/third_party/openssl/crypto/rand/ |
D | drbg_ctr.c | 73 if (!EVP_CipherUpdate(ctr->ctx_df, out, &outlen, out, len) in ctr_BCC_block() 202 if (!EVP_CipherUpdate(ctr->ctx_ecb, ctr->KX, &outlen, ctr->KX + ctr->keylen, in ctr_df() 206 if (!EVP_CipherUpdate(ctr->ctx_ecb, ctr->KX + 16, &outlen, ctr->KX, in ctr_df() 211 if (!EVP_CipherUpdate(ctr->ctx_ecb, ctr->KX + 32, &outlen, in ctr_df() 245 if (!EVP_CipherUpdate(ctr->ctx_ecb, out, &outlen, V_tmp, len) in ctr_update() 379 if (!EVP_CipherUpdate(ctr->ctx_ctr, out, &outl, out, buflen) in drbg_ctr_generate()
|
/third_party/openssl/ssl/record/ |
D | ssl3_record_tls13.c | 174 && EVP_CipherUpdate(ctx, NULL, &lenu, NULL, in tls13_enc() 176 || EVP_CipherUpdate(ctx, NULL, &lenu, recheader, in tls13_enc() 178 || EVP_CipherUpdate(ctx, rec->data, &lenu, rec->input, in tls13_enc()
|
/third_party/openssl/test/ |
D | afalgtest.c | 71 || !TEST_true(EVP_CipherUpdate(ctx, ebuf, &encl, in, BUFFER_SIZE)) in test_afalg_aes_cbc() 81 || !TEST_true(EVP_CipherUpdate(ctx, dbuf, &decl, ebuf, encl)) in test_afalg_aes_cbc()
|
D | evp_extra_test.c | 553 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, t->input, t->inlen))) { in test_evp_init_seq() 640 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, t->input, t->inlen))) { in test_evp_reset() 656 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, t->input, t->inlen))) { in test_evp_reset() 734 if (!TEST_true(EVP_CipherUpdate(ctx, NULL, &outlen3, gcmAAD, sizeof(gcmAAD)))) { in test_gcm_reinit() 739 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, gcmResetPlaintext, in test_gcm_reinit() 769 if (!TEST_true(EVP_CipherUpdate(ctx, NULL, &outlen3, gcmAAD, sizeof(gcmAAD)))) { in test_gcm_reinit() 773 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, gcmResetPlaintext, in test_gcm_reinit() 884 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, cfbPlaintext, sizeof(cfbPlaintext)))) { in test_evp_updated_iv()
|
D | evp_test.c | 669 if (!EVP_CipherUpdate(ctx, NULL, &tmplen, NULL, out_len)) { in cipher_test_enc() 677 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad, in cipher_test_enc() 685 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, expected->aad, 1)) in cipher_test_enc() 690 if (!EVP_CipherUpdate(ctx, NULL, &chunklen, in cipher_test_enc() 697 && !EVP_CipherUpdate(ctx, NULL, &chunklen, in cipher_test_enc() 716 if (!EVP_CipherUpdate(ctx, tmp + out_misalign, &tmplen, in, in_len)) in cipher_test_enc() 721 if (!EVP_CipherUpdate(ctx, tmp + out_misalign, &chunklen, in, 1)) in cipher_test_enc() 728 if (!EVP_CipherUpdate(ctx, tmp + out_misalign + tmplen, &chunklen, in cipher_test_enc() 736 if (!EVP_CipherUpdate(ctx, tmp + out_misalign + tmplen, &chunklen, in cipher_test_enc()
|
/third_party/openssl/crypto/evp/ |
D | bio_enc.c | 179 if (!EVP_CipherUpdate(ctx->cipher, in enc_read() 197 if (!EVP_CipherUpdate(ctx->cipher, in enc_read() 266 if (!EVP_CipherUpdate(ctx->cipher, in enc_write()
|
D | evp_enc.c | 210 int EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, int *outl, in EVP_CipherUpdate() function
|
/third_party/openssl/crypto/pkcs12/ |
D | p12_decr.c | 51 if (!EVP_CipherUpdate(ctx, out, &i, in, inlen)) { in PKCS12_pbe_crypt()
|
/third_party/openssl/doc/man3/ |
D | EVP_EncryptInit.pod | 15 EVP_CipherUpdate, 75 int EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out, 183 EVP_CipherInit_ex(), EVP_CipherUpdate() and EVP_CipherFinal_ex() are 192 for another EVP_CipherInit() / EVP_CipherUpdate() / EVP_CipherFinal() 297 EVP_CipherInit_ex() and EVP_CipherUpdate() return 1 for success and 0 for failure. 349 To specify additional authenticated data (AAD), a call to EVP_CipherUpdate(), 409 EVP_CipherUpdate(), EVP_EncryptUpdate() or EVP_DecryptUpdate() with the output 613 if (!EVP_CipherUpdate(ctx, outbuf, &outlen, inbuf, inlen)) {
|
D | BIO_f_cipher.pod | 25 EVP_CipherInit(), EVP_CipherUpdate() and EVP_CipherFinal().
|
D | EVP_CIPHER_meth_new.pod | 193 The cipher function is called by EVP_CipherUpdate(),
|
/third_party/openssl/crypto/cms/ |
D | cms_kari.c | 206 if (!EVP_CipherUpdate(kari->ctx, NULL, &outlen, in, inlen)) in cms_kek_cipher() 211 if (!EVP_CipherUpdate(kari->ctx, out, &outlen, in, inlen)) in cms_kek_cipher()
|
/third_party/gstreamer/gstplugins_bad/ext/aes/ |
D | gstaesenc.c | 471 if (!EVP_CipherUpdate (filter->evp_ctx, ciphertext, in gst_aes_enc_transform() 486 if (!EVP_CipherUpdate (filter->evp_ctx, in gst_aes_enc_transform()
|
D | gstaesdec.c | 481 if (!EVP_CipherUpdate (filter->evp_ctx, plaintext, in gst_aes_dec_transform()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | crypto_openssl.c | 241 if (!EVP_CipherUpdate(ctx, skip_buf, &outl, skip_buf, len)) in rc4_skip() 246 if (EVP_CipherUpdate(ctx, data, &outl, data, data_len)) in rc4_skip()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | crypto_openssl.c | 314 if (!EVP_CipherUpdate(ctx, skip_buf, &outl, skip_buf, len)) in rc4_skip() 319 if (EVP_CipherUpdate(ctx, data, &outl, data, data_len)) in rc4_skip()
|
/third_party/openssl/include/openssl/ |
D | evp.h | 613 __owur int EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, unsigned char *out,
|
/third_party/node/src/ |
D | node_crypto.cc | 3979 if (!EVP_CipherUpdate(ctx_.get(), nullptr, &outlen, nullptr, plaintext_len)) in SetAAD() 3983 return 1 == EVP_CipherUpdate(ctx_.get(), in SetAAD() 4028 EVP_CipherUpdate(ctx_.get(), in Update() 4037 int r = EVP_CipherUpdate(ctx_.get(), in Update()
|
/third_party/openssl/ |
D | NEWS | 41 o Fixed an overflow in the EVP_CipherUpdate, EVP_EncryptUpdate and
|
D | CHANGES | 374 *) Fixed the EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate 2779 Also EVP_CipherUpdate() is a synonym for EVP_EncryptUpdate(). All instances 12231 EVP_CipherUpdate() would correctly report zero bytes had been decrypted.
|
/third_party/grpc/src/boringssl/ |
D | boringssl_prefix_symbols.h | 1471 #define EVP_CipherUpdate BORINGSSL_ADD_PREFIX(BORINGSSL_PREFIX, EVP_CipherUpdate) macro
|
/third_party/openssl/util/ |
D | libcrypto.num | 2360 EVP_CipherUpdate 2331 1_1_0 EXIST::FUNCTION:
|
/third_party/sqlite/src/ |
D | sqlite3.c | 238334 EVP_CipherUpdate(ctx, output, &cipherLength, input->buffer, input->bufferSize);
|