/external/ppp/pppd/ |
H A D | openssl-hash.h | 31 int md_len; \ 32 EVP_DigestFinal_ex(ctx, digest, &md_len); \
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | openssldigest.cc | 51 unsigned int md_len; local 52 EVP_DigestFinal_ex(&ctx_, static_cast<unsigned char*>(buf), &md_len); 54 ASSERT(md_len == Size()); 55 return md_len;
|
/external/chromium_org/third_party/boringssl/src/crypto/hmac/ |
H A D | hmac_test.c | 111 static char *to_hex(const uint8_t *md, size_t md_len) { argument 115 for (i = 0; i < md_len; i++) {
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | sha.h | 163 unsigned int num, md_len; member in struct:sha256_state_st 229 unsigned int num, md_len; member in struct:sha512_state_st
|
H A D | pem.h | 187 int md_len; /* length of md_data */ member in struct:pem_ctx_st
|
/external/openssl/crypto/hmac/ |
H A D | hmac.h | 101 unsigned int *md_len);
|
H A D | hmac.c | 227 unsigned int *md_len) 238 if (!HMAC_Final(&c,md,md_len)) 225 HMAC(const EVP_MD *evp_md, const void *key, int key_len, const unsigned char *d, size_t n, unsigned char *md, unsigned int *md_len) argument
|
/external/openssl/include/openssl/ |
H A D | hmac.h | 101 unsigned int *md_len);
|
H A D | sha.h | 140 unsigned int num,md_len; member in struct:SHA256state_st 190 unsigned int num,md_len; member in struct:SHA512state_st
|
H A D | pem.h | 192 int md_len; /* length of md_data */ member in struct:pem_ctx_st
|
/external/openssl/crypto/sha/ |
H A D | sha.h | 140 unsigned int num,md_len; member in struct:SHA256state_st 190 unsigned int num,md_len; member in struct:SHA512state_st
|
H A D | sha256.c | 26 c->md_len=SHA224_DIGEST_LENGTH; 37 c->md_len=SHA256_DIGEST_LENGTH; 88 switch ((c)->md_len) \ 98 if ((c)->md_len > SHA256_DIGEST_LENGTH) \ 100 for (nn=0;nn<(c)->md_len/4;nn++) \
|
H A D | sha512.c | 74 c->num=0; c->md_len=SHA384_DIGEST_LENGTH; 90 c->num=0; c->md_len=SHA512_DIGEST_LENGTH; 137 switch (c->md_len) 170 /* ... as well as make sure md_len is not abused. */
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 711 unsigned int md_len; local 725 if (!EVP_DigestFinal_ex(mctx, md_data,&md_len)) 730 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) 872 unsigned int md_len; local 876 if (!EVP_DigestFinal_ex(mdc,md_data,&md_len)) 878 M_ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len); 1078 unsigned int md_len; local 1082 if (!EVP_DigestFinal_ex(&mdc_tmp,md_dat,&md_len)) 1091 if ((message_digest->length != (int)md_len) || 1092 (memcmp(message_digest->data,md_dat,md_len))) [all...] |
/external/chromium_org/third_party/boringssl/src/tool/ |
H A D | speed.cc | 227 unsigned int md_len; 231 EVP_DigestFinal_ex(ctx, digest, &md_len);
|
/external/chromium_org/third_party/boringssl/src/crypto/sha/ |
H A D | sha256.c | 79 sha->md_len = SHA224_DIGEST_LENGTH; 93 sha->md_len = SHA256_DIGEST_LENGTH; 151 switch ((c)->md_len) { \ 165 if ((c)->md_len > SHA256_DIGEST_LENGTH) \ 167 for (nn = 0; nn < (c)->md_len / 4; nn++) { \
|
H A D | sha512.c | 109 sha->md_len = SHA384_DIGEST_LENGTH; 127 sha->md_len = SHA512_DIGEST_LENGTH; 274 switch (sha->md_len) { 304 /* ... as well as make sure md_len is not abused. */
|
/external/openssl/crypto/pem/ |
H A D | pem.h | 192 int md_len; /* length of md_data */ member in struct:pem_ctx_st
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_clnt.c | 1501 size_t md_len = 0; local 1514 md_len += digest_len; 1516 if (!RSA_verify(NID_md5_sha1, md_buf, md_len,
|
/external/openssl/ssl/ |
H A D | s3_clnt.c | 3064 unsigned int md_len; local 3106 EVP_DigestFinal_ex(ukm_hash, shared_ukm, &md_len);
|