/external/boringssl/src/crypto/digest/ |
digests.c | 77 CHECK(MD4_Init(ctx->md_data)); 81 CHECK(MD4_Update(ctx->md_data, data, count)); 85 CHECK(MD4_Final(out, ctx->md_data)); 97 CHECK(MD5_Init(ctx->md_data)); 101 CHECK(MD5_Update(ctx->md_data, data, count)); 105 CHECK(MD5_Final(out, ctx->md_data)); 117 CHECK(SHA1_Init(ctx->md_data)); 121 CHECK(SHA1_Update(ctx->md_data, data, count)); 125 CHECK(SHA1_Final(md, ctx->md_data)); 137 CHECK(SHA224_Init(ctx->md_data)); [all...] |
digest.c | 91 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data) { 92 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size); 93 OPENSSL_free(ctx->md_data); 124 /* |md_data| will be the correct size in this case so it's removed from 127 tmp_buf = out->md_data; 128 out->md_data = NULL; 134 if (in->md_data && in->digest->ctx_size) { 136 out->md_data = tmp_buf; 138 out->md_data = OPENSSL_malloc(in->digest->ctx_size); 139 if (!out->md_data) { [all...] |
/external/boringssl/src/include/openssl/ |
digest.h | 238 /* md_data points to a block of memory that contains the hash-specific 240 void *md_data; member in struct:env_md_ctx_st
|
pem.h | 185 int md_len; /* length of md_data */ 186 char *md_data; /* message digest, could be pkey encrypted */ member in struct:pem_ctx_st
|
/external/tpm2/ |
CpriHash.c | 92 memcpy(buf, (void*) ctxt->md_data, ctxt->digest->ctx_size); 116 // This also allocates the ctxt->md_data 120 memcpy(ctxt->md_data, buf, ctxt->digest->ctx_size); [all...] |
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
sha2.c | 1068 #define data(ctx) ((SHA256_CTX *)(ctx)->md_data) 1087 #define data(ctx) ((SHA384_CTX *)(ctx)->md_data) 1106 #define data(ctx) ((SHA512_CTX *)(ctx)->md_data) [all...] |