/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | sslfingerprint.cc | 52 size_t digest_len; local 54 algorithm, digest_val, sizeof(digest_val), &digest_len); 59 return new SSLFingerprint(algorithm, digest_val, digest_len); 85 const std::string& algorithm, const uint8* digest_in, size_t digest_len) 87 digest.SetData(digest_in, digest_len); 84 SSLFingerprint( const std::string& algorithm, const uint8* digest_in, size_t digest_len) argument
|
H A D | sslstreamadapterhelper.cc | 94 size_t digest_len) { 104 if (expected_len != digest_len) 107 peer_certificate_digest_value_.SetData(digest_val, digest_len); 91 SetPeerCertificateDigest( const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
|
H A D | opensslstreamadapter.cc | 221 size_t digest_len) { 231 if (expected_len != digest_len) 234 peer_certificate_digest_value_.SetData(digest_val, digest_len); 217 SetPeerCertificateDigest(const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
|
H A D | sslstreamadapter_unittest.cc | 267 size_t digest_len; local 274 &digest_len); 281 digest_len); 286 digest, 20, &digest_len); 293 digest_len);
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | sslfingerprint.cc | 34 size_t digest_len; local 36 algorithm, digest_val, sizeof(digest_val), &digest_len); 41 return new SSLFingerprint(algorithm, digest_val, digest_len); 67 const std::string& algorithm, const uint8* digest_in, size_t digest_len) 69 digest.SetData(digest_in, digest_len); 66 SSLFingerprint( const std::string& algorithm, const uint8* digest_in, size_t digest_len) argument
|
H A D | sslstreamadapterhelper.cc | 76 size_t digest_len) { 86 if (expected_len != digest_len) 89 peer_certificate_digest_value_.SetData(digest_val, digest_len); 73 SetPeerCertificateDigest( const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
|
H A D | opensslstreamadapter.cc | 204 size_t digest_len) { 214 if (expected_len != digest_len) 217 peer_certificate_digest_value_.SetData(digest_val, digest_len); 200 SetPeerCertificateDigest(const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
|
H A D | sslstreamadapter_unittest.cc | 249 size_t digest_len; local 256 &digest_len); 263 digest_len); 268 digest, 20, &digest_len); 275 digest_len);
|
/external/chromium_org/crypto/ |
H A D | encryptor_nss.cc | 139 unsigned int digest_len; local 142 &digest_len, 149 output->resize(op_len + digest_len); 185 unsigned int digest_len; local 188 &digest_len, 192 CHECK(!digest_len);
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | rawtransportchannel.h | 163 size_t digest_len) { 160 SetRemoteFingerprint( const std::string& digest_alg, const uint8* digest, size_t digest_len) argument
|
H A D | dtlstransportchannel.cc | 210 size_t digest_len) { 212 talk_base::Buffer remote_fingerprint_value(digest, digest_len); 207 SetRemoteFingerprint( const std::string& digest_alg, const uint8* digest, size_t digest_len) argument
|
H A D | p2ptransportchannel.h | 161 size_t digest_len) { 158 SetRemoteFingerprint( const std::string& digest_alg, const uint8* digest, size_t digest_len) argument
|
H A D | fakesession.h | 124 size_t digest_len) { 125 dtls_fingerprint_ = talk_base::SSLFingerprint(alg, digest, digest_len); 123 SetRemoteFingerprint(const std::string& alg, const uint8* digest, size_t digest_len) argument
|
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/ |
H A D | securetunnelsessionclient.cc | 383 size_t digest_len; local 384 peer_cert->ComputeDigest(algorithm, digest, ARRAY_SIZE(digest), &digest_len); 385 ssl_stream->SetPeerCertificateDigest(algorithm, digest, digest_len);
|
/external/chromium_org/net/android/ |
H A D | keystore_unittest.cc | 247 int digest_len = static_cast<int>(message.size()); local 253 0, digest, digest_len, sigbuf, siglen, pub_key.get()); 294 int digest_len = static_cast<int>(message.size()); local 300 0, digest, digest_len, sigbuf, siglen, pub_key.get()); 318 unsigned int digest_len = static_cast<unsigned int>(message.size()); local 338 NID_md5_sha1, digest, digest_len, p, &p_len, rsa.get()); 360 int ret = DSA_sign(0, digest, digest_len, p, &p_len, dsa.get()); 383 0, digest, digest_len, p, &p_len, ecdsa.get());
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
H A D | t1_enc.c | 1167 unsigned int digest_len; local 1181 !EVP_DigestFinal_ex(&ctx, out, &digest_len) || 1182 digest_len != (unsigned int)hash_size) /* internal error */ 1187 out += digest_len; 1188 out_len -= digest_len; 1189 len += digest_len;
|
H A D | t1_lib.c | 2717 int digest_len; local 2728 digest_len = tls1_handshake_digest( 2731 if (digest_len < 0) 2734 s->session->original_handshake_hash_len = digest_len;
|
/external/openssl/ssl/ |
H A D | t1_enc.c | 915 unsigned int digest_len; local 929 !EVP_DigestFinal_ex(&ctx, out, &digest_len) || 930 digest_len != (unsigned int)hash_size) /* internal error */ 935 out += digest_len; 936 out_len -= digest_len; 937 len += digest_len;
|
H A D | t1_lib.c | 2963 int digest_len; local 2974 digest_len = tls1_handshake_digest( 2977 if (digest_len < 0) 2980 s->session->original_handshake_hash_len = digest_len;
|