Home
last modified time | relevance | path

Searched refs:buffer (Results 1 – 25 of 40) sorted by relevance

12

/net-tools-3.4.0/mbedtls-2.4.0/tests/suites/
Dtest_suite_debug.function12 struct buffer_data *buffer = (struct buffer_data *) data;
13 char *p = buffer->ptr;
40 buffer->ptr = p;
55 struct buffer_data buffer;
59 memset( buffer.buf, 0, 2000 );
60 buffer.ptr = buffer.buf;
65 mbedtls_ssl_conf_dbg( &conf, string_debug, &buffer);
70 TEST_ASSERT( strcmp( buffer.buf, result_str ) == 0 );
84 struct buffer_data buffer;
88 memset( buffer.buf, 0, 2000 );
[all …]
Dtest_suite_memory_buffer_alloc.data1 Memory buffer alloc self test
4 Memory buffer alloc - free in middle, alloc at end
7 Memory buffer alloc - free in middle, realloc
10 Memory buffer alloc - free in middle, merge, realloc
13 Memory buffer alloc - free at end, merge, realloc
16 Memory buffer alloc - Out of Memory test
Dtest_suite_asn1write.data4 ASN.1 Write Octet String #1 (Large buffer)
19 ASN.1 Write Octet String #6 (l = 128, large buffer)
22 ASN.1 Write Octet String #7 (l = 128, buffer just fits)
25 ASN.1 Write Octet String #8 (l = 128, buffer too small for tag)
28 ASN.1 Write Octet String #9 (l = 128, buffer too small for len)
31 ASN.1 Write Octet String #9 (l = 128, buffer too small for string)
37 ASN.1 Write IA5 String #1 (Large buffer)
58 ASN.1 Write / Read Length #2 (Len = 127, buffer too small)
67 ASN.1 Write / Read Length #5 (Len = 255, buffer too small)
76 ASN.1 Write / Read Length #8 (Len = 65535, buffer too small)
[all …]
Dtest_suite_base64.data1 Test case mbedtls_base64_encode #1 buffer just right
4 Test case mbedtls_base64_encode #2 buffer just right
7 Test case mbedtls_base64_encode #2 buffer too small
10 Test case mbedtls_base64_encode #3 buffer just right
13 Test case mbedtls_base64_encode #3 buffer too small
16 Test case mbedtls_base64_encode #4 buffer just right
19 Test case mbedtls_base64_encode #4 buffer too small
22 Test case mbedtls_base64_encode #5 buffer just right
25 Test case mbedtls_base64_encode #5 buffer too small
28 Test case mbedtls_base64_encode #6 buffer just right
[all …]
Dtest_suite_hmac_drbg.misc.data61 HMAC_DRBG from buffer SHA-1
65 HMAC_DRBG from buffer SHA-224
69 HMAC_DRBG from buffer SHA-256
73 HMAC_DRBG from buffer SHA-384
77 HMAC_DRBG from buffer SHA-512
Dtest_suite_ecp.data45 ECP write binary #1 (zero, uncompressed, buffer just fits)
49 ECP write binary #2 (zero, buffer too small)
53 ECP write binary #3 (non-zero, uncompressed, buffer just fits)
57 ECP write binary #4 (non-zero, uncompressed, buffer too small)
61 ECP write binary #5 (zero, compressed, buffer just fits)
65 ECP write binary #6 (zero, buffer too small)
69 ECP write binary #7 (even, compressed, buffer just fits)
73 ECP write binary #8 (even, compressed, buffer too small)
77 ECP write binary #9 (odd, compressed, buffer just fits)
138 ECP tls read group #4 (OK, buffer just fits)
[all …]
Dtest_suite_asn1write.function33 /* Check for buffer overwrite on both sides */
69 /* Check for buffer overwrite on both sides */
106 /* Check for buffer overwrite on both sides */
130 * the buffer is missing
Dhelpers.function209 * Allocate and zeroize a buffer.
211 * If the size if zero, a pointer to a zeroized 1-byte buffer is returned.
229 * Allocate and fill a buffer from hex data.
231 * The buffer is sized exactly as needed. This allows to detect buffer
234 * If the size if zero, a pointer to a zeroized 1-byte buffer is returned.
306 * This function returns random based on a buffer it receives.
310 * The number of bytes released from the buffer on each call to
314 * After the buffer is empty it will return rand();
Dtest_suite_debug.data25 Debug print buffer #1
28 Debug print buffer #2
31 Debug print buffer #3
34 Debug print buffer #4
37 Debug print buffer #5
/net-tools-3.4.0/mbedtls-2.4.0/programs/aes/
Daescrypt2.c85 unsigned char buffer[1024]; in main() local
129 memset(buffer, 0, sizeof(buffer)); in main()
231 buffer[i] = (unsigned char)( filesize >> ( i << 3 ) ); in main()
236 mbedtls_md_update( &sha_ctx, buffer, 8 ); in main()
287 if( fread( buffer, 1, n, fin ) != (size_t) n ) in main()
294 buffer[i] = (unsigned char)( buffer[i] ^ IV[i] ); in main()
296 mbedtls_aes_crypt_ecb( &aes_ctx, MBEDTLS_AES_ENCRYPT, buffer, buffer ); in main()
297 mbedtls_md_hmac_update( &sha_ctx, buffer, 16 ); in main()
299 if( fwrite( buffer, 1, 16, fout ) != 16 ) in main()
305 memcpy( IV, buffer, 16 ); in main()
[all …]
Dcrypt_and_hash.c85 unsigned char buffer[1024]; in main() local
270 buffer[i] = (unsigned char)( filesize >> ( i << 3 ) ); in main()
275 mbedtls_md_update( &md_ctx, buffer, 8 ); in main()
335 if( fread( buffer, 1, ilen, fin ) != ilen ) in main()
341 if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, &olen ) != 0 ) in main()
424 if( fread( buffer, 1, 16, fin ) != 16 ) in main()
430 memcpy( IV, buffer, 16 ); in main()
478 if( fread( buffer, 1, ilen, fin ) != ilen ) in main()
485 mbedtls_md_hmac_update( &md_ctx, buffer, ilen ); in main()
486 if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, in main()
[all …]
/net-tools-3.4.0/tinydtls-0.8.2/sha2/
Dsha2.c375 MEMSET_BZERO(context->buffer, SHA256_BLOCK_LENGTH); in SHA256_Init()
421 W256 = (sha2_word32*)context->buffer; in SHA256_Transform()
479 W256 = (sha2_word32*)context->buffer; in SHA256_Transform()
572 MEMCPY_BCOPY(&context->buffer[usedspace], data, freespace); in SHA256_Update()
576 SHA256_Transform(context, (sha2_word32*)context->buffer); in SHA256_Update()
579 MEMCPY_BCOPY(&context->buffer[usedspace], data, len); in SHA256_Update()
595 MEMCPY_BCOPY(context->buffer, data, len); in SHA256_Update()
618 context->buffer[usedspace++] = 0x80; in SHA256_Final()
622 MEMSET_BZERO(&context->buffer[usedspace], SHA256_SHORT_BLOCK_LENGTH - usedspace); in SHA256_Final()
625 MEMSET_BZERO(&context->buffer[usedspace], SHA256_BLOCK_LENGTH - usedspace); in SHA256_Final()
[all …]
Dsha2.h100 uint8_t buffer[SHA256_BLOCK_LENGTH]; member
105 uint8_t buffer[SHA512_BLOCK_LENGTH]; member
113 u_int8_t buffer[SHA256_BLOCK_LENGTH];
118 u_int8_t buffer[SHA512_BLOCK_LENGTH];
/net-tools-3.4.0/mbedtls-2.4.0/library/
Dbase64.c251 unsigned char buffer[128]; in mbedtls_base64_self_test() local
258 if( mbedtls_base64_encode( buffer, sizeof( buffer ), &len, src, 64 ) != 0 || in mbedtls_base64_self_test()
259 memcmp( base64_test_enc, buffer, 88 ) != 0 ) in mbedtls_base64_self_test()
272 if( mbedtls_base64_decode( buffer, sizeof( buffer ), &len, src, 88 ) != 0 || in mbedtls_base64_self_test()
273 memcmp( base64_test_dec, buffer, 64 ) != 0 ) in mbedtls_base64_self_test()
Dmd2.c112 memset( ctx->buffer, 0, 16 ); in mbedtls_md2_starts()
124 ctx->state[i + 16] = ctx->buffer[i]; in mbedtls_md2_process()
126 (unsigned char)( ctx->buffer[i] ^ ctx->state[i]); in mbedtls_md2_process()
146 ( ctx->cksum[i] ^ PI_SUBST[ctx->buffer[i] ^ t] ); in mbedtls_md2_process()
166 memcpy( ctx->buffer + ctx->left, input, fill ); in mbedtls_md2_update()
191 ctx->buffer[i] = x; in mbedtls_md2_finish()
195 memcpy( ctx->buffer, ctx->cksum, 16 ); in mbedtls_md2_finish()
Dmd4.c239 memcpy( (void *) (ctx->buffer + left), in mbedtls_md4_update()
241 mbedtls_md4_process( ctx, ctx->buffer ); in mbedtls_md4_update()
256 memcpy( (void *) (ctx->buffer + left), in mbedtls_md4_update()
/net-tools-3.4.0/virtual-hub/src/
Dhub.c41 unsigned char **buffer; variable
63 buffer = (unsigned char **) malloc( in alloc_size()
67 buffer[lines] = (unsigned char *) malloc( in alloc_size()
94 free(buffer[i]); in dealloc_size()
99 free(buffer); in dealloc_size()
161 buffer[pos][buffer_index[pos]] = *buf; in fifo_handler()
204 buffer[pos][buffer_index[pos]] = *buf; in fifo_handler()
208 *buf = buffer[pos][i]; in fifo_handler()
209 buffer[pos][i] = 0xFF; in fifo_handler()
/net-tools-3.4.0/mbedtls-2.4.0/include/mbedtls/
Derror.h101 void mbedtls_strerror( int errnum, char *buffer, size_t buflen );
Dmd2.h49 unsigned char buffer[16]; /*!< data block being processed */ member
Dripemd160.h50 unsigned char buffer[64]; /*!< data block being processed */ member
Dsha1.h50 unsigned char buffer[64]; /*!< data block being processed */ member
Dmd4.h50 unsigned char buffer[64]; /*!< data block being processed */ member
Dmd5.h50 unsigned char buffer[64]; /*!< data block being processed */ member
Dsha256.h50 unsigned char buffer[64]; /*!< data block being processed */ member
Dsha512.h50 unsigned char buffer[128]; /*!< data block being processed */ member

12