/hal_espressif-3.6.0/components/bt/esp_ble_mesh/mesh_common/tinycrypt/src/ |
D | cbc_mode.c | 38 unsigned int inlen, const uint8_t *iv, in tc_cbc_mode_encrypt() argument 49 inlen == 0 || in tc_cbc_mode_encrypt() 51 (inlen % TC_AES_BLOCK_SIZE) != 0 || in tc_cbc_mode_encrypt() 53 outlen != inlen + TC_AES_BLOCK_SIZE) { in tc_cbc_mode_encrypt() 63 for (n = m = 0; n < inlen; ++n) { in tc_cbc_mode_encrypt() 78 unsigned int inlen, const uint8_t *iv, in tc_cbc_mode_decrypt() argument 90 inlen == 0 || in tc_cbc_mode_decrypt() 92 (inlen % TC_AES_BLOCK_SIZE) != 0 || in tc_cbc_mode_decrypt() 94 outlen != inlen) { in tc_cbc_mode_decrypt()
|
D | ctr_mode.c | 38 unsigned int inlen, uint8_t *ctr, const TCAesKeySched_t sched) in tc_ctr_mode() argument 51 inlen == 0 || in tc_ctr_mode() 53 outlen != inlen) { in tc_ctr_mode() 63 for (i = 0; i < inlen; ++i) { in tc_ctr_mode()
|
D | ccm_mode.c | 94 unsigned int inlen, uint8_t *ctr, const TCAesKeySched_t sched) in ccm_ctr_mode() argument 107 inlen == 0 || in ccm_ctr_mode() 109 outlen != inlen) { in ccm_ctr_mode() 118 for (i = 0; i < inlen; ++i) { in ccm_ctr_mode()
|
/hal_espressif-3.6.0/components/libsodium/test/ |
D | test_sodium.c | 79 const size_t inlen = 3; variable 82 crypto_hash_sha256(calculated, in, inlen); 89 crypto_hash_sha256_update(&state, in, inlen - 1); // split into two updates 90 crypto_hash_sha256_update(&state, in + (inlen -1), 1); 110 const size_t inlen = 3; variable 113 crypto_hash_sha512(calculated, in, inlen); 120 crypto_hash_sha512_update(&state, in, inlen - 1); // split into two updates 121 crypto_hash_sha512_update(&state, in + (inlen -1), 1);
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/tls/ |
D | pkcs1.c | 17 const u8 *in, size_t inlen, in pkcs1_generate_encryption_block() argument 33 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block() 38 (unsigned long) inlen); in pkcs1_generate_encryption_block() 45 ps_len = modlen - inlen - 3; in pkcs1_generate_encryption_block() 73 os_memcpy(pos, in, inlen); /* D */ in pkcs1_generate_encryption_block() 80 int use_private, const u8 *in, size_t inlen, in pkcs1_encrypt() argument 87 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, in pkcs1_encrypt() 96 const u8 *in, size_t inlen, in pkcs1_v15_private_key_decrypt() argument 102 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1); in pkcs1_v15_private_key_decrypt()
|
D | pkcs1.h | 13 int use_private, const u8 *in, size_t inlen, 16 const u8 *in, size_t inlen,
|
/hal_espressif-3.6.0/components/wpa_supplicant/src/crypto/ |
D | crypto_internal-rsa.c | 73 const u8 *in, size_t inlen, in crypto_public_key_encrypt_pkcs1_v15() argument 77 0, in, inlen, out, outlen); in crypto_public_key_encrypt_pkcs1_v15() 82 const u8 *in, size_t inlen, in crypto_private_key_decrypt_pkcs1_v15() argument 86 in, inlen, out, outlen); in crypto_private_key_decrypt_pkcs1_v15() 91 const u8 *in, size_t inlen, in crypto_private_key_sign_pkcs1() argument 95 1, in, inlen, out, outlen); in crypto_private_key_sign_pkcs1()
|
D | sha256-internal.c | 149 unsigned long inlen) in sha256_process() argument 156 while (inlen > 0) { in sha256_process() 157 if (md->curlen == 0 && inlen >= SHA256_BLOCK_SIZE) { in sha256_process() 162 inlen -= SHA256_BLOCK_SIZE; in sha256_process() 164 n = MIN(inlen, (SHA256_BLOCK_SIZE - md->curlen)); in sha256_process() 168 inlen -= n; in sha256_process()
|
D | sha512-internal.c | 187 unsigned long inlen) in sha512_process() argument 194 while (inlen > 0) { in sha512_process() 195 if (md->curlen == 0 && inlen >= SHA512_BLOCK_SIZE) { in sha512_process() 200 inlen -= SHA512_BLOCK_SIZE; in sha512_process() 202 n = MIN(inlen, (SHA512_BLOCK_SIZE - md->curlen)); in sha512_process() 206 inlen -= n; in sha512_process()
|
D | crypto_mbedtls-rsa.c | 184 const u8 *in, size_t inlen, in crypto_public_key_encrypt_pkcs1_v15() argument 215 ctr_drbg, MBEDTLS_RSA_PUBLIC, inlen, in, out); in crypto_public_key_encrypt_pkcs1_v15() 234 const u8 *in, size_t inlen, in crypto_private_key_decrypt_pkcs1_v15() argument 277 const u8 *in, size_t inlen, in crypto_private_key_sign_pkcs1() argument 285 inlen, in, out)) != 0 ) { in crypto_private_key_sign_pkcs1()
|
D | sha384-internal.c | 67 unsigned long inlen) in sha384_process() argument 69 return sha512_process(md, in, inlen); in sha384_process()
|
D | sha384_i.h | 20 unsigned long inlen);
|
/hal_espressif-3.6.0/components/protocomm/src/common/ |
D | protocomm.c | 185 const uint8_t *inbuf, ssize_t inlen, in protocomm_req_handle() argument 205 ret = ep->req_handler(session_id, inbuf, inlen, outbuf, outlen, ep->priv_data); in protocomm_req_handle() 210 uint8_t *dec_inbuf = (uint8_t *) malloc(inlen); in protocomm_req_handle() 212 ESP_LOGE(TAG, "Failed to allocate decrypt buf len %d", inlen); in protocomm_req_handle() 216 ssize_t dec_inbuf_len = inlen; in protocomm_req_handle() 217 … ret = pc->sec->decrypt(pc->sec_inst, session_id, inbuf, inlen, dec_inbuf, &dec_inbuf_len); in protocomm_req_handle() 243 ESP_LOGE(TAG, "Failed to allocate decrypt buf len %d", inlen); in protocomm_req_handle() 268 inbuf, inlen, in protocomm_req_handle() 274 ret = ep->req_handler(session_id, inbuf, inlen, outbuf, outlen, ep->priv_data); in protocomm_req_handle() 281 const uint8_t *inbuf, ssize_t inlen, in protocomm_common_security_handler() argument [all …]
|
/hal_espressif-3.6.0/components/libsodium/port/crypto_hash_mbedtls/ |
D | crypto_hash_sha512_mbedtls.c | 72 const unsigned char *in, unsigned long long inlen) in crypto_hash_sha512_update() argument 76 int ret = mbedtls_sha512_update_ret(&ctx, in, inlen); in crypto_hash_sha512_update() 94 unsigned long long inlen) in crypto_hash_sha512() argument 96 return mbedtls_sha512_ret(in, inlen, out, 0); in crypto_hash_sha512()
|
D | crypto_hash_sha256_mbedtls.c | 68 const unsigned char *in, unsigned long long inlen) in crypto_hash_sha256_update() argument 72 int ret = mbedtls_sha256_update_ret(&ctx, in, inlen); in crypto_hash_sha256_update() 90 unsigned long long inlen) in crypto_hash_sha256() argument 92 return mbedtls_sha256_ret(in, inlen, out, 0); in crypto_hash_sha256()
|
/hal_espressif-3.6.0/components/protocomm/include/security/ |
D | protocomm_security.h | 85 const uint8_t *inbuf, ssize_t inlen, 94 const uint8_t *inbuf, ssize_t inlen, 102 const uint8_t *inbuf, ssize_t inlen,
|
/hal_espressif-3.6.0/components/bt/esp_ble_mesh/mesh_common/tinycrypt/include/tinycrypt/ |
D | cbc_mode.h | 111 unsigned int inlen, const uint8_t *iv, 144 unsigned int inlen, const uint8_t *iv,
|
D | ctr_mode.h | 102 unsigned int inlen, uint8_t *ctr, const TCAesKeySched_t sched);
|
/hal_espressif-3.6.0/components/protocomm/test/ |
D | test_protocomm.c | 369 ssize_t inlen = 0; in test_sec_endpoint() local 427 inlen = session_data__get_packed_size(&req); in test_sec_endpoint() 428 inbuf = (uint8_t *) malloc(inlen); in test_sec_endpoint() 440 inbuf, inlen, &outbuf, &outlen); in test_sec_endpoint() 471 inlen = session_data__get_packed_size(&req); in test_sec_endpoint() 472 inbuf = (uint8_t *) malloc(inlen); in test_sec_endpoint() 484 inbuf, inlen, &outbuf, &outlen); in test_sec_endpoint() 619 const uint8_t *inbuf, ssize_t inlen, in test_req_handler() argument 623 *outbuf = malloc(inlen); in test_req_handler() 625 *outlen = inlen; in test_req_handler() [all …]
|
/hal_espressif-3.6.0/examples/provisioning/legacy/custom_config/components/custom_provisioning/src/ |
D | custom_config.c | 26 int custom_prov_config_data_handler(uint32_t session_id, const uint8_t *inbuf, ssize_t inlen, uint8… in custom_prov_config_data_handler() argument 32 req = custom_config_request__unpack(NULL, inlen, inbuf); in custom_prov_config_data_handler()
|
/hal_espressif-3.6.0/components/protocomm/include/common/ |
D | protocomm.h | 30 ssize_t inlen, /*!< Length o the input buffer */ 178 const uint8_t *inbuf, ssize_t inlen,
|
/hal_espressif-3.6.0/components/protocomm/src/security/ |
D | security1.c | 483 const uint8_t *inbuf, ssize_t inlen, in sec1_decrypt() argument 491 if (*outlen < inlen) { in sec1_decrypt() 505 *outlen = inlen; in sec1_decrypt() 506 int ret = mbedtls_aes_crypt_ctr(&cur_session->ctx_aes, inlen, &cur_session->nc_off, in sec1_decrypt() 518 const uint8_t *inbuf, ssize_t inlen, in sec1_req_handler() argument 537 req = session_data__unpack(NULL, inlen, inbuf); in sec1_req_handler()
|
D | security0.c | 71 const uint8_t *inbuf, ssize_t inlen, in sec0_req_handler() argument 79 req = session_data__unpack(NULL, inlen, inbuf); in sec0_req_handler()
|
/hal_espressif-3.6.0/docs/en/api-reference/provisioning/ |
D | protocomm.rst | 31 const uint8_t *inbuf, ssize_t inlen, 39 *outlen = inlen; /* Output data length updated */ 40 *outbuf = malloc(inlen); /* This will be deallocated outside */ 41 memcpy(*outbuf, inbuf, inlen);
|
/hal_espressif-3.6.0/examples/provisioning/wifi_prov_mgr/main/ |
D | app_main.c | 126 esp_err_t custom_prov_data_handler(uint32_t session_id, const uint8_t *inbuf, ssize_t inlen, in custom_prov_data_handler() argument 130 ESP_LOGI(TAG, "Received data: %.*s", inlen, (char *)inbuf); in custom_prov_data_handler()
|