HomeSort by relevance Sort by last modified time
    Searched refs:EVP_MAX_MD_SIZE (Results 1 - 25 of 31) sorted by null

1 2

  /external/boringssl/src/crypto/evp/
p_hmac_asn1.c 66 static int hmac_size(const EVP_PKEY *pkey) { return EVP_MAX_MD_SIZE; }
sign.c 79 uint8_t m[EVP_MAX_MD_SIZE];
125 uint8_t m[EVP_MAX_MD_SIZE];
digestsign.c 154 uint8_t md[EVP_MAX_MD_SIZE];
184 uint8_t md[EVP_MAX_MD_SIZE];
pbkdf.c 66 uint8_t digest_tmp[EVP_MAX_MD_SIZE], *p, itmp[4];
  /external/boringssl/src/crypto/cipher/
derive_key.c 73 uint8_t md_buf[EVP_MAX_MD_SIZE];
152 OPENSSL_cleanse(md_buf, EVP_MAX_MD_SIZE);
tls_cbc.c 136 uint8_t rotated_mac_buf[64 + EVP_MAX_MD_SIZE];
139 uint8_t rotated_mac[EVP_MAX_MD_SIZE];
154 assert(md_size <= EVP_MAX_MD_SIZE);
294 uint8_t mac_out[EVP_MAX_MD_SIZE];
342 assert(md_size <= EVP_MAX_MD_SIZE);
e_tls.c 36 uint8_t mac_key[EVP_MAX_MD_SIZE];
43 OPENSSL_COMPILE_ASSERT(EVP_MAX_MD_SIZE < 256, mac_key_len_fits_in_uint8_t);
83 assert(mac_key_len <= EVP_MAX_MD_SIZE);
147 uint8_t mac[EVP_MAX_MD_SIZE];
306 uint8_t mac[EVP_MAX_MD_SIZE];
308 uint8_t record_mac_tmp[EVP_MAX_MD_SIZE];
e_ssl3.c 51 uint8_t tmp[EVP_MAX_MD_SIZE];
164 uint8_t mac[EVP_MAX_MD_SIZE];
287 uint8_t mac[EVP_MAX_MD_SIZE];
  /external/boringssl/src/crypto/hkdf/
hkdf.c 31 uint8_t prk[EVP_MAX_MD_SIZE], previous[EVP_MAX_MD_SIZE];
  /external/boringssl/src/include/openssl/
ssl3.h 361 uint8_t read_mac_secret[EVP_MAX_MD_SIZE];
364 uint8_t write_mac_secret[EVP_MAX_MD_SIZE];
430 uint8_t finish_md[EVP_MAX_MD_SIZE * 2];
432 uint8_t peer_finish_md[EVP_MAX_MD_SIZE * 2];
513 uint8_t previous_client_finished[EVP_MAX_MD_SIZE];
515 uint8_t previous_server_finished[EVP_MAX_MD_SIZE];
digest.h 141 /* EVP_MAX_MD_SIZE is the largest digest size supported. Functions that output
143 #define EVP_MAX_MD_SIZE 64 /* SHA-512 is the longest so far. */
146 * |md_out|. At most |EVP_MAX_MD_SIZE| bytes are written. If |out_size| is not
160 * |EVP_MAX_MD_SIZE| bytes are written. If |out_size| is not NULL then
  /external/boringssl/src/crypto/digest/
digest_test.cc 142 char digest_hex[2*EVP_MAX_MD_SIZE + 1];
174 uint8_t digest[EVP_MAX_MD_SIZE];
digest.c 207 assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE);
  /external/boringssl/src/crypto/hmac/
hmac.c 69 static uint8_t static_out_buffer[EVP_MAX_MD_SIZE];
173 uint8_t buf[EVP_MAX_MD_SIZE];
hmac_test.cc 108 uint8_t mac[EVP_MAX_MD_SIZE];
  /external/boringssl/src/crypto/x509v3/
v3_skey.c 109 unsigned char pkey_dig[EVP_MAX_MD_SIZE];
  /external/boringssl/src/ssl/
s3_both.c 179 assert(n <= EVP_MAX_MD_SIZE);
183 assert(n <= EVP_MAX_MD_SIZE);
228 s->method->ssl_get_message(s, a, b, SSL3_MT_FINISHED, EVP_MAX_MD_SIZE,
267 assert(finished_len <= EVP_MAX_MD_SIZE);
271 assert(finished_len <= EVP_MAX_MD_SIZE);
454 /* ssl3_cert_verify_hash is documented as needing EVP_MAX_MD_SIZE because that
456 OPENSSL_COMPILE_ASSERT(EVP_MAX_MD_SIZE > MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH,
t1_enc.c 162 uint8_t A1[EVP_MAX_MD_SIZE];
553 uint8_t buf[2 * EVP_MAX_MD_SIZE];
589 uint8_t digests[2 * EVP_MAX_MD_SIZE];
s3_enc.c 358 uint8_t md_buf[EVP_MAX_MD_SIZE];
  /external/boringssl/src/tool/
digest.cc 165 uint8_t digest[EVP_MAX_MD_SIZE];
172 char hex_digest[EVP_MAX_MD_SIZE * 2];
246 char line[EVP_MAX_MD_SIZE * 2 + 2 /* spaces */ + PATH_MAX + 1 /* newline */ +
speed.cc 255 uint8_t digest[EVP_MAX_MD_SIZE];
  /external/boringssl/src/crypto/rsa/
padding.c 335 uint8_t md[EVP_MAX_MD_SIZE];
378 uint8_t *dbmask = NULL, seedmask[EVP_MAX_MD_SIZE];
456 uint8_t *db = NULL, seed[EVP_MAX_MD_SIZE], phash[EVP_MAX_MD_SIZE];
561 uint8_t H_[EVP_MAX_MD_SIZE];
  /system/keymaster/
hmac_operation.cpp 166 uint8_t digest[EVP_MAX_MD_SIZE];
integrity_assured_key_blob.cpp 67 uint8_t tmp[EVP_MAX_MD_SIZE];
  /external/libvncserver/x11vnc/
enc.h     [all...]

Completed in 806 milliseconds

1 2