Searched defs:digest_len (Results 1 - 22 of 22) sorted by relevance

/external/chromium_org/third_party/webrtc/base/
H A Dsslfingerprint.cc34 size_t digest_len; local
36 algorithm, digest_val, sizeof(digest_val), &digest_len);
41 return new SSLFingerprint(algorithm, digest_val, digest_len);
67 const std::string& algorithm, const uint8* digest_in, size_t digest_len)
69 digest.SetData(digest_in, digest_len);
66 SSLFingerprint( const std::string& algorithm, const uint8* digest_in, size_t digest_len) argument
H A Dsslstreamadapterhelper.cc76 size_t digest_len) {
86 if (expected_len != digest_len)
89 peer_certificate_digest_value_.SetData(digest_val, digest_len);
73 SetPeerCertificateDigest( const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
H A Dssladapter_unittest.cc197 size_t digest_len = sizeof(digest); local
199 digest_len);
H A Dopensslstreamadapter.cc204 size_t digest_len) {
214 if (expected_len != digest_len)
217 peer_certificate_digest_value_.SetData(digest_val, digest_len);
200 SetPeerCertificateDigest(const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
H A Dsslstreamadapter_unittest.cc250 size_t digest_len; local
257 &digest_len);
264 digest_len);
269 digest, 20, &digest_len);
276 digest_len);
/external/chromium_org/crypto/
H A Dencryptor_nss.cc139 unsigned int digest_len; local
142 &digest_len,
149 output->resize(op_len + digest_len);
185 unsigned int digest_len; local
188 &digest_len,
192 CHECK(!digest_len);
/external/chromium_org/third_party/boringssl/src/crypto/dsa/
H A Ddsa.c193 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument
195 return dsa->meth->sign(digest, digest_len, dsa);
197 return DSA_default_method.sign(digest, digest_len, dsa);
200 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, argument
205 ret = dsa->meth->verify(&valid, digest, digest_len, sig, dsa);
207 ret = DSA_default_method.verify(&valid, digest, digest_len, sig, dsa);
219 size_t digest_len, DSA_SIG *sig, const DSA *dsa) {
221 return dsa->meth->verify(out_valid, digest, digest_len, sig, dsa);
224 return DSA_default_method.verify(out_valid, digest, digest_len, sig, dsa);
227 int DSA_sign(int type, const uint8_t *digest, size_t digest_len, argument
218 DSA_do_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, DSA_SIG *sig, const DSA *dsa) argument
242 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
269 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
[all...]
H A Ddsa_impl.c77 BIGNUM **rp, const uint8_t *digest, size_t digest_len) {
110 if (digest_len > 0) {
111 ok = BN_generate_dsa_nonce(&k, dsa->q, dsa->priv_key, digest, digest_len,
187 static DSA_SIG *sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument
226 if (digest_len > BN_num_bytes(dsa->q)) {
230 digest_len = BN_num_bytes(dsa->q);
233 if (BN_bin2bn(digest, digest_len, &m) == NULL) {
288 static int verify(int *out_valid, const uint8_t *dgst, size_t digest_len, argument
342 if (digest_len > (i >> 3)) {
346 digest_len
76 sign_setup(const DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/ecdsa/
H A Decdsa.c63 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, argument
66 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey);
69 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL,
73 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, argument
79 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey);
86 ret = ECDSA_do_verify(digest, digest_len, s, eckey);
95 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian
98 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, argument
105 if (8 * digest_len > num_bits) {
106 digest_len
123 ECDSA_do_sign(const uint8_t *digest, size_t digest_len, EC_KEY *key) argument
128 ECDSA_do_verify(const uint8_t *digest, size_t digest_len, const ECDSA_SIG *sig, EC_KEY *eckey) argument
226 ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument
358 ECDSA_do_sign_ex(const uint8_t *digest, size_t digest_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey) argument
462 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
[all...]
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Drawtransportchannel.h163 size_t digest_len) {
160 SetRemoteFingerprint( const std::string& digest_alg, const uint8* digest, size_t digest_len) argument
H A Ddtlstransportchannel.cc210 size_t digest_len) {
212 rtc::Buffer remote_fingerprint_value(digest, digest_len);
207 SetRemoteFingerprint( const std::string& digest_alg, const uint8* digest, size_t digest_len) argument
H A Dp2ptransportchannel.h161 size_t digest_len) {
158 SetRemoteFingerprint( const std::string& digest_alg, const uint8* digest, size_t digest_len) argument
H A Dfakesession.h124 size_t digest_len) {
125 dtls_fingerprint_ = rtc::SSLFingerprint(alg, digest, digest_len);
123 SetRemoteFingerprint(const std::string& alg, const uint8* digest, size_t digest_len) argument
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/
H A Dsecuretunnelsessionclient.cc383 size_t digest_len; local
384 peer_cert->ComputeDigest(algorithm, digest, ARRAY_SIZE(digest), &digest_len);
385 ssl_stream->SetPeerCertificateDigest(algorithm, digest, digest_len);
/external/chromium_org/net/android/
H A Dkeystore_openssl.cc455 size_t digest_len,
468 digest_len); local
490 size_t digest_len,
454 EcdsaMethodSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len, EC_KEY* ec_key) argument
489 EcdsaMethodVerify(const uint8_t* digest, size_t digest_len, const uint8_t* sig, size_t sig_len, EC_KEY* ec_key) argument
H A Dkeystore_unittest.cc241 int digest_len = static_cast<int>(message.size()); local
247 0, digest, digest_len, sigbuf, siglen, pub_key.get());
265 unsigned int digest_len = static_cast<unsigned int>(message.size()); local
285 NID_md5_sha1, digest, digest_len, p, &p_len, rsa.get());
308 0, digest, digest_len, p, &p_len, ecdsa.get());
/external/chromium_org/net/ssl/
H A Dopenssl_platform_key_mac.cc363 size_t digest_len,
377 ex_data, &out_len, sig, ECDSA_size(ec_key), digest, digest_len);
385 size_t digest_len,
362 EcdsaMethodSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len, EC_KEY* ec_key) argument
384 EcdsaMethodVerify(const uint8_t* digest, size_t digest_len, const uint8_t* sig, size_t sig_len, EC_KEY* eckey) argument
/external/chromium_org/third_party/boringssl/src/ssl/
H A Ds3_clnt.c1506 unsigned int digest_len; local
1512 EVP_DigestFinal_ex(&md_ctx, q, &digest_len);
1513 q += digest_len;
1514 md_len += digest_len;
H A Dt1_enc.c1011 unsigned int digest_len; local
1025 !EVP_DigestFinal_ex(&ctx, out, &digest_len) ||
1026 digest_len != (unsigned int)hash_size) /* internal error */
1031 out += digest_len;
1032 out_len -= digest_len;
1033 len += digest_len;
H A Dt1_lib.c2842 int digest_len; local
2853 digest_len = tls1_handshake_digest(
2856 if (digest_len < 0)
2859 s->session->original_handshake_hash_len = digest_len;
/external/openssl/ssl/
H A Dt1_enc.c915 unsigned int digest_len; local
929 !EVP_DigestFinal_ex(&ctx, out, &digest_len) ||
930 digest_len != (unsigned int)hash_size) /* internal error */
935 out += digest_len;
936 out_len -= digest_len;
937 len += digest_len;
H A Dt1_lib.c2970 int digest_len; local
2981 digest_len = tls1_handshake_digest(
2984 if (digest_len < 0)
2987 s->session->original_handshake_hash_len = digest_len;

Completed in 2259 milliseconds