/optee_os-3.20.0/core/lib/libtomcrypt/src/mac/blake2/ |
A D | blake2bmac_test.c | 274 unsigned long ilen, klen = sizeof(key), mlen = 64; in blake2bmac_test() 277 for (ilen = 0; ilen < 256; ilen++) inp[ilen] = (unsigned char)ilen; in blake2bmac_test() 279 for (ilen = 0; ilen < 256; ilen++) { in blake2bmac_test() 280 const unsigned char *mac = tests[ilen]; in blake2bmac_test() 283 if (ilen > 15) { in blake2bmac_test() 290 blake2bmac_process(&st, (unsigned char*)inp + 15, ilen - 15); in blake2bmac_test() 292 …if (compare_testvector(out, olen, mac, mlen, "BLAKE2B MAC multi", ilen) != 0) return CRYPT_FAIL_TE… in blake2bmac_test() 296 blake2bmac_process(&st, (unsigned char*)inp, ilen); in blake2bmac_test() 298 …if (compare_testvector(out, olen, mac, mlen, "BLAKE2B MAC single", ilen) != 0) return CRYPT_FAIL_T… in blake2bmac_test()
|
A D | blake2smac_test.c | 274 unsigned long ilen, klen = sizeof(key), mlen = 32; in blake2smac_test() 277 for (ilen = 0; ilen < 256; ilen++) inp[ilen] = (unsigned char)ilen; in blake2smac_test() 279 for (ilen = 0; ilen < 256; ilen++) { in blake2smac_test() 280 const unsigned char *mac = tests[ilen]; in blake2smac_test() 283 if (ilen > 15) { in blake2smac_test() 290 blake2smac_process(&st, (unsigned char*)inp + 15, ilen - 15); in blake2smac_test() 292 …if (compare_testvector(out, olen, mac, mlen, "BLAKE2S MAC multi", ilen) != 0) return CRYPT_FAIL_TE… in blake2smac_test() 296 blake2smac_process(&st, (unsigned char*)inp, ilen); in blake2smac_test() 298 …if (compare_testvector(out, olen, mac, mlen, "BLAKE2S MAC single", ilen) != 0) return CRYPT_FAIL_T… in blake2smac_test()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | cipher.c | 564 *olen = ilen; in mbedtls_cipher_update() 578 *olen = ilen; in mbedtls_cipher_update() 587 *olen = ilen; in mbedtls_cipher_update() 673 if( ilen ) in mbedtls_cipher_update() 698 *olen = ilen; in mbedtls_cipher_update() 713 *olen = ilen; in mbedtls_cipher_update() 729 *olen = ilen; in mbedtls_cipher_update() 750 *olen = ilen; in mbedtls_cipher_update() 765 *olen = ilen; in mbedtls_cipher_update() 1379 *olen = ilen; in mbedtls_cipher_aead_encrypt() [all …]
|
A D | md2.c | 169 size_t ilen ) in mbedtls_md2_update_ret() argument 174 while( ilen > 0 ) in mbedtls_md2_update_ret() 176 if( ilen > 16 - ctx->left ) in mbedtls_md2_update_ret() 179 fill = ilen; in mbedtls_md2_update_ret() 185 ilen -= fill; in mbedtls_md2_update_ret() 201 size_t ilen ) in mbedtls_md2_update() argument 203 mbedtls_md2_update_ret( ctx, input, ilen ); in mbedtls_md2_update() 248 size_t ilen, in mbedtls_md2_ret() argument 259 if( ( ret = mbedtls_md2_update_ret( &ctx, input, ilen ) ) != 0 ) in mbedtls_md2_ret() 273 size_t ilen, in mbedtls_md2() argument [all …]
|
A D | md.c | 624 return( mbedtls_md2_ret( input, ilen, output ) ); in mbedtls_md() 628 return( mbedtls_md4_ret( input, ilen, output ) ); in mbedtls_md() 632 return( mbedtls_md5_ret( input, ilen, output ) ); in mbedtls_md() 636 return( mbedtls_ripemd160_ret( input, ilen, output ) ); in mbedtls_md() 640 return( mbedtls_sha1_ret( input, ilen, output ) ); in mbedtls_md() 644 return( mbedtls_sha256_ret( input, ilen, output, 1 ) ); in mbedtls_md() 646 return( mbedtls_sha256_ret( input, ilen, output, 0 ) ); in mbedtls_md() 651 return( mbedtls_sha512_ret( input, ilen, output, 1 ) ); in mbedtls_md() 654 return( mbedtls_sha512_ret( input, ilen, output, 0 ) ); in mbedtls_md() 754 return( mbedtls_md_update( ctx, input, ilen ) ); in mbedtls_md_hmac_update() [all …]
|
A D | sha512.c | 325 if( ilen == 0 ) in mbedtls_sha512_update_ret() 331 ctx->total[0] += (uint64_t) ilen; in mbedtls_sha512_update_ret() 333 if( ctx->total[0] < (uint64_t) ilen ) in mbedtls_sha512_update_ret() 336 if( left && ilen >= fill ) in mbedtls_sha512_update_ret() 344 ilen -= fill; in mbedtls_sha512_update_ret() 348 while( ilen >= 128 ) in mbedtls_sha512_update_ret() 354 ilen -= 128; in mbedtls_sha512_update_ret() 357 if( ilen > 0 ) in mbedtls_sha512_update_ret() 366 size_t ilen ) in mbedtls_sha512_update() argument 456 size_t ilen, in mbedtls_sha512_ret() argument [all …]
|
A D | sha256.c | 284 if( ilen == 0 ) in mbedtls_sha256_update_ret() 290 ctx->total[0] += (uint32_t) ilen; in mbedtls_sha256_update_ret() 293 if( ctx->total[0] < (uint32_t) ilen ) in mbedtls_sha256_update_ret() 296 if( left && ilen >= fill ) in mbedtls_sha256_update_ret() 304 ilen -= fill; in mbedtls_sha256_update_ret() 308 while( ilen >= 64 ) in mbedtls_sha256_update_ret() 314 ilen -= 64; in mbedtls_sha256_update_ret() 317 if( ilen > 0 ) in mbedtls_sha256_update_ret() 326 size_t ilen ) in mbedtls_sha256_update() argument 412 size_t ilen, in mbedtls_sha256_ret() argument [all …]
|
A D | md4.c | 238 if( ilen == 0 ) in mbedtls_md4_update_ret() 244 ctx->total[0] += (uint32_t) ilen; in mbedtls_md4_update_ret() 250 if( left && ilen >= fill ) in mbedtls_md4_update_ret() 259 ilen -= fill; in mbedtls_md4_update_ret() 263 while( ilen >= 64 ) in mbedtls_md4_update_ret() 269 ilen -= 64; in mbedtls_md4_update_ret() 272 if( ilen > 0 ) in mbedtls_md4_update_ret() 275 (void *) input, ilen ); in mbedtls_md4_update_ret() 284 size_t ilen ) in mbedtls_md4_update() argument 349 size_t ilen, in mbedtls_md4_ret() argument [all …]
|
A D | md5.c | 238 size_t ilen ) in mbedtls_md5_update_ret() argument 244 if( ilen == 0 ) in mbedtls_md5_update_ret() 250 ctx->total[0] += (uint32_t) ilen; in mbedtls_md5_update_ret() 256 if( left && ilen >= fill ) in mbedtls_md5_update_ret() 263 ilen -= fill; in mbedtls_md5_update_ret() 267 while( ilen >= 64 ) in mbedtls_md5_update_ret() 273 ilen -= 64; in mbedtls_md5_update_ret() 276 if( ilen > 0 ) in mbedtls_md5_update_ret() 287 size_t ilen ) in mbedtls_md5_update() argument 364 size_t ilen, in mbedtls_md5_ret() argument [all …]
|
A D | poly1305.c | 307 size_t ilen ) in mbedtls_poly1305_update() argument 310 size_t remaining = ilen; in mbedtls_poly1305_update() 314 POLY1305_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_poly1305_update() 320 if( ilen < queue_free_len ) in mbedtls_poly1305_update() 327 ilen ); in mbedtls_poly1305_update() 329 ctx->queue_len += ilen; in mbedtls_poly1305_update() 398 size_t ilen, in mbedtls_poly1305_mac() argument 405 POLY1305_VALIDATE_RET( ilen == 0 || input != NULL ); in mbedtls_poly1305_mac() 413 ret = mbedtls_poly1305_update( &ctx, input, ilen ); in mbedtls_poly1305_mac()
|
A D | sha1.c | 297 if( ilen == 0 ) in mbedtls_sha1_update_ret() 303 ctx->total[0] += (uint32_t) ilen; in mbedtls_sha1_update_ret() 306 if( ctx->total[0] < (uint32_t) ilen ) in mbedtls_sha1_update_ret() 309 if( left && ilen >= fill ) in mbedtls_sha1_update_ret() 317 ilen -= fill; in mbedtls_sha1_update_ret() 321 while( ilen >= 64 ) in mbedtls_sha1_update_ret() 327 ilen -= 64; in mbedtls_sha1_update_ret() 330 if( ilen > 0 ) in mbedtls_sha1_update_ret() 339 size_t ilen ) in mbedtls_sha1_update() argument 420 size_t ilen, in mbedtls_sha1_ret() argument [all …]
|
A D | ripemd160.c | 307 if( ilen == 0 ) in mbedtls_ripemd160_update_ret() 313 ctx->total[0] += (uint32_t) ilen; in mbedtls_ripemd160_update_ret() 316 if( ctx->total[0] < (uint32_t) ilen ) in mbedtls_ripemd160_update_ret() 319 if( left && ilen >= fill ) in mbedtls_ripemd160_update_ret() 327 ilen -= fill; in mbedtls_ripemd160_update_ret() 331 while( ilen >= 64 ) in mbedtls_ripemd160_update_ret() 337 ilen -= 64; in mbedtls_ripemd160_update_ret() 340 if( ilen > 0 ) in mbedtls_ripemd160_update_ret() 351 size_t ilen ) in mbedtls_ripemd160_update() argument 417 size_t ilen, in mbedtls_ripemd160_ret() argument [all …]
|
/optee_os-3.20.0/core/crypto/ |
A D | sm3.h | 27 void sm3_update(struct sm3_context *ctx, const uint8_t *input, size_t ilen); 29 void sm3(const uint8_t *input, size_t ilen, uint8_t output[32]); 33 size_t ilen); 36 size_t ilen, uint8_t output[32]);
|
A D | sm3.c | 182 if (!ilen) in sm3_update() 188 ctx->total[0] += ilen; in sm3_update() 190 if (ctx->total[0] < ilen) in sm3_update() 193 if (left && ilen >= fill) { in sm3_update() 197 ilen -= fill; in sm3_update() 201 block_count = ilen / SM3_BLOCK_SIZE; in sm3_update() 203 ilen -= block_count * SM3_BLOCK_SIZE; in sm3_update() 206 if (ilen > 0) in sm3_update() 250 sm3_update(&ctx, input, ilen); in sm3() 283 sm3_update(ctx, input, ilen); in sm3_hmac_update() [all …]
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/include/mbedtls/ |
A D | md2.h | 139 size_t ilen ); 207 size_t ilen ); 255 size_t ilen, 279 size_t ilen,
|
A D | md4.h | 138 size_t ilen ); 208 size_t ilen ); 260 size_t ilen, 284 size_t ilen,
|
A D | md5.h | 138 size_t ilen ); 208 size_t ilen ); 260 size_t ilen, 284 size_t ilen,
|
A D | ripemd160.h | 105 size_t ilen ); 157 size_t ilen ); 196 size_t ilen, 215 size_t ilen,
|
A D | sha1.h | 151 size_t ilen ); 229 size_t ilen ); 293 size_t ilen, 325 size_t ilen,
|
A D | sha256.h | 125 size_t ilen ); 190 size_t ilen ); 245 size_t ilen, 277 size_t ilen,
|
A D | sha512.h | 132 size_t ilen ); 199 size_t ilen ); 259 size_t ilen, 294 size_t ilen,
|
A D | md.h | 306 int mbedtls_md_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen ); 348 int mbedtls_md( const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen, 417 size_t ilen ); 482 const unsigned char *input, size_t ilen,
|
A D | poly1305.h | 140 size_t ilen ); 177 size_t ilen,
|
A D | cmac.h | 145 const unsigned char *input, size_t ilen ); 213 const unsigned char *input, size_t ilen,
|
A D | cipher.h | 336 int (*get_padding)( unsigned char *input, size_t ilen, size_t *data_len ); 789 size_t ilen, unsigned char *output, 889 const unsigned char *input, size_t ilen, 948 const unsigned char *input, size_t ilen, 1007 const unsigned char *input, size_t ilen, 1063 const unsigned char *input, size_t ilen, 1119 const unsigned char *input, size_t ilen,
|