Home
last modified time | relevance | path

Searched refs:mbedtls_md_update (Results 1 – 9 of 9) sorted by relevance

/third_party/mbedtls/library/
Dmd.c463 int mbedtls_md_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen ) in mbedtls_md_update() function
608 if( ( ret = mbedtls_md_update( &ctx, buf, n ) ) != 0 ) in mbedtls_md_file()
639 if( ( ret = mbedtls_md_update( ctx, key, keylen ) ) != 0 ) in mbedtls_md_hmac_starts()
662 if( ( ret = mbedtls_md_update( ctx, ipad, in mbedtls_md_hmac_starts()
677 return( mbedtls_md_update( ctx, input, ilen ) ); in mbedtls_md_hmac_update()
695 if( ( ret = mbedtls_md_update( ctx, opad, in mbedtls_md_hmac_finish()
698 if( ( ret = mbedtls_md_update( ctx, tmp, in mbedtls_md_hmac_finish()
716 return( mbedtls_md_update( ctx, ipad, ctx->md_info->block_size ) ); in mbedtls_md_hmac_reset()
Dconstant_time.c489 MD_CHK( mbedtls_md_update( ctx, add_data, add_data_len ) ); in mbedtls_ct_hmac()
490 MD_CHK( mbedtls_md_update( ctx, data, min_data_len ) ); in mbedtls_ct_hmac()
502 MD_CHK( mbedtls_md_update( ctx, data + offset, 1 ) ); in mbedtls_ct_hmac()
510 MD_CHK( mbedtls_md_update( ctx, okey, block_size ) ); in mbedtls_ct_hmac()
511 MD_CHK( mbedtls_md_update( ctx, output, hash_size ) ); in mbedtls_ct_hmac()
Dpkcs12.c280 if( ( ret = mbedtls_md_update( &md_ctx, diversifier, v ) ) != 0 ) in mbedtls_pkcs12_derivation()
285 if( ( ret = mbedtls_md_update( &md_ctx, salt_block, v )) != 0 ) in mbedtls_pkcs12_derivation()
291 if( ( ret = mbedtls_md_update( &md_ctx, pwd_block, v )) != 0 ) in mbedtls_pkcs12_derivation()
Drsa.c1127 if( ( ret = mbedtls_md_update( md_ctx, src, slen ) ) != 0 ) in mgf_mask()
1129 if( ( ret = mbedtls_md_update( md_ctx, counter, 4 ) ) != 0 ) in mgf_mask()
1637 if( ( ret = mbedtls_md_update( &md_ctx, p, 8 ) ) != 0 ) in rsa_rsassa_pss_sign()
1639 if( ( ret = mbedtls_md_update( &md_ctx, hash, hashlen ) ) != 0 ) in rsa_rsassa_pss_sign()
1641 if( ( ret = mbedtls_md_update( &md_ctx, salt, slen ) ) != 0 ) in rsa_rsassa_pss_sign()
2063 ret = mbedtls_md_update( &md_ctx, zeros, 8 ); in mbedtls_rsa_rsassa_pss_verify_ext()
2066 ret = mbedtls_md_update( &md_ctx, hash, hashlen ); in mbedtls_rsa_rsassa_pss_verify_ext()
2069 ret = mbedtls_md_update( &md_ctx, p, observed_salt_len ); in mbedtls_rsa_rsassa_pss_verify_ext()
Dssl_tls.c7061 if( ( ret = mbedtls_md_update( &ctx, ssl->handshake->randbytes, 64 ) ) != 0 ) in mbedtls_ssl_get_key_exchange_md_tls1_2()
7066 if( ( ret = mbedtls_md_update( &ctx, data, data_len ) ) != 0 ) in mbedtls_ssl_get_key_exchange_md_tls1_2()
/third_party/mbedtls/tests/suites/
Dtest_suite_md.function63 TEST_ASSERT( mbedtls_md_update( NULL, buf, 1 ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
64 TEST_ASSERT( mbedtls_md_update( &ctx, buf, 1 ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
208 TEST_ASSERT ( 0 == mbedtls_md_update( &ctx, src_str, halfway ) );
211 TEST_ASSERT ( 0 == mbedtls_md_update( &ctx, src_str + halfway, len - halfway ) );
220 TEST_ASSERT ( 0 == mbedtls_md_update( &ctx_copy, src_str + halfway, len - halfway ) );
257 TEST_ASSERT ( 0 == mbedtls_md_update( &ctx, src_str->x, halfway ) );
260 TEST_ASSERT ( 0 == mbedtls_md_update( &ctx, src_str->x + halfway, src_str->len - halfway) );
269 … TEST_ASSERT ( 0 == mbedtls_md_update( &ctx_copy, src_str->x + halfway, src_str->len - halfway ) );
Dtest_suite_entropy.function486 TEST_ASSERT( mbedtls_md_update( &accumulator, header, 2 ) == 0 );
487 TEST_ASSERT( mbedtls_md_update( &accumulator,
492 TEST_ASSERT( mbedtls_md_update( &accumulator,
500 TEST_ASSERT( mbedtls_md_update( &accumulator, header, 2 ) == 0 );
501 TEST_ASSERT( mbedtls_md_update( &accumulator,
505 TEST_ASSERT( mbedtls_md_update( &accumulator, header, 2 ) == 0 );
506 TEST_ASSERT( mbedtls_md_update( &accumulator,
/third_party/mbedtls/programs/aes/
Dcrypt_and_hash.c285 if( mbedtls_md_update( &md_ctx, buffer, 8 ) != 0 ) in main()
290 if( mbedtls_md_update( &md_ctx, ( unsigned char * ) p, strlen( p ) ) in main()
328 if( mbedtls_md_update( &md_ctx, digest, 32 ) != 0 ) in main()
334 if( mbedtls_md_update( &md_ctx, key, keylen ) != 0 ) in main()
505 if( mbedtls_md_update( &md_ctx, digest, 32 ) != 0 ) in main()
510 if( mbedtls_md_update( &md_ctx, key, keylen ) != 0 ) in main()
/third_party/mbedtls/include/mbedtls/
Dmd.h281 int mbedtls_md_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen );