Searched refs:SHA256_DIGEST_LENGTH (Results 1 – 17 of 17) sorted by relevance
/external/openssh/openbsd-compat/ |
D | sha2.h | 57 #define SHA256_DIGEST_LENGTH 32 macro 58 #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1) 86 void SHA256_Final(u_int8_t [SHA256_DIGEST_LENGTH], SHA256_CTX *) 87 __attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
|
D | sha2.c | 545 SHA256_Final(u_int8_t digest[SHA256_DIGEST_LENGTH], SHA256_CTX *context) in SHA256_Final() argument 558 memcpy(digest, context->state, SHA256_DIGEST_LENGTH); in SHA256_Final()
|
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
D | sha2.h | 50 #define SHA256_DIGEST_LENGTH 32 macro 51 #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1) 125 void SHA256_Final __P((u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*));
|
D | sha2.c | 338 bcopy(sha256_initial_hash_value, context->state, SHA256_DIGEST_LENGTH); in SHA256_Init() 620 bcopy(context->state, d, SHA256_DIGEST_LENGTH); in SHA256_Final() 630 sha2_byte digest[SHA256_DIGEST_LENGTH], *d = digest; in SHA256_End() 639 for (i = 0; i < SHA256_DIGEST_LENGTH; i++) { in SHA256_End() 648 bzero(digest, SHA256_DIGEST_LENGTH); in SHA256_End() 1128 SHA256_DIGEST_LENGTH,
|
/external/boringssl/src/crypto/sha/ |
D | sha256.c | 94 sha->md_len = SHA256_DIGEST_LENGTH; in SHA256_Init() 115 static uint8_t buf[SHA256_DIGEST_LENGTH]; in SHA256() 162 case SHA256_DIGEST_LENGTH: \ 163 for (nn = 0; nn < SHA256_DIGEST_LENGTH / 4; nn++) { \ 169 if ((c)->md_len > SHA256_DIGEST_LENGTH) { \
|
/external/boringssl/src/crypto/dsa/ |
D | dsa_impl.c | 454 unsigned char seed[SHA256_DIGEST_LENGTH]; in paramgen() 455 unsigned char md[SHA256_DIGEST_LENGTH]; in paramgen() 456 unsigned char buf[SHA256_DIGEST_LENGTH], buf2[SHA256_DIGEST_LENGTH]; in paramgen() 479 qsize != SHA256_DIGEST_LENGTH) { in paramgen()
|
/external/boringssl/src/crypto/cipher/ |
D | e_tls.c | 487 SHA256_DIGEST_LENGTH + 16, /* key len (SHA256 + AES128) */ 489 16 + SHA256_DIGEST_LENGTH, /* overhead (padding + SHA256) */ 526 SHA256_DIGEST_LENGTH + 32, /* key len (SHA256 + AES256) */ 528 16 + SHA256_DIGEST_LENGTH, /* overhead (padding + SHA256) */
|
D | e_aes.c | 1499 #define EVP_AEAD_AES_CTR_HMAC_SHA256_TAG_LEN SHA256_DIGEST_LENGTH 1601 static void hmac_calculate(uint8_t out[SHA256_DIGEST_LENGTH], in hmac_calculate() argument 1626 uint8_t inner_digest[SHA256_DIGEST_LENGTH]; in hmac_calculate() 1688 uint8_t hmac_result[SHA256_DIGEST_LENGTH]; in aead_aes_ctr_hmac_sha256_seal() 1725 uint8_t hmac_result[SHA256_DIGEST_LENGTH]; in aead_aes_ctr_hmac_sha256_open()
|
/external/openssh/ |
D | md-sha256.c | 74 ssh_sha256.md_size = SHA256_DIGEST_LENGTH; in evp_ssh_sha256()
|
D | digest-libc.c | 95 SHA256_DIGEST_LENGTH,
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
D | polochallengeresponse.cc | 83 Alpha* alpha = new Alpha(SHA256_DIGEST_LENGTH); in GetAlpha()
|
/external/boringssl/src/include/openssl/ |
D | sha.h | 139 #define SHA256_DIGEST_LENGTH 32 macro
|
D | ssl.h | 686 peer_sha256[SHA256_DIGEST_LENGTH]; /* SHA256 of peer certificate */
|
/external/boringssl/src/crypto/digest/ |
D | digests.c | 170 NID_sha256, SHA256_DIGEST_LENGTH, 0 /* flags */,
|
/external/ipsec-tools/src/racoon/ |
D | crypto_openssl.c | 2003 if ((res = vmalloc(SHA256_DIGEST_LENGTH)) == 0) 2011 if (SHA256_DIGEST_LENGTH != res->l) { 2286 if ((res = vmalloc(SHA256_DIGEST_LENGTH)) == 0) 2312 return SHA256_DIGEST_LENGTH << 3; in eay_sha2_256_hashlen()
|
/external/boringssl/src/ssl/ |
D | ssl_cipher.c | 678 *out_mac_secret_len = SHA256_DIGEST_LENGTH; in ssl_cipher_get_evp_aead() 700 *out_mac_secret_len = SHA256_DIGEST_LENGTH; in ssl_cipher_get_evp_aead()
|
D | s3_srvr.c | 2496 uint8_t channel_id_hash[SHA256_DIGEST_LENGTH]; in ssl3_get_channel_id() 2527 assert(channel_id_hash_len == SHA256_DIGEST_LENGTH); in ssl3_get_channel_id()
|