ESP-IDF
tc_sha256_state_struct::leftover
is only used within ESP-IDF.
Symbol previews are coming soon...
Symbols
loading...
Files
loading (1/5)...
Summary
Syntax
Examples
References
Call Tree
Data Use
Class Tree
Override Tree
Implementations
Instances
Lifecycle
SourceVu
ESP-IDF Framework and Examples
ESP-IDF
tc_sha256_state_struct::leftover
tc_sha256_state_struct::leftover field
Syntax
Show:
Summary
Declaration
from
sha256.h:74
uint8_t
leftover
[
TC_SHA256_BLOCK_SIZE
]
;
Examples
References
from
examples
Code
Location
Referrer
uint8_t
leftover
[
TC_SHA256_BLOCK_SIZE
]
;
sha256.h:74
uint8_t
leftover
[
TC_SHA256_BLOCK_SIZE
]
;
sha256.h:74
.
struct_tc_sha256_off_leftover
=
offsetof
(
struct
tc_sha256_state_struct
,
leftover
)
,
ext.c:4244
s
->
leftover
[
s
->
leftover_offset
++
]
=
*
(
data
++
)
;
sha256.c:76
tc_sha256_update()
compress
(
s
->
iv
,
s
->
leftover
)
;
sha256.c:78
tc_sha256_update()
s
->
leftover
[
s
->
leftover_offset
++
]
=
0x80
;
/* always room for one byte */
sha256.c:99
tc_sha256_final()
if
(
s
->
leftover_offset
>
(
sizeof
(
s
->
leftover
)
-
8
)
)
{
sha256.c:100
tc_sha256_final()
_set
(
s
->
leftover
+
s
->
leftover_offset
,
0x00
,
sha256.c:102
tc_sha256_final()
sizeof
(
s
->
leftover
)
-
s
->
leftover_offset
)
;
sha256.c:103
tc_sha256_final()
compress
(
s
->
iv
,
s
->
leftover
)
;
sha256.c:104
tc_sha256_final()
_set
(
s
->
leftover
+
s
->
leftover_offset
,
0x00
,
sha256.c:109
tc_sha256_final()
sizeof
(
s
->
leftover
)
-
8
-
s
->
leftover_offset
)
;
sha256.c:110
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
1
]
=
(
uint8_t
)
(
s
->
bits_hashed
)
;
sha256.c:111
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
2
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
8
)
;
sha256.c:112
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
3
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
16
)
;
sha256.c:113
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
4
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
24
)
;
sha256.c:114
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
5
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
32
)
;
sha256.c:115
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
6
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
40
)
;
sha256.c:116
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
7
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
48
)
;
sha256.c:117
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
8
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
56
)
;
sha256.c:118
tc_sha256_final()
compress
(
s
->
iv
,
s
->
leftover
)
;
sha256.c:121
tc_sha256_final()
s
->
leftover
[
s
->
leftover_offset
++
]
=
*
(
data
++
)
;
sha256.c:76
tc_sha256_update()
compress
(
s
->
iv
,
s
->
leftover
)
;
sha256.c:78
tc_sha256_update()
s
->
leftover
[
s
->
leftover_offset
++
]
=
0x80
;
/* always room for one byte */
sha256.c:99
tc_sha256_final()
if
(
s
->
leftover_offset
>
(
sizeof
(
s
->
leftover
)
-
8
)
)
{
sha256.c:100
tc_sha256_final()
_set
(
s
->
leftover
+
s
->
leftover_offset
,
0x00
,
sha256.c:102
tc_sha256_final()
sizeof
(
s
->
leftover
)
-
s
->
leftover_offset
)
;
sha256.c:103
tc_sha256_final()
compress
(
s
->
iv
,
s
->
leftover
)
;
sha256.c:104
tc_sha256_final()
_set
(
s
->
leftover
+
s
->
leftover_offset
,
0x00
,
sha256.c:109
tc_sha256_final()
sizeof
(
s
->
leftover
)
-
8
-
s
->
leftover_offset
)
;
sha256.c:110
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
1
]
=
(
uint8_t
)
(
s
->
bits_hashed
)
;
sha256.c:111
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
2
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
8
)
;
sha256.c:112
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
3
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
16
)
;
sha256.c:113
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
4
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
24
)
;
sha256.c:114
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
5
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
32
)
;
sha256.c:115
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
6
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
40
)
;
sha256.c:116
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
7
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
48
)
;
sha256.c:117
tc_sha256_final()
s
->
leftover
[
sizeof
(
s
->
leftover
)
-
8
]
=
(
uint8_t
)
(
s
->
bits_hashed
>
>
56
)
;
sha256.c:118
tc_sha256_final()
compress
(
s
->
iv
,
s
->
leftover
)
;
sha256.c:121
tc_sha256_final()
Call Tree
from
examples
All items filtered out
All items filtered out
Data Use
from
examples
tc_sha256_state_struct::leftover
is read by 2 functions:
All items filtered out
tc_sha256_state_struct::leftover
tc_sha256_update()
tc_sha256_final()
All items filtered out
Class Tree
from
examples
All items filtered out
All items filtered out
Override Tree
from
examples
All items filtered out
All items filtered out
Implementations
from
examples
All items filtered out
All items filtered out
Instances
from
examples
Lifecycle
from
examples
All items filtered out
All items filtered out