Searched refs:MD5_DIGEST_LENGTH (Results 1 – 17 of 17) sorted by relevance
/external/boringssl/src/crypto/cipher/ |
D | e_rc4.c | 114 tag_len = MD5_DIGEST_LENGTH; in aead_rc4_md5_tls_init() 117 if (tag_len > MD5_DIGEST_LENGTH) { in aead_rc4_md5_tls_init() 124 if (key_len <= MD5_DIGEST_LENGTH) { in aead_rc4_md5_tls_init() 136 RC4_set_key(&rc4_ctx->rc4, key_len - MD5_DIGEST_LENGTH, in aead_rc4_md5_tls_init() 137 key + MD5_DIGEST_LENGTH); in aead_rc4_md5_tls_init() 140 memcpy(hmac_key, key, MD5_DIGEST_LENGTH); in aead_rc4_md5_tls_init() 185 uint8_t digest[MD5_DIGEST_LENGTH]; in aead_rc4_md5_tls_seal() 257 if (rc4_ctx->tag_len == MD5_DIGEST_LENGTH) { in aead_rc4_md5_tls_seal() 266 RC4(&rc4_ctx->rc4, MD5_DIGEST_LENGTH, out + in_len, out + in_len); in aead_rc4_md5_tls_seal() 288 uint8_t digest[MD5_DIGEST_LENGTH]; in aead_rc4_md5_tls_open() [all …]
|
D | e_ssl3.c | 344 MD5_DIGEST_LENGTH + 16, /* key len (MD5 + RC4) */ 346 MD5_DIGEST_LENGTH, /* overhead */ 347 MD5_DIGEST_LENGTH, /* max tag length */
|
/external/openssh/openbsd-compat/ |
D | md5.h | 21 #define MD5_DIGEST_LENGTH 16 macro 22 #define MD5_DIGEST_STRING_LENGTH (MD5_DIGEST_LENGTH * 2 + 1) 34 void MD5Final(u_int8_t [MD5_DIGEST_LENGTH], MD5_CTX *) 35 __attribute__((__bounded__(__minbytes__,1,MD5_DIGEST_LENGTH)));
|
D | md5.c | 128 MD5Final(unsigned char digest[MD5_DIGEST_LENGTH], MD5_CTX *ctx) in MD5Final() argument
|
/external/mtpd/ |
D | l2tp.c | 275 uint8_t hash[MD5_DIGEST_LENGTH]; in get_attribute_raw() 286 int j = i % MD5_DIGEST_LENGTH; in get_attribute_raw() 290 MD5_Update(&ctx, &p->value[i - MD5_DIGEST_LENGTH], in get_attribute_raw() 291 MD5_DIGEST_LENGTH); in get_attribute_raw() 376 static uint8_t response[MD5_DIGEST_LENGTH]; in compute_response() 389 uint8_t response[MD5_DIGEST_LENGTH]; in verify_challenge() 390 if (get_attribute_raw(CHALLENGE_RESPONSE, response, MD5_DIGEST_LENGTH) in verify_challenge() 391 != MD5_DIGEST_LENGTH) { in verify_challenge() 395 response, MD5_DIGEST_LENGTH); in verify_challenge() 407 add_attribute_raw(CHALLENGE_RESPONSE, response, MD5_DIGEST_LENGTH); in answer_challenge()
|
/external/ipsec-tools/src/racoon/ |
D | isakmp_frag.c | 173 return ntohl(hp[MD5_DIGEST_LENGTH / sizeof(*hp)]); 341 if (len == MD5_DIGEST_LENGTH) { 351 capp = (int *)(buf->v + MD5_DIGEST_LENGTH);
|
D | crypto_openssl.c | 2118 if ((res = vmalloc(MD5_DIGEST_LENGTH)) == 0) 2126 if (MD5_DIGEST_LENGTH != res->l) { 2403 if ((res = vmalloc(MD5_DIGEST_LENGTH)) == 0) 2429 return MD5_DIGEST_LENGTH << 3; in eay_md5_hashlen()
|
/external/boringssl/src/crypto/digest/ |
D | digests.c | 109 NID_md5, MD5_DIGEST_LENGTH, 0 /* flags */, md5_init, 240 SHA1_Final(out + MD5_DIGEST_LENGTH, &ctx->sha1)); in md5_sha1_final() 245 MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH,
|
/external/boringssl/src/ssl/ |
D | s3_enc.c | 179 for (i = 0; i < out_len; i += MD5_DIGEST_LENGTH) { in ssl3_prf() 212 if (i + MD5_DIGEST_LENGTH > out_len) { in ssl3_prf() 219 out += MD5_DIGEST_LENGTH; in ssl3_prf()
|
D | s3_both.c | 456 OPENSSL_COMPILE_ASSERT(EVP_MAX_MD_SIZE > MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH, 485 s->enc_method->cert_verify_mac(s, NID_sha1, out + MD5_DIGEST_LENGTH) == in ssl3_cert_verify_hash() 489 *out_len = MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH; in ssl3_cert_verify_hash()
|
D | ssl_cipher.c | 648 *out_mac_secret_len = MD5_DIGEST_LENGTH; in ssl_cipher_get_evp_aead()
|
/external/boringssl/src/include/openssl/ |
D | md5.h | 73 #define MD5_DIGEST_LENGTH 16 macro
|
/external/openssh/ |
D | digest-libc.c | 65 MD5_DIGEST_LENGTH,
|
/external/boringssl/src/crypto/md5/ |
D | md5.c | 65 static uint8_t digest[MD5_DIGEST_LENGTH]; in MD5()
|
/external/iputils/ |
D | ping6.c | 329 static __u8 digest[MD5_DIGEST_LENGTH]; in niquery_nonce() 516 __u8 digest[MD5_DIGEST_LENGTH]; in niquery_option_subject_name_handler()
|
D | RELNOTES | 97 ping6: Use MD5_DIGEST_LENGTH instead of magic value 16.
|
/external/mdnsresponder/mDNSCore/ |
D | DNSDigest.c | 185 #define MD5_DIGEST_LENGTH 16 /* digest length in bytes */ macro 203 #define MD5_DIGEST_LENGTH 16 macro
|