HomeSort by relevance Sort by last modified time
    Searched refs:taglen (Results 1 - 22 of 22) sorted by null

  /external/dropbear/libtomcrypt/src/encauth/ocb/
ocb_done_encrypt.c 27 @param taglen [in/out] The max size and resulting size of the tag
31 unsigned char *ct, unsigned char *tag, unsigned long *taglen)
37 LTC_ARGCHK(taglen != NULL);
38 return s_ocb_done(ocb, pt, ptlen, ct, tag, taglen, 0);
ocb_done_decrypt.c 27 @param taglen The length of the authentication tag provided
34 const unsigned char *tag, unsigned long taglen, int *stat)
60 if (taglen <= tagbuflen && XMEMCMP(tagbuf, tag, taglen) == 0) {
ocb_encrypt_authenticate_memory.c 30 @param taglen [in/out] The max size and resulting size of the authentication tag
38 unsigned char *tag, unsigned long *taglen)
48 LTC_ARGCHK(taglen != NULL);
69 err = ocb_done_encrypt(ocb, pt, ptlen, ct, tag, taglen);
s_ocb_done.c 35 @param taglen [in/out] The max size and resulting size of the authentication tag
40 unsigned char *ct, unsigned char *tag, unsigned long *taglen, int mode)
50 LTC_ARGCHK(taglen != NULL);
124 for (x = 0; x < ocb->block_len && x < (int)*taglen; x++) {
127 *taglen = x;
ocb_decrypt_verify_memory.c 30 @param taglen The length of the tag (octets)
39 const unsigned char *tag, unsigned long taglen,
71 err = ocb_done_decrypt(ocb, ct, ctlen, pt, tag, taglen, stat);
  /external/dropbear/libtomcrypt/src/encauth/eax/
eax_decrypt_verify_memory.c 33 @param taglen [in/out] The length of the tag (octets)
43 unsigned char *tag, unsigned long taglen,
61 buf = XMALLOC(taglen);
81 buflen = taglen;
87 if (buflen >= taglen && XMEMCMP(buf, tag, taglen) == 0) {
94 zeromem(buf, taglen);
eax_encrypt_authenticate_memory.c 33 @param taglen [in/out] The max size and resulting size of the authentication tag
42 unsigned char *tag, unsigned long *taglen)
51 LTC_ARGCHK(taglen != NULL);
63 if ((err = eax_done(eax, tag, taglen)) != CRYPT_OK) {
eax_done.c 24 @param taglen [in/out] The max length and resulting length of the authentication tag
27 int eax_done(eax_state *eax, unsigned char *tag, unsigned long *taglen)
35 LTC_ARGCHK(taglen != NULL);
71 for (x = 0; x < len && x < *taglen; x++) {
74 *taglen = x;
  /external/dropbear/libtomcrypt/src/encauth/gcm/
gcm_done.c 24 @param taglen [in/out] The length of the MAC tag
28 unsigned char *tag, unsigned long *taglen)
35 LTC_ARGCHK(taglen != NULL);
68 for (x = 0; x < 16 && x < *taglen; x++) {
71 *taglen = x;
gcm_memory.c 33 @param taglen [in/out] The MAC tag length
43 unsigned char *tag, unsigned long *taglen,
62 tag, taglen,
99 err = gcm_done(gcm, tag, taglen);
  /external/dropbear/libtomcrypt/src/encauth/ccm/
ccm_memory.c 34 @param taglen [in/out] The max size and resulting size of the authentication tag
45 unsigned char *tag, unsigned long *taglen,
63 LTC_ARGCHK(taglen != NULL);
79 /* make sure the taglen is even and <= 16 */
80 *taglen &= ~1;
81 if (*taglen > 16) {
82 *taglen = 16;
86 if (*taglen < 4) {
99 tag, taglen,
144 (((*taglen - 2)>>1)<<3)
    [all...]
ccm_test.c 35 int taglen;
116 unsigned long taglen, x;
130 taglen = tests[x].taglen;
142 tag, &taglen, 0)) != CRYPT_OK) {
149 if (XMEMCMP(tag, tests[x].tag, tests[x].taglen)) {
160 tag2, &taglen, 1 )) != CRYPT_OK) {
167 if (XMEMCMP(tag2, tests[x].tag, tests[x].taglen)) {
  /external/dropbear/libtomcrypt/src/mac/f9/
f9_test.c 51 unsigned long taglen;
60 taglen = 4;
61 if ((err = f9_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) {
64 if (taglen != 4 || XMEMCMP(T, tests[x].T, 4)) {
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_mac.h 118 int eax_done(eax_state *eax, unsigned char *tag, unsigned long *taglen);
126 unsigned char *tag, unsigned long *taglen);
134 unsigned char *tag, unsigned long taglen,
164 unsigned char *tag, unsigned long *taglen);
169 const unsigned char *tag, unsigned long taglen, int *stat);
176 unsigned char *tag, unsigned long *taglen);
183 const unsigned char *tag, unsigned long taglen,
192 unsigned char *ct, unsigned char *tag, unsigned long *taglen, int mode);
208 unsigned char *tag, unsigned long *taglen,
278 unsigned char *tag, unsigned long *taglen);
    [all...]
tomcrypt_cipher.h 453 @param taglen [in/out] The max size and resulting size of the authentication tag
464 unsigned char *tag, unsigned long *taglen,
478 @param taglen [in/out] The MAC tag length
488 unsigned char *tag, unsigned long *taglen,
  /external/dropbear/libtomcrypt/src/mac/xcbc/
xcbc_test.c 99 unsigned long taglen;
110 taglen = 16;
111 if ((err = xcbc_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) {
114 if (taglen != 16 || XMEMCMP(T, tests[x].T, 16)) {
  /external/tremolo/Tremolo/
treminfo.c 77 int taglen = strlen(tag)+1; /* +1 for the = we append */ local
78 char *fulltag = (char *)alloca(taglen+ 1);
84 if(!tagcompare(vc->user_comments[i], fulltag, taglen)){
87 return vc->user_comments[i] + taglen;
97 int taglen = strlen(tag)+1; /* +1 for the = we append */ local
98 char *fulltag = (char *)alloca(taglen+1);
103 if(!tagcompare(vc->user_comments[i], fulltag, taglen))
  /external/libvorbis/lib/
info.c 100 int taglen = strlen(tag)+1; /* +1 for the = we append */ local
101 char *fulltag = alloca(taglen+ 1);
107 if(!tagcompare(vc->user_comments[i], fulltag, taglen)){
110 return vc->user_comments[i] + taglen;
120 int taglen = strlen(tag)+1; /* +1 for the = we append */ local
121 char *fulltag = alloca(taglen+1);
126 if(!tagcompare(vc->user_comments[i], fulltag, taglen))
  /bootable/recovery/minadbd/
adb.c 109 int taglen = strlen(tags[tagn].tag); local
111 if (len == taglen && !memcmp(tags[tagn].tag, p, len) )
  /external/openssl/crypto/evp/
e_aes.c 81 int taglen; member in struct:__anon12606
710 gctx->taglen = -1;
739 gctx->taglen = arg;
743 if (arg <= 0 || arg > 16 || !c->encrypt || gctx->taglen < 0)
1013 if (gctx->taglen < 0)
1016 ctx->buf, gctx->taglen) != 0)
1022 gctx->taglen = 16;
    [all...]
  /external/dropbear/libtomcrypt/
crypt.tex     [all...]
  /system/core/adb/
adb.c 127 int taglen = strlen(tags[tagn].tag); local
129 if (len == taglen && !memcmp(tags[tagn].tag, p, len) )
    [all...]

Completed in 306 milliseconds