/external/chromium_org/third_party/webrtc/base/ |
H A D | sslfingerprint.cc | 34 size_t digest_len; local 36 algorithm, digest_val, sizeof(digest_val), &digest_len); 41 return new SSLFingerprint(algorithm, digest_val, digest_len); 67 const std::string& algorithm, const uint8* digest_in, size_t digest_len) 69 digest.SetData(digest_in, digest_len); 66 SSLFingerprint( const std::string& algorithm, const uint8* digest_in, size_t digest_len) argument
|
H A D | sslstreamadapterhelper.cc | 76 size_t digest_len) { 86 if (expected_len != digest_len) 89 peer_certificate_digest_value_.SetData(digest_val, digest_len); 73 SetPeerCertificateDigest( const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
|
H A D | ssladapter_unittest.cc | 197 size_t digest_len = sizeof(digest); local 199 digest_len);
|
H A D | opensslstreamadapter.cc | 204 size_t digest_len) { 214 if (expected_len != digest_len) 217 peer_certificate_digest_value_.SetData(digest_val, digest_len); 200 SetPeerCertificateDigest(const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
|
H A D | sslstreamadapter_unittest.cc | 250 size_t digest_len; local 257 &digest_len); 264 digest_len); 269 digest, 20, &digest_len); 276 digest_len);
|
/external/chromium_org/crypto/ |
H A D | encryptor_nss.cc | 139 unsigned int digest_len; local 142 &digest_len, 149 output->resize(op_len + digest_len); 185 unsigned int digest_len; local 188 &digest_len, 192 CHECK(!digest_len);
|
/external/chromium_org/third_party/boringssl/src/crypto/dsa/ |
H A D | dsa.c | 193 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument 195 return dsa->meth->sign(digest, digest_len, dsa); 197 return DSA_default_method.sign(digest, digest_len, dsa); 200 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, argument 205 ret = dsa->meth->verify(&valid, digest, digest_len, sig, dsa); 207 ret = DSA_default_method.verify(&valid, digest, digest_len, sig, dsa); 219 size_t digest_len, DSA_SIG *sig, const DSA *dsa) { 221 return dsa->meth->verify(out_valid, digest, digest_len, sig, dsa); 224 return DSA_default_method.verify(out_valid, digest, digest_len, sig, dsa); 227 int DSA_sign(int type, const uint8_t *digest, size_t digest_len, argument 218 DSA_do_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, DSA_SIG *sig, const DSA *dsa) argument 242 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument 269 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument [all...] |
H A D | dsa_impl.c | 77 BIGNUM **rp, const uint8_t *digest, size_t digest_len) { 110 if (digest_len > 0) { 111 ok = BN_generate_dsa_nonce(&k, dsa->q, dsa->priv_key, digest, digest_len, 187 static DSA_SIG *sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument 226 if (digest_len > BN_num_bytes(dsa->q)) { 230 digest_len = BN_num_bytes(dsa->q); 233 if (BN_bin2bn(digest, digest_len, &m) == NULL) { 288 static int verify(int *out_valid, const uint8_t *dgst, size_t digest_len, argument 342 if (digest_len > (i >> 3)) { 346 digest_len 76 sign_setup(const DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/ecdsa/ |
H A D | ecdsa.c | 63 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, argument 66 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey); 69 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, 73 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, argument 79 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey); 86 ret = ECDSA_do_verify(digest, digest_len, s, eckey); 95 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian 98 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, argument 105 if (8 * digest_len > num_bits) { 106 digest_len 123 ECDSA_do_sign(const uint8_t *digest, size_t digest_len, EC_KEY *key) argument 128 ECDSA_do_verify(const uint8_t *digest, size_t digest_len, const ECDSA_SIG *sig, EC_KEY *eckey) argument 226 ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument 358 ECDSA_do_sign_ex(const uint8_t *digest, size_t digest_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey) argument 462 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | rawtransportchannel.h | 163 size_t digest_len) { 160 SetRemoteFingerprint( const std::string& digest_alg, const uint8* digest, size_t digest_len) argument
|
H A D | dtlstransportchannel.cc | 210 size_t digest_len) { 212 rtc::Buffer remote_fingerprint_value(digest, digest_len); 207 SetRemoteFingerprint( const std::string& digest_alg, const uint8* digest, size_t digest_len) argument
|
H A D | p2ptransportchannel.h | 161 size_t digest_len) { 158 SetRemoteFingerprint( const std::string& digest_alg, const uint8* digest, size_t digest_len) argument
|
H A D | fakesession.h | 124 size_t digest_len) { 125 dtls_fingerprint_ = rtc::SSLFingerprint(alg, digest, digest_len); 123 SetRemoteFingerprint(const std::string& alg, const uint8* digest, size_t digest_len) argument
|
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/ |
H A D | securetunnelsessionclient.cc | 383 size_t digest_len; local 384 peer_cert->ComputeDigest(algorithm, digest, ARRAY_SIZE(digest), &digest_len); 385 ssl_stream->SetPeerCertificateDigest(algorithm, digest, digest_len);
|
/external/chromium_org/net/android/ |
H A D | keystore_openssl.cc | 455 size_t digest_len, 468 digest_len); local 490 size_t digest_len, 454 EcdsaMethodSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len, EC_KEY* ec_key) argument 489 EcdsaMethodVerify(const uint8_t* digest, size_t digest_len, const uint8_t* sig, size_t sig_len, EC_KEY* ec_key) argument
|
H A D | keystore_unittest.cc | 241 int digest_len = static_cast<int>(message.size()); local 247 0, digest, digest_len, sigbuf, siglen, pub_key.get()); 265 unsigned int digest_len = static_cast<unsigned int>(message.size()); local 285 NID_md5_sha1, digest, digest_len, p, &p_len, rsa.get()); 308 0, digest, digest_len, p, &p_len, ecdsa.get());
|
/external/chromium_org/net/ssl/ |
H A D | openssl_platform_key_mac.cc | 363 size_t digest_len, 377 ex_data, &out_len, sig, ECDSA_size(ec_key), digest, digest_len); 385 size_t digest_len, 362 EcdsaMethodSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len, EC_KEY* ec_key) argument 384 EcdsaMethodVerify(const uint8_t* digest, size_t digest_len, const uint8_t* sig, size_t sig_len, EC_KEY* eckey) argument
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_clnt.c | 1506 unsigned int digest_len; local 1512 EVP_DigestFinal_ex(&md_ctx, q, &digest_len); 1513 q += digest_len; 1514 md_len += digest_len;
|
H A D | t1_enc.c | 1011 unsigned int digest_len; local 1025 !EVP_DigestFinal_ex(&ctx, out, &digest_len) || 1026 digest_len != (unsigned int)hash_size) /* internal error */ 1031 out += digest_len; 1032 out_len -= digest_len; 1033 len += digest_len;
|
H A D | t1_lib.c | 2842 int digest_len; local 2853 digest_len = tls1_handshake_digest( 2856 if (digest_len < 0) 2859 s->session->original_handshake_hash_len = digest_len;
|
/external/openssl/ssl/ |
H A D | t1_enc.c | 915 unsigned int digest_len; local 929 !EVP_DigestFinal_ex(&ctx, out, &digest_len) || 930 digest_len != (unsigned int)hash_size) /* internal error */ 935 out += digest_len; 936 out_len -= digest_len; 937 len += digest_len;
|
H A D | t1_lib.c | 2970 int digest_len; local 2981 digest_len = tls1_handshake_digest( 2984 if (digest_len < 0) 2987 s->session->original_handshake_hash_len = digest_len;
|