/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
H A D | e_chacha20poly1305.c | 69 unsigned char tag_len; member in struct:aead_chacha20_poly1305_ctx 72 static int aead_chacha20_poly1305_init(EVP_AEAD_CTX *ctx, const unsigned char *key, size_t key_len, size_t tag_len) argument 76 if (tag_len == 0) 77 tag_len = POLY1305_TAG_LEN; 79 if (tag_len > POLY1305_TAG_LEN) 93 c20_ctx->tag_len = tag_len; 153 if (max_out_len < in_len + c20_ctx->tag_len) 173 if (c20_ctx->tag_len != POLY1305_TAG_LEN) 177 memcpy(out + in_len, tag, c20_ctx->tag_len); [all...] |
H A D | evp_aead.c | 88 size_t tag_len, ENGINE *impl) 96 return aead->init(ctx, key, key_len, tag_len); 86 EVP_AEAD_CTX_init(EVP_AEAD_CTX *ctx, const EVP_AEAD *aead, const unsigned char *key, size_t key_len, size_t tag_len, ENGINE *impl) argument
|
H A D | e_aes.c | 1320 unsigned char tag_len; member in struct:aead_aes_128_gcm_ctx 1324 const unsigned char *key, size_t key_len, size_t tag_len) 1334 if (tag_len == EVP_AEAD_DEFAULT_TAG_LENGTH) 1335 tag_len = EVP_AEAD_AES_128_GCM_TAG_LEN; 1337 if (tag_len > EVP_AEAD_AES_128_GCM_TAG_LEN) 1361 gcm_ctx->tag_len = tag_len; 1383 if (max_out_len < in_len + gcm_ctx->tag_len) 1408 CRYPTO_gcm128_tag(&gcm, out + in_len, gcm_ctx->tag_len); 1409 return in_len + gcm_ctx->tag_len; 1323 aead_aes_128_gcm_init(EVP_AEAD_CTX *ctx, const unsigned char *key, size_t key_len, size_t tag_len) argument [all...] |
H A D | evp_locl.h | 359 size_t key_len, size_t tag_len);
|
/external/srtp/crypto/include/ |
H A D | null_auth.h | 65 int msg_octets, int tag_len, uint8_t *result);
|
H A D | hmac.h | 75 int msg_octets, int tag_len, uint8_t *result);
|
H A D | crypto_kernel.h | 205 * crypto_kernel_alloc_auth(id, ap, key_len, tag_len); 208 * length key_len octets and output tag length of tag_len. Return 220 int tag_len);
|
H A D | auth.h | 65 int tag_len, uint8_t *tag);
|
/external/tcpdump/ |
H A D | print-pppoe.c | 143 u_short tag_type = 0xffff, tag_len; local 154 tag_len = EXTRACT_16BITS(p + 2); 158 if (tag_len) { 165 TCHECK2(*p, tag_len); 166 for (v = p; v < p + tag_len && tag_str_len < MAXTAGPRINT-1; v++) 185 for (v=p; v<p+tag_len; v++) { 196 p += tag_len;
|
/external/chromium_org/net/quic/crypto/ |
H A D | aes_128_gcm_12_encrypter_test.cc | 51 size_t tag_len; member in struct:__anon9581::TestGroupInfo 254 EXPECT_EQ(test_info.tag_len, tag.size() * 8); 270 size_t tag_len = Aes128Gcm12Encrypter::kAuthTagSize; local 272 ASSERT_EQ(ct.size() + tag_len, encrypted->length()); 276 "authentication tag", encrypted->data() + ct.size(), tag_len, 277 tag.data(), tag_len);
|
H A D | aes_128_gcm_12_decrypter_test.cc | 51 size_t tag_len; member in struct:__anon9577::TestGroupInfo 306 EXPECT_EQ(test_info.tag_len, tag.size() * 8);
|
/external/srtp/include/ |
H A D | ekt.h | 158 * With EKT, the tag_len parameter is actually the base tag 165 unsigned tag_len); 170 unsigned tag_len);
|
/external/srtp/crypto/hash/ |
H A D | hmac.c | 171 int msg_octets, int tag_len, uint8_t *result) { 177 if (tag_len > 20) 204 for (i=0; i < tag_len; i++) 208 octet_string_hex_string((uint8_t *)hash_value, tag_len)); 170 hmac_compute(hmac_ctx_t *state, const void *message, int msg_octets, int tag_len, uint8_t *result) argument
|
H A D | null_auth.c | 109 int msg_octets, int tag_len, uint8_t *result) { 108 null_auth_compute(null_auth_ctx_t *state, uint8_t *message, int msg_octets, int tag_len, uint8_t *result) argument
|
/external/srtp/srtp/ |
H A D | srtp.c | 606 int tag_len; local 684 tag_len = auth_get_tag_length(stream->rtp_auth); 823 octet_string_hex_string(auth_tag, tag_len)); 832 *pkt_octet_len += tag_len; 852 int tag_len, prefix_len; local 913 tag_len = auth_get_tag_length(stream->rtp_auth); 969 enc_octet_len = (uint32_t)(*pkt_octet_len - tag_len 982 auth_tag = (uint8_t *)hdr + *pkt_octet_len - tag_len; 1017 *pkt_octet_len - tag_len); 1023 octet_string_hex_string(tmp_tag, tag_len)); 1454 int tag_len; local 1640 int tag_len; local [all...] |
/external/chromium_org/third_party/protobuf/python/google/protobuf/internal/ |
H A D | decoder.py | 211 tag_len = len(tag_bytes) 221 pos = new_pos + tag_len 387 tag_len = len(tag_bytes) 399 pos = new_pos + tag_len 424 tag_len = len(tag_bytes) 436 pos = new_pos + tag_len 463 tag_len = len(tag_bytes) 479 pos = new_pos + tag_len 508 tag_len = len(tag_bytes) 528 pos = new_pos + tag_len [all...] |
/external/protobuf/python/google/protobuf/internal/ |
H A D | decoder.py | 204 tag_len = len(tag_bytes) 214 pos = new_pos + tag_len 314 tag_len = len(tag_bytes) 326 pos = new_pos + tag_len 351 tag_len = len(tag_bytes) 363 pos = new_pos + tag_len 390 tag_len = len(tag_bytes) 406 pos = new_pos + tag_len 435 tag_len = len(tag_bytes) 455 pos = new_pos + tag_len [all...] |
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | httpread.c | 837 int tag_len = os_strlen(tag); local 844 if (!os_strncasecmp(hdr, tag, tag_len)) { 845 hdr += tag_len;
|
/external/wpa_supplicant_8/src/wps/ |
H A D | httpread.c | 837 int tag_len = os_strlen(tag); local 844 if (!os_strncasecmp(hdr, tag, tag_len)) { 845 hdr += tag_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | httpread.c | 837 int tag_len = os_strlen(tag); local 844 if (!os_strncasecmp(hdr, tag, tag_len)) { 845 hdr += tag_len;
|
/external/kernel-headers/original/linux/ |
H A D | if_pppox.h | 116 __be16 tag_len; member in struct:pppoe_tag
|
/external/srtp/crypto/kernel/ |
H A D | crypto_kernel.c | 451 int tag_len) { 465 return ((at)->alloc(ap, key_len, tag_len)); 448 crypto_kernel_alloc_auth(auth_type_id_t id, auth_pointer_t *ap, int key_len, int tag_len) argument
|
/external/oprofile/libop/ |
H A D | op_events.c | 350 size_t tag_len; local 371 tag_len = colon - c; 374 if (!tag_len) { 382 *name = op_xstrndup(c, tag_len);
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
H A D | t1_enc.c | 376 aead_ctx->tag_len = EVP_AEAD_max_overhead(aead); 895 out + eivlen, len + aead->tag_len, 925 if (len < aead->tag_len) 927 len -= aead->tag_len; 933 in, len + aead->tag_len, ad, sizeof(ad));
|
/external/chromium_org/third_party/qcms/src/ |
H A D | iccread.c | 496 uint32_t tag_len; local 498 (*curveArray)[i] = read_curveType(src, curve_offset + channel_offset, &tag_len); 503 channel_offset += tag_len; 505 if ((tag_len % 4) != 0) 506 channel_offset += 4 - (tag_len % 4);
|