/libcore/luni/src/main/java/javax/crypto/spec/ |
GCMParameterSpec.java | 33 private final int tagLen; 40 * {@code tagLen} in bits. 46 public GCMParameterSpec(int tagLen, byte[] iv) { 47 if (tagLen < 0) { 53 this.tagLen = tagLen; 60 * starting at {@code offset} and a tag length of {@code tagLen} in bits. 68 public GCMParameterSpec(int tagLen, byte[] iv, int offset, int byteCount) { 69 if (tagLen < 0) { 80 this.tagLen = tagLen [all...] |
/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_done_encrypt.c | 27 @param taglen [in/out] The max size and resulting size of the tag 31 unsigned char *ct, unsigned char *tag, unsigned long *taglen) 37 LTC_ARGCHK(taglen != NULL); 38 return s_ocb_done(ocb, pt, ptlen, ct, tag, taglen, 0);
|
ocb_done_decrypt.c | 27 @param taglen The length of the authentication tag provided 34 const unsigned char *tag, unsigned long taglen, int *stat) 60 if (taglen <= tagbuflen && XMEMCMP(tagbuf, tag, taglen) == 0) {
|
ocb_encrypt_authenticate_memory.c | 30 @param taglen [in/out] The max size and resulting size of the authentication tag 38 unsigned char *tag, unsigned long *taglen) 48 LTC_ARGCHK(taglen != NULL); 69 err = ocb_done_encrypt(ocb, pt, ptlen, ct, tag, taglen);
|
ocb_decrypt_verify_memory.c | 30 @param taglen The length of the tag (octets) 39 const unsigned char *tag, unsigned long taglen, 71 err = ocb_done_decrypt(ocb, ct, ctlen, pt, tag, taglen, stat);
|
s_ocb_done.c | 35 @param taglen [in/out] The max size and resulting size of the authentication tag 40 unsigned char *ct, unsigned char *tag, unsigned long *taglen, int mode) 50 LTC_ARGCHK(taglen != NULL); 124 for (x = 0; x < ocb->block_len && x < (int)*taglen; x++) { 127 *taglen = x;
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_decrypt_verify_memory.c | 33 @param taglen [in/out] The length of the tag (octets) 43 unsigned char *tag, unsigned long taglen, 61 buf = XMALLOC(taglen); 81 buflen = taglen; 87 if (buflen >= taglen && XMEMCMP(buf, tag, taglen) == 0) { 94 zeromem(buf, taglen);
|
eax_done.c | 24 @param taglen [in/out] The max length and resulting length of the authentication tag 27 int eax_done(eax_state *eax, unsigned char *tag, unsigned long *taglen) 35 LTC_ARGCHK(taglen != NULL); 71 for (x = 0; x < len && x < *taglen; x++) { 74 *taglen = x;
|
eax_encrypt_authenticate_memory.c | 33 @param taglen [in/out] The max size and resulting size of the authentication tag 42 unsigned char *tag, unsigned long *taglen) 51 LTC_ARGCHK(taglen != NULL); 63 if ((err = eax_done(eax, tag, taglen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_done.c | 24 @param taglen [in/out] The length of the MAC tag 28 unsigned char *tag, unsigned long *taglen) 35 LTC_ARGCHK(taglen != NULL); 68 for (x = 0; x < 16 && x < *taglen; x++) { 71 *taglen = x;
|
gcm_memory.c | 33 @param taglen [in/out] The MAC tag length 43 unsigned char *tag, unsigned long *taglen, 62 tag, taglen, 99 err = gcm_done(gcm, tag, taglen);
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 34 @param taglen [in/out] The max size and resulting size of the authentication tag 45 unsigned char *tag, unsigned long *taglen, 63 LTC_ARGCHK(taglen != NULL); 79 /* make sure the taglen is even and <= 16 */ 80 *taglen &= ~1; 81 if (*taglen > 16) { 82 *taglen = 16; 86 if (*taglen < 4) { 99 tag, taglen, 144 (((*taglen - 2)>>1)<<3) [all...] |
ccm_test.c | 35 int taglen; 116 unsigned long taglen, x; 130 taglen = tests[x].taglen; 142 tag, &taglen, 0)) != CRYPT_OK) { 149 if (XMEMCMP(tag, tests[x].tag, tests[x].taglen)) { 160 tag2, &taglen, 1 )) != CRYPT_OK) { 167 if (XMEMCMP(tag2, tests[x].tag, tests[x].taglen)) {
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_test.c | 51 unsigned long taglen; 60 taglen = 4; 61 if ((err = f9_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) { 64 if (taglen != 4 || XMEMCMP(T, tests[x].T, 4)) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 118 int eax_done(eax_state *eax, unsigned char *tag, unsigned long *taglen); 126 unsigned char *tag, unsigned long *taglen); 134 unsigned char *tag, unsigned long taglen, 164 unsigned char *tag, unsigned long *taglen); 169 const unsigned char *tag, unsigned long taglen, int *stat); 176 unsigned char *tag, unsigned long *taglen); 183 const unsigned char *tag, unsigned long taglen, 192 unsigned char *ct, unsigned char *tag, unsigned long *taglen, int mode); 208 unsigned char *tag, unsigned long *taglen, 278 unsigned char *tag, unsigned long *taglen); [all...] |
/external/ppp/pppd/plugins/rp-pppoe/ |
common.c | 50 UINT16_t tagType, tagLen; 73 tagLen = (((UINT16_t) curTag[2]) << 8) + 78 if ((curTag - packet->payload) + tagLen + TAG_HDR_SIZE > len) { 79 syslog(LOG_ERR, "Invalid PPPoE tag length (%u)", tagLen); 82 func(tagType, tagLen, curTag+TAG_HDR_SIZE, extra); 83 curTag = curTag + TAG_HDR_SIZE + tagLen; 105 UINT16_t tagType, tagLen; 128 tagLen = (((UINT16_t) curTag[2]) << 8) + 133 if ((curTag - packet->payload) + tagLen + TAG_HDR_SIZE > len) { 134 syslog(LOG_ERR, "Invalid PPPoE tag length (%u)", tagLen); [all...] |
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_test.c | 99 unsigned long taglen; 110 taglen = 16; 111 if ((err = xcbc_memory(idx, tests[x].K, 16, tests[x].M, tests[x].msglen, T, &taglen)) != CRYPT_OK) { 114 if (taglen != 16 || XMEMCMP(T, tests[x].T, 16)) {
|
/external/tremolo/Tremolo/ |
treminfo.c | 77 int taglen = strlen(tag)+1; /* +1 for the = we append */ local 78 char *fulltag = (char *)alloca(taglen+ 1); 84 if(!tagcompare(vc->user_comments[i], fulltag, taglen)){ 87 return vc->user_comments[i] + taglen; 97 int taglen = strlen(tag)+1; /* +1 for the = we append */ local 98 char *fulltag = (char *)alloca(taglen+1); 103 if(!tagcompare(vc->user_comments[i], fulltag, taglen))
|
/external/libvorbis/lib/ |
info.c | 100 int taglen = strlen(tag)+1; /* +1 for the = we append */ local 101 char *fulltag = alloca(taglen+ 1); 107 if(!tagcompare(vc->user_comments[i], fulltag, taglen)){ 110 return vc->user_comments[i] + taglen; 120 int taglen = strlen(tag)+1; /* +1 for the = we append */ local 121 char *fulltag = alloca(taglen+1); 126 if(!tagcompare(vc->user_comments[i], fulltag, taglen))
|
/frameworks/av/media/libstagefright/ |
OggExtractor.cpp | 809 size_t tagLen = strlen(kMap[j].mTag); 810 if (!strncasecmp(kMap[j].mTag, comment, tagLen) 811 && comment[tagLen] == '=') { 815 &comment[tagLen + 1], 816 commentLength - tagLen - 1); 818 if (!strcasecmp(&comment[tagLen + 1], "true")) { 822 fileMeta->setCString(kMap[j].mKey, &comment[tagLen + 1]);
|
/external/chromium_org/third_party/icu/source/tools/gencnval/ |
gencnval.c | 181 getTagNumber(const char *tag, uint16_t tagLen); 510 getTagNumber(const char *tag, uint16_t tagLen) { 513 UBool preferredName = ((tagLen > 0) ? (tag[tagLen - 1] == '*') : (FALSE)); 522 tagLen--; 527 if (uprv_strlen(currTag) == tagLen && !uprv_strnicmp(currTag, tag, tagLen)) { 539 atag = allocString(&tagBlock, tag, tagLen); 546 else if (tagLen > 0 && strcmp(tag, ALL_TAG_STR) != 0) { [all...] |
/external/icu4c/tools/gencnval/ |
gencnval.c | 181 getTagNumber(const char *tag, uint16_t tagLen); 520 getTagNumber(const char *tag, uint16_t tagLen) { 523 UBool preferredName = ((tagLen > 0) ? (tag[tagLen - 1] == '*') : (FALSE)); 532 tagLen--; 537 if (uprv_strlen(currTag) == tagLen && !uprv_strnicmp(currTag, tag, tagLen)) { 549 atag = allocString(&tagBlock, tag, tagLen); 556 else if (tagLen > 0 && strcmp(tag, ALL_TAG_STR) != 0) { [all...] |
/external/chromium_org/third_party/icu/source/common/ |
uloc_tag.c | 114 ultag_parse(const char* tag, int32_t tagLen, int32_t* parsedLen, UErrorCode* status); [all...] |
/bootable/recovery/minadbd/ |
adb.c | 109 int taglen = strlen(tags[tagn].tag); local 111 if (len == taglen && !memcmp(tags[tagn].tag, p, len) )
|
/external/icu4c/common/ |
uloc_tag.c | 126 ultag_parse(const char* tag, int32_t tagLen, int32_t* parsedLen, UErrorCode* status); [all...] |