/net-tools-3.4.0/mbedtls-2.4.0/tests/suites/ |
D | test_suite_debug.function | 12 struct buffer_data *buffer = (struct buffer_data *) data; 13 char *p = buffer->ptr; 40 buffer->ptr = p; 55 struct buffer_data buffer; 59 memset( buffer.buf, 0, 2000 ); 60 buffer.ptr = buffer.buf; 65 mbedtls_ssl_conf_dbg( &conf, string_debug, &buffer); 70 TEST_ASSERT( strcmp( buffer.buf, result_str ) == 0 ); 84 struct buffer_data buffer; 88 memset( buffer.buf, 0, 2000 ); [all …]
|
D | test_suite_memory_buffer_alloc.data | 1 Memory buffer alloc self test 4 Memory buffer alloc - free in middle, alloc at end 7 Memory buffer alloc - free in middle, realloc 10 Memory buffer alloc - free in middle, merge, realloc 13 Memory buffer alloc - free at end, merge, realloc 16 Memory buffer alloc - Out of Memory test
|
D | test_suite_asn1write.data | 4 ASN.1 Write Octet String #1 (Large buffer) 19 ASN.1 Write Octet String #6 (l = 128, large buffer) 22 ASN.1 Write Octet String #7 (l = 128, buffer just fits) 25 ASN.1 Write Octet String #8 (l = 128, buffer too small for tag) 28 ASN.1 Write Octet String #9 (l = 128, buffer too small for len) 31 ASN.1 Write Octet String #9 (l = 128, buffer too small for string) 37 ASN.1 Write IA5 String #1 (Large buffer) 58 ASN.1 Write / Read Length #2 (Len = 127, buffer too small) 67 ASN.1 Write / Read Length #5 (Len = 255, buffer too small) 76 ASN.1 Write / Read Length #8 (Len = 65535, buffer too small) [all …]
|
D | test_suite_base64.data | 1 Test case mbedtls_base64_encode #1 buffer just right 4 Test case mbedtls_base64_encode #2 buffer just right 7 Test case mbedtls_base64_encode #2 buffer too small 10 Test case mbedtls_base64_encode #3 buffer just right 13 Test case mbedtls_base64_encode #3 buffer too small 16 Test case mbedtls_base64_encode #4 buffer just right 19 Test case mbedtls_base64_encode #4 buffer too small 22 Test case mbedtls_base64_encode #5 buffer just right 25 Test case mbedtls_base64_encode #5 buffer too small 28 Test case mbedtls_base64_encode #6 buffer just right [all …]
|
D | test_suite_hmac_drbg.misc.data | 61 HMAC_DRBG from buffer SHA-1 65 HMAC_DRBG from buffer SHA-224 69 HMAC_DRBG from buffer SHA-256 73 HMAC_DRBG from buffer SHA-384 77 HMAC_DRBG from buffer SHA-512
|
D | test_suite_ecp.data | 45 ECP write binary #1 (zero, uncompressed, buffer just fits) 49 ECP write binary #2 (zero, buffer too small) 53 ECP write binary #3 (non-zero, uncompressed, buffer just fits) 57 ECP write binary #4 (non-zero, uncompressed, buffer too small) 61 ECP write binary #5 (zero, compressed, buffer just fits) 65 ECP write binary #6 (zero, buffer too small) 69 ECP write binary #7 (even, compressed, buffer just fits) 73 ECP write binary #8 (even, compressed, buffer too small) 77 ECP write binary #9 (odd, compressed, buffer just fits) 138 ECP tls read group #4 (OK, buffer just fits) [all …]
|
D | test_suite_asn1write.function | 33 /* Check for buffer overwrite on both sides */ 69 /* Check for buffer overwrite on both sides */ 106 /* Check for buffer overwrite on both sides */ 130 * the buffer is missing
|
D | helpers.function | 209 * Allocate and zeroize a buffer. 211 * If the size if zero, a pointer to a zeroized 1-byte buffer is returned. 229 * Allocate and fill a buffer from hex data. 231 * The buffer is sized exactly as needed. This allows to detect buffer 234 * If the size if zero, a pointer to a zeroized 1-byte buffer is returned. 306 * This function returns random based on a buffer it receives. 310 * The number of bytes released from the buffer on each call to 314 * After the buffer is empty it will return rand();
|
D | test_suite_debug.data | 25 Debug print buffer #1 28 Debug print buffer #2 31 Debug print buffer #3 34 Debug print buffer #4 37 Debug print buffer #5
|
/net-tools-3.4.0/mbedtls-2.4.0/programs/aes/ |
D | aescrypt2.c | 85 unsigned char buffer[1024]; in main() local 129 memset(buffer, 0, sizeof(buffer)); in main() 231 buffer[i] = (unsigned char)( filesize >> ( i << 3 ) ); in main() 236 mbedtls_md_update( &sha_ctx, buffer, 8 ); in main() 287 if( fread( buffer, 1, n, fin ) != (size_t) n ) in main() 294 buffer[i] = (unsigned char)( buffer[i] ^ IV[i] ); in main() 296 mbedtls_aes_crypt_ecb( &aes_ctx, MBEDTLS_AES_ENCRYPT, buffer, buffer ); in main() 297 mbedtls_md_hmac_update( &sha_ctx, buffer, 16 ); in main() 299 if( fwrite( buffer, 1, 16, fout ) != 16 ) in main() 305 memcpy( IV, buffer, 16 ); in main() [all …]
|
D | crypt_and_hash.c | 85 unsigned char buffer[1024]; in main() local 270 buffer[i] = (unsigned char)( filesize >> ( i << 3 ) ); in main() 275 mbedtls_md_update( &md_ctx, buffer, 8 ); in main() 335 if( fread( buffer, 1, ilen, fin ) != ilen ) in main() 341 if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, &olen ) != 0 ) in main() 424 if( fread( buffer, 1, 16, fin ) != 16 ) in main() 430 memcpy( IV, buffer, 16 ); in main() 478 if( fread( buffer, 1, ilen, fin ) != ilen ) in main() 485 mbedtls_md_hmac_update( &md_ctx, buffer, ilen ); in main() 486 if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, in main() [all …]
|
/net-tools-3.4.0/tinydtls-0.8.2/sha2/ |
D | sha2.c | 375 MEMSET_BZERO(context->buffer, SHA256_BLOCK_LENGTH); in SHA256_Init() 421 W256 = (sha2_word32*)context->buffer; in SHA256_Transform() 479 W256 = (sha2_word32*)context->buffer; in SHA256_Transform() 572 MEMCPY_BCOPY(&context->buffer[usedspace], data, freespace); in SHA256_Update() 576 SHA256_Transform(context, (sha2_word32*)context->buffer); in SHA256_Update() 579 MEMCPY_BCOPY(&context->buffer[usedspace], data, len); in SHA256_Update() 595 MEMCPY_BCOPY(context->buffer, data, len); in SHA256_Update() 618 context->buffer[usedspace++] = 0x80; in SHA256_Final() 622 MEMSET_BZERO(&context->buffer[usedspace], SHA256_SHORT_BLOCK_LENGTH - usedspace); in SHA256_Final() 625 MEMSET_BZERO(&context->buffer[usedspace], SHA256_BLOCK_LENGTH - usedspace); in SHA256_Final() [all …]
|
D | sha2.h | 100 uint8_t buffer[SHA256_BLOCK_LENGTH]; member 105 uint8_t buffer[SHA512_BLOCK_LENGTH]; member 113 u_int8_t buffer[SHA256_BLOCK_LENGTH]; 118 u_int8_t buffer[SHA512_BLOCK_LENGTH];
|
/net-tools-3.4.0/mbedtls-2.4.0/library/ |
D | base64.c | 251 unsigned char buffer[128]; in mbedtls_base64_self_test() local 258 if( mbedtls_base64_encode( buffer, sizeof( buffer ), &len, src, 64 ) != 0 || in mbedtls_base64_self_test() 259 memcmp( base64_test_enc, buffer, 88 ) != 0 ) in mbedtls_base64_self_test() 272 if( mbedtls_base64_decode( buffer, sizeof( buffer ), &len, src, 88 ) != 0 || in mbedtls_base64_self_test() 273 memcmp( base64_test_dec, buffer, 64 ) != 0 ) in mbedtls_base64_self_test()
|
D | md2.c | 112 memset( ctx->buffer, 0, 16 ); in mbedtls_md2_starts() 124 ctx->state[i + 16] = ctx->buffer[i]; in mbedtls_md2_process() 126 (unsigned char)( ctx->buffer[i] ^ ctx->state[i]); in mbedtls_md2_process() 146 ( ctx->cksum[i] ^ PI_SUBST[ctx->buffer[i] ^ t] ); in mbedtls_md2_process() 166 memcpy( ctx->buffer + ctx->left, input, fill ); in mbedtls_md2_update() 191 ctx->buffer[i] = x; in mbedtls_md2_finish() 195 memcpy( ctx->buffer, ctx->cksum, 16 ); in mbedtls_md2_finish()
|
D | md4.c | 239 memcpy( (void *) (ctx->buffer + left), in mbedtls_md4_update() 241 mbedtls_md4_process( ctx, ctx->buffer ); in mbedtls_md4_update() 256 memcpy( (void *) (ctx->buffer + left), in mbedtls_md4_update()
|
/net-tools-3.4.0/virtual-hub/src/ |
D | hub.c | 41 unsigned char **buffer; variable 63 buffer = (unsigned char **) malloc( in alloc_size() 67 buffer[lines] = (unsigned char *) malloc( in alloc_size() 94 free(buffer[i]); in dealloc_size() 99 free(buffer); in dealloc_size() 161 buffer[pos][buffer_index[pos]] = *buf; in fifo_handler() 204 buffer[pos][buffer_index[pos]] = *buf; in fifo_handler() 208 *buf = buffer[pos][i]; in fifo_handler() 209 buffer[pos][i] = 0xFF; in fifo_handler()
|
/net-tools-3.4.0/mbedtls-2.4.0/include/mbedtls/ |
D | error.h | 101 void mbedtls_strerror( int errnum, char *buffer, size_t buflen );
|
D | md2.h | 49 unsigned char buffer[16]; /*!< data block being processed */ member
|
D | ripemd160.h | 50 unsigned char buffer[64]; /*!< data block being processed */ member
|
D | sha1.h | 50 unsigned char buffer[64]; /*!< data block being processed */ member
|
D | md4.h | 50 unsigned char buffer[64]; /*!< data block being processed */ member
|
D | md5.h | 50 unsigned char buffer[64]; /*!< data block being processed */ member
|
D | sha256.h | 50 unsigned char buffer[64]; /*!< data block being processed */ member
|
D | sha512.h | 50 unsigned char buffer[128]; /*!< data block being processed */ member
|