|
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| e_aria.c | 44 /* ARIA CCM context */ 56 CCM128_CONTEXT ccm; member in struct:__anon278 200 /* Authenticated cipher modes (GCM/CCM) */ 522 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, 613 if (!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg)) 623 if (cctx->ccm.key) { 624 if (cctx->ccm.key != &cctx->ks) 626 cctx_out->ccm.key = &cctx_out->ks; 640 CCM128_CONTEXT *ccm = &cctx->ccm; local 688 CCM128_CONTEXT *ccm = &cctx->ccm; local [all...] |
| e_aes.c | 91 CCM128_CONTEXT ccm; member in struct:__anon228 341 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, 727 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, 967 * Padding is chosen so that ccm.kmac_param.k overlaps with key.k and 968 * ccm.fc with key.k.rounds. Remember that on s390x, an AES_KEY's 1011 } ccm; member in union:__anon248::__anon249 1802 ctx->aes.ccm.nonce.b[0] &= ~S390X_CCM_AAD_FLAG; 1803 ctx->aes.ccm.nonce.g[1] = mlen; 1804 memcpy(ctx->aes.ccm.nonce.b + 1, nonce, 15 - ctx->aes.ccm.l) 3536 CCM128_CONTEXT *ccm = &cctx->ccm; local 3585 CCM128_CONTEXT *ccm = &cctx->ccm; local [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| quic_cc_test.c | 95 const OSSL_CC_METHOD *ccm; member in struct:net_sim 108 const OSSL_CC_METHOD *ccm, OSSL_CC_DATA *cc, 111 s->ccm = ccm; 187 if (!TEST_true(s->ccm->on_data_sent(s->cc, sz))) 237 if (!TEST_true(s->ccm->on_data_lost(s->cc, &loss_info))) 240 if (!TEST_true(s->ccm->on_data_lost_finished(s->cc, 0))) 252 if (!TEST_true(s->ccm->on_data_acked(s->cc, &ack_info))) 284 static int dump_state(const OSSL_CC_METHOD *ccm, OSSL_CC_DATA *cc, 293 if (!TEST_true(ccm->get_option_uint(cc, OSSL_CC_OPTION_CUR_CWND_SIZE 333 const OSSL_CC_METHOD *ccm = &ossl_cc_newreno_method; local 487 const OSSL_CC_METHOD *ccm = &ossl_cc_newreno_method; local [all...] |
| evp_libctx_test.c | 350 int ret = 0, diff, ccm, siv, no_null_key; local 444 /* ccm fails on the second update - this matches OpenSSL 1_1_1 behaviour */ 445 ccm = (EVP_CIPHER_get_mode(cipher) == EVP_CIPH_CCM_MODE); 464 ccm ? 0 : 1) 468 ccm || siv ? 0 : 1)))) 471 if (ccm == 0) {
|
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| e_aria.c | 44 /* ARIA CCM context */ 56 CCM128_CONTEXT ccm; member in struct:__anon1387 197 /* Authenticated cipher modes (GCM/CCM) */ 525 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, 617 if (!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg)) 628 if (cctx->ccm.key) { 629 if (cctx->ccm.key != &cctx->ks) 631 cctx_out->ccm.key = &cctx_out->ks; 645 CCM128_CONTEXT *ccm = &cctx->ccm; local 693 CCM128_CONTEXT *ccm = &cctx->ccm; local [all...] |
| e_aes.c | 91 CCM128_CONTEXT ccm; member in struct:__anon1337 323 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, 678 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, 905 * Padding is chosen so that ccm.kmac_param.k overlaps with key.k and 906 * ccm.fc with key.k.rounds. Remember that on s390x, an AES_KEY's 949 } ccm; member in union:__anon1357::__anon1358 1703 ctx->aes.ccm.nonce.b[0] &= ~S390X_CCM_AAD_FLAG; 1704 ctx->aes.ccm.nonce.g[1] = mlen; 1705 memcpy(ctx->aes.ccm.nonce.b + 1, nonce, 15 - ctx->aes.ccm.l) 3426 CCM128_CONTEXT *ccm = &cctx->ccm; local 3475 CCM128_CONTEXT *ccm = &cctx->ccm; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
| e_aria.c | 43 /* ARIA CCM context */ 55 CCM128_CONTEXT ccm; member in struct:__anon2029 189 /* Authenticated cipher modes (GCM/CCM) */ 515 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, 607 if (!CRYPTO_ccm128_tag(&cctx->ccm, ptr, (size_t)arg)) 618 if (cctx->ccm.key) { 619 if (cctx->ccm.key != &cctx->ks) 621 cctx_out->ccm.key = &cctx_out->ks; 635 CCM128_CONTEXT *ccm = &cctx->ccm; local 682 CCM128_CONTEXT *ccm = &cctx->ccm; local [all...] |
| e_aes.c | 73 CCM128_CONTEXT ccm; member in struct:__anon1979 447 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, 885 CRYPTO_ccm128_init(&cctx->ccm, cctx->M, cctx->L, 1108 * Padding is chosen so that ccm.kmac_param.k overlaps with key.k and 1109 * ccm.fc with key.k.rounds. Remember that on s390x, an AES_KEY's 1152 } ccm; member in union:__anon1999::__anon2000 1971 ctx->aes.ccm.nonce.b[0] &= ~S390X_CCM_AAD_FLAG; 1972 ctx->aes.ccm.nonce.g[1] = mlen; 1973 memcpy(ctx->aes.ccm.nonce.b + 1, nonce, 15 - ctx->aes.ccm.l) 3651 CCM128_CONTEXT *ccm = &cctx->ccm; local 3699 CCM128_CONTEXT *ccm = &cctx->ccm; local [all...] |
| /src/sys/dev/sbus/ |
| zx.c | 529 const uint8_t *ccm = sc->sc_curcmap; local 536 red[i] = ccm[i + cm->index + 0]; 537 green[i] = ccm[i + cm->index + 2]; 538 blue[i] = ccm[i + cm->index + 4];
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_libctx_test.c | 316 int ret = 0, diff, ccm, siv, no_null_key; local 350 /* ccm fails on the second update - this matches OpenSSL 1_1_1 behaviour */ 351 ccm = (EVP_CIPHER_get_mode(cipher) == EVP_CIPH_CCM_MODE); 371 ccm ? 0 : 1) 375 ccm || siv ? 0 : 1)))) 378 if (ccm == 0) {
|
| /src/external/gpl3/gcc.old/dist/gcc/config/arc/ |
| arc.cc | 9491 machine_mode ccm = GET_MODE (XEXP (cond, 0)); 9493 if (code == UNKNOWN || ccm == CC_FP_GTmode || ccm == CC_FP_GEmode) 9700 machine_mode ccm = GET_MODE (XEXP (cond, 0)); 9702 if (code == UNKNOWN || ccm == CC_FP_GTmode || ccm == CC_FP_GEmode) 9490 machine_mode ccm = GET_MODE (XEXP (cond, 0)); local 9699 machine_mode ccm = GET_MODE (XEXP (cond, 0)); local
|