/external/openssl/crypto/evp/ |
m_ecdsa.c | 122 { return SHA1_Init(ctx->md_data); } 125 { return SHA1_Update(ctx->md_data,data,count); } 128 { return SHA1_Final(md,ctx->md_data); }
|
m_wp.c | 15 { return WHIRLPOOL_Init(ctx->md_data); } 18 { return WHIRLPOOL_Update(ctx->md_data,data,count); } 21 { return WHIRLPOOL_Final(md,ctx->md_data); }
|
m_sha1.c | 75 { return SHA1_Init(ctx->md_data); } 78 { return SHA1_Update(ctx->md_data,data,count); } 81 { return SHA1_Final(md,ctx->md_data); } 107 { return SHA224_Init(ctx->md_data); } 109 { return SHA256_Init(ctx->md_data); } 116 { return SHA256_Update(ctx->md_data,data,count); } 118 { return SHA256_Final(md,ctx->md_data); } 161 { return SHA384_Init(ctx->md_data); } 163 { return SHA512_Init(ctx->md_data); } 166 { return SHA512_Update(ctx->md_data,data,count); [all...] |
openbsd_hw.c | 280 } MD_DATA; 282 static int dev_crypto_init_digest(MD_DATA *md_data,int mac) 284 if(!dev_crypto_init(&md_data->sess)) 287 md_data->len=0; 288 md_data->data=NULL; 290 md_data->sess.mac=mac; 292 if (ioctl(fd,CIOCGSESSION,&md_data->sess) == -1) 300 static int dev_crypto_cleanup_digest(MD_DATA *md_data) [all...] |
m_dss.c | 72 { return SHA1_Init(ctx->md_data); } 75 { return SHA1_Update(ctx->md_data,data,count); } 78 { return SHA1_Final(md,ctx->md_data); }
|
m_dss1.c | 74 { return SHA1_Init(ctx->md_data); } 77 { return SHA1_Update(ctx->md_data,data,count); } 80 { return SHA1_Final(md,ctx->md_data); }
|
m_md4.c | 75 { return MD4_Init(ctx->md_data); } 78 { return MD4_Update(ctx->md_data,data,count); } 81 { return MD4_Final(md,ctx->md_data); }
|
m_md5.c | 74 { return MD5_Init(ctx->md_data); } 77 { return MD5_Update(ctx->md_data,data,count); } 80 { return MD5_Final(md,ctx->md_data); }
|
m_mdc2.c | 75 { return MDC2_Init(ctx->md_data); } 78 { return MDC2_Update(ctx->md_data,data,count); } 81 { return MDC2_Final(md,ctx->md_data); }
|
m_ripemd.c | 74 { return RIPEMD160_Init(ctx->md_data); } 77 { return RIPEMD160_Update(ctx->md_data,data,count); } 80 { return RIPEMD160_Final(md,ctx->md_data); }
|
digest.c | 205 OPENSSL_free(ctx->md_data); 210 ctx->md_data=OPENSSL_malloc(type->ctx_size); 211 if (ctx->md_data == NULL) 237 OPENSSL_free(ctx->md_data); 238 ctx->md_data = NULL; 279 memset(ctx->md_data,0,ctx->digest->ctx_size); 309 tmp_buf = out->md_data; 316 if (in->md_data && out->digest->ctx_size) 319 out->md_data = tmp_buf; 322 out->md_data=OPENSSL_malloc(out->digest->ctx_size) [all...] |
bio_ok.c | 494 RAND_pseudo_bytes(md->md_data, md->digest->md_size); 495 memcpy(&(ctx->buf[ctx->buf_len]), md->md_data, md->digest->md_size); 526 memcpy(md->md_data, &(ctx->buf[ctx->buf_off]), md->digest->md_size); 527 longswap(md->md_data, md->digest->md_size);
|
evp.h | 180 int ctx_size; /* how big does the ctx->md_data need to be */ 270 void *md_data; member in struct:env_md_ctx_st 283 #define EVP_MD_CTX_FLAG_REUSE 0x0004 /* Don't free up ctx->md_data 301 #define EVP_MD_CTX_FLAG_NO_INIT 0x0100 /* Don't initialize md_data */ [all...] |
/external/openssh/ |
md-sha256.c | 42 SHA256_Init(ctxt->md_data); 49 SHA256_Update(ctxt->md_data, data, len); 56 SHA256_Final(digest, ctxt->md_data); 63 memset(ctxt->md_data, 0, sizeof(SHA256_CTX));
|
/external/openssl/crypto/mdc2/ |
mdc2test.c | 125 ((MDC2_CTX *)c.md_data)->pad_type=2;
|
/external/openssl/crypto/engine/ |
eng_openssl.c | 314 return SHA1_Init(ctx->md_data); 321 return SHA1_Update(ctx->md_data,data,count); 328 return SHA1_Final(md,ctx->md_data);
|
eng_cryptodev.c | 677 struct dev_crypto_state *state = ctx->md_data; 711 struct dev_crypto_state *state = ctx->md_data; 757 struct dev_crypto_state *state = ctx->md_data; 793 struct dev_crypto_state *state = ctx->md_data; 824 struct dev_crypto_state *fstate = from->md_data; 825 struct dev_crypto_state *dstate = to->md_data; [all...] |
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 705 unsigned char md_data[EVP_MAX_MD_SIZE]; local 720 if (!EVP_DigestFinal_ex(mctx, md_data,&md_len)) 725 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) 866 unsigned char md_data[EVP_MAX_MD_SIZE]; local 871 if (!EVP_DigestFinal_ex(mdc,md_data,&md_len)) 873 M_ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len);
|
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
sha2.c | 1068 #define data(ctx) ((SHA256_CTX *)(ctx)->md_data) 1087 #define data(ctx) ((SHA384_CTX *)(ctx)->md_data) 1106 #define data(ctx) ((SHA512_CTX *)(ctx)->md_data) [all...] |
/external/openssl/crypto/pem/ |
pem.h | 192 int md_len; /* length of md_data */ 193 char *md_data; /* message digest, could be pkey encrypted */ member in struct:pem_ctx_st
|
/external/openssl/include/openssl/ |
pem.h | 192 int md_len; /* length of md_data */ 193 char *md_data; /* message digest, could be pkey encrypted */ member in struct:pem_ctx_st
|
evp.h | 180 int ctx_size; /* how big does the ctx->md_data need to be */ 270 void *md_data; member in struct:env_md_ctx_st 283 #define EVP_MD_CTX_FLAG_REUSE 0x0004 /* Don't free up ctx->md_data 301 #define EVP_MD_CTX_FLAG_NO_INIT 0x0100 /* Don't initialize md_data */ [all...] |