/third_party/mbedtls/include/mbedtls/ |
D | pkcs12.h | 111 mbedtls_md_type_t mbedtls_md, int id, int iterations );
|
D | md.h | 323 int mbedtls_md( const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen,
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_md.function | 24 * state of the underlying mbedtls_md/sha context.) 69 TEST_ASSERT( mbedtls_md( NULL, buf, 1, buf ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA ); 146 TEST_ASSERT ( 0 == mbedtls_md( md_info, src_str, strlen( (char *) src_str ), output ) ); 168 TEST_ASSERT ( 0 == mbedtls_md( md_info, src_str->x, src_str->len, output ) );
|
D | test_suite_pkcs1_v21.function | 157 TEST_ASSERT( mbedtls_md( md_info, message_str->x, message_str->len, hash_result ) == 0 ); 216 TEST_ASSERT( mbedtls_md( md_info, message_str->x, message_str->len, hash_result ) == 0 ); 257 TEST_ASSERT( mbedtls_md( md_info,
|
D | test_suite_pkcs1_v15.function | 303 TEST_ASSERT( mbedtls_md( md_info, message_str->x, message_str->len, hash_result ) == 0 ); 349 TEST_ASSERT( mbedtls_md( md_info, message_str->x, message_str->len, hash_result ) == 0 );
|
D | test_suite_entropy.function | 495 TEST_ASSERT( mbedtls_md( md_info, buf, MBEDTLS_ENTROPY_BLOCK_SIZE, 510 TEST_ASSERT( mbedtls_md( md_info, buf, MBEDTLS_ENTROPY_BLOCK_SIZE,
|
D | test_suite_ecdsa.function | 167 TEST_ASSERT( mbedtls_md( md_info, (const unsigned char *) msg, 397 TEST_ASSERT( mbedtls_md( md_info,
|
D | test_suite_pk.function | 411 …TEST_ASSERT( mbedtls_md( mbedtls_md_info_from_type( digest ), message_str->x, message_str->len, ha… 456 TEST_ASSERT( mbedtls_md( md_info, message_str->x, message_str->len, 548 TEST_ASSERT( mbedtls_md( md_info,
|
D | test_suite_x509write.function | 49 if( mbedtls_md( md_info, csr.cri.p, csr.cri.len, hash ) != 0 )
|
D | test_suite_rsa.function | 114 TEST_ASSERT( mbedtls_md( md_info, message_str->x, message_str->len, hash_result ) == 0 ); 158 TEST_ASSERT( mbedtls_md( md_info, message_str->x, message_str->len, hash_result ) == 0 );
|
D | test_suite_ssl.function | 1476 ret = mbedtls_md( mbedtls_md_info_from_type(
|
/third_party/mbedtls/library/ |
D | x509write_csr.c | 234 ret = mbedtls_md( mbedtls_md_info_from_type( ctx->md_alg ), c, len, hash ); in x509write_csr_der_internal()
|
D | pkcs12.c | 301 if( ( ret = mbedtls_md( md_info, hash_output, hlen, hash_output ) ) != 0 ) in mbedtls_pkcs12_derivation()
|
D | ecjpake.c | 233 MBEDTLS_MPI_CHK( mbedtls_md( md_info, buf, p - buf, hash ) ); in ecjpake_hash() 794 MBEDTLS_MPI_CHK( mbedtls_md( ctx->md_info, kx, x_bytes, buf ) ); in mbedtls_ecjpake_derive_secret()
|
D | x509write_crt.c | 469 if( ( ret = mbedtls_md( mbedtls_md_info_from_type( ctx->md_alg ), c, in mbedtls_x509write_crt_der()
|
D | md.c | 543 int mbedtls_md( const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen, in mbedtls_md() function
|
D | ssl_tls13_keys.c | 264 ret = mbedtls_md( md_info, ctx, ctx_len, hashed_context ); in mbedtls_ssl_tls13_derive_secret()
|
D | rsa.c | 1198 if( ( ret = mbedtls_md( md_info, label, label_len, p ) ) != 0 ) in mbedtls_rsa_rsaes_oaep_encrypt() 1400 if( ( ret = mbedtls_md( md_info, label, label_len, lhash ) ) != 0 ) in mbedtls_rsa_rsaes_oaep_decrypt()
|
D | x509_crt.c | 2374 if( mbedtls_md( md_info, crl_list->tbs.p, crl_list->tbs.len, hash ) != 0 ) in x509_crt_verifycrl() 2432 if( mbedtls_md( md_info, child->tbs.p, child->tbs.len, hash ) != 0 ) in x509_crt_check_signature()
|
D | ssl_tls.c | 1813 ret = mbedtls_md( digest_info, crt_buf, crt_buf_len, tmp_digest ); in ssl_check_peer_crt_unchanged() 2244 ret = mbedtls_md( mbedtls_md_info_from_type( in ssl_remember_peer_crt_digest()
|
/third_party/mbedtls/ |
D | ChangeLog | 1244 * Fix an unchecked call to mbedtls_md() in the x509write module.
|