/netbsd/crypto/external/bsd/openssl/dist/providers/implementations/rands/ |
H A D | drbg_hmac.c | 66 || !EVP_MAC_update(ctx, hmac->V, hmac->blocklen) in do_hmac() 67 || !EVP_MAC_update(ctx, &inbyte, 1) in do_hmac() 68 || !(in1 == NULL || in1len == 0 || EVP_MAC_update(ctx, in1, in1len)) in do_hmac() 69 || !(in2 == NULL || in2len == 0 || EVP_MAC_update(ctx, in2, in2len)) in do_hmac() 70 || !(in3 == NULL || in3len == 0 || EVP_MAC_update(ctx, in3, in3len)) in do_hmac() 76 && EVP_MAC_update(ctx, hmac->V, hmac->blocklen) in do_hmac() 217 || !EVP_MAC_update(ctx, temp, hmac->blocklen)) in drbg_hmac_generate()
|
/netbsd/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/ |
H A D | kbkdf.c | 186 if (mode == FEEDBACK && !EVP_MAC_update(ctx, k_i, k_i_len)) in derive() 189 if (!EVP_MAC_update(ctx, (unsigned char *)&i, 4) in derive() 190 || !EVP_MAC_update(ctx, label, label_len) in derive() 191 || (has_separator && !EVP_MAC_update(ctx, &zero, 1)) in derive() 192 || !EVP_MAC_update(ctx, context, context_len) in derive() 193 || (has_l && !EVP_MAC_update(ctx, (unsigned char *)&l, 4)) in derive()
|
H A D | tls1_prf.c | 307 if (seed != NULL && !EVP_MAC_update(ctx_Ai, seed, seed_len)) in tls1_prf_P_hash() 321 if (!EVP_MAC_update(ctx, Ai, Ai_len)) in tls1_prf_P_hash() 329 if (seed != NULL && !EVP_MAC_update(ctx, seed, seed_len)) in tls1_prf_P_hash()
|
H A D | sskdf.c | 255 && EVP_MAC_update(ctx, c, sizeof(c)) in SSKDF_mac_kdm() 256 && EVP_MAC_update(ctx, z, z_len) in SSKDF_mac_kdm() 257 && EVP_MAC_update(ctx, info, info_len))) in SSKDF_mac_kdm()
|
/netbsd/crypto/external/bsd/openssl/dist/test/ |
H A D | bad_dtls_test.c | 318 || !EVP_MAC_update(ctx, epoch, 2) in send_record() 319 || !EVP_MAC_update(ctx, seq, 6) in send_record() 320 || !EVP_MAC_update(ctx, &type, 1) in send_record() 321 || !EVP_MAC_update(ctx, ver, 2) /* Version */ in send_record() 322 || !EVP_MAC_update(ctx, lenbytes, 2) /* Length */ in send_record() 323 || !EVP_MAC_update(ctx, enc, len) /* Finally the data itself */ in send_record()
|
/netbsd/crypto/external/bsd/openssl/dist/crypto/modes/ |
H A D | siv128.c | 102 if (!EVP_MAC_update(mac_ctx, in, len - SIV_LEN)) in siv128_do_s2v_p() 106 if (!EVP_MAC_update(mac_ctx, t.byte, SIV_LEN)) in siv128_do_s2v_p() 114 if (!EVP_MAC_update(mac_ctx, t.byte, SIV_LEN)) in siv128_do_s2v_p() 201 || !EVP_MAC_update(mac_ctx, zero, sizeof(zero)) in ossl_siv128_init() 256 || !EVP_MAC_update(mac_ctx, aad, len) in ossl_siv128_aad()
|
/netbsd/crypto/external/bsd/openssl/dist/doc/life-cycles/ |
H A D | mac.dot | 13 initialised -> updated [label="EVP_MAC_update"]; 14 updated -> updated [label="EVP_MAC_update"];
|
/netbsd/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | EVP_MAC.pod | 11 EVP_MAC_init, EVP_MAC_update, EVP_MAC_final, EVP_MAC_finalXOF, 52 int EVP_MAC_update(EVP_MAC_CTX *ctx, const unsigned char *data, size_t datalen); 149 EVP_MAC_init() should be called before EVP_MAC_update() and EVP_MAC_final(). 151 EVP_MAC_update() adds I<datalen> bytes from I<data> to the MAC input. 322 When used EVP_MAC_update must be called precisely twice. The first time with 326 B<datalen> parameter to EVP_MAC_update() should be equal to the length of the 332 EVP_MAC_init(), EVP_MAC_update() and EVP_MAC_final() for a full 375 EVP_MAC_init(), EVP_MAC_update(), EVP_MAC_final(), and EVP_MAC_finalXOF() 430 if (!EVP_MAC_update(ctx, buf, read_l))
|
H A D | HMAC.pod | 79 L<EVP_MAC_init(3)>, L<EVP_MAC_update(3)> and L<EVP_MAC_final(3)>
|
/netbsd/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | mac_lib.c | 124 int EVP_MAC_update(EVP_MAC_CTX *ctx, const unsigned char *data, size_t datalen) in EVP_MAC_update() function 285 && EVP_MAC_update(ctx, data, datalen) in EVP_Q_mac()
|
/netbsd/crypto/external/bsd/openssl/dist/demos/mac/ |
H A D | gmac.c | 112 if (!EVP_MAC_update(mctx, data, sizeof(data))) { in main()
|
H A D | siphash.c | 96 if (!EVP_MAC_update(mctx, data, sizeof(data))) { in main()
|
H A D | cmac-aes256.c | 109 if (!EVP_MAC_update(mctx, data, sizeof(data))) { in main()
|
H A D | hmac-sha512.c | 120 if (!EVP_MAC_update(mctx, data, sizeof(data))) { in main()
|
H A D | poly1305.c | 174 if (!EVP_MAC_update(mctx, test_m, sizeof(test_m))) { in main()
|
/netbsd/crypto/external/bsd/openssl/dist/doc/man7/ |
H A D | life_cycle-mac.pod | 66 | | EVP_MAC_update | EVP_MAC_init 99 EVP_MAC_update updated updated 136 <tr><th style="border:1px solid" align="left">EVP_MAC_update</th>
|
H A D | EVP_MAC-KMAC.pod | 128 if (!EVP_MAC_update(ctx, in, in_len))
|
H A D | provider-mac.pod | 48 L<EVP_MAC_update(3)> and L<EVP_MAC_final(3)>.
|
/netbsd/crypto/external/bsd/openssl/dist/apps/ |
H A D | mac.c | 195 if (!EVP_MAC_update(ctx, buf, i)) { in mac_main()
|
H A D | fipsinstall.c | 89 if (i < 0 || !EVP_MAC_update(ctx, tmp, i)) in do_mac()
|
H A D | speed.c | 599 || !EVP_MAC_update(mctx, buf, lengths[testnum]) in EVP_MAC_loop() 666 if (!EVP_MAC_update(mctx, buf, lengths[testnum])) in GHASH_loop()
|
/netbsd/external/bsd/nsd/dist/ |
H A D | tsig-openssl.c | 266 if(EVP_MAC_update(c->hmac_ctx, data, size) <= 0) { in update()
|
/netbsd/crypto/external/bsd/openssl/dist/providers/implementations/signature/ |
H A D | mac_legacy_sig.c | 150 return EVP_MAC_update(pmacctx->macctx, data, datalen); in mac_digest_sign_update()
|
/netbsd/crypto/external/bsd/openssl/dist/providers/fips/ |
H A D | self_test.c | 212 if (!EVP_MAC_update(ctx, buf, bytes_read)) in verify_integrity()
|
/netbsd/crypto/external/bsd/openssl/dist/include/openssl/ |
H A D | evp.h | 1222 int EVP_MAC_update(EVP_MAC_CTX *ctx, const unsigned char *data, size_t datalen);
|