/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_done_encrypt.c | 27 @param taglen [in/out] The max size and resulting size of the tag 31 unsigned char *ct, unsigned char *tag, unsigned long *taglen) 37 LTC_ARGCHK(taglen != NULL); 38 return s_ocb_done(ocb, pt, ptlen, ct, tag, taglen, 0);
|
ocb_done_decrypt.c | 27 @param taglen The length of the authentication tag provided 34 const unsigned char *tag, unsigned long taglen, int *stat) 60 if (taglen <= tagbuflen && XMEMCMP(tagbuf, tag, taglen) == 0) {
|
ocb_encrypt_authenticate_memory.c | 30 @param taglen [in/out] The max size and resulting size of the authentication tag 38 unsigned char *tag, unsigned long *taglen) 48 LTC_ARGCHK(taglen != NULL); 69 err = ocb_done_encrypt(ocb, pt, ptlen, ct, tag, taglen);
|
ocb_decrypt_verify_memory.c | 30 @param taglen The length of the tag (octets) 39 const unsigned char *tag, unsigned long taglen, 71 err = ocb_done_decrypt(ocb, ct, ctlen, pt, tag, taglen, stat);
|
s_ocb_done.c | 35 @param taglen [in/out] The max size and resulting size of the authentication tag 40 unsigned char *ct, unsigned char *tag, unsigned long *taglen, int mode) 50 LTC_ARGCHK(taglen != NULL); 124 for (x = 0; x < ocb->block_len && x < (int)*taglen; x++) { 127 *taglen = x;
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_decrypt_verify_memory.c | 33 @param taglen [in/out] The length of the tag (octets) 43 unsigned char *tag, unsigned long taglen, 61 buf = XMALLOC(taglen); 81 buflen = taglen; 87 if (buflen >= taglen && XMEMCMP(buf, tag, taglen) == 0) { 94 zeromem(buf, taglen);
|
eax_done.c | 24 @param taglen [in/out] The max length and resulting length of the authentication tag 27 int eax_done(eax_state *eax, unsigned char *tag, unsigned long *taglen) 35 LTC_ARGCHK(taglen != NULL); 71 for (x = 0; x < len && x < *taglen; x++) { 74 *taglen = x;
|
eax_encrypt_authenticate_memory.c | 33 @param taglen [in/out] The max size and resulting size of the authentication tag 42 unsigned char *tag, unsigned long *taglen) 51 LTC_ARGCHK(taglen != NULL); 63 if ((err = eax_done(eax, tag, taglen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_done.c | 24 @param taglen [in/out] The length of the MAC tag 28 unsigned char *tag, unsigned long *taglen) 35 LTC_ARGCHK(taglen != NULL); 68 for (x = 0; x < 16 && x < *taglen; x++) { 71 *taglen = x;
|
gcm_memory.c | 33 @param taglen [in/out] The MAC tag length 43 unsigned char *tag, unsigned long *taglen, 62 tag, taglen, 99 err = gcm_done(gcm, tag, taglen);
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 34 @param taglen [in/out] The max size and resulting size of the authentication tag 45 unsigned char *tag, unsigned long *taglen, 63 LTC_ARGCHK(taglen != NULL); 79 /* make sure the taglen is even and <= 16 */ 80 *taglen &= ~1; 81 if (*taglen > 16) { 82 *taglen = 16; 86 if (*taglen < 4) { 99 tag, taglen, 144 (((*taglen - 2)>>1)<<3) [all...] |
ccm_test.c | 35 int taglen; 116 unsigned long taglen, x; 130 taglen = tests[x].taglen; 142 tag, &taglen, 0)) != CRYPT_OK) { 149 if (XMEMCMP(tag, tests[x].tag, tests[x].taglen)) { 160 tag2, &taglen, 1 )) != CRYPT_OK) { 167 if (XMEMCMP(tag2, tests[x].tag, tests[x].taglen)) {
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_test.c | 51 unsigned long taglen; 60 taglen = 4; 61 if ((err = f9_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) { 64 if (taglen != 4 || XMEMCMP(T, tests[x].T, 4)) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 118 int eax_done(eax_state *eax, unsigned char *tag, unsigned long *taglen); 126 unsigned char *tag, unsigned long *taglen); 134 unsigned char *tag, unsigned long taglen, 164 unsigned char *tag, unsigned long *taglen); 169 const unsigned char *tag, unsigned long taglen, int *stat); 176 unsigned char *tag, unsigned long *taglen); 183 const unsigned char *tag, unsigned long taglen, 192 unsigned char *ct, unsigned char *tag, unsigned long *taglen, int mode); 208 unsigned char *tag, unsigned long *taglen, 278 unsigned char *tag, unsigned long *taglen); [all...] |
/frameworks/base/media/libdrm/mobile1/src/xml/ |
xml_tinyparser.c | 74 int32_t tagLen, tagType, bal; 81 if (NULL == (buffer = XML_DOM_getTag(buffer, &tagLen, &tagType))) 87 if (NULL == (buffer = xml_goto_tagend(buffer + tagLen + 1))) 99 buffer = buffer + tagLen + 2; 264 uint8_t *XML_DOM_getTag(uint8_t *buffer, int32_t *tagLen, int32_t *tagType) 327 *tagLen = buffer - pStart - 2; 329 *tagLen = buffer - pStart - 1; 342 int32_t tagLen, tagType; 358 if (NULL == (buffer = XML_DOM_getTag(buffer, &tagLen, &tagType))) { 373 if ((int32_t) strlen((char *)nodeStr) != tagLen [all...] |
/external/ppp/pppd/plugins/rp-pppoe/ |
common.c | 50 UINT16_t tagType, tagLen; 73 tagLen = (((UINT16_t) curTag[2]) << 8) + 78 if ((curTag - packet->payload) + tagLen + TAG_HDR_SIZE > len) { 79 syslog(LOG_ERR, "Invalid PPPoE tag length (%u)", tagLen); 82 func(tagType, tagLen, curTag+TAG_HDR_SIZE, extra); 83 curTag = curTag + TAG_HDR_SIZE + tagLen; 105 UINT16_t tagType, tagLen; 128 tagLen = (((UINT16_t) curTag[2]) << 8) + 133 if ((curTag - packet->payload) + tagLen + TAG_HDR_SIZE > len) { 134 syslog(LOG_ERR, "Invalid PPPoE tag length (%u)", tagLen); [all...] |
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_test.c | 99 unsigned long taglen; 110 taglen = 16; 111 if ((err = xcbc_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) { 114 if (taglen != 16 || XMEMCMP(T, tests[x].T, 16)) {
|
/external/tremolo/Tremolo/ |
treminfo.c | 77 int taglen = strlen(tag)+1; /* +1 for the = we append */ local 78 char *fulltag = (char *)alloca(taglen+ 1); 84 if(!tagcompare(vc->user_comments[i], fulltag, taglen)){ 87 return vc->user_comments[i] + taglen; 97 int taglen = strlen(tag)+1; /* +1 for the = we append */ local 98 char *fulltag = (char *)alloca(taglen+1); 103 if(!tagcompare(vc->user_comments[i], fulltag, taglen))
|
/development/simulator/app/ |
MessageStream.cpp | 134 int tagLen, msgLen; 135 tagLen = strlen(pBundle->tag) + 1; 146 tagLen + 160 memcpy(pCur, pBundle->tag, tagLen); 161 pCur += tagLen;
|
/frameworks/base/media/libstagefright/ |
OggExtractor.cpp | 682 size_t tagLen = strlen(kMap[j].mTag); 683 if (!strncasecmp(kMap[j].mTag, comment, tagLen) 684 && comment[tagLen] == '=') { 687 &comment[tagLen + 1], 688 mVc.comment_lengths[i] - tagLen - 1); 690 if (!strcasecmp(&comment[tagLen + 1], "true")) { 694 mFileMeta->setCString(kMap[j].mKey, &comment[tagLen + 1]);
|
/external/chromium/third_party/icu/source/tools/gencnval/ |
gencnval.c | 181 getTagNumber(const char *tag, uint16_t tagLen); 510 getTagNumber(const char *tag, uint16_t tagLen) { 513 UBool preferredName = ((tagLen > 0) ? (tag[tagLen - 1] == '*') : (FALSE)); 522 tagLen--; 527 if (uprv_strlen(currTag) == tagLen && !uprv_strnicmp(currTag, tag, tagLen)) { 539 atag = allocString(&tagBlock, tag, tagLen); 546 else if (tagLen > 0 && strcmp(tag, ALL_TAG_STR) != 0) { [all...] |
/external/icu4c/tools/gencnval/ |
gencnval.c | 181 getTagNumber(const char *tag, uint16_t tagLen); 510 getTagNumber(const char *tag, uint16_t tagLen) { 513 UBool preferredName = ((tagLen > 0) ? (tag[tagLen - 1] == '*') : (FALSE)); 522 tagLen--; 527 if (uprv_strlen(currTag) == tagLen && !uprv_strnicmp(currTag, tag, tagLen)) { 539 atag = allocString(&tagBlock, tag, tagLen); 546 else if (tagLen > 0 && strcmp(tag, ALL_TAG_STR) != 0) { [all...] |
/frameworks/base/media/libdrm/mobile1/include/xml/ |
xml_tinyParser.h | 85 uint8_t *XML_DOM_getTag(uint8_t *buffer, int32_t *tagLen, int32_t *tagType);
|
/external/chromium/third_party/icu/source/common/ |
uloc_tag.c | 110 ultag_parse(const char* tag, int32_t tagLen, int32_t* parsedLen, UErrorCode* status); [all...] |
/external/icu4c/common/ |
uloc_tag.c | 111 ultag_parse(const char* tag, int32_t tagLen, int32_t* parsedLen, UErrorCode* status); [all...] |