OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:EVP_MAX_MD_SIZE
(Results
1 - 25
of
31
) sorted by null
1
2
/external/boringssl/src/crypto/evp/
p_hmac_asn1.c
66
static int hmac_size(const EVP_PKEY *pkey) { return
EVP_MAX_MD_SIZE
; }
sign.c
79
uint8_t m[
EVP_MAX_MD_SIZE
];
125
uint8_t m[
EVP_MAX_MD_SIZE
];
digestsign.c
154
uint8_t md[
EVP_MAX_MD_SIZE
];
184
uint8_t md[
EVP_MAX_MD_SIZE
];
pbkdf.c
66
uint8_t digest_tmp[
EVP_MAX_MD_SIZE
], *p, itmp[4];
/external/boringssl/src/crypto/cipher/
derive_key.c
73
uint8_t md_buf[
EVP_MAX_MD_SIZE
];
152
OPENSSL_cleanse(md_buf,
EVP_MAX_MD_SIZE
);
tls_cbc.c
136
uint8_t rotated_mac_buf[64 +
EVP_MAX_MD_SIZE
];
139
uint8_t rotated_mac[
EVP_MAX_MD_SIZE
];
154
assert(md_size <=
EVP_MAX_MD_SIZE
);
294
uint8_t mac_out[
EVP_MAX_MD_SIZE
];
342
assert(md_size <=
EVP_MAX_MD_SIZE
);
e_tls.c
36
uint8_t mac_key[
EVP_MAX_MD_SIZE
];
43
OPENSSL_COMPILE_ASSERT(
EVP_MAX_MD_SIZE
< 256, mac_key_len_fits_in_uint8_t);
83
assert(mac_key_len <=
EVP_MAX_MD_SIZE
);
147
uint8_t mac[
EVP_MAX_MD_SIZE
];
306
uint8_t mac[
EVP_MAX_MD_SIZE
];
308
uint8_t record_mac_tmp[
EVP_MAX_MD_SIZE
];
e_ssl3.c
51
uint8_t tmp[
EVP_MAX_MD_SIZE
];
164
uint8_t mac[
EVP_MAX_MD_SIZE
];
287
uint8_t mac[
EVP_MAX_MD_SIZE
];
/external/boringssl/src/crypto/hkdf/
hkdf.c
31
uint8_t prk[
EVP_MAX_MD_SIZE
], previous[
EVP_MAX_MD_SIZE
];
/external/boringssl/src/include/openssl/
ssl3.h
361
uint8_t read_mac_secret[
EVP_MAX_MD_SIZE
];
364
uint8_t write_mac_secret[
EVP_MAX_MD_SIZE
];
430
uint8_t finish_md[
EVP_MAX_MD_SIZE
* 2];
432
uint8_t peer_finish_md[
EVP_MAX_MD_SIZE
* 2];
513
uint8_t previous_client_finished[
EVP_MAX_MD_SIZE
];
515
uint8_t previous_server_finished[
EVP_MAX_MD_SIZE
];
digest.h
141
/*
EVP_MAX_MD_SIZE
is the largest digest size supported. Functions that output
143
#define
EVP_MAX_MD_SIZE
64 /* SHA-512 is the longest so far. */
146
* |md_out|. At most |
EVP_MAX_MD_SIZE
| bytes are written. If |out_size| is not
160
* |
EVP_MAX_MD_SIZE
| bytes are written. If |out_size| is not NULL then
/external/boringssl/src/crypto/digest/
digest_test.cc
142
char digest_hex[2*
EVP_MAX_MD_SIZE
+ 1];
174
uint8_t digest[
EVP_MAX_MD_SIZE
];
digest.c
207
assert(ctx->digest->md_size <=
EVP_MAX_MD_SIZE
);
/external/boringssl/src/crypto/hmac/
hmac.c
69
static uint8_t static_out_buffer[
EVP_MAX_MD_SIZE
];
173
uint8_t buf[
EVP_MAX_MD_SIZE
];
hmac_test.cc
108
uint8_t mac[
EVP_MAX_MD_SIZE
];
/external/boringssl/src/crypto/x509v3/
v3_skey.c
109
unsigned char pkey_dig[
EVP_MAX_MD_SIZE
];
/external/boringssl/src/ssl/
s3_both.c
179
assert(n <=
EVP_MAX_MD_SIZE
);
183
assert(n <=
EVP_MAX_MD_SIZE
);
228
s->method->ssl_get_message(s, a, b, SSL3_MT_FINISHED,
EVP_MAX_MD_SIZE
,
267
assert(finished_len <=
EVP_MAX_MD_SIZE
);
271
assert(finished_len <=
EVP_MAX_MD_SIZE
);
454
/* ssl3_cert_verify_hash is documented as needing
EVP_MAX_MD_SIZE
because that
456
OPENSSL_COMPILE_ASSERT(
EVP_MAX_MD_SIZE
> MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH,
t1_enc.c
162
uint8_t A1[
EVP_MAX_MD_SIZE
];
553
uint8_t buf[2 *
EVP_MAX_MD_SIZE
];
589
uint8_t digests[2 *
EVP_MAX_MD_SIZE
];
s3_enc.c
358
uint8_t md_buf[
EVP_MAX_MD_SIZE
];
/external/boringssl/src/tool/
digest.cc
165
uint8_t digest[
EVP_MAX_MD_SIZE
];
172
char hex_digest[
EVP_MAX_MD_SIZE
* 2];
246
char line[
EVP_MAX_MD_SIZE
* 2 + 2 /* spaces */ + PATH_MAX + 1 /* newline */ +
speed.cc
255
uint8_t digest[
EVP_MAX_MD_SIZE
];
/external/boringssl/src/crypto/rsa/
padding.c
335
uint8_t md[
EVP_MAX_MD_SIZE
];
378
uint8_t *dbmask = NULL, seedmask[
EVP_MAX_MD_SIZE
];
456
uint8_t *db = NULL, seed[
EVP_MAX_MD_SIZE
], phash[
EVP_MAX_MD_SIZE
];
561
uint8_t H_[
EVP_MAX_MD_SIZE
];
/system/keymaster/
hmac_operation.cpp
166
uint8_t digest[
EVP_MAX_MD_SIZE
];
integrity_assured_key_blob.cpp
67
uint8_t tmp[
EVP_MAX_MD_SIZE
];
/external/libvncserver/x11vnc/
enc.h
[
all
...]
Completed in 806 milliseconds
1
2