/external/boringssl/src/crypto/evp/ |
digestsign.c | 130 unsigned int mdlen; local 134 EVP_DigestFinal_ex(&tmp_ctx, md, &mdlen) && 135 EVP_PKEY_sign(ctx->pctx, out_sig, out_sig_len, md, mdlen); 150 unsigned int mdlen; local 154 EVP_DigestFinal_ex(&tmp_ctx, md, &mdlen) && 155 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen);
|
pbkdf.c | 69 size_t cplen, mdlen, tkeylen, k; local 74 mdlen = EVP_MD_size(digest); 83 if (tkeylen > mdlen) { 84 cplen = mdlen; 112 if (!HMAC_Update(&hctx, digest_tmp, mdlen) ||
|
/external/openssh/ |
digest-openssl.c | 186 u_int mdlen; local 194 mdlen = dlen; 195 if (!EVP_Digest(m, mlen, d, &mdlen, digest->mdfunc(), NULL))
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_pwd_common.c | 46 size_t resultbytelen, len = 0, mdlen; local 63 mdlen = SHA256_MAC_LEN; 64 if (crypto_hash_finish(hash, digest, &mdlen) < 0) 66 if ((len + mdlen) > resultbytelen) 69 os_memcpy(result + len, digest, mdlen); 70 len += mdlen;
|
/external/boringssl/src/crypto/rsa/ |
padding.c | 325 size_t mdlen = EVP_MD_size(md); local 327 if (to_len < 2 * mdlen + 2) { 333 if (from_len > emlen - 2 * mdlen - 1) { 338 if (emlen < 2 * mdlen + 1) { 345 uint8_t *db = to + mdlen + 1; 350 OPENSSL_memset(db + mdlen, 0, emlen - from_len - 2 * mdlen - 1); 351 db[emlen - from_len - mdlen - 1] = 0x01; 352 OPENSSL_memcpy(db + emlen - from_len - mdlen, from, from_len); 353 if (!RAND_bytes(seed, mdlen)) { 389 unsigned i, dblen, mlen = -1, mdlen, bad, looking_for_one_byte, one_index = 0; local [all...] |
/external/ppp/pppd/ |
chap_ms.c | 583 int mdlen = secret_len; local 587 int mdlen = secret_len; 589 int mdlen = secret_len * 8; 596 while (mdlen > 512) { 599 mdlen -= 512; 601 MD4Update(&md4Context, secret, mdlen);
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 909 unsigned int mdlen; local 921 mdlen = *len; 922 res = HMAC_Final(ctx->ctx, mac, &mdlen); 927 *len = mdlen; 938 unsigned int mdlen) 957 res = HMAC_Final(ctx, mac, &mdlen); [all...] |