/external/dropbear/libtomcrypt/src/encauth/ocb/ |
D | ocb_test.c | 30 int ptlen; in ocb_test() 181 tests[x].nonce, tests[x].pt, tests[x].ptlen, outct, outtag, &len)) != CRYPT_OK) { in ocb_test() 185 if (XMEMCMP(outtag, tests[x].tag, len) || XMEMCMP(outct, tests[x].ct, tests[x].ptlen)) { in ocb_test() 189 for (y = 0; y < (unsigned long)tests[x].ptlen; ) { in ocb_test() 191 if (y < (unsigned long)(tests[x].ptlen-1)) printf(", "); in ocb_test() 204 … if ((err = ocb_decrypt_verify_memory(idx, tests[x].key, 16, tests[x].nonce, outct, tests[x].ptlen, in ocb_test() 208 if ((res != 1) || XMEMCMP(tests[x].pt, outct, tests[x].ptlen)) { in ocb_test() 212 for (y = 0; y < (unsigned long)tests[x].ptlen; ) { in ocb_test() 214 if (y < (unsigned long)(tests[x].ptlen-1)) printf(", "); in ocb_test()
|
D | s_ocb_done.c | 39 int s_ocb_done(ocb_state *ocb, const unsigned char *pt, unsigned long ptlen, in s_ocb_done() argument 55 (int)ptlen > ocb->block_len || (int)ptlen < 0) { in s_ocb_done() 80 X[ocb->block_len-1] ^= (ptlen*8)&255; in s_ocb_done() 81 X[ocb->block_len-2] ^= ((ptlen*8)>>8)&255; in s_ocb_done() 94 for (x = 0; x < (int)ptlen; x++) { in s_ocb_done() 100 for (x = 0; x < (int)ptlen; x++) { in s_ocb_done() 107 for (x = 0; x < (int)ptlen; x++) { in s_ocb_done()
|
D | ocb_encrypt_authenticate_memory.c | 36 const unsigned char *pt, unsigned long ptlen, in ocb_encrypt_authenticate_memory() argument 60 while (ptlen > (unsigned long)ocb->block_len) { in ocb_encrypt_authenticate_memory() 64 ptlen -= ocb->block_len; in ocb_encrypt_authenticate_memory() 69 err = ocb_done_encrypt(ocb, pt, ptlen, ct, tag, taglen); in ocb_encrypt_authenticate_memory()
|
D | ocb_done_encrypt.c | 30 int ocb_done_encrypt(ocb_state *ocb, const unsigned char *pt, unsigned long ptlen, in ocb_done_encrypt() argument 38 return s_ocb_done(ocb, pt, ptlen, ct, tag, taglen, 0); in ocb_done_encrypt()
|
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
D | gcm_test.c | 33 unsigned long ptlen; in gcm_test() 345 (unsigned char*)tests[x].P, tests[x].ptlen, in gcm_test() 350 if (XMEMCMP(out[0], tests[x].C, tests[x].ptlen)) { in gcm_test() 353 for (y = 0; y < tests[x].ptlen; y++) { in gcm_test() 376 out[1], tests[x].ptlen, in gcm_test() 381 if (XMEMCMP(out[1], tests[x].P, tests[x].ptlen)) { in gcm_test() 384 for (y = 0; y < tests[x].ptlen; y++) { in gcm_test()
|
D | gcm_process.c | 30 unsigned char *pt, unsigned long ptlen, in gcm_process() argument 39 if (ptlen > 0) { in gcm_process() 81 for (x = 0; x < (ptlen & ~15); x += 16) { in gcm_process() 99 for (x = 0; x < (ptlen & ~15); x += 16) { in gcm_process() 121 for (; x < ptlen; x++) { in gcm_process()
|
D | gcm_memory.c | 41 unsigned char *pt, unsigned long ptlen, in gcm_memory() argument 60 pt, ptlen, in gcm_memory() 96 if ((err = gcm_process(gcm, pt, ptlen, ct, direction)) != CRYPT_OK) { in gcm_memory()
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
D | ccm_test.c | 32 int ptlen; in ccm_test() 140 (unsigned char*)tests[x].pt, tests[x].ptlen, in ccm_test() 146 if (XMEMCMP(buf, tests[x].ct, tests[x].ptlen)) { in ccm_test() 158 buf2, tests[x].ptlen, in ccm_test() 164 if (XMEMCMP(buf2, tests[x].pt, tests[x].ptlen)) { in ccm_test()
|
D | ccm_memory.c | 43 unsigned char *pt, unsigned long ptlen, in ccm_memory() argument 97 pt, ptlen, in ccm_memory() 104 len = ptlen; in ccm_memory() 153 len = ptlen; in ccm_memory() 230 if (ptlen > 0) { in ccm_memory() 233 if (ptlen & ~15) { in ccm_memory() 235 for (; y < (ptlen & ~15); y += 16) { in ccm_memory() 255 for (; y < (ptlen & ~15); y += 16) { in ccm_memory() 278 for (; y < ptlen; y++) { in ccm_memory()
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_mac.h | 124 const unsigned char *pt, unsigned long ptlen, 162 const unsigned char *pt, unsigned long ptlen, 174 const unsigned char *pt, unsigned long ptlen, 191 int s_ocb_done(ocb_state *ocb, const unsigned char *pt, unsigned long ptlen, 206 unsigned char *pt, unsigned long ptlen, 273 unsigned char *pt, unsigned long ptlen, 284 unsigned char *pt, unsigned long ptlen,
|
D | tomcrypt_cipher.h | 462 unsigned char *pt, unsigned long ptlen, 486 unsigned char *pt, unsigned long ptlen,
|
/external/dropbear/libtomcrypt/src/mac/pelican/ |
D | pelican_test.c | 27 int keylen, ptlen; in pelican_test() 95 if ((err = pelican_process(&pel, tests[x].MSG, tests[x].ptlen)) != CRYPT_OK) { in pelican_test()
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
D | eax_encrypt_authenticate_memory.c | 40 const unsigned char *pt, unsigned long ptlen, in eax_encrypt_authenticate_memory() argument 59 if ((err = eax_encrypt(eax, pt, ct, ptlen)) != CRYPT_OK) { in eax_encrypt_authenticate_memory()
|
/external/dropbear/libtomcrypt/ |
D | crypt.tex | 1309 const unsigned char *pt, unsigned long ptlen, 1376 unsigned long ptlen, 1383 you can pass them here. This will also encrypt the \textit{ptlen} bytes in \textit{pt} and store t… 1386 Note that \textit{ptlen} must be less than or equal to the block size of block cipher chosen. Also… 1415 const unsigned char *pt, unsigned long ptlen, 1420 … message \textit{pt} of length \textit{ptlen}, and store the ciphertext in \textit{ct}. The lengt… 1451 unsigned char *pt, unsigned long ptlen, 1468 …textit{ct}. The length of both are expected to be equal and is passed in as \textit{ptlen}. It is 1597 unsigned long ptlen, 1601 …t{ct} is the ciphertext. The length of both are equal and stored in \textit{ptlen}. Depending on [all …]
|