/third_party/mbedtls/tests/suites/ |
D | test_suite_cipher.function | 269 /* mbedtls_cipher_update() */ 271 mbedtls_cipher_update( &invalid_ctx, 372 TEST_ASSERT( mbedtls_cipher_update( &ctx, input, 1, output, &olen ) 463 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, length, encbuf, &outlen ) ); 484 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, total_len, decbuf, &outlen ) ); 556 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, inbuf, length, encbuf, &outlen ) ); 610 mbedtls_cipher_update( &ctx_dec, encbuf, 0, decbuf, &outlen ) ); 710 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf, first_length, encbuf, &outlen ) ); 713 …TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_enc, inbuf + first_length, second_length, encbuf + t… 730 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx_dec, encbuf, first_length, decbuf, &outlen ) ); [all …]
|
/third_party/mbedtls/library/ |
D | ccm.c | 120 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->ctr, 16, tmp_buf, in mbedtls_ccm_crypt() 194 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen ) ) != 0 ) in ccm_calculate_first_block_if_ready() 322 … if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen ) ) != 0 ) in mbedtls_ccm_update_ad() 389 … if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen ) ) != 0 ) in mbedtls_ccm_update() 422 … if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen ) ) != 0 ) in mbedtls_ccm_update()
|
D | nist_kw.c | 221 ret = mbedtls_cipher_update( &ctx->cipher_ctx, in mbedtls_nist_kw_wrap() 246 ret = mbedtls_cipher_update( &ctx->cipher_ctx, in mbedtls_nist_kw_wrap() 314 ret = mbedtls_cipher_update( &ctx->cipher_ctx, in unwrap() 411 ret = mbedtls_cipher_update( &ctx->cipher_ctx, in mbedtls_nist_kw_unwrap()
|
D | cmac.c | 131 if( ( ret = mbedtls_cipher_update( ctx, L, block_size, L, &olen ) ) != 0 ) in cmac_generate_subkeys() 252 if( ( ret = mbedtls_cipher_update( ctx, state, block_size, state, in mbedtls_cipher_cmac_update() 272 if( ( ret = mbedtls_cipher_update( ctx, state, block_size, state, in mbedtls_cipher_cmac_update() 332 if( ( ret = mbedtls_cipher_update( ctx, state, block_size, state, in mbedtls_cipher_cmac_finish()
|
D | psa_crypto_cipher.c | 300 mbedtls_cipher_update( ctx, in psa_cipher_update_ecb() 318 mbedtls_cipher_update( ctx, input, in psa_cipher_update_ecb() 386 mbedtls_cipher_update( &operation->ctx.cipher, input, in mbedtls_psa_cipher_update()
|
D | gcm.c | 87 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, h, 16, h, &olen ) ) != 0 ) in gcm_gen_table() 305 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, in mbedtls_gcm_starts() 406 if( ( ret = mbedtls_cipher_update( &ctx->cipher_ctx, ctx->y, 16, ectr, in gcm_mask()
|
D | pkcs12.c | 167 if( ( ret = mbedtls_cipher_update( &cipher_ctx, data, len, in mbedtls_pkcs12_pbe()
|
D | cipher.c | 513 int mbedtls_cipher_update( mbedtls_cipher_context_t *ctx, const unsigned char *input, in mbedtls_cipher_update() function 1324 if( ( ret = mbedtls_cipher_update( ctx, input, ilen, in mbedtls_cipher_crypt()
|
/third_party/lwip/src/apps/snmp/ |
D | snmpv3_mbedtls.c | 162 … if (mbedtls_cipher_update(&ctx, in_bytes, LWIP_ARRAYSIZE(in_bytes), out_bytes, &out_len) != 0) { in snmpv3_crypt() 215 if (mbedtls_cipher_update(&ctx, &in_byte, sizeof(in_byte), &out_byte, &out_len) != 0) { in snmpv3_crypt()
|
/third_party/mbedtls/programs/aes/ |
D | crypt_and_hash.c | 388 if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, &olen ) != 0 ) in main() 569 if( mbedtls_cipher_update( &cipher_ctx, buffer, ilen, output, in main()
|
/third_party/mbedtls/include/mbedtls/ |
D | cipher.h | 942 int mbedtls_cipher_update( mbedtls_cipher_context_t *ctx,
|
/third_party/mbedtls/docs/ |
D | 3.0-migration-guide.md | 383 the last call to `mbedtls_cipher_update()` — that is, without calling
|
/third_party/mbedtls/ |
D | ChangeLog | 462 mbedtls_cipher_update()) no longer requires the size of partial inputs to 2173 stated in the mbedtls_cipher_update() documentation. Contributed by 2733 * Fixed potential arithmetic overflows in mbedtls_cipher_update() that could
|