/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_done_encrypt.c | 27 @param taglen [in/out] The max size and resulting size of the tag 31 unsigned char *ct, unsigned char *tag, unsigned long *taglen) 37 LTC_ARGCHK(taglen != NULL); 38 return s_ocb_done(ocb, pt, ptlen, ct, tag, taglen, 0);
|
ocb_done_decrypt.c | 27 @param taglen The length of the authentication tag provided 34 const unsigned char *tag, unsigned long taglen, int *stat) 60 if (taglen <= tagbuflen && XMEMCMP(tagbuf, tag, taglen) == 0) {
|
ocb_encrypt_authenticate_memory.c | 30 @param taglen [in/out] The max size and resulting size of the authentication tag 38 unsigned char *tag, unsigned long *taglen) 48 LTC_ARGCHK(taglen != NULL); 69 err = ocb_done_encrypt(ocb, pt, ptlen, ct, tag, taglen);
|
s_ocb_done.c | 35 @param taglen [in/out] The max size and resulting size of the authentication tag 40 unsigned char *ct, unsigned char *tag, unsigned long *taglen, int mode) 50 LTC_ARGCHK(taglen != NULL); 124 for (x = 0; x < ocb->block_len && x < (int)*taglen; x++) { 127 *taglen = x;
|
ocb_decrypt_verify_memory.c | 30 @param taglen The length of the tag (octets) 39 const unsigned char *tag, unsigned long taglen, 71 err = ocb_done_decrypt(ocb, ct, ctlen, pt, tag, taglen, stat);
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_decrypt_verify_memory.c | 33 @param taglen [in/out] The length of the tag (octets) 43 unsigned char *tag, unsigned long taglen, 61 buf = XMALLOC(taglen); 81 buflen = taglen; 87 if (buflen >= taglen && XMEMCMP(buf, tag, taglen) == 0) { 94 zeromem(buf, taglen);
|
eax_encrypt_authenticate_memory.c | 33 @param taglen [in/out] The max size and resulting size of the authentication tag 42 unsigned char *tag, unsigned long *taglen) 51 LTC_ARGCHK(taglen != NULL); 63 if ((err = eax_done(eax, tag, taglen)) != CRYPT_OK) {
|
eax_done.c | 24 @param taglen [in/out] The max length and resulting length of the authentication tag 27 int eax_done(eax_state *eax, unsigned char *tag, unsigned long *taglen) 35 LTC_ARGCHK(taglen != NULL); 71 for (x = 0; x < len && x < *taglen; x++) { 74 *taglen = x;
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_done.c | 24 @param taglen [in/out] The length of the MAC tag 28 unsigned char *tag, unsigned long *taglen) 35 LTC_ARGCHK(taglen != NULL); 68 for (x = 0; x < 16 && x < *taglen; x++) { 71 *taglen = x;
|
gcm_memory.c | 33 @param taglen [in/out] The MAC tag length 43 unsigned char *tag, unsigned long *taglen, 62 tag, taglen, 99 err = gcm_done(gcm, tag, taglen);
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 34 @param taglen [in/out] The max size and resulting size of the authentication tag 45 unsigned char *tag, unsigned long *taglen, 63 LTC_ARGCHK(taglen != NULL); 79 /* make sure the taglen is even and <= 16 */ 80 *taglen &= ~1; 81 if (*taglen > 16) { 82 *taglen = 16; 86 if (*taglen < 4) { 99 tag, taglen, 144 (((*taglen - 2)>>1)<<3) [all...] |
ccm_test.c | 35 int taglen; 116 unsigned long taglen, x; 130 taglen = tests[x].taglen; 142 tag, &taglen, 0)) != CRYPT_OK) { 149 if (XMEMCMP(tag, tests[x].tag, tests[x].taglen)) { 160 tag2, &taglen, 1 )) != CRYPT_OK) { 167 if (XMEMCMP(tag2, tests[x].tag, tests[x].taglen)) {
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_test.c | 51 unsigned long taglen; 60 taglen = 4; 61 if ((err = f9_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) { 64 if (taglen != 4 || XMEMCMP(T, tests[x].T, 4)) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 118 int eax_done(eax_state *eax, unsigned char *tag, unsigned long *taglen); 126 unsigned char *tag, unsigned long *taglen); 134 unsigned char *tag, unsigned long taglen, 164 unsigned char *tag, unsigned long *taglen); 169 const unsigned char *tag, unsigned long taglen, int *stat); 176 unsigned char *tag, unsigned long *taglen); 183 const unsigned char *tag, unsigned long taglen, 192 unsigned char *ct, unsigned char *tag, unsigned long *taglen, int mode); 208 unsigned char *tag, unsigned long *taglen, 278 unsigned char *tag, unsigned long *taglen); [all...] |
tomcrypt_cipher.h | 453 @param taglen [in/out] The max size and resulting size of the authentication tag 464 unsigned char *tag, unsigned long *taglen, 478 @param taglen [in/out] The MAC tag length 488 unsigned char *tag, unsigned long *taglen,
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_test.c | 99 unsigned long taglen; 110 taglen = 16; 111 if ((err = xcbc_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) { 114 if (taglen != 16 || XMEMCMP(T, tests[x].T, 16)) {
|
/external/tremolo/Tremolo/ |
treminfo.c | 77 int taglen = strlen(tag)+1; /* +1 for the = we append */ local 78 char *fulltag = (char *)alloca(taglen+ 1); 84 if(!tagcompare(vc->user_comments[i], fulltag, taglen)){ 87 return vc->user_comments[i] + taglen; 97 int taglen = strlen(tag)+1; /* +1 for the = we append */ local 98 char *fulltag = (char *)alloca(taglen+1); 103 if(!tagcompare(vc->user_comments[i], fulltag, taglen))
|
/external/libvorbis/lib/ |
info.c | 100 int taglen = strlen(tag)+1; /* +1 for the = we append */ local 101 char *fulltag = alloca(taglen+ 1); 107 if(!tagcompare(vc->user_comments[i], fulltag, taglen)){ 110 return vc->user_comments[i] + taglen; 120 int taglen = strlen(tag)+1; /* +1 for the = we append */ local 121 char *fulltag = alloca(taglen+1); 126 if(!tagcompare(vc->user_comments[i], fulltag, taglen))
|
/bootable/recovery/minadbd/ |
adb.c | 109 int taglen = strlen(tags[tagn].tag); local 111 if (len == taglen && !memcmp(tags[tagn].tag, p, len) )
|
/external/openssl/crypto/evp/ |
e_aes.c | 81 int taglen; member in struct:__anon12606 710 gctx->taglen = -1; 739 gctx->taglen = arg; 743 if (arg <= 0 || arg > 16 || !c->encrypt || gctx->taglen < 0) 1013 if (gctx->taglen < 0) 1016 ctx->buf, gctx->taglen) != 0) 1022 gctx->taglen = 16; [all...] |
/external/dropbear/libtomcrypt/ |
crypt.tex | [all...] |
/system/core/adb/ |
adb.c | 127 int taglen = strlen(tags[tagn].tag); local 129 if (len == taglen && !memcmp(tags[tagn].tag, p, len) ) [all...] |