/external/chromium/base/ |
H A D | sha1_win.cc | 38 DWORD hash_len = 0; local 39 DWORD buffer_size = sizeof hash_len; 41 reinterpret_cast<unsigned char*>(&hash_len), 50 // but so that result.length() is correctly set to |hash_len|. 51 reinterpret_cast<BYTE*>(WriteInto(&result, hash_len + 1)), &hash_len, 57 if (hash_len != SHA1_LENGTH) { 58 LOG(ERROR) << "Returned hash value is wrong length: " << hash_len
|
/external/chromium/net/http/ |
H A D | des.cc | 213 DWORD hash_len = 8; local 214 CryptEncrypt(key, 0, FALSE, 0, hash, &hash_len, 8);
|
/external/srtp/crypto/test/ |
H A D | sha1_driver.c | 57 unsigned hash_len; /* number of octets output by hash */ member in struct:hash_test_case_t 70 unsigned hash_len) { 83 tmp_len = hex_string_to_octet_string((char *)test_case->hash, hex_hash, hash_len*2); 84 if (tmp_len != hash_len*2) 88 test_case->hash_len = hash_len; 105 if (test_case->hash_len != 20) 66 hash_test_case_add(hash_test_case_t **list_ptr, char *hex_data, unsigned data_len, char *hex_hash, unsigned hash_len) argument
|
/external/chromium/chrome/browser/safe_browsing/ |
H A D | protocol_parser.cc | 290 const int hash_len = atoi(cmd_parts[2].c_str()); local 291 if (hash_len != sizeof(SBPrefix) && hash_len != sizeof(SBFullHash)) { 292 VLOG(1) << "ParseChunk got unknown hashlen " << hash_len; 306 if (!ParseAddChunk(list_name, chunk_data, chunk_len, hash_len, 311 if (!ParseSubChunk(list_name, chunk_data, chunk_len, hash_len, 332 int hash_len, 337 SBEntry::Type type = hash_len == sizeof(SBPrefix) ? 342 DCHECK_EQ(0, remaining % hash_len); 343 prefix_count = remaining / hash_len; 329 ParseAddChunk(const std::string& list_name, const char* data, int data_len, int hash_len, std::deque<SBChunkHost>* hosts) argument 367 ParseSubChunk(const std::string& list_name, const char* data, int data_len, int hash_len, std::deque<SBChunkHost>* hosts) argument 435 int hash_len = entry->HashLen(); local [all...] |
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_attr_build.c | 355 size_t hash_len; local 360 hash_len = wpabuf_len(pubkey); 361 sha256_vector(1, addr, &hash_len, pubkey_hash);
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_attr_build.c | 355 size_t hash_len; local 360 hash_len = wpabuf_len(pubkey); 361 sha256_vector(1, addr, &hash_len, pubkey_hash);
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_attr_build.c | 355 size_t hash_len; local 360 hash_len = wpabuf_len(pubkey); 361 sha256_vector(1, addr, &hash_len, pubkey_hash);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | crypto_cryptoapi.c | 114 int cryptoapi_hash_vector(ALG_ID alg, size_t hash_len, size_t num_elem, argument 142 hlen = hash_len;
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls.h | 60 size_t hash_len; member in struct:tls_event_data::__anon16024
|
H A D | crypto_cryptoapi.c | 106 int cryptoapi_hash_vector(ALG_ID alg, size_t hash_len, size_t num_elem, argument 134 hlen = hash_len;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls.h | 60 size_t hash_len; member in struct:tls_event_data::__anon16248
|
H A D | crypto_cryptoapi.c | 106 int cryptoapi_hash_vector(ALG_ID alg, size_t hash_len, size_t num_elem, argument 134 hlen = hash_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls.h | 60 size_t hash_len; member in struct:tls_event_data::__anon16474
|
H A D | crypto_cryptoapi.c | 106 int cryptoapi_hash_vector(ALG_ID alg, size_t hash_len, size_t num_elem, argument 134 hlen = hash_len;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 124 size_t hash_len; local 134 hash_len = prf->hash_len; 137 len[0] = hash_len; 156 clen = hash_len; 469 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 478 os_memcpy(pos, hash, prf->hash_len); 483 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, 528 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 537 integ = end - integ_alg->hash_len; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_aka.c | 223 size_t hash_len; local 238 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 241 if (checkcode_len != hash_len) { 256 if (os_memcmp(hash, checkcode, hash_len) != 0) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | x509v3.c | 1328 size_t hash_len; local 1486 hash_len = 16; 1488 hash, hash_len); 1493 hash_len = 20; 1495 hash, hash_len); 1501 hash_len = 32; 1503 hash, hash_len); 1520 if (hdr.length != hash_len ||
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 119 size_t hash_len; local 129 hash_len = prf->hash_len; 132 len[0] = hash_len; 151 clen = hash_len; 464 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 473 os_memcpy(pos, hash, prf->hash_len); 478 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, 523 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 532 integ = end - integ_alg->hash_len; [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_aka.c | 306 size_t hash_len; local 321 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 324 if (checkcode_len != hash_len) { 339 if (os_memcmp(hash, checkcode, hash_len) != 0) {
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | x509v3.c | 1591 size_t hash_len; local 1749 hash_len = 16; 1751 hash, hash_len); 1756 hash_len = 20; 1758 hash, hash_len); 1763 hash_len = 32; 1765 hash, hash_len); 1777 if (hdr.length != hash_len ||
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | ikev2_common.c | 119 size_t hash_len; local 129 hash_len = prf->hash_len; 132 len[0] = hash_len; 151 clen = hash_len; 464 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 473 os_memcpy(pos, hash, prf->hash_len); 478 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, 523 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 532 integ = end - integ_alg->hash_len; [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_aka.c | 306 size_t hash_len; local 321 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 324 if (checkcode_len != hash_len) { 339 if (os_memcmp(hash, checkcode, hash_len) != 0) {
|
/external/wpa_supplicant_8/src/tls/ |
H A D | x509v3.c | 1591 size_t hash_len; local 1749 hash_len = 16; 1751 hash, hash_len); 1756 hash_len = 20; 1758 hash, hash_len); 1763 hash_len = 32; 1765 hash, hash_len); 1777 if (hdr.length != hash_len ||
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 119 size_t hash_len; local 129 hash_len = prf->hash_len; 132 len[0] = hash_len; 151 clen = hash_len; 464 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 473 os_memcpy(pos, hash, prf->hash_len); 478 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, 523 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 532 integ = end - integ_alg->hash_len; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_aka.c | 306 size_t hash_len; local 321 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 324 if (checkcode_len != hash_len) { 339 if (os_memcmp(hash, checkcode, hash_len) != 0) {
|