/external/chromium_org/third_party/boringssl/src/crypto/digest/ |
H A D | digests.c | 67 static int md4_init(EVP_MD_CTX *ctx) { return MD4_Init(ctx->md_data); } 70 return MD4_Update(ctx->md_data, data, count); 74 return MD4_Final(out, ctx->md_data); 85 static int md5_init(EVP_MD_CTX *ctx) { return MD5_Init(ctx->md_data); } 88 return MD5_Update(ctx->md_data, data, count); 92 return MD5_Final(out, ctx->md_data); 103 static int sha1_init(EVP_MD_CTX *ctx) { return SHA1_Init(ctx->md_data); } 106 return SHA1_Update(ctx->md_data, data, count); 110 return SHA1_Final(md, ctx->md_data); 121 static int sha224_init(EVP_MD_CTX *ctx) { return SHA224_Init(ctx->md_data); } [all...] |
H A D | digest.c | 93 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data) { 94 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size); 95 OPENSSL_free(ctx->md_data); 127 /* |md_data| will be the correct size in this case so it's removed from 130 tmp_buf = out->md_data; 131 out->md_data = NULL; 137 if (in->md_data && in->digest->ctx_size) { 139 out->md_data = tmp_buf; 141 out->md_data = OPENSSL_malloc(in->digest->ctx_size); 142 if (!out->md_data) { [all...] |
/external/openssl/crypto/evp/ |
H A D | m_ecdsa.c | 122 { return SHA1_Init(ctx->md_data); } 125 { return SHA1_Update(ctx->md_data,data,count); } 128 { return SHA1_Final(md,ctx->md_data); }
|
H A D | m_wp.c | 15 { return WHIRLPOOL_Init(ctx->md_data); } 18 { return WHIRLPOOL_Update(ctx->md_data,data,count); } 21 { return WHIRLPOOL_Final(md,ctx->md_data); }
|
H A D | m_sha1.c | 75 { return SHA1_Init(ctx->md_data); } 78 { return SHA1_Update(ctx->md_data,data,count); } 81 { return SHA1_Final(md,ctx->md_data); } 107 { return SHA224_Init(ctx->md_data); } 109 { return SHA256_Init(ctx->md_data); } 116 { return SHA256_Update(ctx->md_data,data,count); } 118 { return SHA256_Final(md,ctx->md_data); } 161 { return SHA384_Init(ctx->md_data); } 163 { return SHA512_Init(ctx->md_data); } 166 { return SHA512_Update(ctx->md_data,dat [all...] |
H A D | openbsd_hw.c | 282 static int dev_crypto_init_digest(MD_DATA *md_data,int mac) 284 if(!dev_crypto_init(&md_data->sess)) 287 md_data->len=0; 288 md_data->data=NULL; 290 md_data->sess.mac=mac; 292 if (ioctl(fd,CIOCGSESSION,&md_data->sess) == -1) 300 static int dev_crypto_cleanup_digest(MD_DATA *md_data) 302 if (ioctl(fd,CIOCFSESSION,&md_data->sess.ses) == -1) 314 { return dev_crypto_init_digest(ctx->md_data,CRYPTO_MD5); } 374 MD_DATA *md_data [all...] |
H A D | m_dss.c | 72 { return SHA1_Init(ctx->md_data); } 75 { return SHA1_Update(ctx->md_data,data,count); } 78 { return SHA1_Final(md,ctx->md_data); }
|
H A D | m_dss1.c | 74 { return SHA1_Init(ctx->md_data); } 77 { return SHA1_Update(ctx->md_data,data,count); } 80 { return SHA1_Final(md,ctx->md_data); }
|
H A D | m_md4.c | 75 { return MD4_Init(ctx->md_data); } 78 { return MD4_Update(ctx->md_data,data,count); } 81 { return MD4_Final(md,ctx->md_data); }
|
H A D | m_md5.c | 74 { return MD5_Init(ctx->md_data); } 77 { return MD5_Update(ctx->md_data,data,count); } 80 { return MD5_Final(md,ctx->md_data); }
|
H A D | m_mdc2.c | 75 { return MDC2_Init(ctx->md_data); } 78 { return MDC2_Update(ctx->md_data,data,count); } 81 { return MDC2_Final(md,ctx->md_data); }
|
H A D | m_ripemd.c | 74 { return RIPEMD160_Init(ctx->md_data); } 77 { return RIPEMD160_Update(ctx->md_data,data,count); } 80 { return RIPEMD160_Final(md,ctx->md_data); }
|
H A D | digest.c | 205 OPENSSL_free(ctx->md_data); 210 ctx->md_data=OPENSSL_malloc(type->ctx_size); 211 if (ctx->md_data == NULL) 237 OPENSSL_free(ctx->md_data); 238 ctx->md_data = NULL; 280 memset(ctx->md_data,0,ctx->digest->ctx_size); 310 tmp_buf = out->md_data; 317 if (in->md_data && out->digest->ctx_size) 320 out->md_data = tmp_buf; 323 out->md_data [all...] |
H A D | bio_ok.c | 494 RAND_pseudo_bytes(md->md_data, md->digest->md_size); 495 memcpy(&(ctx->buf[ctx->buf_len]), md->md_data, md->digest->md_size); 526 memcpy(md->md_data, &(ctx->buf[ctx->buf_off]), md->digest->md_size); 527 longswap(md->md_data, md->digest->md_size);
|
H A D | evp.h | 180 int ctx_size; /* how big does the ctx->md_data need to be */ 270 void *md_data; member in struct:env_md_ctx_st 283 #define EVP_MD_CTX_FLAG_REUSE 0x0004 /* Don't free up ctx->md_data 301 #define EVP_MD_CTX_FLAG_NO_INIT 0x0100 /* Don't initialize md_data */
|
/external/openssl/crypto/mdc2/ |
H A D | mdc2test.c | 125 ((MDC2_CTX *)c.md_data)->pad_type=2;
|
/external/openssl/crypto/engine/ |
H A D | eng_openssl.c | 314 return SHA1_Init(ctx->md_data); 321 return SHA1_Update(ctx->md_data,data,count); 328 return SHA1_Final(md,ctx->md_data);
|
H A D | eng_cryptodev.c | 677 struct dev_crypto_state *state = ctx->md_data; 711 struct dev_crypto_state *state = ctx->md_data; 757 struct dev_crypto_state *state = ctx->md_data; 793 struct dev_crypto_state *state = ctx->md_data; 824 struct dev_crypto_state *fstate = from->md_data; 825 struct dev_crypto_state *dstate = to->md_data;
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | digest.h | 247 /* md_data points to a block of memory that contains the hash-specific 249 void *md_data; member in struct:env_md_ctx_st 265 * |EVP_DigestInit_ex| and for |md_data| not to be initialised. */
|
H A D | pem.h | 187 int md_len; /* length of md_data */ 188 char *md_data; /* message digest, could be pkey encrypted */ member in struct:pem_ctx_st
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 710 unsigned char md_data[EVP_MAX_MD_SIZE]; local 725 if (!EVP_DigestFinal_ex(mctx, md_data,&md_len)) 730 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) 871 unsigned char md_data[EVP_MAX_MD_SIZE]; local 876 if (!EVP_DigestFinal_ex(mdc,md_data,&md_len)) 878 M_ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len);
|
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
H A D | sha2.c | 1068 #define data(ctx) ((SHA256_CTX *)(ctx)->md_data) 1087 #define data(ctx) ((SHA384_CTX *)(ctx)->md_data) 1106 #define data(ctx) ((SHA512_CTX *)(ctx)->md_data)
|
/external/openssl/crypto/pem/ |
H A D | pem.h | 192 int md_len; /* length of md_data */ 193 char *md_data; /* message digest, could be pkey encrypted */ member in struct:pem_ctx_st
|
/external/openssl/include/openssl/ |
H A D | pem.h | 192 int md_len; /* length of md_data */ 193 char *md_data; /* message digest, could be pkey encrypted */ member in struct:pem_ctx_st
|
H A D | evp.h | 180 int ctx_size; /* how big does the ctx->md_data need to be */ 270 void *md_data; member in struct:env_md_ctx_st 283 #define EVP_MD_CTX_FLAG_REUSE 0x0004 /* Don't free up ctx->md_data 301 #define EVP_MD_CTX_FLAG_NO_INIT 0x0100 /* Don't initialize md_data */
|