Lines Matching full:provided

15  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 
79 * Initialise the AEAD algorithm, on a provided context structure.
82 * secret key is provided at this point, either directly or
87 * Start a new AEAD computation. The nonce value is provided as
93 * be provided in several chunks of arbitrary length.
104 * Encryption/decryption is done in place. Data may be provided in
118 * compared with the one provided as parameter.
135 * the provided key, nonce, and data elements all fit the algorithm's
173 * The OOP API is not provided for CCM, due to its specific requirements
195 * cancels any ongoing AEAD computation that uses the provided
198 * The provided IV is a _nonce_. Each AEAD algorithm has its
212 * The provided data is injected into a running AEAD
241 * the provided data shall be plaintext, and it is encrypted in
245 * Data may be provided in several chunks of arbitrary length.
259 * on the AEAD algorithm; it is written in the provided `tag`
285 * provided tag value. If they match, 1 is returned; on
302 * length is provided. Some AEAD algorithms allow several tag
375 * is provided. The block cipher MUST use 16-byte blocks in CTR mode,
376 * and its secret key MUST have been already set in the provided context.
377 * A GHASH implementation must also be provided. The parameters are linked
396 * uses the provided context structure.
398 * The provided IV is a _nonce_. It is critical to GCM security that IV
412 * The provided data is injected into a running GCM computation. Additional
441 * provided data shall be plaintext, and it is encrypted in place.
444 * Data may be provided in several chunks of arbitrary length. The maximum
458 * is written in the provided `tag` buffer. This call terminates the
479 * recomputed and compared with the provided tag value. If they match, 1
495 * is provided as `len` (in bytes); it MUST be no more than 16, but
505 * The tag is written in the provided `tag` buffer. This call terminates
528 * recomputed and compared with the provided tag value. If they match, 1
613 * structure, is provided. The block cipher MUST use 16-byte blocks in
615 * the provided context. The parameters are linked in the EAX context.
629 * provided `st` structure. This structure should then be used with
646 * uses the provided context structure.
670 * MUST be provided with `br_eax_aad_inject()`; computation result will
674 * one message byte must be provided. Empty messages are not supported
695 * message data MUST be provided with `br_eax_run()`; empty messages
709 * The provided data is injected into a running EAX computation. Additional
736 * AAD-specific MAC value into the provided state. The MAC value depends
755 * provided data shall be plaintext, and it is encrypted in place.
758 * Data may be provided in several chunks of arbitrary length.
771 * is written in the provided `tag` buffer. This call terminates the
792 * recomputed and compared with the provided tag value. If they match, 1
808 * is provided as `len` (in bytes); it MUST be no more than 16, but
818 * The tag is written in the provided `tag` buffer. This call terminates
841 * recomputed and compared with the provided tag value. If they match, 1
877 * can still be provided by chunks, but the total size must match
878 * the value provided upon initialisation.
912 * structure, is provided. The block cipher MUST use 16-byte blocks in
914 * the provided context. The parameters are linked in the CCM context.
930 * uses the provided context structure.
971 * The provided data is injected into a running CCM computation. Additional
974 * but the total amount MUST exactly match the value which was provided
1000 * provided data shall be plaintext, and it is encrypted in place.
1003 * Data may be provided in several chunks of arbitrary length, provided
1004 * that the total length exactly matches the length provided to the
1023 * The tag length was provided upon context initialisation (last call
1044 * recomputed and compared with the provided tag value. If they match, 1