/third_party/mbedtls/library/ |
D | cipher.c | 514 size_t ilen, unsigned char *output, size_t *olen ) in mbedtls_cipher_update() argument 520 CIPHER_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_cipher_update() 545 if( ilen != block_size ) in mbedtls_cipher_update() 548 *olen = ilen; in mbedtls_cipher_update() 563 input, ilen, in mbedtls_cipher_update() 564 output, ilen, olen ) ); in mbedtls_cipher_update() 572 input, ilen, in mbedtls_cipher_update() 573 output, ilen, olen ) ); in mbedtls_cipher_update() 580 *olen = ilen; in mbedtls_cipher_update() 582 ilen, input, output ) ); in mbedtls_cipher_update() [all …]
|
D | md.c | 463 int mbedtls_md_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen ) in mbedtls_md_update() argument 472 return( mbedtls_md5_update( ctx->md_ctx, input, ilen ) ); in mbedtls_md_update() 476 return( mbedtls_ripemd160_update( ctx->md_ctx, input, ilen ) ); in mbedtls_md_update() 480 return( mbedtls_sha1_update( ctx->md_ctx, input, ilen ) ); in mbedtls_md_update() 484 return( mbedtls_sha256_update( ctx->md_ctx, input, ilen ) ); in mbedtls_md_update() 488 return( mbedtls_sha256_update( ctx->md_ctx, input, ilen ) ); in mbedtls_md_update() 492 return( mbedtls_sha512_update( ctx->md_ctx, input, ilen ) ); in mbedtls_md_update() 496 return( mbedtls_sha512_update( ctx->md_ctx, input, ilen ) ); in mbedtls_md_update() 543 int mbedtls_md( const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen, in mbedtls_md() argument 553 return( mbedtls_md5( input, ilen, output ) ); in mbedtls_md() [all …]
|
D | sha512.c | 301 size_t ilen ) in mbedtls_sha512_update() argument 308 SHA512_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_sha512_update() 310 if( ilen == 0 ) in mbedtls_sha512_update() 316 ctx->total[0] += (uint64_t) ilen; in mbedtls_sha512_update() 318 if( ctx->total[0] < (uint64_t) ilen ) in mbedtls_sha512_update() 321 if( left && ilen >= fill ) in mbedtls_sha512_update() 329 ilen -= fill; in mbedtls_sha512_update() 333 while( ilen >= 128 ) in mbedtls_sha512_update() 339 ilen -= 128; in mbedtls_sha512_update() 342 if( ilen > 0 ) in mbedtls_sha512_update() [all …]
|
D | sha256.c | 267 size_t ilen ) in mbedtls_sha256_update() argument 274 SHA256_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_sha256_update() 276 if( ilen == 0 ) in mbedtls_sha256_update() 282 ctx->total[0] += (uint32_t) ilen; in mbedtls_sha256_update() 285 if( ctx->total[0] < (uint32_t) ilen ) in mbedtls_sha256_update() 288 if( left && ilen >= fill ) in mbedtls_sha256_update() 296 ilen -= fill; in mbedtls_sha256_update() 300 while( ilen >= 64 ) in mbedtls_sha256_update() 306 ilen -= 64; in mbedtls_sha256_update() 309 if( ilen > 0 ) in mbedtls_sha256_update() [all …]
|
D | rsa.c | 1157 size_t ilen, in mbedtls_rsa_rsaes_oaep_encrypt() argument 1170 RSA_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_rsa_rsaes_oaep_encrypt() 1184 if( ilen + 2 * hlen + 2 < ilen || olen < ilen + 2 * hlen + 2 ) in mbedtls_rsa_rsaes_oaep_encrypt() 1201 p += olen - 2 * hlen - 2 - ilen; in mbedtls_rsa_rsaes_oaep_encrypt() 1203 if( ilen != 0 ) in mbedtls_rsa_rsaes_oaep_encrypt() 1204 memcpy( p, input, ilen ); in mbedtls_rsa_rsaes_oaep_encrypt() 1236 void *p_rng, size_t ilen, in mbedtls_rsa_rsaes_pkcs1_v15_encrypt() argument 1246 RSA_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_rsa_rsaes_pkcs1_v15_encrypt() 1251 if( ilen + 11 < ilen || olen < ilen + 11 ) in mbedtls_rsa_rsaes_pkcs1_v15_encrypt() 1254 nb_pad = olen - 3 - ilen; in mbedtls_rsa_rsaes_pkcs1_v15_encrypt() [all …]
|
D | md5.c | 224 size_t ilen ) in mbedtls_md5_update() argument 230 if( ilen == 0 ) in mbedtls_md5_update() 236 ctx->total[0] += (uint32_t) ilen; in mbedtls_md5_update() 239 if( ctx->total[0] < (uint32_t) ilen ) in mbedtls_md5_update() 242 if( left && ilen >= fill ) in mbedtls_md5_update() 249 ilen -= fill; in mbedtls_md5_update() 253 while( ilen >= 64 ) in mbedtls_md5_update() 259 ilen -= 64; in mbedtls_md5_update() 262 if( ilen > 0 ) in mbedtls_md5_update() 264 memcpy( (void *) (ctx->buffer + left), input, ilen ); in mbedtls_md5_update() [all …]
|
D | poly1305.c | 307 size_t ilen ) in mbedtls_poly1305_update() argument 310 size_t remaining = ilen; in mbedtls_poly1305_update() 314 POLY1305_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_poly1305_update() 320 if( ilen < queue_free_len ) in mbedtls_poly1305_update() 327 ilen ); in mbedtls_poly1305_update() 329 ctx->queue_len += ilen; in mbedtls_poly1305_update() 398 size_t ilen, in mbedtls_poly1305_mac() argument 405 POLY1305_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_poly1305_mac() 413 ret = mbedtls_poly1305_update( &ctx, input, ilen ); in mbedtls_poly1305_mac()
|
D | cmac.c | 226 const unsigned char *input, size_t ilen ) in mbedtls_cipher_cmac_update() argument 244 ilen > block_size - cmac_ctx->unprocessed_len ) in mbedtls_cipher_cmac_update() 259 ilen -= block_size - cmac_ctx->unprocessed_len; in mbedtls_cipher_cmac_update() 264 n = ( ilen + block_size - 1 ) / block_size; in mbedtls_cipher_cmac_update() 276 ilen -= block_size; in mbedtls_cipher_cmac_update() 281 if( ilen > 0 ) in mbedtls_cipher_cmac_update() 285 ilen ); in mbedtls_cipher_cmac_update() 286 cmac_ctx->unprocessed_len += ilen; in mbedtls_cipher_cmac_update() 375 const unsigned char *input, size_t ilen, in mbedtls_cipher_cmac() argument 393 ret = mbedtls_cipher_cmac_update( &ctx, input, ilen ); in mbedtls_cipher_cmac()
|
D | sha1.c | 274 size_t ilen ) in mbedtls_sha1_update() argument 281 SHA1_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_sha1_update() 283 if( ilen == 0 ) in mbedtls_sha1_update() 289 ctx->total[0] += (uint32_t) ilen; in mbedtls_sha1_update() 292 if( ctx->total[0] < (uint32_t) ilen ) in mbedtls_sha1_update() 295 if( left && ilen >= fill ) in mbedtls_sha1_update() 303 ilen -= fill; in mbedtls_sha1_update() 307 while( ilen >= 64 ) in mbedtls_sha1_update() 313 ilen -= 64; in mbedtls_sha1_update() 316 if( ilen > 0 ) in mbedtls_sha1_update() [all …]
|
D | constant_time.c | 676 size_t ilen, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() argument 700 plaintext_max_size = ( output_max_len > ilen - 11 ) ? ilen - 11 in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 714 for( i = 2; i < ilen; i++ ) in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 736 (unsigned) ( ilen - pad_count - 3 ) ); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 761 for( i = 11; i < ilen; i++ ) in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 778 mbedtls_ct_mem_move_to_left( input + ilen - plaintext_max_size, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 790 memcpy( output, input + ilen - plaintext_max_size, plaintext_max_size ); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
|
D | ripemd160.c | 287 size_t ilen ) in mbedtls_ripemd160_update() argument 293 if( ilen == 0 ) in mbedtls_ripemd160_update() 299 ctx->total[0] += (uint32_t) ilen; in mbedtls_ripemd160_update() 302 if( ctx->total[0] < (uint32_t) ilen ) in mbedtls_ripemd160_update() 305 if( left && ilen >= fill ) in mbedtls_ripemd160_update() 313 ilen -= fill; in mbedtls_ripemd160_update() 317 while( ilen >= 64 ) in mbedtls_ripemd160_update() 323 ilen -= 64; in mbedtls_ripemd160_update() 326 if( ilen > 0 ) in mbedtls_ripemd160_update() 328 memcpy( (void *) (ctx->buffer + left), input, ilen ); in mbedtls_ripemd160_update() [all …]
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_pkwrite.function | 20 size_t ilen, pem_len, buf_index; 41 ilen = fread( check_buf, 1, sizeof( check_buf ), f ); 44 TEST_ASSERT( ilen == pem_len ); 45 TEST_ASSERT( memcmp( (char *) buf, (char *) check_buf, ilen ) == 0 ); 60 size_t ilen, pem_len, buf_index; 82 ilen = fread( check_buf, 1, sizeof( check_buf ), f ); 85 TEST_ASSERT( ilen == strlen( (char *) buf ) ); 86 TEST_ASSERT( memcmp( (char *) buf, (char *) check_buf, ilen ) == 0 );
|
/third_party/openssl/crypto/comp/ |
D | comp_lib.c | 60 unsigned char *in, int ilen) in COMP_compress_block() argument 66 ret = ctx->meth->compress(ctx, out, olen, in, ilen); in COMP_compress_block() 68 ctx->compress_in += ilen; in COMP_compress_block() 75 unsigned char *in, int ilen) in COMP_expand_block() argument 82 ret = ctx->meth->expand(ctx, out, olen, in, ilen); in COMP_expand_block() 84 ctx->expand_in += ilen; in COMP_expand_block()
|
D | comp_local.h | 17 unsigned char *in, unsigned int ilen); 20 unsigned char *in, unsigned int ilen);
|
D | c_zlib.c | 42 unsigned int ilen); 45 unsigned int ilen); 167 unsigned int ilen) in zlib_stateful_compress_block() argument 176 state->ostream.avail_in = ilen; in zlib_stateful_compress_block() 179 if (ilen > 0) in zlib_stateful_compress_block() 188 unsigned int ilen) in zlib_stateful_expand_block() argument 197 state->istream.avail_in = ilen; in zlib_stateful_expand_block() 200 if (ilen > 0) in zlib_stateful_expand_block()
|
/third_party/lwip/src/netif/ppp/polarssl/ |
D | md5.c | 211 void md5_update( md5_context *ctx, const unsigned char *input, int ilen ) in md5_update() argument 216 if( ilen <= 0 ) in md5_update() 222 ctx->total[0] += ilen; in md5_update() 225 if( ctx->total[0] < (unsigned long) ilen ) in md5_update() 228 if( left && ilen >= fill ) in md5_update() 234 ilen -= fill; in md5_update() 238 while( ilen >= 64 ) in md5_update() 242 ilen -= 64; in md5_update() 245 if( ilen > 0 ) in md5_update() 248 input, ilen ); in md5_update() [all …]
|
D | md4.c | 192 void md4_update( md4_context *ctx, const unsigned char *input, int ilen ) in md4_update() argument 197 if( ilen <= 0 ) in md4_update() 203 ctx->total[0] += ilen; in md4_update() 206 if( ctx->total[0] < (unsigned long) ilen ) in md4_update() 209 if( left && ilen >= fill ) in md4_update() 215 ilen -= fill; in md4_update() 219 while( ilen >= 64 ) in md4_update() 223 ilen -= 64; in md4_update() 226 if( ilen > 0 ) in md4_update() 229 input, ilen ); in md4_update() [all …]
|
D | sha1.c | 245 void sha1_update( sha1_context *ctx, const unsigned char *input, int ilen ) in sha1_update() argument 250 if( ilen <= 0 ) in sha1_update() 256 ctx->total[0] += ilen; in sha1_update() 259 if( ctx->total[0] < (unsigned long) ilen ) in sha1_update() 262 if( left && ilen >= fill ) in sha1_update() 268 ilen -= fill; in sha1_update() 272 while( ilen >= 64 ) in sha1_update() 276 ilen -= 64; in sha1_update() 279 if( ilen > 0 ) in sha1_update() 282 input, ilen ); in sha1_update() [all …]
|
/third_party/mbedtls/programs/aes/ |
D | crypt_and_hash.c | 86 size_t keylen, ilen, olen; in main() local 379 … ilen = ( (unsigned int) filesize - offset > mbedtls_cipher_get_block_size( &cipher_ctx ) ) ? in main() 382 if( fread( buffer, 1, ilen, fin ) != ilen ) in main() 384 mbedtls_fprintf( stderr, "fread(%ld bytes) failed\n", (long) ilen ); in main() 388 if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, &olen ) != 0 ) in main() 554 … ilen = ( (unsigned int) filesize - offset > mbedtls_cipher_get_block_size( &cipher_ctx ) ) ? in main() 557 if( fread( buffer, 1, ilen, fin ) != ilen ) in main() 564 if( mbedtls_md_hmac_update( &md_ctx, buffer, ilen ) != 0 ) in main() 569 if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, in main()
|
/third_party/mbedtls/include/mbedtls/ |
D | md.h | 281 int mbedtls_md_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen ); 323 int mbedtls_md( const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen, 392 size_t ilen ); 457 const unsigned char *input, size_t ilen,
|
/third_party/lwip/src/include/netif/ppp/polarssl/ |
D | md4.h | 71 void md4_update( md4_context *ctx, const unsigned char *input, int ilen ); 88 void md4( unsigned char *input, int ilen, unsigned char output[16] );
|
D | sha1.h | 71 void sha1_update( sha1_context *ctx, const unsigned char *input, int ilen ); 88 void sha1( unsigned char *input, int ilen, unsigned char output[20] );
|
D | md5.h | 71 void md5_update( md5_context *ctx, const unsigned char *input, int ilen ); 88 void md5( unsigned char *input, int ilen, unsigned char output[16] );
|
/third_party/rust/crates/regex/examples/ |
D | shootout-regex-dna-replace.rs | 13 let ilen = seq.len(); in main() localVariable 16 println!("original: {}, replaced: {}", ilen, seq.len()); in main()
|
/third_party/python/Python/ |
D | wordcode_helpers.h | 26 unsigned int oparg, int ilen) in write_op_arg() argument 28 switch (ilen) { in write_op_arg()
|