HomeSort by relevance Sort by last modified time
    Searched refs:md_size (Results 1 - 25 of 28) sorted by null

1 2

  /external/chromium_org/third_party/openssl/openssl/ssl/
s3_cbc.c 235 /* ssl3_cbc_copy_mac copies |md_size| bytes from the end of |rec| to |out| in
243 * rec->orig_len >= md_size
244 * md_size <= EVP_MAX_MD_SIZE
256 unsigned md_size,unsigned orig_len)
267 unsigned mac_start = mac_end - md_size;
275 OPENSSL_assert(orig_len >= md_size);
276 OPENSSL_assert(md_size <= EVP_MAX_MD_SIZE);
283 if (orig_len > md_size + 255 + 1)
284 scan_start = orig_len - (md_size + 255 + 1);
285 /* div_spoiler contains a multiple of md_size that is used to cause th
452 unsigned md_size, md_block_size = 64; local
    [all...]
s2_lib.c 455 int md_size; local
472 md_size = EVP_MD_size(md5);
473 if (md_size < 0)
475 for (i=0; i<s->s2->key_material_length; i += md_size)
477 if (((km - s->s2->key_material) + md_size) >
496 km += md_size;
s3_enc.c 712 size_t md_size, orig_len; local
734 md_size=t;
735 npad=(48/md_size)*md_size;
738 orig_len = rec->length+md_size+((unsigned int)rec->type>>8);
758 memcpy(header+j, mac_sec, md_size);
759 j += md_size;
770 md, &md_size,
772 rec->length + md_size, orig_len,
773 mac_sec, md_size,
    [all...]
t1_enc.c 952 size_t md_size, orig_len; local
974 md_size=t;
1000 orig_len = rec->length+md_size+((unsigned int)rec->type>>8);
1019 md, &md_size,
1021 rec->length + md_size, orig_len,
1030 t=EVP_DigestSignFinal(mac_ctx,md,&md_size);
1045 {unsigned int z; for (z=0; z<md_size; z++) printf("%02X ",mac_sec[z]); printf("\n"); }
1064 {unsigned int z; for (z=0; z<md_size; z++) printf("%02X ",md[z]); printf("\n"); }
1066 return(md_size);
    [all...]
ssl_locl.h     [all...]
  /external/openssl/ssl/
s3_cbc.c 235 /* ssl3_cbc_copy_mac copies |md_size| bytes from the end of |rec| to |out| in
243 * rec->orig_len >= md_size
244 * md_size <= EVP_MAX_MD_SIZE
256 unsigned md_size,unsigned orig_len)
267 unsigned mac_start = mac_end - md_size;
275 OPENSSL_assert(orig_len >= md_size);
276 OPENSSL_assert(md_size <= EVP_MAX_MD_SIZE);
283 if (orig_len > md_size + 255 + 1)
284 scan_start = orig_len - (md_size + 255 + 1);
285 /* div_spoiler contains a multiple of md_size that is used to cause th
452 unsigned md_size, md_block_size = 64; local
    [all...]
s2_lib.c 455 int md_size; local
472 md_size = EVP_MD_size(md5);
473 if (md_size < 0)
475 for (i=0; i<s->s2->key_material_length; i += md_size)
477 if (((km - s->s2->key_material) + md_size) >
496 km += md_size;
s3_enc.c 712 size_t md_size, orig_len; local
734 md_size=t;
735 npad=(48/md_size)*md_size;
738 orig_len = rec->length+md_size+((unsigned int)rec->type>>8);
758 memcpy(header+j, mac_sec, md_size);
759 j += md_size;
770 md, &md_size,
772 rec->length + md_size, orig_len,
773 mac_sec, md_size,
    [all...]
t1_enc.c 952 size_t md_size, orig_len; local
974 md_size=t;
1000 orig_len = rec->length+md_size+((unsigned int)rec->type>>8);
1019 md, &md_size,
1021 rec->length + md_size, orig_len,
1030 t=EVP_DigestSignFinal(mac_ctx,md,&md_size);
1045 {unsigned int z; for (z=0; z<md_size; z++) printf("%02X ",mac_sec[z]); printf("\n"); }
1064 {unsigned int z; for (z=0; z<md_size; z++) printf("%02X ",md[z]); printf("\n"); }
1066 return(md_size);
    [all...]
ssl_locl.h     [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
bio_ok.c 487 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return 1;
494 RAND_pseudo_bytes(md->md_data, md->digest->md_size);
495 memcpy(&(ctx->buf[ctx->buf_len]), md->md_data, md->digest->md_size);
496 longswap(&(ctx->buf[ctx->buf_len]), md->digest->md_size);
497 ctx->buf_len+= md->digest->md_size;
503 ctx->buf_len+= md->digest->md_size;
522 if((int)(ctx->buf_len-ctx->buf_off) < 2*md->digest->md_size) return 1;
526 memcpy(md->md_data, &(ctx->buf[ctx->buf_off]), md->digest->md_size);
527 longswap(md->md_data, md->digest->md_size);
528 ctx->buf_off+= md->digest->md_size;
    [all...]
digest.c 271 OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE);
274 *size=ctx->digest->md_size;
bio_md.c 259 if (size < ctx->digest->md_size)
evp_lib.c 273 return md->md_size;
evp.h 164 int md_size; member in struct:env_md_st
    [all...]
  /external/openssl/crypto/evp/
bio_ok.c 487 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return 1;
494 RAND_pseudo_bytes(md->md_data, md->digest->md_size);
495 memcpy(&(ctx->buf[ctx->buf_len]), md->md_data, md->digest->md_size);
496 longswap(&(ctx->buf[ctx->buf_len]), md->digest->md_size);
497 ctx->buf_len+= md->digest->md_size;
503 ctx->buf_len+= md->digest->md_size;
522 if((int)(ctx->buf_len-ctx->buf_off) < 2*md->digest->md_size) return 1;
526 memcpy(md->md_data, &(ctx->buf[ctx->buf_off]), md->digest->md_size);
527 longswap(md->md_data, md->digest->md_size);
528 ctx->buf_off+= md->digest->md_size;
    [all...]
digest.c 271 OPENSSL_assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE);
274 *size=ctx->digest->md_size;
bio_md.c 259 if (size < ctx->digest->md_size)
evp_lib.c 273 return md->md_size;
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
p12_mutl.c 74 int md_size; local
91 md_size = EVP_MD_size(md_type);
92 if (md_size < 0)
95 md_size, key, md_type)) {
100 if (!HMAC_Init_ex(&hmac, key, md_size, md_type, NULL)
  /external/openssl/crypto/pkcs12/
p12_mutl.c 74 int md_size; local
91 md_size = EVP_MD_size(md_type);
92 if (md_size < 0)
95 md_size, key, md_type)) {
100 if (!HMAC_Init_ex(&hmac, key, md_size, md_type, NULL)
  /external/openssh/
md-sha256.c 74 ssh_sha256.md_size = SHA256_DIGEST_LENGTH;
  /external/wpa_supplicant_8/src/crypto/
tls_openssl.c 3092 int md_size; local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/engine/
eng_cryptodev.c 784 memcpy(md, state->digest_res, ctx->digest->md_size);
    [all...]
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
evp.h 164 int md_size; member in struct:env_md_st
    [all...]

Completed in 504 milliseconds

1 2