Home
last modified time | relevance | path

Searched refs:inlen (Results 1 – 25 of 39) sorted by relevance

12

/hal_espressif-3.6.0/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/
Dcbc_mode.c38 unsigned int inlen, const uint8_t *iv, in tc_cbc_mode_encrypt() argument
49 inlen == 0 || in tc_cbc_mode_encrypt()
51 (inlen % TC_AES_BLOCK_SIZE) != 0 || in tc_cbc_mode_encrypt()
53 outlen != inlen + TC_AES_BLOCK_SIZE) { in tc_cbc_mode_encrypt()
63 for (n = m = 0; n < inlen; ++n) { in tc_cbc_mode_encrypt()
78 unsigned int inlen, const uint8_t *iv, in tc_cbc_mode_decrypt() argument
90 inlen == 0 || in tc_cbc_mode_decrypt()
92 (inlen % TC_AES_BLOCK_SIZE) != 0 || in tc_cbc_mode_decrypt()
94 outlen != inlen) { in tc_cbc_mode_decrypt()
Dctr_mode.c38 unsigned int inlen, uint8_t *ctr, const TCAesKeySched_t sched) in tc_ctr_mode() argument
51 inlen == 0 || in tc_ctr_mode()
53 outlen != inlen) { in tc_ctr_mode()
63 for (i = 0; i < inlen; ++i) { in tc_ctr_mode()
Dccm_mode.c94 unsigned int inlen, uint8_t *ctr, const TCAesKeySched_t sched) in ccm_ctr_mode() argument
107 inlen == 0 || in ccm_ctr_mode()
109 outlen != inlen) { in ccm_ctr_mode()
118 for (i = 0; i < inlen; ++i) { in ccm_ctr_mode()
/hal_espressif-3.6.0/components/libsodium/test/
Dtest_sodium.c79 const size_t inlen = 3; variable
82 crypto_hash_sha256(calculated, in, inlen);
89 crypto_hash_sha256_update(&state, in, inlen - 1); // split into two updates
90 crypto_hash_sha256_update(&state, in + (inlen -1), 1);
110 const size_t inlen = 3; variable
113 crypto_hash_sha512(calculated, in, inlen);
120 crypto_hash_sha512_update(&state, in, inlen - 1); // split into two updates
121 crypto_hash_sha512_update(&state, in + (inlen -1), 1);
/hal_espressif-3.6.0/components/wpa_supplicant/src/tls/
Dpkcs1.c17 const u8 *in, size_t inlen, in pkcs1_generate_encryption_block() argument
33 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block()
38 (unsigned long) inlen); in pkcs1_generate_encryption_block()
45 ps_len = modlen - inlen - 3; in pkcs1_generate_encryption_block()
73 os_memcpy(pos, in, inlen); /* D */ in pkcs1_generate_encryption_block()
80 int use_private, const u8 *in, size_t inlen, in pkcs1_encrypt() argument
87 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, in pkcs1_encrypt()
96 const u8 *in, size_t inlen, in pkcs1_v15_private_key_decrypt() argument
102 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1); in pkcs1_v15_private_key_decrypt()
Dpkcs1.h13 int use_private, const u8 *in, size_t inlen,
16 const u8 *in, size_t inlen,
/hal_espressif-3.6.0/components/wpa_supplicant/src/crypto/
Dcrypto_internal-rsa.c73 const u8 *in, size_t inlen, in crypto_public_key_encrypt_pkcs1_v15() argument
77 0, in, inlen, out, outlen); in crypto_public_key_encrypt_pkcs1_v15()
82 const u8 *in, size_t inlen, in crypto_private_key_decrypt_pkcs1_v15() argument
86 in, inlen, out, outlen); in crypto_private_key_decrypt_pkcs1_v15()
91 const u8 *in, size_t inlen, in crypto_private_key_sign_pkcs1() argument
95 1, in, inlen, out, outlen); in crypto_private_key_sign_pkcs1()
Dsha256-internal.c149 unsigned long inlen) in sha256_process() argument
156 while (inlen > 0) { in sha256_process()
157 if (md->curlen == 0 && inlen >= SHA256_BLOCK_SIZE) { in sha256_process()
162 inlen -= SHA256_BLOCK_SIZE; in sha256_process()
164 n = MIN(inlen, (SHA256_BLOCK_SIZE - md->curlen)); in sha256_process()
168 inlen -= n; in sha256_process()
Dsha512-internal.c187 unsigned long inlen) in sha512_process() argument
194 while (inlen > 0) { in sha512_process()
195 if (md->curlen == 0 && inlen >= SHA512_BLOCK_SIZE) { in sha512_process()
200 inlen -= SHA512_BLOCK_SIZE; in sha512_process()
202 n = MIN(inlen, (SHA512_BLOCK_SIZE - md->curlen)); in sha512_process()
206 inlen -= n; in sha512_process()
Dcrypto_mbedtls-rsa.c184 const u8 *in, size_t inlen, in crypto_public_key_encrypt_pkcs1_v15() argument
215 ctr_drbg, MBEDTLS_RSA_PUBLIC, inlen, in, out); in crypto_public_key_encrypt_pkcs1_v15()
234 const u8 *in, size_t inlen, in crypto_private_key_decrypt_pkcs1_v15() argument
277 const u8 *in, size_t inlen, in crypto_private_key_sign_pkcs1() argument
285 inlen, in, out)) != 0 ) { in crypto_private_key_sign_pkcs1()
Dsha384-internal.c67 unsigned long inlen) in sha384_process() argument
69 return sha512_process(md, in, inlen); in sha384_process()
Dsha384_i.h20 unsigned long inlen);
/hal_espressif-3.6.0/components/protocomm/src/common/
Dprotocomm.c185 const uint8_t *inbuf, ssize_t inlen, in protocomm_req_handle() argument
205 ret = ep->req_handler(session_id, inbuf, inlen, outbuf, outlen, ep->priv_data); in protocomm_req_handle()
210 uint8_t *dec_inbuf = (uint8_t *) malloc(inlen); in protocomm_req_handle()
212 ESP_LOGE(TAG, "Failed to allocate decrypt buf len %d", inlen); in protocomm_req_handle()
216 ssize_t dec_inbuf_len = inlen; in protocomm_req_handle()
217 … ret = pc->sec->decrypt(pc->sec_inst, session_id, inbuf, inlen, dec_inbuf, &dec_inbuf_len); in protocomm_req_handle()
243 ESP_LOGE(TAG, "Failed to allocate decrypt buf len %d", inlen); in protocomm_req_handle()
268 inbuf, inlen, in protocomm_req_handle()
274 ret = ep->req_handler(session_id, inbuf, inlen, outbuf, outlen, ep->priv_data); in protocomm_req_handle()
281 const uint8_t *inbuf, ssize_t inlen, in protocomm_common_security_handler() argument
[all …]
/hal_espressif-3.6.0/components/libsodium/port/crypto_hash_mbedtls/
Dcrypto_hash_sha512_mbedtls.c72 const unsigned char *in, unsigned long long inlen) in crypto_hash_sha512_update() argument
76 int ret = mbedtls_sha512_update_ret(&ctx, in, inlen); in crypto_hash_sha512_update()
94 unsigned long long inlen) in crypto_hash_sha512() argument
96 return mbedtls_sha512_ret(in, inlen, out, 0); in crypto_hash_sha512()
Dcrypto_hash_sha256_mbedtls.c68 const unsigned char *in, unsigned long long inlen) in crypto_hash_sha256_update() argument
72 int ret = mbedtls_sha256_update_ret(&ctx, in, inlen); in crypto_hash_sha256_update()
90 unsigned long long inlen) in crypto_hash_sha256() argument
92 return mbedtls_sha256_ret(in, inlen, out, 0); in crypto_hash_sha256()
/hal_espressif-3.6.0/components/protocomm/include/security/
Dprotocomm_security.h85 const uint8_t *inbuf, ssize_t inlen,
94 const uint8_t *inbuf, ssize_t inlen,
102 const uint8_t *inbuf, ssize_t inlen,
/hal_espressif-3.6.0/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/
Dcbc_mode.h111 unsigned int inlen, const uint8_t *iv,
144 unsigned int inlen, const uint8_t *iv,
Dctr_mode.h102 unsigned int inlen, uint8_t *ctr, const TCAesKeySched_t sched);
/hal_espressif-3.6.0/components/protocomm/test/
Dtest_protocomm.c369 ssize_t inlen = 0; in test_sec_endpoint() local
427 inlen = session_data__get_packed_size(&req); in test_sec_endpoint()
428 inbuf = (uint8_t *) malloc(inlen); in test_sec_endpoint()
440 inbuf, inlen, &outbuf, &outlen); in test_sec_endpoint()
471 inlen = session_data__get_packed_size(&req); in test_sec_endpoint()
472 inbuf = (uint8_t *) malloc(inlen); in test_sec_endpoint()
484 inbuf, inlen, &outbuf, &outlen); in test_sec_endpoint()
619 const uint8_t *inbuf, ssize_t inlen, in test_req_handler() argument
623 *outbuf = malloc(inlen); in test_req_handler()
625 *outlen = inlen; in test_req_handler()
[all …]
/hal_espressif-3.6.0/examples/provisioning/legacy/custom_config/components/custom_provisioning/src/
Dcustom_config.c26 int custom_prov_config_data_handler(uint32_t session_id, const uint8_t *inbuf, ssize_t inlen, uint8… in custom_prov_config_data_handler() argument
32 req = custom_config_request__unpack(NULL, inlen, inbuf); in custom_prov_config_data_handler()
/hal_espressif-3.6.0/components/protocomm/include/common/
Dprotocomm.h30 ssize_t inlen, /*!< Length o the input buffer */
178 const uint8_t *inbuf, ssize_t inlen,
/hal_espressif-3.6.0/components/protocomm/src/security/
Dsecurity1.c483 const uint8_t *inbuf, ssize_t inlen, in sec1_decrypt() argument
491 if (*outlen < inlen) { in sec1_decrypt()
505 *outlen = inlen; in sec1_decrypt()
506 int ret = mbedtls_aes_crypt_ctr(&cur_session->ctx_aes, inlen, &cur_session->nc_off, in sec1_decrypt()
518 const uint8_t *inbuf, ssize_t inlen, in sec1_req_handler() argument
537 req = session_data__unpack(NULL, inlen, inbuf); in sec1_req_handler()
Dsecurity0.c71 const uint8_t *inbuf, ssize_t inlen, in sec0_req_handler() argument
79 req = session_data__unpack(NULL, inlen, inbuf); in sec0_req_handler()
/hal_espressif-3.6.0/docs/en/api-reference/provisioning/
Dprotocomm.rst31 const uint8_t *inbuf, ssize_t inlen,
39 *outlen = inlen; /* Output data length updated */
40 *outbuf = malloc(inlen); /* This will be deallocated outside */
41 memcpy(*outbuf, inbuf, inlen);
/hal_espressif-3.6.0/examples/provisioning/wifi_prov_mgr/main/
Dapp_main.c126 esp_err_t custom_prov_data_handler(uint32_t session_id, const uint8_t *inbuf, ssize_t inlen, in custom_prov_data_handler() argument
130 ESP_LOGI(TAG, "Received data: %.*s", inlen, (char *)inbuf); in custom_prov_data_handler()

12