Home
last modified time | relevance | path

Searched refs:ilen (Results 1 – 25 of 37) sorted by relevance

12

/optee_os/core/lib/libtomcrypt/src/mac/blake2/
H A Dblake2smac_test.c274 unsigned long ilen, klen = sizeof(key), mlen = 32; in blake2smac_test()
277 for (ilen = 0; ilen < 256; ilen++) inp[ilen] = (unsigned char)ilen; in blake2smac_test()
279 for (ilen = 0; ilen < 256; ilen++) { in blake2smac_test()
280 const unsigned char *mac = tests[ilen]; in blake2smac_test()
283 if (ilen > 15) { in blake2smac_test()
290 blake2smac_process(&st, (unsigned char*)inp + 15, ilen - 15); in blake2smac_test()
292 …if (compare_testvector(out, olen, mac, mlen, "BLAKE2S MAC multi", ilen) != 0) return CRYPT_FAIL_TE… in blake2smac_test()
296 blake2smac_process(&st, (unsigned char*)inp, ilen); in blake2smac_test()
298 …if (compare_testvector(out, olen, mac, mlen, "BLAKE2S MAC single", ilen) != 0) return CRYPT_FAIL_T… in blake2smac_test()
H A Dblake2bmac_test.c274 unsigned long ilen, klen = sizeof(key), mlen = 64; in blake2bmac_test()
277 for (ilen = 0; ilen < 256; ilen++) inp[ilen] = (unsigned char)ilen; in blake2bmac_test()
279 for (ilen = 0; ilen < 256; ilen++) { in blake2bmac_test()
280 const unsigned char *mac = tests[ilen]; in blake2bmac_test()
283 if (ilen > 15) { in blake2bmac_test()
290 blake2bmac_process(&st, (unsigned char*)inp + 15, ilen - 15); in blake2bmac_test()
292 …if (compare_testvector(out, olen, mac, mlen, "BLAKE2B MAC multi", ilen) != 0) return CRYPT_FAIL_TE… in blake2bmac_test()
296 blake2bmac_process(&st, (unsigned char*)inp, ilen); in blake2bmac_test()
298 …if (compare_testvector(out, olen, mac, mlen, "BLAKE2B MAC single", ilen) != 0) return CRYPT_FAIL_T… in blake2bmac_test()
/optee_os/lib/libmbedtls/mbedtls/library/
H A Dcipher.c620 size_t ilen, unsigned char *output, size_t *olen) in mbedtls_cipher_update() argument
645 if (ilen != block_size) { in mbedtls_cipher_update()
649 *olen = ilen; in mbedtls_cipher_update()
663 input, ilen, in mbedtls_cipher_update()
664 output, ilen, olen); in mbedtls_cipher_update()
671 input, ilen, in mbedtls_cipher_update()
672 output, ilen, olen); in mbedtls_cipher_update()
678 *olen = ilen; in mbedtls_cipher_update()
680 ilen, input, output); in mbedtls_cipher_update()
685 (ctx->unprocessed_len != 0 || ilen % block_size)) { in mbedtls_cipher_update()
[all …]
H A Dmd.c574 int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen) in mbedtls_md_update() argument
584 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen); in mbedtls_md_update()
592 return mbedtls_md5_update(ctx->md_ctx, input, ilen); in mbedtls_md_update()
596 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen); in mbedtls_md_update()
600 return mbedtls_sha1_update(ctx->md_ctx, input, ilen); in mbedtls_md_update()
604 return mbedtls_sha256_update(ctx->md_ctx, input, ilen); in mbedtls_md_update()
608 return mbedtls_sha256_update(ctx->md_ctx, input, ilen); in mbedtls_md_update()
612 return mbedtls_sha512_update(ctx->md_ctx, input, ilen); in mbedtls_md_update()
616 return mbedtls_sha512_update(ctx->md_ctx, input, ilen); in mbedtls_md_update()
623 return mbedtls_sha3_update(ctx->md_ctx, input, ilen); in mbedtls_md_update()
[all …]
H A Dmd5.c205 size_t ilen) in mbedtls_md5_update() argument
211 if (ilen == 0) { in mbedtls_md5_update()
218 ctx->total[0] += (uint32_t) ilen; in mbedtls_md5_update()
221 if (ctx->total[0] < (uint32_t) ilen) { in mbedtls_md5_update()
225 if (left && ilen >= fill) { in mbedtls_md5_update()
232 ilen -= fill; in mbedtls_md5_update()
236 while (ilen >= 64) { in mbedtls_md5_update()
242 ilen -= 64; in mbedtls_md5_update()
245 if (ilen > 0) { in mbedtls_md5_update()
246 memcpy((void *) (ctx->buffer + left), input, ilen); in mbedtls_md5_update()
[all …]
H A Drsa.c446 size_t ilen, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() argument
470 plaintext_max_size = (output_max_len > ilen - 11) ? ilen - 11 in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
485 for (i = 2; i < ilen; i++) { in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
506 (unsigned) (ilen - pad_count - 3)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
530 mbedtls_ct_zeroize_if(mbedtls_ct_bool_or(bad, output_too_large), input + 11, ilen - 11); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
546 mbedtls_ct_memmove_left(input + ilen - plaintext_max_size, in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
558 memcpy(output, input + ilen - plaintext_max_size, plaintext_max_size); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
1745 const unsigned char *input, size_t ilen, in compute_hash() argument
1755 return mbedtls_md(md_info, input, ilen, output); in compute_hash()
1767 size_t ilen, in mbedtls_rsa_rsaes_oaep_encrypt() argument
[all …]
H A Dcmac.c207 const unsigned char *input, size_t ilen) in mbedtls_cipher_cmac_update() argument
230 ilen > block_size - cmac_ctx->unprocessed_len) { in mbedtls_cipher_cmac_update()
243 ilen -= block_size - cmac_ctx->unprocessed_len; in mbedtls_cipher_cmac_update()
248 n = (ilen + block_size - 1) / block_size; in mbedtls_cipher_cmac_update()
260 ilen -= block_size; in mbedtls_cipher_cmac_update()
265 if (ilen > 0) { in mbedtls_cipher_cmac_update()
268 ilen); in mbedtls_cipher_cmac_update()
269 cmac_ctx->unprocessed_len += ilen; in mbedtls_cipher_cmac_update()
357 const unsigned char *input, size_t ilen, in mbedtls_cipher_cmac() argument
378 ret = mbedtls_cipher_cmac_update(&ctx, input, ilen); in mbedtls_cipher_cmac()
H A Dpoly1305.c272 size_t ilen) in mbedtls_poly1305_update() argument
275 size_t remaining = ilen; in mbedtls_poly1305_update()
282 if (ilen < queue_free_len) { in mbedtls_poly1305_update()
288 ilen); in mbedtls_poly1305_update()
290 ctx->queue_len += ilen; in mbedtls_poly1305_update()
351 size_t ilen, in mbedtls_poly1305_mac() argument
364 ret = mbedtls_poly1305_update(&ctx, input, ilen); in mbedtls_poly1305_mac()
H A Dsha256.c647 size_t ilen) in mbedtls_sha256_update() argument
653 if (ilen == 0) { in mbedtls_sha256_update()
660 ctx->total[0] += (uint32_t) ilen; in mbedtls_sha256_update()
663 if (ctx->total[0] < (uint32_t) ilen) { in mbedtls_sha256_update()
667 if (left && ilen >= fill) { in mbedtls_sha256_update()
675 ilen -= fill; in mbedtls_sha256_update()
679 while (ilen >= SHA256_BLOCK_SIZE) { in mbedtls_sha256_update()
681 mbedtls_internal_sha256_process_many(ctx, input, ilen); in mbedtls_sha256_update()
687 ilen -= processed; in mbedtls_sha256_update()
690 if (ilen > 0) { in mbedtls_sha256_update()
[all …]
H A Dsha1.c240 size_t ilen) in mbedtls_sha1_update() argument
246 if (ilen == 0) { in mbedtls_sha1_update()
253 ctx->total[0] += (uint32_t) ilen; in mbedtls_sha1_update()
256 if (ctx->total[0] < (uint32_t) ilen) { in mbedtls_sha1_update()
260 if (left && ilen >= fill) { in mbedtls_sha1_update()
268 ilen -= fill; in mbedtls_sha1_update()
272 while (ilen >= 64) { in mbedtls_sha1_update()
278 ilen -= 64; in mbedtls_sha1_update()
281 if (ilen > 0) { in mbedtls_sha1_update()
282 memcpy((void *) (ctx->buffer + left), input, ilen); in mbedtls_sha1_update()
[all …]
H A Dripemd160.c268 size_t ilen) in mbedtls_ripemd160_update() argument
274 if (ilen == 0) { in mbedtls_ripemd160_update()
281 ctx->total[0] += (uint32_t) ilen; in mbedtls_ripemd160_update()
284 if (ctx->total[0] < (uint32_t) ilen) { in mbedtls_ripemd160_update()
288 if (left && ilen >= fill) { in mbedtls_ripemd160_update()
296 ilen -= fill; in mbedtls_ripemd160_update()
300 while (ilen >= 64) { in mbedtls_ripemd160_update()
306 ilen -= 64; in mbedtls_ripemd160_update()
309 if (ilen > 0) { in mbedtls_ripemd160_update()
310 memcpy((void *) (ctx->buffer + left), input, ilen); in mbedtls_ripemd160_update()
[all …]
H A Dsha3.c304 size_t ilen) in mbedtls_sha3_update() argument
306 if (ilen >= 8) { in mbedtls_sha3_update()
312 ilen--; in mbedtls_sha3_update()
321 while (ilen >= 8) { in mbedtls_sha3_update()
324 ilen -= 8; in mbedtls_sha3_update()
332 while (ilen-- > 0) { in mbedtls_sha3_update()
380 size_t ilen, uint8_t *output, size_t olen) in mbedtls_sha3() argument
392 if ((ret = mbedtls_sha3_update(&ctx, input, ilen)) != 0) { in mbedtls_sha3()
H A Dpk_wrap.h63 int (*decrypt_func)(mbedtls_pk_context *pk, const unsigned char *input, size_t ilen,
69 int (*encrypt_func)(mbedtls_pk_context *pk, const unsigned char *input, size_t ilen,
/optee_os/core/crypto/
H A Dsm3.h27 void sm3_update(struct sm3_context *ctx, const uint8_t *input, size_t ilen);
29 void sm3(const uint8_t *input, size_t ilen, uint8_t output[32]);
33 size_t ilen);
36 size_t ilen, uint8_t output[32]);
H A Dsm3.c187 void sm3_update(struct sm3_context *ctx, const uint8_t *input, size_t ilen) in sm3_update() argument
193 if (!ilen) in sm3_update()
199 ctx->total[0] += ilen; in sm3_update()
201 if (ctx->total[0] < ilen) in sm3_update()
204 if (left && ilen >= fill) { in sm3_update()
208 ilen -= fill; in sm3_update()
212 block_count = ilen / SM3_BLOCK_SIZE; in sm3_update()
214 ilen -= block_count * SM3_BLOCK_SIZE; in sm3_update()
217 if (ilen > 0) in sm3_update()
218 memcpy(ctx->buffer + left, input, ilen); in sm3_update()
[all …]
/optee_os/lib/libmbedtls/mbedtls/include/mbedtls/
H A Dmd.h295 int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen);
337 int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
454 size_t ilen);
519 const unsigned char *input, size_t ilen,
H A Dmd5.h118 size_t ilen);
167 size_t ilen,
H A Dripemd160.h84 size_t ilen);
118 size_t ilen,
H A Dpoly1305.h114 size_t ilen);
151 size_t ilen,
H A Dsha1.h132 size_t ilen);
195 size_t ilen,
H A Dsha512.h113 size_t ilen);
176 size_t ilen,
H A Dsha256.h112 size_t ilen);
168 size_t ilen,
H A Dcmac.h144 const unsigned char *input, size_t ilen);
212 const unsigned char *input, size_t ilen,
H A Dsha3.h110 size_t ilen);
154 size_t ilen,
H A Dcipher.h333 int(*MBEDTLS_PRIVATE(get_padding))(unsigned char *input, size_t ilen, size_t *data_len);
984 size_t ilen, unsigned char *output,
1084 const unsigned char *input, size_t ilen,
1135 const unsigned char *input, size_t ilen,
1191 const unsigned char *input, size_t ilen,

12