/aosp_15_r20/external/mbedtls/tests/suites/ |
H A D | test_suite_cipher.function | 251 /* mbedtls_cipher_update() */ 253 mbedtls_cipher_update(&invalid_ctx, 352 TEST_ASSERT(mbedtls_cipher_update(&ctx, input, 1, output, &olen) 449 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx_enc, inbuf, length, encbuf, &outlen)); 470 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx_dec, encbuf, total_len, decbuf, &outlen)); 546 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx, inbuf, length, encbuf, &outlen)); 621 mbedtls_cipher_update(&ctx_dec, encbuf, 0, decbuf, &outlen)); 728 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx_enc, inbuf, first_length, encbuf, &outlen)); 732 mbedtls_cipher_update(&ctx_enc, inbuf + first_length, second_length, 751 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx_dec, encbuf, first_length, decbuf, &outlen)); [all …]
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/tests/suites/ |
H A D | test_suite_cipher.function | 255 /* mbedtls_cipher_update() */ 257 mbedtls_cipher_update(&invalid_ctx, 356 TEST_ASSERT(mbedtls_cipher_update(&ctx, input, 1, output, &olen) 453 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx_enc, inbuf, length, encbuf, &outlen)); 474 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx_dec, encbuf, total_len, decbuf, &outlen)); 550 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx, inbuf, length, encbuf, &outlen)); 625 mbedtls_cipher_update(&ctx_dec, encbuf, 0, decbuf, &outlen)); 732 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx_enc, inbuf, first_length, encbuf, &outlen)); 736 mbedtls_cipher_update(&ctx_enc, inbuf + first_length, second_length, 755 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx_dec, encbuf, first_length, decbuf, &outlen)); [all …]
|
/aosp_15_r20/external/mbedtls/library/ |
H A D | ccm.c | 111 if ((ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->ctr, 16, tmp_buf, in mbedtls_ccm_crypt() 181 if ((ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen)) != 0) { in ccm_calculate_first_block_if_ready() 302 mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen)) != 0) { in mbedtls_ccm_update_ad() 364 mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen)) != 0) { in mbedtls_ccm_update() 395 mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen)) != 0) { in mbedtls_ccm_update()
|
H A D | nist_kw.c | 196 ret = mbedtls_cipher_update(&ctx->cipher_ctx, in mbedtls_nist_kw_wrap() 218 ret = mbedtls_cipher_update(&ctx->cipher_ctx, in mbedtls_nist_kw_wrap() 285 ret = mbedtls_cipher_update(&ctx->cipher_ctx, in unwrap() 378 ret = mbedtls_cipher_update(&ctx->cipher_ctx, in mbedtls_nist_kw_unwrap()
|
H A D | cmac.c | 113 if ((ret = mbedtls_cipher_update(ctx, L, block_size, L, &olen)) != 0) { in cmac_generate_subkeys() 230 if ((ret = mbedtls_cipher_update(ctx, state, block_size, state, in mbedtls_cipher_cmac_update() 248 if ((ret = mbedtls_cipher_update(ctx, state, block_size, state, in mbedtls_cipher_cmac_update() 306 if ((ret = mbedtls_cipher_update(ctx, state, block_size, state, in mbedtls_cipher_cmac_finish()
|
H A D | psa_crypto_cipher.c | 322 mbedtls_cipher_update(ctx, in psa_cipher_update_ecb() 340 mbedtls_cipher_update(ctx, input, in psa_cipher_update_ecb() 407 mbedtls_cipher_update(&operation->ctx.cipher, input, in mbedtls_psa_cipher_update()
|
H A D | gcm.c | 65 if ((ret = mbedtls_cipher_update(&ctx->cipher_ctx, h, 16, h, &olen)) != 0) { in gcm_gen_table() 296 if ((ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, in mbedtls_gcm_starts() 392 if ((ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ectr, in gcm_mask()
|
H A D | pkcs12.c | 234 if ((ret = mbedtls_cipher_update(&cipher_ctx, data, len, in mbedtls_pkcs12_pbe_ext()
|
H A D | cipher.c | 563 int mbedtls_cipher_update(mbedtls_cipher_context_t *ctx, const unsigned char *input, in mbedtls_cipher_update() function 1366 if ((ret = mbedtls_cipher_update(ctx, input, ilen, in mbedtls_cipher_crypt()
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/library/ |
H A D | ccm.c | 135 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->ctr, 16, tmp_buf, &olen); in mbedtls_ccm_crypt() 212 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen); in ccm_calculate_first_block_if_ready() 340 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen); in mbedtls_ccm_update_ad() 409 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen); in mbedtls_ccm_update() 444 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->y, &olen); in mbedtls_ccm_update()
|
H A D | nist_kw.c | 196 ret = mbedtls_cipher_update(&ctx->cipher_ctx, in mbedtls_nist_kw_wrap() 218 ret = mbedtls_cipher_update(&ctx->cipher_ctx, in mbedtls_nist_kw_wrap() 285 ret = mbedtls_cipher_update(&ctx->cipher_ctx, in unwrap() 378 ret = mbedtls_cipher_update(&ctx->cipher_ctx, in mbedtls_nist_kw_unwrap()
|
H A D | cmac.c | 108 if ((ret = mbedtls_cipher_update(ctx, L, block_size, L, &olen)) != 0) { in cmac_generate_subkeys() 229 if ((ret = mbedtls_cipher_update(ctx, state, block_size, state, in mbedtls_cipher_cmac_update() 247 if ((ret = mbedtls_cipher_update(ctx, state, block_size, state, in mbedtls_cipher_cmac_update() 306 if ((ret = mbedtls_cipher_update(ctx, state, block_size, state, in mbedtls_cipher_cmac_finish()
|
H A D | psa_crypto_cipher.c | 452 mbedtls_cipher_update(ctx, in psa_cipher_update_ecb() 470 mbedtls_cipher_update(ctx, input, in psa_cipher_update_ecb() 541 mbedtls_cipher_update(&operation->ctx.cipher, input, in mbedtls_psa_cipher_update()
|
H A D | gcm.c | 109 ret = mbedtls_cipher_update(&ctx->cipher_ctx, h, 16, h, &olen); in gcm_gen_table() 441 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ctx->base_ectr, &olen); in mbedtls_gcm_starts() 546 ret = mbedtls_cipher_update(&ctx->cipher_ctx, ctx->y, 16, ectr, &olen); in gcm_mask()
|
H A D | cipher.c | 579 int mbedtls_cipher_update(mbedtls_cipher_context_t *ctx, const unsigned char *input, in mbedtls_cipher_update() function 1382 if ((ret = mbedtls_cipher_update(ctx, input, ilen, in mbedtls_cipher_crypt()
|
/aosp_15_r20/external/mbedtls/programs/cipher/ |
H A D | cipher_aead_demo.c | 191 CHK(mbedtls_cipher_update(ctx, part1, part1_len, p, &olen)); in aead_encrypt() 193 CHK(mbedtls_cipher_update(ctx, part2, part2_len, p, &olen)); in aead_encrypt()
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/programs/cipher/ |
H A D | cipher_aead_demo.c | 191 CHK(mbedtls_cipher_update(ctx, part1, part1_len, p, &olen)); in aead_encrypt() 193 CHK(mbedtls_cipher_update(ctx, part2, part2_len, p, &olen)); in aead_encrypt()
|
/aosp_15_r20/external/mbedtls/programs/aes/ |
H A D | crypt_and_hash.c | 335 if (mbedtls_cipher_update(&cipher_ctx, buffer, ilen, output, &olen) != 0) { in main() 494 if (mbedtls_cipher_update(&cipher_ctx, buffer, ilen, output, in main()
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/programs/aes/ |
H A D | crypt_and_hash.c | 339 if (mbedtls_cipher_update(&cipher_ctx, buffer, ilen, output, &olen) != 0) { in main() 498 if (mbedtls_cipher_update(&cipher_ctx, buffer, ilen, output, in main()
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/include/mbedtls/ |
H A D | cipher.h | 956 int mbedtls_cipher_update(mbedtls_cipher_context_t *ctx,
|
/aosp_15_r20/external/mbedtls/include/mbedtls/ |
H A D | cipher.h | 966 int mbedtls_cipher_update(mbedtls_cipher_context_t *ctx,
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/docs/ |
H A D | 3.0-migration-guide.md | 411 the last call to `mbedtls_cipher_update()` — that is, without calling
|
H A D | psa-transition.md | 366 …mbedtls_cipher_crypt`. To pass the input in multiple parts, call `mbedtls_cipher_update` as many t… 392 5. Call `mbedtls_cipher_update` as many times as necessary to pass the input plaintext or ciphertex…
|
/aosp_15_r20/external/mbedtls/docs/ |
H A D | 3.0-migration-guide.md | 411 the last call to `mbedtls_cipher_update()` — that is, without calling
|
/aosp_15_r20/external/mbedtls/ |
H A D | ChangeLog | 1473 mbedtls_cipher_update()) no longer requires the size of partial inputs to 3185 stated in the mbedtls_cipher_update() documentation. Contributed by 3745 * Fixed potential arithmetic overflows in mbedtls_cipher_update() that could
|