Searched refs:mbedtls_md_update (Results 1 – 9 of 9) sorted by relevance
/third_party/mbedtls/library/ |
D | md.c | 463 int mbedtls_md_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen ) in mbedtls_md_update() function 608 if( ( ret = mbedtls_md_update( &ctx, buf, n ) ) != 0 ) in mbedtls_md_file() 639 if( ( ret = mbedtls_md_update( ctx, key, keylen ) ) != 0 ) in mbedtls_md_hmac_starts() 662 if( ( ret = mbedtls_md_update( ctx, ipad, in mbedtls_md_hmac_starts() 677 return( mbedtls_md_update( ctx, input, ilen ) ); in mbedtls_md_hmac_update() 695 if( ( ret = mbedtls_md_update( ctx, opad, in mbedtls_md_hmac_finish() 698 if( ( ret = mbedtls_md_update( ctx, tmp, in mbedtls_md_hmac_finish() 716 return( mbedtls_md_update( ctx, ipad, ctx->md_info->block_size ) ); in mbedtls_md_hmac_reset()
|
D | constant_time.c | 489 MD_CHK( mbedtls_md_update( ctx, add_data, add_data_len ) ); in mbedtls_ct_hmac() 490 MD_CHK( mbedtls_md_update( ctx, data, min_data_len ) ); in mbedtls_ct_hmac() 502 MD_CHK( mbedtls_md_update( ctx, data + offset, 1 ) ); in mbedtls_ct_hmac() 510 MD_CHK( mbedtls_md_update( ctx, okey, block_size ) ); in mbedtls_ct_hmac() 511 MD_CHK( mbedtls_md_update( ctx, output, hash_size ) ); in mbedtls_ct_hmac()
|
D | pkcs12.c | 280 if( ( ret = mbedtls_md_update( &md_ctx, diversifier, v ) ) != 0 ) in mbedtls_pkcs12_derivation() 285 if( ( ret = mbedtls_md_update( &md_ctx, salt_block, v )) != 0 ) in mbedtls_pkcs12_derivation() 291 if( ( ret = mbedtls_md_update( &md_ctx, pwd_block, v )) != 0 ) in mbedtls_pkcs12_derivation()
|
D | rsa.c | 1127 if( ( ret = mbedtls_md_update( md_ctx, src, slen ) ) != 0 ) in mgf_mask() 1129 if( ( ret = mbedtls_md_update( md_ctx, counter, 4 ) ) != 0 ) in mgf_mask() 1637 if( ( ret = mbedtls_md_update( &md_ctx, p, 8 ) ) != 0 ) in rsa_rsassa_pss_sign() 1639 if( ( ret = mbedtls_md_update( &md_ctx, hash, hashlen ) ) != 0 ) in rsa_rsassa_pss_sign() 1641 if( ( ret = mbedtls_md_update( &md_ctx, salt, slen ) ) != 0 ) in rsa_rsassa_pss_sign() 2063 ret = mbedtls_md_update( &md_ctx, zeros, 8 ); in mbedtls_rsa_rsassa_pss_verify_ext() 2066 ret = mbedtls_md_update( &md_ctx, hash, hashlen ); in mbedtls_rsa_rsassa_pss_verify_ext() 2069 ret = mbedtls_md_update( &md_ctx, p, observed_salt_len ); in mbedtls_rsa_rsassa_pss_verify_ext()
|
D | ssl_tls.c | 7061 if( ( ret = mbedtls_md_update( &ctx, ssl->handshake->randbytes, 64 ) ) != 0 ) in mbedtls_ssl_get_key_exchange_md_tls1_2() 7066 if( ( ret = mbedtls_md_update( &ctx, data, data_len ) ) != 0 ) in mbedtls_ssl_get_key_exchange_md_tls1_2()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_md.function | 63 TEST_ASSERT( mbedtls_md_update( NULL, buf, 1 ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA ); 64 TEST_ASSERT( mbedtls_md_update( &ctx, buf, 1 ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA ); 208 TEST_ASSERT ( 0 == mbedtls_md_update( &ctx, src_str, halfway ) ); 211 TEST_ASSERT ( 0 == mbedtls_md_update( &ctx, src_str + halfway, len - halfway ) ); 220 TEST_ASSERT ( 0 == mbedtls_md_update( &ctx_copy, src_str + halfway, len - halfway ) ); 257 TEST_ASSERT ( 0 == mbedtls_md_update( &ctx, src_str->x, halfway ) ); 260 TEST_ASSERT ( 0 == mbedtls_md_update( &ctx, src_str->x + halfway, src_str->len - halfway) ); 269 … TEST_ASSERT ( 0 == mbedtls_md_update( &ctx_copy, src_str->x + halfway, src_str->len - halfway ) );
|
D | test_suite_entropy.function | 486 TEST_ASSERT( mbedtls_md_update( &accumulator, header, 2 ) == 0 ); 487 TEST_ASSERT( mbedtls_md_update( &accumulator, 492 TEST_ASSERT( mbedtls_md_update( &accumulator, 500 TEST_ASSERT( mbedtls_md_update( &accumulator, header, 2 ) == 0 ); 501 TEST_ASSERT( mbedtls_md_update( &accumulator, 505 TEST_ASSERT( mbedtls_md_update( &accumulator, header, 2 ) == 0 ); 506 TEST_ASSERT( mbedtls_md_update( &accumulator,
|
/third_party/mbedtls/programs/aes/ |
D | crypt_and_hash.c | 285 if( mbedtls_md_update( &md_ctx, buffer, 8 ) != 0 ) in main() 290 if( mbedtls_md_update( &md_ctx, ( unsigned char * ) p, strlen( p ) ) in main() 328 if( mbedtls_md_update( &md_ctx, digest, 32 ) != 0 ) in main() 334 if( mbedtls_md_update( &md_ctx, key, keylen ) != 0 ) in main() 505 if( mbedtls_md_update( &md_ctx, digest, 32 ) != 0 ) in main() 510 if( mbedtls_md_update( &md_ctx, key, keylen ) != 0 ) in main()
|
/third_party/mbedtls/include/mbedtls/ |
D | md.h | 281 int mbedtls_md_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen );
|