Lines Matching refs:dOut
26893 …the digest in dOut. The number of bytes in the placed in the buffer is returned. If there is a fai…
26905 280 BYTE *dOut // OUT: hash digest
26915 290 BYTE *rBuffer = dOut;
26938 308 if(rBuffer != dOut)
26940 310 if(dOut != NULL)
26942 312 memcpy(dOut, temp, dOutSize);
27152 …then add the oPadKey and the completed digest and return the results in dOut. It will not return m…
27157 >= 0 number of bytes in dOut (may be zero)
27164 472 BYTE *dOut // OUT: hash digest
27180 488 return _cpri__CompleteHash(&localState, dOutSize, dOut);
27740 …is function performs AES encryption in CBC chain mode. The input dIn buffer is encrypted into dOut.
27751 41 BYTE *dOut, // OUT:
27766 56 pAssert(dOut != NULL && key != NULL && iv != NULL && dIn != NULL);
27798 83 *dOut++ = *pIv++;
27806 …is function performs AES decryption in CBC chain mode. The input dIn buffer is decrypted into dOut.
27817 89 BYTE *dOut, // OUT: the decrypted data
27834 106 pAssert(dOut != NULL && key != NULL && iv != NULL && dIn != NULL);
27864 130 AES_decrypt(tmp, dOut, &AesKey);
27869 135 *dOut++ ^= *pIv;
27879 This function performs AES encryption in CFB chain mode. The dOut buffer receives the values
27889 143 BYTE *dOut, // OUT: the encrypted
27903 157 pAssert(dOut != NULL && key != NULL && iv != NULL && dIn != NULL);
27924 178 *dOut++ = *pIv++ ^= *dIn++;
27942 …This function performs AES decrypt in CFB chain mode. The dOut buffer receives the values decrypted
27953 189 BYTE *dOut, // OUT: the decrypted data
27969 205 pAssert(dOut != NULL && key != NULL && iv != NULL && dIn != NULL);
27990 226 *dOut++ = *pT++ ^ (*pIv++ = *dIn++);
28011 …dOut. The input iv buffer is assumed to have a size equal to the AES block size (16 bytes). The iv…
28020 239 BYTE *dOut, // OUT: the encrypted data
28035 254 pAssert(dOut != NULL && key != NULL && iv != NULL && dIn != NULL);
28060 279 *dOut++ = *dIn++ ^ *pT++;
28075 283 //% #define _cpri__AESDecryptCTR(dOut, keySize, key, iv, dInSize, dIn) \
28077 285 //% ((BYTE *)dOut), \
28100 297 BYTE *dOut, // OUT: encrypted data
28111 308 pAssert(dOut != NULL && key != NULL && dIn != NULL);
28129 326 AES_encrypt(dIn, dOut, &AesKey);
28131 328 dOut = &dOut[16];
28145 into dOut.
28153 334 BYTE *dOut, // OUT: the clear text data
28164 345 pAssert(dOut != NULL && key != NULL && dIn != NULL);
28183 364 AES_decrypt(dIn, dOut, &AesKey);
28185 366 dOut = &dOut[16];
28212 372 BYTE *dOut, // OUT: the encrypted/decrypted data
28227 387 pAssert(dOut != NULL && key != NULL && iv != NULL && dIn != NULL);
28239 399 // This is written so that dIn and dOut may be the same
28246 406 // XOR the encrypted IV into dIn to create the cipher text (dOut)
28249 409 *dOut++ = (*pIv++ ^ *dIn++);
28260 413 //%#define _cpri__AESDecryptOFB(dOut,keySizeInBits, key, iv, dInSize, dIn) \
28262 415 //% ((BYTE *)dOut), \
28283 …is function performs SM4 encryption in CBC chain mode. The input dIn buffer is encrypted into dOut.
28294 426 BYTE *dOut, // OUT:
28309 441 pAssert(dOut != NULL && key != NULL && iv != NULL && dIn != NULL);
28336 468 *dOut++ = *pIv++;
28349 …is function performs SM4 decryption in CBC chain mode. The input dIn buffer is decrypted into dOut.
28360 474 BYTE *dOut, // OUT: the decrypted data
28377 491 pAssert(dOut != NULL && key != NULL && iv != NULL && dIn != NULL);
28401 515 SM4_decrypt(tmp, dOut, &Sm4Key);
28406 520 *dOut++ ^= *pIv;
28422 This function performs SM4 encryption in CFB chain mode. The dOut buffer receives the values
28432 528 BYTE *dOut, // OUT: the encrypted
28446 542 pAssert(dOut != NULL && key != NULL && iv != NULL && dIn != NULL);
28467 563 *dOut++ = *pIv++ ^= *dIn++;
28475 …This function performs SM4 decrypt in CFB chain mode. The dOut buffer receives the values decrypted
28492 569 BYTE *dOut, // OUT: the decrypted data
28508 585 pAssert(dOut != NULL && key != NULL && iv != NULL && dIn != NULL);
28529 606 *dOut++ = *pT++ ^ (*pIv++ = *dIn++);
28545 …dOut. The input iv buffer is assumed to have a size equal to the SM4 block size (16 bytes). The iv…
28559 619 BYTE *dOut, // OUT: the encrypted data
28574 634 pAssert(dOut != NULL && key != NULL && iv != NULL && dIn != NULL);
28599 659 *dOut++ = *dIn++ ^ *pT++;
28610 663 //% #define _cpri__SM4DecryptCTR(dOut, keySize, key, iv, dInSize, dIn) \
28612 665 //% ((BYTE *)dOut), \
28641 677 BYTE *dOut, // OUT: encrypted data
28652 688 pAssert(dOut != NULL && key != NULL && dIn != NULL);
28670 706 SM4_encrypt(dIn, dOut, &Sm4Key);
28672 708 dOut = &dOut[16];
28681 into dOut.
28697 714 BYTE *dOut, // OUT: the clear text data
28708 725 pAssert(dOut != NULL && key != NULL && dIn != NULL);
28727 744 SM4_decrypt(dIn, dOut, &Sm4Key);
28729 746 dOut = &dOut[16];
28748 752 BYTE *dOut, // OUT: the encrypted/decrypted data
28768 767 pAssert(dOut != NULL && key != NULL && iv != NULL && dIn != NULL);
28780 779 // This is written so that dIn and dOut may be the same
28787 786 // XOR the encrypted IV into dIn to create the cipher text (dOut)
28790 789 *dOut++ = (*pIv++ ^ *dIn++);
28801 793 //%#define _cpri__SM4DecryptOFB(dOut,keySizeInBits, key, iv, dInSize, dIn) \
28803 795 //% ((BYTE *)dOut), \
30009 873 BYTE *dOut, // OUT: the decrypted data
30021 885 pAssert(cIn != NULL && dOut != NULL && dOutSize != NULL && key != NULL);
30039 903 memcpy(dOut, cIn, *dOutSize);
30042 906 return RSAES_Decode(dOutSize, dOut, cInSize, cIn);
30050 909 return OaepDecode(dOutSize, dOut, hashAlg, label, cInSize, cIn);
33366 …It is a fatal error if dOut or pIn is not provided or if the size of pIn is larger than MAX_ECC_KE…
33371 214 TPM2B_ECC_PARAMETER *dOut, // OUT: the qualified random va…
33378 221 pAssert(pIn != NULL && dOut != NULL && pIn->size <= MAX_ECC_KEY_BYTES);
33381 224 dOut->t.size = pIn->size;
33390 228 _cpri__GenerateRandom(dOut->t.size, dOut->t.buffer);
33392 230 if(memcmp(dOut->t.buffer, pIn->buffer, pIn->size) < 0)
33394 232 // dOut < n so make sure that 0 < dOut
33395 233 for(pb = dOut->t.buffer, i = dOut->t.size; i > 0; i--)
33826 It is a fatal error if Qout, dOut, or seed is not provided (is NULL).
33835 558 TPM2B_ECC_PARAMETER *dOut, // OUT: the private scalar
33867 585 pAssert( seed != NULL && dOut != NULL && Qout != NULL && curveData != NULL);
33920 638 if(BnTo2B(&dOut->b, bnD, keySizeInBytes) != 1)
33926 644 if( (retVal = _cpri__EccPointMultiply(Qout, curveId, dOut, NULL, NULL))
33956 662 TPM2B_ECC_PARAMETER *dOut, // OUT: the private scalar
33970 676 GetRandomPrivate(dOut, curveData->p);
33975 681 retVal = _cpri__EccPointMultiply(Qout, curveId, dOut, NULL, NULL);