Mercurial > dropbear
view eax_encrypt_authenticate_memory.c @ 162:bc4e3ac2dd5a libtomcrypt
make data pointers volatile so that memory zeroing won't get optimised away
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Sun, 02 Jan 2005 17:09:05 +0000 |
parents | 5d99163f7e32 |
children |
line wrap: on
line source
/* LibTomCrypt, modular cryptographic library -- Tom St Denis * * LibTomCrypt is a library that provides various cryptographic * algorithms in a highly modular and flexible manner. * * The library is free for all purposes without any express * guarantee it works. * * Tom St Denis, [email protected], http://libtomcrypt.org */ /* EAX Implementation by Tom St Denis */ #include "mycrypt.h" #ifdef EAX_MODE int eax_encrypt_authenticate_memory(int cipher, const unsigned char *key, unsigned long keylen, const unsigned char *nonce, unsigned long noncelen, const unsigned char *header, unsigned long headerlen, const unsigned char *pt, unsigned long ptlen, unsigned char *ct, unsigned char *tag, unsigned long *taglen) { int err; eax_state *eax; eax = XMALLOC(sizeof(eax_state)); if ((err = eax_init(eax, cipher, key, keylen, nonce, noncelen, header, headerlen)) != CRYPT_OK) { goto __ERR; } if ((err = eax_encrypt(eax, pt, ct, ptlen)) != CRYPT_OK) { goto __ERR; } if ((err = eax_done(eax, tag, taglen)) != CRYPT_OK) { goto __ERR; } err = CRYPT_OK; __ERR: #ifdef CLEAN_STACK zeromem(eax, sizeof(eax_state)); #endif XFREE(eax); return err; } #endif