/external/boringssl/src/crypto/cipher/ |
derive_key.c | 73 uint8_t md_buf[EVP_MAX_MD_SIZE]; 152 OPENSSL_cleanse(md_buf, EVP_MAX_MD_SIZE);
|
tls_cbc.c | 136 uint8_t rotated_mac_buf[64 + EVP_MAX_MD_SIZE]; 139 uint8_t rotated_mac[EVP_MAX_MD_SIZE]; 154 assert(md_size <= EVP_MAX_MD_SIZE); 294 uint8_t mac_out[EVP_MAX_MD_SIZE]; 342 assert(md_size <= EVP_MAX_MD_SIZE);
|
e_tls.c | 37 uint8_t mac_key[EVP_MAX_MD_SIZE]; 44 OPENSSL_COMPILE_ASSERT(EVP_MAX_MD_SIZE < 256, mac_key_len_fits_in_uint8_t); 84 assert(mac_key_len <= EVP_MAX_MD_SIZE); 147 uint8_t mac[EVP_MAX_MD_SIZE]; 301 uint8_t mac[EVP_MAX_MD_SIZE]; 303 uint8_t record_mac_tmp[EVP_MAX_MD_SIZE];
|
e_ssl3.c | 51 uint8_t tmp[EVP_MAX_MD_SIZE]; 164 uint8_t mac[EVP_MAX_MD_SIZE]; 287 uint8_t mac[EVP_MAX_MD_SIZE];
|
/external/boringssl/src/crypto/hkdf/ |
hkdf.c | 31 uint8_t prk[EVP_MAX_MD_SIZE], previous[EVP_MAX_MD_SIZE];
|
/external/boringssl/src/crypto/evp/ |
digestsign.c | 129 uint8_t md[EVP_MAX_MD_SIZE]; 149 uint8_t md[EVP_MAX_MD_SIZE];
|
sign.c | 79 uint8_t m[EVP_MAX_MD_SIZE]; 125 uint8_t m[EVP_MAX_MD_SIZE];
|
pbkdf.c | 66 uint8_t digest_tmp[EVP_MAX_MD_SIZE], *p, itmp[4];
|
/external/libchrome/crypto/ |
hmac_openssl.cc | 50 ScopedOpenSSLSafeSizeBuffer<EVP_MAX_MD_SIZE> result(digest, digest_length);
|
/external/boringssl/src/ssl/ |
s3_both.c | 183 assert(n <= EVP_MAX_MD_SIZE); 187 assert(n <= EVP_MAX_MD_SIZE); 232 ssl, a, b, SSL3_MT_FINISHED, EVP_MAX_MD_SIZE, ssl_dont_hash_message, &ok); 261 assert(finished_len <= EVP_MAX_MD_SIZE); 266 assert(finished_len <= EVP_MAX_MD_SIZE); 445 /* ssl3_cert_verify_hash is documented as needing EVP_MAX_MD_SIZE because that 447 OPENSSL_COMPILE_ASSERT(EVP_MAX_MD_SIZE > MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH,
|
t1_enc.c | 163 uint8_t A1[EVP_MAX_MD_SIZE]; 183 uint8_t hmac[EVP_MAX_MD_SIZE]; 516 uint8_t buf[2 * EVP_MAX_MD_SIZE]; 547 uint8_t digests[2 * EVP_MAX_MD_SIZE];
|
s3_enc.c | 339 uint8_t md_buf[EVP_MAX_MD_SIZE];
|
s3_srvr.c | [all...] |
/external/boringssl/src/crypto/digest/ |
digest_test.cc | 142 char digest_hex[2*EVP_MAX_MD_SIZE + 1]; 174 uint8_t digest[EVP_MAX_MD_SIZE];
|
digest.c | 197 assert(ctx->digest->md_size <= EVP_MAX_MD_SIZE);
|
/external/boringssl/src/crypto/hmac/ |
hmac.c | 69 static uint8_t static_out_buffer[EVP_MAX_MD_SIZE]; 173 uint8_t buf[EVP_MAX_MD_SIZE];
|
hmac_test.cc | 107 uint8_t mac[EVP_MAX_MD_SIZE];
|
/external/boringssl/src/crypto/x509v3/ |
v3_skey.c | 109 unsigned char pkey_dig[EVP_MAX_MD_SIZE];
|
/external/boringssl/src/tool/ |
digest.cc | 165 uint8_t digest[EVP_MAX_MD_SIZE]; 172 char hex_digest[EVP_MAX_MD_SIZE * 2]; 246 char line[EVP_MAX_MD_SIZE * 2 + 2 /* spaces */ + PATH_MAX + 1 /* newline */ +
|
/external/boringssl/src/include/openssl/ |
digest.h | 141 /* EVP_MAX_MD_SIZE is the largest digest size supported, in bytes. 144 #define EVP_MAX_MD_SIZE 64 /* SHA-512 is the longest so far. */ 147 * |md_out|. At most |EVP_MAX_MD_SIZE| bytes are written. If |out_size| is not 161 * |EVP_MAX_MD_SIZE| bytes are written. If |out_size| is not NULL then
|
/external/boringssl/src/crypto/rsa/ |
padding.c | 284 uint8_t md[EVP_MAX_MD_SIZE]; 328 uint8_t *dbmask = NULL, seedmask[EVP_MAX_MD_SIZE]; 402 uint8_t *db = NULL, seed[EVP_MAX_MD_SIZE], phash[EVP_MAX_MD_SIZE]; 503 uint8_t H_[EVP_MAX_MD_SIZE];
|
/system/keymaster/ |
hmac_operation.cpp | 170 uint8_t digest[EVP_MAX_MD_SIZE];
|
integrity_assured_key_blob.cpp | 67 uint8_t tmp[EVP_MAX_MD_SIZE];
|
/system/update_engine/ |
certificate_checker.cc | 148 uint8_t digest[EVP_MAX_MD_SIZE];
|
/system/tpm/trunks/ |
hmac_authorization_delegate.cc | 276 unsigned char digest[EVP_MAX_MD_SIZE];
|