/mbedtls-development/library/ |
A D | cipher.c | 568 *olen = ilen; in mbedtls_cipher_update() 600 *olen = ilen; in mbedtls_cipher_update() 686 if( ilen ) in mbedtls_cipher_update() 711 *olen = ilen; in mbedtls_cipher_update() 726 *olen = ilen; in mbedtls_cipher_update() 742 *olen = ilen; in mbedtls_cipher_update() 763 *olen = ilen; in mbedtls_cipher_update() 778 *olen = ilen; in mbedtls_cipher_update() 1394 *olen = ilen; in mbedtls_cipher_aead_encrypt() 1403 *olen = ilen; in mbedtls_cipher_aead_encrypt() [all …]
|
A D | md.c | 472 return( mbedtls_md5_update( ctx->md_ctx, input, ilen ) ); in mbedtls_md_update() 553 return( mbedtls_md5( input, ilen, output ) ); in mbedtls_md() 557 return( mbedtls_ripemd160( input, ilen, output ) ); in mbedtls_md() 561 return( mbedtls_sha1( input, ilen, output ) ); in mbedtls_md() 565 return( mbedtls_sha256( input, ilen, output, 1 ) ); in mbedtls_md() 569 return( mbedtls_sha256( input, ilen, output, 0 ) ); in mbedtls_md() 573 return( mbedtls_sha512( input, ilen, output, 1 ) ); in mbedtls_md() 577 return( mbedtls_sha512( input, ilen, output, 0 ) ); in mbedtls_md() 677 return( mbedtls_md_update( ctx, input, ilen ) ); in mbedtls_md_hmac_update() 721 const unsigned char *input, size_t ilen, in mbedtls_md_hmac() argument [all …]
|
A D | sha512.c | 301 size_t ilen ) in mbedtls_sha512_update() argument 308 SHA512_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_sha512_update() 310 if( ilen == 0 ) in mbedtls_sha512_update() 316 ctx->total[0] += (uint64_t) ilen; in mbedtls_sha512_update() 318 if( ctx->total[0] < (uint64_t) ilen ) in mbedtls_sha512_update() 321 if( left && ilen >= fill ) in mbedtls_sha512_update() 329 ilen -= fill; in mbedtls_sha512_update() 333 while( ilen >= 128 ) in mbedtls_sha512_update() 339 ilen -= 128; in mbedtls_sha512_update() 342 if( ilen > 0 ) in mbedtls_sha512_update() [all …]
|
A D | sha256.c | 267 size_t ilen ) in mbedtls_sha256_update() argument 274 SHA256_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_sha256_update() 276 if( ilen == 0 ) in mbedtls_sha256_update() 282 ctx->total[0] += (uint32_t) ilen; in mbedtls_sha256_update() 285 if( ctx->total[0] < (uint32_t) ilen ) in mbedtls_sha256_update() 288 if( left && ilen >= fill ) in mbedtls_sha256_update() 296 ilen -= fill; in mbedtls_sha256_update() 300 while( ilen >= 64 ) in mbedtls_sha256_update() 306 ilen -= 64; in mbedtls_sha256_update() 309 if( ilen > 0 ) in mbedtls_sha256_update() [all …]
|
A D | rsa.c | 1198 if( ilen + 2 * hlen + 2 < ilen || olen < ilen + 2 * hlen + 2 ) in mbedtls_rsa_rsaes_oaep_encrypt() 1217 if( ilen != 0 ) in mbedtls_rsa_rsaes_oaep_encrypt() 1265 if( ilen + 11 < ilen || olen < ilen + 11 ) in mbedtls_rsa_rsaes_pkcs1_v15_encrypt() 1268 nb_pad = olen - 3 - ilen; in mbedtls_rsa_rsaes_pkcs1_v15_encrypt() 1293 if( ilen != 0 ) in mbedtls_rsa_rsaes_pkcs1_v15_encrypt() 1347 size_t ilen, i, pad_len; in mbedtls_rsa_rsaes_oaep_decrypt() local 1367 ilen = ctx->len; in mbedtls_rsa_rsaes_oaep_decrypt() 1369 if( ilen < 16 || ilen > sizeof( buf ) ) in mbedtls_rsa_rsaes_oaep_decrypt() 1379 if( 2 * hlen + 2 > ilen ) in mbedtls_rsa_rsaes_oaep_decrypt() 1602 ilen = ctx->len; in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() [all …]
|
A D | md5.c | 224 size_t ilen ) in mbedtls_md5_update() argument 230 if( ilen == 0 ) in mbedtls_md5_update() 236 ctx->total[0] += (uint32_t) ilen; in mbedtls_md5_update() 239 if( ctx->total[0] < (uint32_t) ilen ) in mbedtls_md5_update() 242 if( left && ilen >= fill ) in mbedtls_md5_update() 249 ilen -= fill; in mbedtls_md5_update() 253 while( ilen >= 64 ) in mbedtls_md5_update() 259 ilen -= 64; in mbedtls_md5_update() 262 if( ilen > 0 ) in mbedtls_md5_update() 264 memcpy( (void *) (ctx->buffer + left), input, ilen ); in mbedtls_md5_update() [all …]
|
A D | poly1305.c | 307 size_t ilen ) in mbedtls_poly1305_update() argument 310 size_t remaining = ilen; in mbedtls_poly1305_update() 314 POLY1305_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_poly1305_update() 320 if( ilen < queue_free_len ) in mbedtls_poly1305_update() 327 ilen ); in mbedtls_poly1305_update() 329 ctx->queue_len += ilen; in mbedtls_poly1305_update() 398 size_t ilen, in mbedtls_poly1305_mac() argument 405 POLY1305_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_poly1305_mac() 413 ret = mbedtls_poly1305_update( &ctx, input, ilen ); in mbedtls_poly1305_mac()
|
A D | cmac.c | 226 const unsigned char *input, size_t ilen ) in mbedtls_cipher_cmac_update() argument 244 ilen > block_size - cmac_ctx->unprocessed_len ) in mbedtls_cipher_cmac_update() 259 ilen -= block_size - cmac_ctx->unprocessed_len; in mbedtls_cipher_cmac_update() 264 n = ( ilen + block_size - 1 ) / block_size; in mbedtls_cipher_cmac_update() 276 ilen -= block_size; in mbedtls_cipher_cmac_update() 281 if( ilen > 0 ) in mbedtls_cipher_cmac_update() 285 ilen ); in mbedtls_cipher_cmac_update() 286 cmac_ctx->unprocessed_len += ilen; in mbedtls_cipher_cmac_update() 375 const unsigned char *input, size_t ilen, in mbedtls_cipher_cmac() argument 393 ret = mbedtls_cipher_cmac_update( &ctx, input, ilen ); in mbedtls_cipher_cmac()
|
A D | sha1.c | 274 size_t ilen ) in mbedtls_sha1_update() argument 281 SHA1_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_sha1_update() 283 if( ilen == 0 ) in mbedtls_sha1_update() 289 ctx->total[0] += (uint32_t) ilen; in mbedtls_sha1_update() 292 if( ctx->total[0] < (uint32_t) ilen ) in mbedtls_sha1_update() 295 if( left && ilen >= fill ) in mbedtls_sha1_update() 303 ilen -= fill; in mbedtls_sha1_update() 307 while( ilen >= 64 ) in mbedtls_sha1_update() 313 ilen -= 64; in mbedtls_sha1_update() 316 if( ilen > 0 ) in mbedtls_sha1_update() [all …]
|
A D | ripemd160.c | 287 size_t ilen ) in mbedtls_ripemd160_update() argument 293 if( ilen == 0 ) in mbedtls_ripemd160_update() 299 ctx->total[0] += (uint32_t) ilen; in mbedtls_ripemd160_update() 302 if( ctx->total[0] < (uint32_t) ilen ) in mbedtls_ripemd160_update() 305 if( left && ilen >= fill ) in mbedtls_ripemd160_update() 313 ilen -= fill; in mbedtls_ripemd160_update() 317 while( ilen >= 64 ) in mbedtls_ripemd160_update() 323 ilen -= 64; in mbedtls_ripemd160_update() 326 if( ilen > 0 ) in mbedtls_ripemd160_update() 328 memcpy( (void *) (ctx->buffer + left), input, ilen ); in mbedtls_ripemd160_update() [all …]
|
A D | pk_wrap.h | 72 int (*decrypt_func)( void *ctx, const unsigned char *input, size_t ilen, 78 int (*encrypt_func)( void *ctx, const unsigned char *input, size_t ilen,
|
A D | pk.c | 463 const unsigned char *input, size_t ilen, in mbedtls_pk_decrypt() argument 468 PK_VALIDATE_RET( input != NULL || ilen == 0 ); in mbedtls_pk_decrypt() 478 return( ctx->pk_info->decrypt_func( ctx->pk_ctx, input, ilen, in mbedtls_pk_decrypt() 486 const unsigned char *input, size_t ilen, in mbedtls_pk_encrypt() argument 491 PK_VALIDATE_RET( input != NULL || ilen == 0 ); in mbedtls_pk_encrypt() 501 return( ctx->pk_info->encrypt_func( ctx->pk_ctx, input, ilen, in mbedtls_pk_encrypt()
|
/mbedtls-development/tests/suites/ |
A D | test_suite_pkwrite.function | 20 size_t ilen, pem_len, buf_index; 41 ilen = fread( check_buf, 1, sizeof( check_buf ), f ); 44 TEST_ASSERT( ilen == pem_len ); 45 TEST_ASSERT( memcmp( (char *) buf, (char *) check_buf, ilen ) == 0 ); 60 size_t ilen, pem_len, buf_index; 82 ilen = fread( check_buf, 1, sizeof( check_buf ), f ); 85 TEST_ASSERT( ilen == strlen( (char *) buf ) ); 86 TEST_ASSERT( memcmp( (char *) buf, (char *) check_buf, ilen ) == 0 );
|
/mbedtls-development/programs/aes/ |
A D | crypt_and_hash.c | 86 size_t keylen, ilen, olen; in main() local 338 … ilen = ( (unsigned int) filesize - offset > mbedtls_cipher_get_block_size( &cipher_ctx ) ) ? in main() 341 if( fread( buffer, 1, ilen, fin ) != ilen ) in main() 343 mbedtls_fprintf( stderr, "fread(%ld bytes) failed\n", (long) ilen ); in main() 347 if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, &olen ) != 0 ) in main() 481 … ilen = ( (unsigned int) filesize - offset > mbedtls_cipher_get_block_size( &cipher_ctx ) ) ? in main() 484 if( fread( buffer, 1, ilen, fin ) != ilen ) in main() 491 mbedtls_md_hmac_update( &md_ctx, buffer, ilen ); in main() 492 if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, in main()
|
/mbedtls-development/include/mbedtls/ |
A D | md.h | 272 int mbedtls_md_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen ); 312 int mbedtls_md( const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen, 378 size_t ilen ); 440 const unsigned char *input, size_t ilen,
|
A D | ripemd160.h | 97 size_t ilen ); 131 size_t ilen,
|
A D | md5.h | 131 size_t ilen ); 180 size_t ilen,
|
A D | sha1.h | 145 size_t ilen ); 208 size_t ilen,
|
A D | poly1305.h | 127 size_t ilen ); 164 size_t ilen,
|
A D | sha256.h | 119 size_t ilen ); 172 size_t ilen,
|
A D | sha512.h | 126 size_t ilen ); 186 size_t ilen,
|
A D | cmac.h | 111 const unsigned char *input, size_t ilen ); 176 const unsigned char *input, size_t ilen,
|
A D | cipher.h | 339 int (*MBEDTLS_PRIVATE(get_padding))( unsigned char *input, size_t ilen, size_t *data_len ); 868 size_t ilen, unsigned char *output, 968 const unsigned char *input, size_t ilen, 1019 const unsigned char *input, size_t ilen, 1075 const unsigned char *input, size_t ilen,
|
A D | rsa.h | 599 size_t ilen, 626 size_t ilen, 661 size_t ilen,
|
/mbedtls-development/programs/util/ |
A D | pem2der.c | 72 int convert_pem_to_der( const unsigned char *input, size_t ilen, in convert_pem_to_der() argument 76 const unsigned char *s1, *s2, *end = input + ilen; in convert_pem_to_der()
|