Searched refs:mbedtls_cipher_update (Results 1 – 12 of 12) sorted by relevance
/mbedtls-development/tests/suites/ |
A D | test_suite_cipher.function | 231 /* mbedtls_cipher_update() */ 233 mbedtls_cipher_update( &invalid_ctx, 334 TEST_ASSERT( mbedtls_cipher_update( &ctx, input, 1, output, &olen ) 425 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, length, encbuf, &outlen ) ); 446 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, total_len, decbuf, &outlen ) ); 518 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, inbuf, length, encbuf, &outlen ) ); 572 mbedtls_cipher_update( &ctx_dec, encbuf, 0, decbuf, &outlen ) ); 672 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, first_length, encbuf, &outlen ) ); 692 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, first_length, decbuf, &outlen ) ); 754 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, cipher->x, cipher->len, output, &outlen ) ); [all …]
|
/mbedtls-development/library/ |
A D | ccm.c | 120 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->ctr, 16, tmp_buf, in mbedtls_ccm_crypt() 194 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen ) ) != 0 ) in ccm_calculate_first_block_if_ready() 322 … if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen ) ) != 0 ) in mbedtls_ccm_update_ad() 389 … if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen ) ) != 0 ) in mbedtls_ccm_update() 422 … if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen ) ) != 0 ) in mbedtls_ccm_update()
|
A D | nist_kw.c | 240 ret = mbedtls_cipher_update( &ctx->cipher_ctx, in mbedtls_nist_kw_wrap() 265 ret = mbedtls_cipher_update( &ctx->cipher_ctx, in mbedtls_nist_kw_wrap() 333 ret = mbedtls_cipher_update( &ctx->cipher_ctx, in unwrap() 430 ret = mbedtls_cipher_update( &ctx->cipher_ctx, in mbedtls_nist_kw_unwrap()
|
A D | cmac.c | 131 if( ( ret = mbedtls_cipher_update( ctx, L, block_size, L, &olen ) ) != 0 ) in cmac_generate_subkeys() 252 if( ( ret = mbedtls_cipher_update( ctx, state, block_size, state, in mbedtls_cipher_cmac_update() 272 if( ( ret = mbedtls_cipher_update( ctx, state, block_size, state, in mbedtls_cipher_cmac_update() 332 if( ( ret = mbedtls_cipher_update( ctx, state, block_size, state, in mbedtls_cipher_cmac_finish()
|
A D | psa_crypto_cipher.c | 322 mbedtls_cipher_update( ctx, in psa_cipher_update_ecb() 340 mbedtls_cipher_update( ctx, input, in psa_cipher_update_ecb() 410 mbedtls_cipher_update( &operation->ctx.cipher, input, in cipher_update()
|
A D | gcm.c | 87 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, h, 16, h, &olen ) ) != 0 ) in gcm_gen_table() 303 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, in mbedtls_gcm_starts() 404 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ectr, in gcm_mask()
|
A D | pkcs12.c | 164 if( ( ret = mbedtls_cipher_update( &cipher_ctx, data, len, in mbedtls_pkcs12_pbe()
|
A D | cipher.c | 533 int mbedtls_cipher_update( mbedtls_cipher_context_t *ctx, const unsigned char *input, in mbedtls_cipher_update() function 1334 if( ( ret = mbedtls_cipher_update( ctx, input, ilen, in mbedtls_cipher_crypt()
|
/mbedtls-development/programs/aes/ |
A D | crypt_and_hash.c | 347 if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, &olen ) != 0 ) in main() 492 if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, in main()
|
/mbedtls-development/include/mbedtls/ |
A D | cipher.h | 866 int mbedtls_cipher_update( mbedtls_cipher_context_t *ctx,
|
/mbedtls-development/docs/ |
A D | 3.0-migration-guide.md | 383 the last call to `mbedtls_cipher_update()` — that is, without calling
|
/mbedtls-development/ |
A D | ChangeLog | 283 mbedtls_cipher_update()) no longer requires the size of partial inputs to 1994 stated in the mbedtls_cipher_update() documentation. Contributed by 2554 * Fixed potential arithmetic overflows in mbedtls_cipher_update() that could
|
Completed in 39 milliseconds