Home | History | Annotate | Download | only in demos

Lines Matching defs:nonce

397    unsigned char key[MAXBLOCKSIZE], nonce[MAXBLOCKSIZE*2], header[MAXBLOCKSIZE*2], 
402 fprintf(out, "EAX Test Vectors. Uses the 00010203...NN-1 pattern for header/nonce/plaintext/key. The outputs\n"
425 nonce[z] = (unsigned char)(z & 255);
429 if ((err = eax_encrypt_authenticate_memory(x, key, kl, nonce, y1, header, y1, plaintext, y1, plaintext, tag, &len)) != CRYPT_OK) {
457 unsigned char key[MAXBLOCKSIZE], nonce[MAXBLOCKSIZE*2],
462 fprintf(out, "OCB Test Vectors. Uses the 00010203...NN-1 pattern for nonce/plaintext/key. The outputs\n"
464 "step repeated sufficiently. The nonce is fixed throughout.\n\n");
482 /* fixed nonce */
484 nonce[z] = z;
492 if ((err = ocb_encrypt_authenticate_memory(x, key, kl, nonce, plaintext, y1, plaintext, tag, &len)) != CRYPT_OK) {
521 unsigned char key[MAXBLOCKSIZE], nonce[MAXBLOCKSIZE*2],
526 fprintf(out, "CCM Test Vectors. Uses the 00010203...NN-1 pattern for nonce/header/plaintext/key. The outputs\n"
528 "step repeated sufficiently. The nonce is fixed throughout at 13 bytes 000102...\n\n");
546 /* fixed nonce */
548 nonce[z] = z;
556 if ((err = ccm_memory(x, key, kl, NULL, nonce, 13, plaintext, y1, plaintext, y1, plaintext, tag, &len, CCM_ENCRYPT)) != CRYPT_OK) {
588 fprintf(out, "GCM Test Vectors. Uses the 00010203...NN-1 pattern for nonce/header/plaintext/key. The outputs\n"
590 "step repeated sufficiently. The nonce is fixed throughout at 13 bytes 000102...\n\n");