Home
last modified time | relevance | path

Searched refs:curlen (Results 1 – 25 of 33) sorted by relevance

12

/optee_os-3.20.0/core/lib/libtomcrypt/
A Dsha1_accel.c104 md->sha1.curlen = 0; in sha1_init()
122 if (md->sha1.curlen >= sizeof(md->sha1.buf)) { in sha1_done()
127 md->sha1.length += md->sha1.curlen * 8; in sha1_done()
130 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0x80; in sha1_done()
136 if (md->sha1.curlen > 56) { in sha1_done()
137 while (md->sha1.curlen < 64) { in sha1_done()
138 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0; in sha1_done()
141 md->sha1.curlen = 0; in sha1_done()
145 while (md->sha1.curlen < 56) { in sha1_done()
146 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0; in sha1_done()
A Dsha256_accel.c93 md->sha256.curlen = 0; in sha256_init()
128 if (md->sha256.curlen >= sizeof(md->sha256.buf)) { in sha256_done()
134 md->sha256.length += md->sha256.curlen * 8; in sha256_done()
137 md->sha256.buf[md->sha256.curlen++] = (unsigned char)0x80; in sha256_done()
143 if (md->sha256.curlen > 56) { in sha256_done()
144 while (md->sha256.curlen < 64) { in sha256_done()
145 md->sha256.buf[md->sha256.curlen++] = (unsigned char)0; in sha256_done()
148 md->sha256.curlen = 0; in sha256_done()
152 while (md->sha256.curlen < 56) { in sha256_done()
153 md->sha256.buf[md->sha256.curlen++] = (unsigned char)0; in sha256_done()
A Dsha512_accel.c61 md->sha512.curlen = 0; in sha512_init()
89 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { in sha512_done()
94 md->sha512.length += md->sha512.curlen * CONST64(8); in sha512_done()
97 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0x80; in sha512_done()
103 if (md->sha512.curlen > 112) { in sha512_done()
104 while (md->sha512.curlen < 128) { in sha512_done()
105 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0; in sha512_done()
108 md->sha512.curlen = 0; in sha512_done()
115 while (md->sha512.curlen < 120) { in sha512_done()
116 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0; in sha512_done()
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/
A Dmd2.c101 md->md2.curlen = 0; in md2_init()
117 if (md-> md2 .curlen > sizeof(md-> md2 .buf)) { in md2_process()
121 n = MIN(inlen, (16 - md->md2.curlen)); in md2_process()
122 XMEMCPY(md->md2.buf + md->md2.curlen, in, (size_t)n); in md2_process()
123 md->md2.curlen += n; in md2_process()
128 if (md->md2.curlen == 16) { in md2_process()
131 md->md2.curlen = 0; in md2_process()
150 if (md->md2.curlen >= sizeof(md->md2.buf)) { in md2_done()
156 k = 16 - md->md2.curlen; in md2_done()
157 for (i = md->md2.curlen; i < 16; i++) { in md2_done()
A Dsha1.c165 md->sha1.curlen = 0; in sha1_init()
192 if (md->sha1.curlen >= sizeof(md->sha1.buf)) { in sha1_done()
197 md->sha1.length += md->sha1.curlen * 8; in sha1_done()
200 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0x80; in sha1_done()
206 if (md->sha1.curlen > 56) { in sha1_done()
207 while (md->sha1.curlen < 64) { in sha1_done()
208 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0; in sha1_done()
211 md->sha1.curlen = 0; in sha1_done()
215 while (md->sha1.curlen < 56) { in sha1_done()
216 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0; in sha1_done()
A Dmd4.c174 md->md4.curlen = 0; in md4_init()
200 if (md->md4.curlen >= sizeof(md->md4.buf)) { in md4_done()
205 md->md4.length += md->md4.curlen * 8; in md4_done()
208 md->md4.buf[md->md4.curlen++] = (unsigned char)0x80; in md4_done()
214 if (md->md4.curlen > 56) { in md4_done()
215 while (md->md4.curlen < 64) { in md4_done()
216 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done()
219 md->md4.curlen = 0; in md4_done()
223 while (md->md4.curlen < 56) { in md4_done()
224 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done()
A Dmd5.c232 md->md5.curlen = 0; in md5_init()
259 if (md->md5.curlen >= sizeof(md->md5.buf)) { in md5_done()
265 md->md5.length += md->md5.curlen * 8; in md5_done()
268 md->md5.buf[md->md5.curlen++] = (unsigned char)0x80; in md5_done()
274 if (md->md5.curlen > 56) { in md5_done()
275 while (md->md5.curlen < 64) { in md5_done()
276 md->md5.buf[md->md5.curlen++] = (unsigned char)0; in md5_done()
279 md->md5.curlen = 0; in md5_done()
283 while (md->md5.curlen < 56) { in md5_done()
284 md->md5.buf[md->md5.curlen++] = (unsigned char)0; in md5_done()
A Dblake2b.c372 if (md->blake2b.curlen > sizeof(md->blake2b.buf)) { in blake2b_process()
377 unsigned long left = md->blake2b.curlen; in blake2b_process()
380 md->blake2b.curlen = 0; in blake2b_process()
393 XMEMCPY(md->blake2b.buf + md->blake2b.curlen, in, inlen); in blake2b_process()
394 md->blake2b.curlen += inlen; in blake2b_process()
419 s_blake2b_increment_counter(md, md->blake2b.curlen); in blake2b_done()
421 …XMEMSET(md->blake2b.buf + md->blake2b.curlen, 0, BLAKE2B_BLOCKBYTES - md->blake2b.curlen); /* Padd… in blake2b_done()
A Dblake2s.c361 if (md->blake2s.curlen > sizeof(md->blake2s.buf)) { in blake2s_process()
366 unsigned long left = md->blake2s.curlen; in blake2s_process()
369 md->blake2s.curlen = 0; in blake2s_process()
382 XMEMCPY(md->blake2s.buf + md->blake2s.curlen, in, inlen); in blake2s_process()
383 md->blake2s.curlen += inlen; in blake2s_process()
407 s_blake2s_increment_counter(md, md->blake2s.curlen); in blake2s_done()
409 …XMEMSET(md->blake2s.buf + md->blake2s.curlen, 0, BLAKE2S_BLOCKBYTES - md->blake2s.curlen); /* Padd… in blake2s_done()
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/blake2/
A Dblake2bmac_memory_multi.c26 unsigned long curlen; in blake2bmac_memory_multi() local
35 curlen = inlen; in blake2bmac_memory_multi()
38 if ((err = blake2bmac_process(&st, curptr, curlen)) != CRYPT_OK) { goto LBL_ERR; } in blake2bmac_memory_multi()
41 curlen = va_arg(args, unsigned long); in blake2bmac_memory_multi()
A Dblake2smac_memory_multi.c26 unsigned long curlen; in blake2smac_memory_multi() local
35 curlen = inlen; in blake2smac_memory_multi()
38 if ((err = blake2smac_process(&st, curptr, curlen)) != CRYPT_OK) { goto LBL_ERR; } in blake2smac_memory_multi()
41 curlen = va_arg(args, unsigned long); in blake2smac_memory_multi()
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/poly1305/
A Dpoly1305_memory_multi.c31 unsigned long curlen; in poly1305_memory_multi() local
40 curlen = inlen; in poly1305_memory_multi()
43 if ((err = poly1305_process(&st, curptr, curlen)) != CRYPT_OK) { goto LBL_ERR; } in poly1305_memory_multi()
46 curlen = va_arg(args, unsigned long); in poly1305_memory_multi()
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/whirl/
A Dwhirl.c150 if (md->whirlpool.curlen >= sizeof(md->whirlpool.buf)) { in whirlpool_done()
155 md->whirlpool.length += md->whirlpool.curlen * 8; in whirlpool_done()
158 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0x80; in whirlpool_done()
164 if (md->whirlpool.curlen > 32) { in whirlpool_done()
165 while (md->whirlpool.curlen < 64) { in whirlpool_done()
166 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0; in whirlpool_done()
169 md->whirlpool.curlen = 0; in whirlpool_done()
173 while (md->whirlpool.curlen < 56) { in whirlpool_done()
174 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0; in whirlpool_done()
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/omac/
A Domac_memory_multi.c34 unsigned long curlen; in omac_memory_multi() local
53 curlen = inlen; in omac_memory_multi()
56 if ((err = omac_process(omac, curptr, curlen)) != CRYPT_OK) { in omac_memory_multi()
64 curlen = va_arg(args, unsigned long); in omac_memory_multi()
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/pmac/
A Dpmac_memory_multi.c34 unsigned long curlen; in pmac_memory_multi() local
52 curlen = inlen; in pmac_memory_multi()
55 if ((err = pmac_process(pmac, curptr, curlen)) != CRYPT_OK) { in pmac_memory_multi()
63 curlen = va_arg(args, unsigned long); in pmac_memory_multi()
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/f9/
A Df9_memory_multi.c34 unsigned long curlen; in f9_memory_multi() local
53 curlen = inlen; in f9_memory_multi()
56 if ((err = f9_process(f9, curptr, curlen)) != CRYPT_OK) { in f9_memory_multi()
64 curlen = va_arg(args, unsigned long); in f9_memory_multi()
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/hmac/
A Dhmac_memory_multi.c35 unsigned long curlen; in hmac_memory_multi() local
54 curlen = inlen; in hmac_memory_multi()
57 if ((err = hmac_process(hmac, curptr, curlen)) != CRYPT_OK) { in hmac_memory_multi()
65 curlen = va_arg(args, unsigned long); in hmac_memory_multi()
/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/xcbc/
A Dxcbc_memory_multi.c34 unsigned long curlen; in xcbc_memory_multi() local
53 curlen = inlen; in xcbc_memory_multi()
56 if ((err = xcbc_process(xcbc, curptr, curlen)) != CRYPT_OK) { in xcbc_memory_multi()
64 curlen = va_arg(args, unsigned long); in xcbc_memory_multi()
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/helper/
A Dhash_memory_multi.c29 unsigned long curlen; in hash_memory_multi() local
55 curlen = inlen; in hash_memory_multi()
58 if ((err = hash_descriptor[hash]->process(md, curptr, curlen)) != CRYPT_OK) { in hash_memory_multi()
66 curlen = va_arg(args, unsigned long); in hash_memory_multi()
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/chc/
A Dchc.c112 md->chc.curlen = 0; in chc_init()
206 if (md->chc.curlen >= sizeof(md->chc.buf)) { in chc_done()
211 md->chc.length += md->chc.curlen * 8; in chc_done()
214 md->chc.buf[md->chc.curlen++] = (unsigned char)0x80; in chc_done()
220 if (md->chc.curlen > (unsigned long)(cipher_blocksize - 8)) { in chc_done()
221 while (md->chc.curlen < (unsigned long)cipher_blocksize) { in chc_done()
222 md->chc.buf[md->chc.curlen++] = (unsigned char)0; in chc_done()
225 md->chc.curlen = 0; in chc_done()
229 while (md->chc.curlen < (unsigned long)(cipher_blocksize - 8)) { in chc_done()
230 md->chc.buf[md->chc.curlen++] = (unsigned char)0; in chc_done()
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_hash.h20 unsigned long curlen; member
28 ulong32 state[8], curlen; member
36 ulong32 state[5], curlen; member
44 ulong32 state[4], curlen; member
52 ulong32 state[4], curlen; member
60 unsigned long curlen; member
68 unsigned long curlen; member
108 ulong32 curlen; member
116 ulong32 curlen; member
126 unsigned long curlen; member
[all …]
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/sha2/
A Dsha512.c170 md->sha512.curlen = 0; in sha512_init()
205 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { in sha512_done()
210 md->sha512.length += md->sha512.curlen * CONST64(8); in sha512_done()
213 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0x80; in sha512_done()
219 if (md->sha512.curlen > 112) { in sha512_done()
220 while (md->sha512.curlen < 128) { in sha512_done()
221 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0; in sha512_done()
224 md->sha512.curlen = 0; in sha512_done()
231 while (md->sha512.curlen < 120) { in sha512_done()
232 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0; in sha512_done()
A Dsha512_224.c39 md->sha512.curlen = 0; in sha512_224_init()
65 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { in sha512_224_done()
A Dsha384.c39 md->sha512.curlen = 0; in sha384_init()
65 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { in sha384_done()
A Dsha512_256.c39 md->sha512.curlen = 0; in sha512_256_init()
65 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { in sha512_256_done()

Completed in 32 milliseconds

12