/external/boringssl/src/crypto/evp/ |
digestsign.c | 130 unsigned int mdlen; local 134 EVP_DigestFinal_ex(&tmp_ctx, md, &mdlen) && 135 EVP_PKEY_sign(ctx->pctx, out_sig, out_sig_len, md, mdlen); 150 unsigned int mdlen; local 154 EVP_DigestFinal_ex(&tmp_ctx, md, &mdlen) && 155 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen);
|
pbkdf.c | 67 size_t cplen, mdlen, tkeylen, k; local 72 mdlen = EVP_MD_size(digest); 81 if (tkeylen > mdlen) { 82 cplen = mdlen; 110 if (!HMAC_Update(&hctx, digest_tmp, mdlen) ||
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_pwd_common.c | 46 size_t resultbytelen, len = 0, mdlen; local 63 mdlen = SHA256_MAC_LEN; 64 if (crypto_hash_finish(hash, digest, &mdlen) < 0) 66 if ((len + mdlen) > resultbytelen) 69 os_memcpy(result + len, digest, mdlen); 70 len += mdlen;
|
/external/boringssl/src/crypto/rsa/ |
padding.c | 285 unsigned mdlen; local 289 mdlen = EVP_MD_size(dgst); 302 if (outlen + mdlen <= len) { 306 outlen += mdlen; 326 unsigned i, emlen, mdlen; local 338 mdlen = EVP_MD_size(md); 340 if (to_len < 2 * mdlen + 2) { 346 if (from_len > emlen - 2 * mdlen - 1) { 351 if (emlen < 2 * mdlen + 1) { 358 db = to + mdlen + 1 400 unsigned i, dblen, mlen = -1, mdlen, bad, looking_for_one_byte, one_index = 0; local [all...] |
/external/ppp/pppd/ |
chap_ms.c | 583 int mdlen = secret_len; local 587 int mdlen = secret_len; 589 int mdlen = secret_len * 8; 596 while (mdlen > 512) { 599 mdlen -= 512; 601 MD4Update(&md4Context, secret, mdlen);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 795 unsigned int mdlen; local 807 mdlen = *len; 808 res = HMAC_Final(ctx->ctx, mac, &mdlen); 813 *len = mdlen; 824 unsigned int mdlen) 843 res = HMAC_Final(ctx, mac, &mdlen);
|