/external/chromium_org/crypto/ |
H A D | signature_creator_openssl.cc | 21 const EVP_MD* ToOpenSSLDigest(SignatureCreator::HashAlgorithm hash_alg) { argument 22 switch (hash_alg) { 31 int ToOpenSSLDigestType(SignatureCreator::HashAlgorithm hash_alg) { argument 32 switch (hash_alg) { 45 HashAlgorithm hash_alg) { 49 const EVP_MD* const digest = ToOpenSSLDigest(hash_alg); 61 HashAlgorithm hash_alg, 71 bool success = RSA_sign(ToOpenSSLDigestType(hash_alg), data, data_len, 44 Create(RSAPrivateKey* key, HashAlgorithm hash_alg) argument 60 Sign(RSAPrivateKey* key, HashAlgorithm hash_alg, const uint8* data, int data_len, std::vector<uint8>* signature) argument
|
H A D | signature_creator_nss.cc | 20 SECOidTag ToNSSSigOid(SignatureCreator::HashAlgorithm hash_alg) { argument 21 switch (hash_alg) { 30 SECOidTag ToNSSHashOid(SignatureCreator::HashAlgorithm hash_alg) { argument 31 switch (hash_alg) { 51 HashAlgorithm hash_alg) { 55 result->sign_context_ = SGN_NewContext(ToNSSSigOid(hash_alg), key->key()); 72 HashAlgorithm hash_alg, 82 SECStatus rv = SGN_Digest(key->key(), ToNSSHashOid(hash_alg), &signature_item, 50 Create(RSAPrivateKey* key, HashAlgorithm hash_alg) argument 71 Sign(RSAPrivateKey* key, HashAlgorithm hash_alg, const uint8* data, int data_len, std::vector<uint8>* signature) argument
|
H A D | signature_creator.h | 41 static SignatureCreator* Create(RSAPrivateKey* key, HashAlgorithm hash_alg); 44 // Signs the precomputed |hash_alg| digest |data| using private |key| as 47 HashAlgorithm hash_alg,
|
H A D | hmac_openssl.cc | 23 HMAC::HMAC(HashAlgorithm hash_alg) argument 24 : hash_alg_(hash_alg), plat_(new HMACPlatformData()) {
|
H A D | hmac.h | 31 explicit HMAC(HashAlgorithm hash_alg);
|
H A D | signature_verifier_openssl.cc | 22 const EVP_MD* ToOpenSSLDigest(SignatureVerifier::HashAlgorithm hash_alg) { argument 23 switch (hash_alg) { 75 bool SignatureVerifier::VerifyInitRSAPSS(HashAlgorithm hash_alg, argument 83 const EVP_MD* const digest = ToOpenSSLDigest(hash_alg);
|
H A D | hmac_nss.cc | 23 HMAC::HMAC(HashAlgorithm hash_alg) argument 24 : hash_alg_(hash_alg), plat_(new HMACPlatformData()) {
|
H A D | signature_verifier.h | 72 // |hash_alg|, |mask_hash_alg|, and |salt_len| arguments. 84 bool VerifyInitRSAPSS(HashAlgorithm hash_alg,
|
H A D | signature_verifier_nss.cc | 22 HASH_HashType ToNSSHashType(SignatureVerifier::HashAlgorithm hash_alg) { argument 23 switch (hash_alg) { 138 bool SignatureVerifier::VerifyInitRSAPSS(HashAlgorithm hash_alg, argument 156 hash_alg_ = hash_alg;
|
H A D | hmac_win.cc | 106 HMAC::HMAC(HashAlgorithm hash_alg) argument 107 : hash_alg_(hash_alg), plat_(new HMACPlatformData()) {
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.h | 26 const struct asn1_oid *hash_alg,
|
H A D | tlsv1_record.h | 45 enum crypto_hash_alg hash_alg; member in struct:tlsv1_record_layer
|
H A D | tlsv1_record.c | 45 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5; 48 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1; 51 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256; 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 436 hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret,
|
H A D | pkcs1.c | 198 const struct asn1_oid *hash_alg, 273 if (!asn1_oid_equal(&oid, hash_alg)) { 276 asn1_oid_to_str(hash_alg, txt2, sizeof(txt2)); 196 pkcs1_v15_sig_ver(struct crypto_public_key *pk, const u8 *s, size_t s_len, const struct asn1_oid *hash_alg, const u8 *hash, size_t hash_len) argument
|
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.h | 26 const struct asn1_oid *hash_alg,
|
H A D | tlsv1_record.h | 45 enum crypto_hash_alg hash_alg; member in struct:tlsv1_record_layer
|
H A D | tlsv1_record.c | 45 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5; 48 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1; 51 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256; 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 436 hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret,
|
H A D | pkcs1.c | 198 const struct asn1_oid *hash_alg, 273 if (!asn1_oid_equal(&oid, hash_alg)) { 276 asn1_oid_to_str(hash_alg, txt2, sizeof(txt2)); 196 pkcs1_v15_sig_ver(struct crypto_public_key *pk, const u8 *s, size_t s_len, const struct asn1_oid *hash_alg, const u8 *hash, size_t hash_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs1.h | 26 const struct asn1_oid *hash_alg,
|
H A D | tlsv1_record.h | 45 enum crypto_hash_alg hash_alg; member in struct:tlsv1_record_layer
|
H A D | tlsv1_record.c | 45 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5; 48 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1; 51 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256; 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 436 hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret,
|
H A D | pkcs1.c | 198 const struct asn1_oid *hash_alg, 273 if (!asn1_oid_equal(&oid, hash_alg)) { 276 asn1_oid_to_str(hash_alg, txt2, sizeof(txt2)); 196 pkcs1_v15_sig_ver(struct crypto_public_key *pk, const u8 *s, size_t s_len, const struct asn1_oid *hash_alg, const u8 *hash, size_t hash_len) argument
|
/external/chromium_org/net/cert/ |
H A D | ct_log_verifier_openssl.cc | 102 const EVP_MD* hash_alg = GetEvpAlg(hash_algorithm_); local 103 if (hash_alg == NULL) 110 1 == EVP_DigestVerifyInit(&ctx, NULL, hash_alg, NULL, public_key_) &&
|
/external/e2fsprogs/debugfs/ |
H A D | htree.c | 45 int hash_alg; local 62 hash_alg = rootnode->hash_version; 63 if ((hash_alg <= EXT2_HASH_TEA) && 65 hash_alg += 3; 87 errcode = ext2fs_dirhash(hash_alg, name, 300 com_err(argv[0], 0, "usage: dx_hash [-h hash_alg] "
|
/external/e2fsprogs/e2fsck/ |
H A D | rehash.c | 92 int hash_alg; local 112 hash_alg = fs->super->s_def_hash_version; 113 if ((hash_alg <= EXT2_HASH_TEA) && 115 hash_alg += 3; 156 fd->err = ext2fs_dirhash(hash_alg, dirent->name, 340 int hash_alg; local 345 hash_alg = fs->super->s_def_hash_version; 346 if ((hash_alg <= EXT2_HASH_TEA) && 348 hash_alg += 3; 386 ext2fs_dirhash(hash_alg, en [all...] |