/external/chromium_org/third_party/boringssl/src/crypto/digest/ |
digest.c | 93 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data) { 94 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size); 137 if (in->md_data && in->digest->ctx_size) { 141 out->md_data = OPENSSL_malloc(in->digest->ctx_size); 147 memcpy(out->md_data, in->md_data, in->digest->ctx_size); 169 if (ctx->digest && ctx->digest->ctx_size) { 173 if (!(ctx->flags & EVP_MD_CTX_FLAG_NO_INIT) && type->ctx_size) { 175 ctx->md_data = OPENSSL_malloc(type->ctx_size); 214 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size);
|
internal.h | 91 /* ctx_size contains the size, in bytes, of the state of the hash function. */ 92 unsigned ctx_size; member in struct:env_md_st
|
/external/openssl/crypto/evp/ |
digest.c | 204 if (ctx->digest && ctx->digest->ctx_size) 207 if (!(ctx->flags & EVP_MD_CTX_FLAG_NO_INIT) && type->ctx_size) 210 ctx->md_data=OPENSSL_malloc(type->ctx_size); 280 memset(ctx->md_data,0,ctx->digest->ctx_size); 317 if (in->md_data && out->digest->ctx_size) 323 out->md_data=OPENSSL_malloc(out->digest->ctx_size); 330 memcpy(out->md_data,in->md_data,out->digest->ctx_size); 386 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data 389 OPENSSL_cleanse(ctx->md_data,ctx->digest->ctx_size);
|
evp_enc.c | 178 if (ctx->cipher->ctx_size) 180 ctx->cipher_data=OPENSSL_malloc(ctx->cipher->ctx_size); 585 OPENSSL_cleanse(c->cipher_data, c->cipher->ctx_size); 673 if (in->cipher_data && in->cipher->ctx_size) 675 out->cipher_data=OPENSSL_malloc(in->cipher->ctx_size); 681 memcpy(out->cipher_data,in->cipher_data,in->cipher->ctx_size);
|
evp.h | 180 int ctx_size; /* how big does the ctx->md_data need to be */ member in struct:env_md_st 315 int ctx_size; /* how big ctx->cipher_data needs to be */ member in struct:evp_cipher_st [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
cipher.c | 110 OPENSSL_cleanse(c->cipher_data, c->cipher->ctx_size); 134 if (in->cipher_data && in->cipher->ctx_size) { 135 out->cipher_data = OPENSSL_malloc(in->cipher->ctx_size); 140 memcpy(out->cipher_data, in->cipher_data, in->cipher->ctx_size); 173 if (ctx->cipher->ctx_size) { 174 ctx->cipher_data = OPENSSL_malloc(ctx->cipher->ctx_size);
|
internal.h | 84 /* ctx_size contains the size, in bytes, of the per-key context for this 86 unsigned ctx_size; member in struct:evp_cipher_st
|
e_null.c | 79 0 /* ctx_size */, 0 /* flags */, NULL /* app_data */, null_init_key,
|
/external/openssl/include/openssl/ |
evp.h | 180 int ctx_size; /* how big does the ctx->md_data need to be */ member in struct:env_md_st 315 int ctx_size; /* how big ctx->cipher_data needs to be */ member in struct:evp_cipher_st [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/lib2to3/tests/data/ |
infinite_recursion.py | 654 ('ctx_size', c_int), 681 ('ctx_size', c_int), [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/lib2to3/tests/data/ |
infinite_recursion.py | 654 ('ctx_size', c_int), 681 ('ctx_size', c_int), [all...] |