/external/boringssl/src/crypto/evp/ |
digestsign.c | 160 unsigned int mdlen; local 164 EVP_DigestFinal_ex(&tmp_ctx, md, &mdlen) && 165 EVP_PKEY_sign(ctx->pctx, out_sig, out_sig_len, md, mdlen); 185 unsigned int mdlen; local 189 EVP_DigestFinal_ex(&tmp_ctx, md, &mdlen) && 190 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen);
|
/external/openssh/ |
digest-openssl.c | 186 u_int mdlen; local 194 mdlen = dlen; 195 if (!EVP_Digest(m, mlen, d, &mdlen, digest->mdfunc(), NULL))
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_pwd_common.c | 46 size_t resultbytelen, len = 0, mdlen; local 63 mdlen = SHA256_MAC_LEN; 64 if (crypto_hash_finish(hash, digest, &mdlen) < 0) 66 if ((len + mdlen) > resultbytelen) 69 os_memcpy(result + len, digest, mdlen); 70 len += mdlen;
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
padding.c | 324 size_t mdlen = EVP_MD_size(md); local 326 if (to_len < 2 * mdlen + 2) { 332 if (from_len > emlen - 2 * mdlen - 1) { 337 if (emlen < 2 * mdlen + 1) { 344 uint8_t *db = to + mdlen + 1; 349 OPENSSL_memset(db + mdlen, 0, emlen - from_len - 2 * mdlen - 1); 350 db[emlen - from_len - mdlen - 1] = 0x01; 351 OPENSSL_memcpy(db + emlen - from_len - mdlen, from, from_len); 352 if (!RAND_bytes(seed, mdlen)) { 398 size_t mdlen = EVP_MD_size(md); local [all...] |
/external/ppp/pppd/ |
chap_ms.c | 583 int mdlen = secret_len; local 587 int mdlen = secret_len; 589 int mdlen = secret_len * 8; 596 while (mdlen > 512) { 599 mdlen -= 512; 601 MD4Update(&md4Context, secret, mdlen);
|
/external/python/cpython2/Modules/ |
_hashopenssl.c | 591 int cplen, j, k, tkeylen, mdlen; local 595 mdlen = EVP_MD_size(digest); 596 if (mdlen < 0) 608 if (tkeylen > mdlen) 609 cplen = mdlen; 637 if (!HMAC_Update(&hctx, digtmp, mdlen)
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 909 unsigned int mdlen; local 921 mdlen = *len; 922 res = HMAC_Final(ctx->ctx, mac, &mdlen); 927 *len = mdlen; 938 unsigned int mdlen) 957 res = HMAC_Final(ctx, mac, &mdlen); [all...] |