/mbedtls-latest/tests/suites/ |
D | test_suite_cipher.function | 255 /* mbedtls_cipher_update() */ 257 mbedtls_cipher_update(&invalid_ctx, 356 TEST_ASSERT(mbedtls_cipher_update(&ctx, input, 1, output, &olen) 453 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx_enc, inbuf, length, encbuf, &outlen)); 474 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx_dec, encbuf, total_len, decbuf, &outlen)); 550 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx, inbuf, length, encbuf, &outlen)); 629 mbedtls_cipher_update(&ctx_dec, encbuf, 0, decbuf, &outlen)); 736 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx_enc, inbuf, first_length, encbuf, &outlen)); 740 mbedtls_cipher_update(&ctx_enc, inbuf + first_length, second_length, 759 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx_dec, encbuf, first_length, decbuf, &outlen)); [all …]
|
/mbedtls-latest/library/ |
D | ccm.c | 135 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->ctr, 16, tmp_buf, &olen); in mbedtls_ccm_crypt() 212 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen); in ccm_calculate_first_block_if_ready() 340 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen); in mbedtls_ccm_update_ad() 409 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen); in mbedtls_ccm_update() 444 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen); in mbedtls_ccm_update()
|
D | nist_kw.c | 200 ret = mbedtls_cipher_update(&ctx->cipher_ctx, in mbedtls_nist_kw_wrap() 222 ret = mbedtls_cipher_update(&ctx->cipher_ctx, in mbedtls_nist_kw_wrap() 289 ret = mbedtls_cipher_update(&ctx->cipher_ctx, in unwrap() 382 ret = mbedtls_cipher_update(&ctx->cipher_ctx, in mbedtls_nist_kw_unwrap()
|
D | cmac.c | 108 if ((ret = mbedtls_cipher_update(ctx, L, block_size, L, &olen)) != 0) { in cmac_generate_subkeys() 229 if ((ret = mbedtls_cipher_update(ctx, state, block_size, state, in mbedtls_cipher_cmac_update() 247 if ((ret = mbedtls_cipher_update(ctx, state, block_size, state, in mbedtls_cipher_cmac_update() 306 if ((ret = mbedtls_cipher_update(ctx, state, block_size, state, in mbedtls_cipher_cmac_finish()
|
D | psa_crypto_cipher.c | 452 mbedtls_cipher_update(ctx, in psa_cipher_update_ecb() 470 mbedtls_cipher_update(ctx, input, in psa_cipher_update_ecb() 541 mbedtls_cipher_update(&operation->ctx.cipher, input, in mbedtls_psa_cipher_update()
|
D | gcm.c | 109 ret = mbedtls_cipher_update(&ctx->cipher_ctx, h, 16, h, &olen); in gcm_gen_table() 441 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->base_ectr, &olen); in mbedtls_gcm_starts() 546 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ectr, &olen); in gcm_mask()
|
D | cipher.c | 579 int mbedtls_cipher_update(mbedtls_cipher_context_t *ctx, const unsigned char *input, in mbedtls_cipher_update() function 1385 if ((ret = mbedtls_cipher_update(ctx, input, ilen, in mbedtls_cipher_crypt()
|
/mbedtls-latest/programs/cipher/ |
D | cipher_aead_demo.c | 191 CHK(mbedtls_cipher_update(ctx, part1, part1_len, p, &olen)); in aead_encrypt() 193 CHK(mbedtls_cipher_update(ctx, part2, part2_len, p, &olen)); in aead_encrypt()
|
/mbedtls-latest/programs/aes/ |
D | crypt_and_hash.c | 339 if (mbedtls_cipher_update(&cipher_ctx, buffer, ilen, output, &olen) != 0) { in main() 498 if (mbedtls_cipher_update(&cipher_ctx, buffer, ilen, output, in main()
|
/mbedtls-latest/include/mbedtls/ |
D | cipher.h | 956 int mbedtls_cipher_update(mbedtls_cipher_context_t *ctx,
|
/mbedtls-latest/docs/ |
D | 3.0-migration-guide.md | 411 the last call to `mbedtls_cipher_update()` — that is, without calling
|
D | psa-transition.md | 366 …mbedtls_cipher_crypt`. To pass the input in multiple parts, call `mbedtls_cipher_update` as many t… 392 5. Call `mbedtls_cipher_update` as many times as necessary to pass the input plaintext or ciphertex…
|
/mbedtls-latest/ |
D | ChangeLog | 1928 mbedtls_cipher_update()) no longer requires the size of partial inputs to 3640 stated in the mbedtls_cipher_update() documentation. Contributed by 4200 * Fixed potential arithmetic overflows in mbedtls_cipher_update() that could
|