/external/chromium_org/third_party/boringssl/src/crypto/digest/ |
digests.c | 67 static int md4_init(EVP_MD_CTX *ctx) { return MD4_Init(ctx->md_data); } 70 return MD4_Update(ctx->md_data, data, count); 74 return MD4_Final(out, ctx->md_data); 85 static int md5_init(EVP_MD_CTX *ctx) { return MD5_Init(ctx->md_data); } 88 return MD5_Update(ctx->md_data, data, count); 92 return MD5_Final(out, ctx->md_data); 103 static int sha1_init(EVP_MD_CTX *ctx) { return SHA1_Init(ctx->md_data); } 106 return SHA1_Update(ctx->md_data, data, count); 110 return SHA1_Final(md, ctx->md_data); 121 static int sha224_init(EVP_MD_CTX *ctx) { return SHA224_Init(ctx->md_data); } [all...] |
digest.c | 93 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data) { 94 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size); 95 OPENSSL_free(ctx->md_data); 127 /* |md_data| will be the correct size in this case so it's removed from 130 tmp_buf = out->md_data; 131 out->md_data = NULL; 137 if (in->md_data && in->digest->ctx_size) { 139 out->md_data = tmp_buf; 141 out->md_data = OPENSSL_malloc(in->digest->ctx_size); 142 if (!out->md_data) { [all...] |
/external/openssl/crypto/evp/ |
m_ecdsa.c | 122 { return SHA1_Init(ctx->md_data); } 125 { return SHA1_Update(ctx->md_data,data,count); } 128 { return SHA1_Final(md,ctx->md_data); }
|
m_wp.c | 15 { return WHIRLPOOL_Init(ctx->md_data); } 18 { return WHIRLPOOL_Update(ctx->md_data,data,count); } 21 { return WHIRLPOOL_Final(md,ctx->md_data); }
|
m_sha1.c | 75 { return SHA1_Init(ctx->md_data); } 78 { return SHA1_Update(ctx->md_data,data,count); } 81 { return SHA1_Final(md,ctx->md_data); } 107 { return SHA224_Init(ctx->md_data); } 109 { return SHA256_Init(ctx->md_data); } 116 { return SHA256_Update(ctx->md_data,data,count); } 118 { return SHA256_Final(md,ctx->md_data); } 161 { return SHA384_Init(ctx->md_data); } 163 { return SHA512_Init(ctx->md_data); } 166 { return SHA512_Update(ctx->md_data,data,count); [all...] |
openbsd_hw.c | 280 } MD_DATA; 282 static int dev_crypto_init_digest(MD_DATA *md_data,int mac) 284 if(!dev_crypto_init(&md_data->sess)) 287 md_data->len=0; 288 md_data->data=NULL; 290 md_data->sess.mac=mac; 292 if (ioctl(fd,CIOCGSESSION,&md_data->sess) == -1) 300 static int dev_crypto_cleanup_digest(MD_DATA *md_data) [all...] |
m_dss.c | 72 { return SHA1_Init(ctx->md_data); } 75 { return SHA1_Update(ctx->md_data,data,count); } 78 { return SHA1_Final(md,ctx->md_data); }
|
m_dss1.c | 74 { return SHA1_Init(ctx->md_data); } 77 { return SHA1_Update(ctx->md_data,data,count); } 80 { return SHA1_Final(md,ctx->md_data); }
|
m_md4.c | 75 { return MD4_Init(ctx->md_data); } 78 { return MD4_Update(ctx->md_data,data,count); } 81 { return MD4_Final(md,ctx->md_data); }
|
m_md5.c | 74 { return MD5_Init(ctx->md_data); } 77 { return MD5_Update(ctx->md_data,data,count); } 80 { return MD5_Final(md,ctx->md_data); }
|
m_mdc2.c | 75 { return MDC2_Init(ctx->md_data); } 78 { return MDC2_Update(ctx->md_data,data,count); } 81 { return MDC2_Final(md,ctx->md_data); }
|
m_ripemd.c | 74 { return RIPEMD160_Init(ctx->md_data); } 77 { return RIPEMD160_Update(ctx->md_data,data,count); } 80 { return RIPEMD160_Final(md,ctx->md_data); }
|
digest.c | 205 OPENSSL_free(ctx->md_data); 210 ctx->md_data=OPENSSL_malloc(type->ctx_size); 211 if (ctx->md_data == NULL) 237 OPENSSL_free(ctx->md_data); 238 ctx->md_data = NULL; 280 memset(ctx->md_data,0,ctx->digest->ctx_size); 310 tmp_buf = out->md_data; 317 if (in->md_data && out->digest->ctx_size) 320 out->md_data = tmp_buf; 323 out->md_data=OPENSSL_malloc(out->digest->ctx_size) [all...] |
bio_ok.c | 494 RAND_pseudo_bytes(md->md_data, md->digest->md_size); 495 memcpy(&(ctx->buf[ctx->buf_len]), md->md_data, md->digest->md_size); 526 memcpy(md->md_data, &(ctx->buf[ctx->buf_off]), md->digest->md_size); 527 longswap(md->md_data, md->digest->md_size);
|
evp.h | 180 int ctx_size; /* how big does the ctx->md_data need to be */ 270 void *md_data; member in struct:env_md_ctx_st 283 #define EVP_MD_CTX_FLAG_REUSE 0x0004 /* Don't free up ctx->md_data 301 #define EVP_MD_CTX_FLAG_NO_INIT 0x0100 /* Don't initialize md_data */ [all...] |
/external/openssl/crypto/mdc2/ |
mdc2test.c | 125 ((MDC2_CTX *)c.md_data)->pad_type=2;
|
/external/openssl/crypto/engine/ |
eng_openssl.c | 314 return SHA1_Init(ctx->md_data); 321 return SHA1_Update(ctx->md_data,data,count); 328 return SHA1_Final(md,ctx->md_data);
|
eng_cryptodev.c | 677 struct dev_crypto_state *state = ctx->md_data; 711 struct dev_crypto_state *state = ctx->md_data; 757 struct dev_crypto_state *state = ctx->md_data; 793 struct dev_crypto_state *state = ctx->md_data; 824 struct dev_crypto_state *fstate = from->md_data; 825 struct dev_crypto_state *dstate = to->md_data; [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
digest.h | 247 /* md_data points to a block of memory that contains the hash-specific 249 void *md_data; member in struct:env_md_ctx_st 265 * |EVP_DigestInit_ex| and for |md_data| not to be initialised. */
|
pem.h | 187 int md_len; /* length of md_data */ 188 char *md_data; /* message digest, could be pkey encrypted */ member in struct:pem_ctx_st
|
/external/openssl/crypto/pkcs7/ |
pk7_doit.c | 710 unsigned char md_data[EVP_MAX_MD_SIZE]; local 725 if (!EVP_DigestFinal_ex(mctx, md_data,&md_len)) 730 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) 871 unsigned char md_data[EVP_MAX_MD_SIZE]; local 876 if (!EVP_DigestFinal_ex(mdc,md_data,&md_len)) 878 M_ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len);
|
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
sha2.c | 1068 #define data(ctx) ((SHA256_CTX *)(ctx)->md_data) 1087 #define data(ctx) ((SHA384_CTX *)(ctx)->md_data) 1106 #define data(ctx) ((SHA512_CTX *)(ctx)->md_data) [all...] |
/external/openssl/crypto/pem/ |
pem.h | 192 int md_len; /* length of md_data */ 193 char *md_data; /* message digest, could be pkey encrypted */ member in struct:pem_ctx_st
|
/external/openssl/include/openssl/ |
pem.h | 192 int md_len; /* length of md_data */ 193 char *md_data; /* message digest, could be pkey encrypted */ member in struct:pem_ctx_st
|
evp.h | 180 int ctx_size; /* how big does the ctx->md_data need to be */ 270 void *md_data; member in struct:env_md_ctx_st 283 #define EVP_MD_CTX_FLAG_REUSE 0x0004 /* Don't free up ctx->md_data 301 #define EVP_MD_CTX_FLAG_NO_INIT 0x0100 /* Don't initialize md_data */ [all...] |