/external/boringssl/src/crypto/cipher/ |
tls_cbc.c | 132 void EVP_tls_cbc_copy_mac(uint8_t *out, unsigned md_size, 144 unsigned mac_start = mac_end - md_size; 153 assert(in_len >= md_size); 154 assert(md_size <= EVP_MAX_MD_SIZE); 161 if (orig_len > md_size + 255 + 1) { 162 scan_start = orig_len - (md_size + 255 + 1); 164 /* div_spoiler contains a multiple of md_size that is used to cause the 168 * The aim of right-shifting md_size is so that the compiler doesn't 170 * to prove that md_size is always even, which I hope is beyond it. */ 171 div_spoiler = md_size >> 1 286 unsigned md_size, md_block_size = 64; local [all...] |
internal.h | 116 /* EVP_tls_cbc_copy_mac copies |md_size| bytes from the end of the first 122 * orig_len >= in_len >= md_size 123 * md_size <= EVP_MAX_MD_SIZE */ 124 void EVP_tls_cbc_copy_mac(uint8_t *out, unsigned md_size,
|
e_ssl3.c | 38 size_t md_size = EVP_MD_CTX_size(&ssl3_ctx->md_ctx); local 39 size_t pad_len = (md_size == 20) ? 40 : 48; 66 !EVP_DigestUpdate(&md_ctx, tmp, md_size) ||
|
/external/boringssl/src/crypto/digest/ |
internal.h | 72 /* md_size contains the size, in bytes, of the resulting digest. */ 73 unsigned md_size; member in struct:env_md_st 84 /* final completes the hash and writes |md_size| bytes of digest to |out|. */
|
digest.c | 73 size_t EVP_MD_size(const EVP_MD *md) { return md->md_size; } 207 assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE); 210 *size = ctx->digest->md_size;
|
/external/boringssl/src/crypto/evp/ |
p_hmac.c | 163 size_t md_size = EVP_MD_CTX_size(mctx); local 166 *siglen = md_size; 168 } else if (*siglen < md_size) {
|
/external/openssh/ |
md-sha256.c | 74 ssh_sha256.md_size = SHA256_DIGEST_LENGTH;
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 2684 int md_size; local [all...] |