| /optee_os/core/lib/libtomcrypt/src/mac/blake2/ |
| H A D | blake2smac_test.c | 274 unsigned long ilen, klen = sizeof(key), mlen = 32; in blake2smac_test() 277 for (ilen = 0; ilen < 256; ilen++) inp[ilen] = (unsigned char)ilen; in blake2smac_test() 279 for (ilen = 0; ilen < 256; ilen++) { in blake2smac_test() 280 const unsigned char *mac = tests[ilen]; in blake2smac_test() 283 if (ilen > 15) { in blake2smac_test() 290 blake2smac_process(&st, (unsigned char*)inp + 15, ilen - 15); in blake2smac_test() 292 …if (compare_testvector(out, olen, mac, mlen, "BLAKE2S MAC multi", ilen) != 0) return CRYPT_FAIL_TE… in blake2smac_test() 296 blake2smac_process(&st, (unsigned char*)inp, ilen); in blake2smac_test() 298 …if (compare_testvector(out, olen, mac, mlen, "BLAKE2S MAC single", ilen) != 0) return CRYPT_FAIL_T… in blake2smac_test()
|
| H A D | blake2bmac_test.c | 274 unsigned long ilen, klen = sizeof(key), mlen = 64; in blake2bmac_test() 277 for (ilen = 0; ilen < 256; ilen++) inp[ilen] = (unsigned char)ilen; in blake2bmac_test() 279 for (ilen = 0; ilen < 256; ilen++) { in blake2bmac_test() 280 const unsigned char *mac = tests[ilen]; in blake2bmac_test() 283 if (ilen > 15) { in blake2bmac_test() 290 blake2bmac_process(&st, (unsigned char*)inp + 15, ilen - 15); in blake2bmac_test() 292 …if (compare_testvector(out, olen, mac, mlen, "BLAKE2B MAC multi", ilen) != 0) return CRYPT_FAIL_TE… in blake2bmac_test() 296 blake2bmac_process(&st, (unsigned char*)inp, ilen); in blake2bmac_test() 298 …if (compare_testvector(out, olen, mac, mlen, "BLAKE2B MAC single", ilen) != 0) return CRYPT_FAIL_T… in blake2bmac_test()
|
| /optee_os/lib/libmbedtls/mbedtls/library/ |
| H A D | cipher.c | 620 size_t ilen, unsigned char *output, size_t *olen) in mbedtls_cipher_update() argument 645 if (ilen != block_size) { in mbedtls_cipher_update() 649 *olen = ilen; in mbedtls_cipher_update() 663 input, ilen, in mbedtls_cipher_update() 664 output, ilen, olen); in mbedtls_cipher_update() 671 input, ilen, in mbedtls_cipher_update() 672 output, ilen, olen); in mbedtls_cipher_update() 678 *olen = ilen; in mbedtls_cipher_update() 680 ilen, input, output); in mbedtls_cipher_update() 685 (ctx->unprocessed_len != 0 || ilen % block_size)) { in mbedtls_cipher_update() [all …]
|
| H A D | md.c | 574 int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen) in mbedtls_md_update() argument 584 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 592 return mbedtls_md5_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 596 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 600 return mbedtls_sha1_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 604 return mbedtls_sha256_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 608 return mbedtls_sha256_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 612 return mbedtls_sha512_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 616 return mbedtls_sha512_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 623 return mbedtls_sha3_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() [all …]
|
| H A D | md5.c | 205 size_t ilen) in mbedtls_md5_update() argument 211 if (ilen == 0) { in mbedtls_md5_update() 218 ctx->total[0] += (uint32_t) ilen; in mbedtls_md5_update() 221 if (ctx->total[0] < (uint32_t) ilen) { in mbedtls_md5_update() 225 if (left && ilen >= fill) { in mbedtls_md5_update() 232 ilen -= fill; in mbedtls_md5_update() 236 while (ilen >= 64) { in mbedtls_md5_update() 242 ilen -= 64; in mbedtls_md5_update() 245 if (ilen > 0) { in mbedtls_md5_update() 246 memcpy((void *) (ctx->buffer + left), input, ilen); in mbedtls_md5_update() [all …]
|
| H A D | rsa.c | 446 size_t ilen, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() argument 470 plaintext_max_size = (output_max_len > ilen - 11) ? ilen - 11 in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 485 for (i = 2; i < ilen; i++) { in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 506 (unsigned) (ilen - pad_count - 3)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 530 mbedtls_ct_zeroize_if(mbedtls_ct_bool_or(bad, output_too_large), input + 11, ilen - 11); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 546 mbedtls_ct_memmove_left(input + ilen - plaintext_max_size, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 558 memcpy(output, input + ilen - plaintext_max_size, plaintext_max_size); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 1745 const unsigned char *input, size_t ilen, in compute_hash() argument 1755 return mbedtls_md(md_info, input, ilen, output); in compute_hash() 1767 size_t ilen, in mbedtls_rsa_rsaes_oaep_encrypt() argument [all …]
|
| H A D | cmac.c | 207 const unsigned char *input, size_t ilen) in mbedtls_cipher_cmac_update() argument 230 ilen > block_size - cmac_ctx->unprocessed_len) { in mbedtls_cipher_cmac_update() 243 ilen -= block_size - cmac_ctx->unprocessed_len; in mbedtls_cipher_cmac_update() 248 n = (ilen + block_size - 1) / block_size; in mbedtls_cipher_cmac_update() 260 ilen -= block_size; in mbedtls_cipher_cmac_update() 265 if (ilen > 0) { in mbedtls_cipher_cmac_update() 268 ilen); in mbedtls_cipher_cmac_update() 269 cmac_ctx->unprocessed_len += ilen; in mbedtls_cipher_cmac_update() 357 const unsigned char *input, size_t ilen, in mbedtls_cipher_cmac() argument 378 ret = mbedtls_cipher_cmac_update(&ctx, input, ilen); in mbedtls_cipher_cmac()
|
| H A D | poly1305.c | 272 size_t ilen) in mbedtls_poly1305_update() argument 275 size_t remaining = ilen; in mbedtls_poly1305_update() 282 if (ilen < queue_free_len) { in mbedtls_poly1305_update() 288 ilen); in mbedtls_poly1305_update() 290 ctx->queue_len += ilen; in mbedtls_poly1305_update() 351 size_t ilen, in mbedtls_poly1305_mac() argument 364 ret = mbedtls_poly1305_update(&ctx, input, ilen); in mbedtls_poly1305_mac()
|
| H A D | sha256.c | 647 size_t ilen) in mbedtls_sha256_update() argument 653 if (ilen == 0) { in mbedtls_sha256_update() 660 ctx->total[0] += (uint32_t) ilen; in mbedtls_sha256_update() 663 if (ctx->total[0] < (uint32_t) ilen) { in mbedtls_sha256_update() 667 if (left && ilen >= fill) { in mbedtls_sha256_update() 675 ilen -= fill; in mbedtls_sha256_update() 679 while (ilen >= SHA256_BLOCK_SIZE) { in mbedtls_sha256_update() 681 mbedtls_internal_sha256_process_many(ctx, input, ilen); in mbedtls_sha256_update() 687 ilen -= processed; in mbedtls_sha256_update() 690 if (ilen > 0) { in mbedtls_sha256_update() [all …]
|
| H A D | sha1.c | 240 size_t ilen) in mbedtls_sha1_update() argument 246 if (ilen == 0) { in mbedtls_sha1_update() 253 ctx->total[0] += (uint32_t) ilen; in mbedtls_sha1_update() 256 if (ctx->total[0] < (uint32_t) ilen) { in mbedtls_sha1_update() 260 if (left && ilen >= fill) { in mbedtls_sha1_update() 268 ilen -= fill; in mbedtls_sha1_update() 272 while (ilen >= 64) { in mbedtls_sha1_update() 278 ilen -= 64; in mbedtls_sha1_update() 281 if (ilen > 0) { in mbedtls_sha1_update() 282 memcpy((void *) (ctx->buffer + left), input, ilen); in mbedtls_sha1_update() [all …]
|
| H A D | ripemd160.c | 268 size_t ilen) in mbedtls_ripemd160_update() argument 274 if (ilen == 0) { in mbedtls_ripemd160_update() 281 ctx->total[0] += (uint32_t) ilen; in mbedtls_ripemd160_update() 284 if (ctx->total[0] < (uint32_t) ilen) { in mbedtls_ripemd160_update() 288 if (left && ilen >= fill) { in mbedtls_ripemd160_update() 296 ilen -= fill; in mbedtls_ripemd160_update() 300 while (ilen >= 64) { in mbedtls_ripemd160_update() 306 ilen -= 64; in mbedtls_ripemd160_update() 309 if (ilen > 0) { in mbedtls_ripemd160_update() 310 memcpy((void *) (ctx->buffer + left), input, ilen); in mbedtls_ripemd160_update() [all …]
|
| H A D | sha3.c | 304 size_t ilen) in mbedtls_sha3_update() argument 306 if (ilen >= 8) { in mbedtls_sha3_update() 312 ilen--; in mbedtls_sha3_update() 321 while (ilen >= 8) { in mbedtls_sha3_update() 324 ilen -= 8; in mbedtls_sha3_update() 332 while (ilen-- > 0) { in mbedtls_sha3_update() 380 size_t ilen, uint8_t *output, size_t olen) in mbedtls_sha3() argument 392 if ((ret = mbedtls_sha3_update(&ctx, input, ilen)) != 0) { in mbedtls_sha3()
|
| H A D | pk_wrap.h | 63 int (*decrypt_func)(mbedtls_pk_context *pk, const unsigned char *input, size_t ilen, 69 int (*encrypt_func)(mbedtls_pk_context *pk, const unsigned char *input, size_t ilen,
|
| /optee_os/core/crypto/ |
| H A D | sm3.h | 27 void sm3_update(struct sm3_context *ctx, const uint8_t *input, size_t ilen); 29 void sm3(const uint8_t *input, size_t ilen, uint8_t output[32]); 33 size_t ilen); 36 size_t ilen, uint8_t output[32]);
|
| H A D | sm3.c | 187 void sm3_update(struct sm3_context *ctx, const uint8_t *input, size_t ilen) in sm3_update() argument 193 if (!ilen) in sm3_update() 199 ctx->total[0] += ilen; in sm3_update() 201 if (ctx->total[0] < ilen) in sm3_update() 204 if (left && ilen >= fill) { in sm3_update() 208 ilen -= fill; in sm3_update() 212 block_count = ilen / SM3_BLOCK_SIZE; in sm3_update() 214 ilen -= block_count * SM3_BLOCK_SIZE; in sm3_update() 217 if (ilen > 0) in sm3_update() 218 memcpy(ctx->buffer + left, input, ilen); in sm3_update() [all …]
|
| /optee_os/lib/libmbedtls/mbedtls/include/mbedtls/ |
| H A D | md.h | 295 int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen); 337 int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen, 454 size_t ilen); 519 const unsigned char *input, size_t ilen,
|
| H A D | md5.h | 118 size_t ilen); 167 size_t ilen,
|
| H A D | ripemd160.h | 84 size_t ilen); 118 size_t ilen,
|
| H A D | poly1305.h | 114 size_t ilen); 151 size_t ilen,
|
| H A D | sha1.h | 132 size_t ilen); 195 size_t ilen,
|
| H A D | sha512.h | 113 size_t ilen); 176 size_t ilen,
|
| H A D | sha256.h | 112 size_t ilen); 168 size_t ilen,
|
| H A D | cmac.h | 144 const unsigned char *input, size_t ilen); 212 const unsigned char *input, size_t ilen,
|
| H A D | sha3.h | 110 size_t ilen); 154 size_t ilen,
|
| H A D | cipher.h | 333 int(*MBEDTLS_PRIVATE(get_padding))(unsigned char *input, size_t ilen, size_t *data_len); 984 size_t ilen, unsigned char *output, 1084 const unsigned char *input, size_t ilen, 1135 const unsigned char *input, size_t ilen, 1191 const unsigned char *input, size_t ilen,
|