/mbedtls-latest/library/ |
D | cipher.c | 580 size_t ilen, unsigned char *output, size_t *olen) in mbedtls_cipher_update() argument 605 if (ilen != block_size) { in mbedtls_cipher_update() 609 *olen = ilen; in mbedtls_cipher_update() 623 input, ilen, in mbedtls_cipher_update() 624 output, ilen, olen); in mbedtls_cipher_update() 631 input, ilen, in mbedtls_cipher_update() 632 output, ilen, olen); in mbedtls_cipher_update() 638 *olen = ilen; in mbedtls_cipher_update() 640 ilen, input, output); in mbedtls_cipher_update() 645 (ctx->unprocessed_len != 0 || ilen % block_size)) { in mbedtls_cipher_update() [all …]
|
D | md.c | 571 int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen) in mbedtls_md_update() argument 581 psa_status_t status = psa_hash_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 589 return mbedtls_md5_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 593 return mbedtls_ripemd160_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 597 return mbedtls_sha1_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 601 return mbedtls_sha256_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 605 return mbedtls_sha256_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 609 return mbedtls_sha512_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 613 return mbedtls_sha512_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 620 return mbedtls_sha3_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() [all …]
|
D | rsa.c | 444 size_t ilen, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() argument 468 plaintext_max_size = (output_max_len > ilen - 11) ? ilen - 11 in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 483 for (i = 2; i < ilen; i++) { in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 504 (unsigned) (ilen - pad_count - 3)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 528 mbedtls_ct_zeroize_if(mbedtls_ct_bool_or(bad, output_too_large), input + 11, ilen - 11); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 544 mbedtls_ct_memmove_left(input + ilen - plaintext_max_size, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 556 memcpy(output, input + ilen - plaintext_max_size, plaintext_max_size); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 1743 const unsigned char *input, size_t ilen, in compute_hash() argument 1753 return mbedtls_md(md_info, input, ilen, output); in compute_hash() 1765 size_t ilen, in mbedtls_rsa_rsaes_oaep_encrypt() argument [all …]
|
D | md5.c | 205 size_t ilen) in mbedtls_md5_update() argument 211 if (ilen == 0) { in mbedtls_md5_update() 218 ctx->total[0] += (uint32_t) ilen; in mbedtls_md5_update() 221 if (ctx->total[0] < (uint32_t) ilen) { in mbedtls_md5_update() 225 if (left && ilen >= fill) { in mbedtls_md5_update() 232 ilen -= fill; in mbedtls_md5_update() 236 while (ilen >= 64) { in mbedtls_md5_update() 242 ilen -= 64; in mbedtls_md5_update() 245 if (ilen > 0) { in mbedtls_md5_update() 246 memcpy((void *) (ctx->buffer + left), input, ilen); in mbedtls_md5_update() [all …]
|
D | cmac.c | 199 const unsigned char *input, size_t ilen) in mbedtls_cipher_cmac_update() argument 222 ilen > block_size - cmac_ctx->unprocessed_len) { in mbedtls_cipher_cmac_update() 235 ilen -= block_size - cmac_ctx->unprocessed_len; in mbedtls_cipher_cmac_update() 240 n = (ilen + block_size - 1) / block_size; in mbedtls_cipher_cmac_update() 252 ilen -= block_size; in mbedtls_cipher_cmac_update() 257 if (ilen > 0) { in mbedtls_cipher_cmac_update() 260 ilen); in mbedtls_cipher_cmac_update() 261 cmac_ctx->unprocessed_len += ilen; in mbedtls_cipher_cmac_update() 349 const unsigned char *input, size_t ilen, in mbedtls_cipher_cmac() argument 370 ret = mbedtls_cipher_cmac_update(&ctx, input, ilen); in mbedtls_cipher_cmac()
|
D | sha256.c | 647 size_t ilen) in mbedtls_sha256_update() argument 653 if (ilen == 0) { in mbedtls_sha256_update() 660 ctx->total[0] += (uint32_t) ilen; in mbedtls_sha256_update() 663 if (ctx->total[0] < (uint32_t) ilen) { in mbedtls_sha256_update() 667 if (left && ilen >= fill) { in mbedtls_sha256_update() 675 ilen -= fill; in mbedtls_sha256_update() 679 while (ilen >= SHA256_BLOCK_SIZE) { in mbedtls_sha256_update() 681 mbedtls_internal_sha256_process_many(ctx, input, ilen); in mbedtls_sha256_update() 687 ilen -= processed; in mbedtls_sha256_update() 690 if (ilen > 0) { in mbedtls_sha256_update() [all …]
|
D | ripemd160.c | 268 size_t ilen) in mbedtls_ripemd160_update() argument 274 if (ilen == 0) { in mbedtls_ripemd160_update() 281 ctx->total[0] += (uint32_t) ilen; in mbedtls_ripemd160_update() 284 if (ctx->total[0] < (uint32_t) ilen) { in mbedtls_ripemd160_update() 288 if (left && ilen >= fill) { in mbedtls_ripemd160_update() 296 ilen -= fill; in mbedtls_ripemd160_update() 300 while (ilen >= 64) { in mbedtls_ripemd160_update() 306 ilen -= 64; in mbedtls_ripemd160_update() 309 if (ilen > 0) { in mbedtls_ripemd160_update() 310 memcpy((void *) (ctx->buffer + left), input, ilen); in mbedtls_ripemd160_update() [all …]
|
D | sha1.c | 240 size_t ilen) in mbedtls_sha1_update() argument 246 if (ilen == 0) { in mbedtls_sha1_update() 253 ctx->total[0] += (uint32_t) ilen; in mbedtls_sha1_update() 256 if (ctx->total[0] < (uint32_t) ilen) { in mbedtls_sha1_update() 260 if (left && ilen >= fill) { in mbedtls_sha1_update() 268 ilen -= fill; in mbedtls_sha1_update() 272 while (ilen >= 64) { in mbedtls_sha1_update() 278 ilen -= 64; in mbedtls_sha1_update() 281 if (ilen > 0) { in mbedtls_sha1_update() 282 memcpy((void *) (ctx->buffer + left), input, ilen); in mbedtls_sha1_update() [all …]
|
D | poly1305.c | 272 size_t ilen) in mbedtls_poly1305_update() argument 275 size_t remaining = ilen; in mbedtls_poly1305_update() 282 if (ilen < queue_free_len) { in mbedtls_poly1305_update() 288 ilen); in mbedtls_poly1305_update() 290 ctx->queue_len += ilen; in mbedtls_poly1305_update() 351 size_t ilen, in mbedtls_poly1305_mac() argument 364 ret = mbedtls_poly1305_update(&ctx, input, ilen); in mbedtls_poly1305_mac()
|
D | sha3.c | 304 size_t ilen) in mbedtls_sha3_update() argument 306 if (ilen >= 8) { in mbedtls_sha3_update() 312 ilen--; in mbedtls_sha3_update() 321 while (ilen >= 8) { in mbedtls_sha3_update() 324 ilen -= 8; in mbedtls_sha3_update() 332 while (ilen-- > 0) { in mbedtls_sha3_update() 380 size_t ilen, uint8_t *output, size_t olen) in mbedtls_sha3() argument 392 if ((ret = mbedtls_sha3_update(&ctx, input, ilen)) != 0) { in mbedtls_sha3()
|
D | sha512.c | 762 size_t ilen) in mbedtls_sha512_update() argument 768 if (ilen == 0) { in mbedtls_sha512_update() 775 ctx->total[0] += (uint64_t) ilen; in mbedtls_sha512_update() 777 if (ctx->total[0] < (uint64_t) ilen) { in mbedtls_sha512_update() 781 if (left && ilen >= fill) { in mbedtls_sha512_update() 789 ilen -= fill; in mbedtls_sha512_update() 793 while (ilen >= SHA512_BLOCK_SIZE) { in mbedtls_sha512_update() 795 mbedtls_internal_sha512_process_many(ctx, input, ilen); in mbedtls_sha512_update() 801 ilen -= processed; in mbedtls_sha512_update() 804 if (ilen > 0) { in mbedtls_sha512_update() [all …]
|
D | pk_wrap.c | 280 const unsigned char *input, size_t ilen, in rsa_decrypt_wrap() argument 297 if (ilen != mbedtls_rsa_get_len(rsa)) { in rsa_decrypt_wrap() 325 input, ilen, in rsa_decrypt_wrap() 346 const unsigned char *input, size_t ilen, in rsa_decrypt_wrap() argument 352 if (ilen != mbedtls_rsa_get_len(rsa)) { in rsa_decrypt_wrap() 363 const unsigned char *input, size_t ilen, in rsa_encrypt_wrap() argument 408 input, ilen, in rsa_encrypt_wrap() 428 const unsigned char *input, size_t ilen, in rsa_encrypt_wrap() argument 440 ilen, input, output); in rsa_encrypt_wrap() 1317 const unsigned char *input, size_t ilen, in rsa_alt_decrypt_wrap() argument [all …]
|
D | pk_wrap.h | 63 int (*decrypt_func)(mbedtls_pk_context *pk, const unsigned char *input, size_t ilen, 69 int (*encrypt_func)(mbedtls_pk_context *pk, const unsigned char *input, size_t ilen,
|
/mbedtls-latest/programs/aes/ |
D | crypt_and_hash.c | 64 size_t keylen, ilen, olen; in main() local 331 ilen = ((unsigned int) filesize - offset > cipher_block_size) ? in main() 334 if (fread(buffer, 1, ilen, fin) != ilen) { in main() 335 mbedtls_fprintf(stderr, "fread(%ld bytes) failed\n", (long) ilen); in main() 339 if (mbedtls_cipher_update(&cipher_ctx, buffer, ilen, output, &olen) != 0) { in main() 485 ilen = ((unsigned int) filesize - offset > cipher_block_size) ? in main() 488 if (fread(buffer, 1, ilen, fin) != ilen) { in main() 494 if (mbedtls_md_hmac_update(&md_ctx, buffer, ilen) != 0) { in main() 498 if (mbedtls_cipher_update(&cipher_ctx, buffer, ilen, output, in main()
|
/mbedtls-latest/include/mbedtls/ |
D | md.h | 295 int mbedtls_md_update(mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen); 337 int mbedtls_md(const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen, 454 size_t ilen); 519 const unsigned char *input, size_t ilen,
|
D | cipher.h | 333 int(*MBEDTLS_PRIVATE(get_padding))(unsigned char *input, size_t ilen, size_t *data_len); 958 size_t ilen, unsigned char *output, 1058 const unsigned char *input, size_t ilen, 1109 const unsigned char *input, size_t ilen, 1165 const unsigned char *input, size_t ilen,
|
D | md5.h | 118 size_t ilen); 167 size_t ilen,
|
D | ripemd160.h | 84 size_t ilen); 118 size_t ilen,
|
D | poly1305.h | 114 size_t ilen); 151 size_t ilen,
|
D | sha1.h | 132 size_t ilen); 195 size_t ilen,
|
D | sha256.h | 112 size_t ilen); 168 size_t ilen,
|
D | sha512.h | 113 size_t ilen); 176 size_t ilen,
|
D | cmac.h | 131 const unsigned char *input, size_t ilen); 199 const unsigned char *input, size_t ilen,
|
D | rsa.h | 624 size_t ilen, 651 size_t ilen, 686 size_t ilen,
|
D | sha3.h | 110 size_t ilen); 154 size_t ilen,
|