Searched defs:digest_len (Results 1 - 14 of 14) sorted by relevance

/external/vboot_reference/tests/
H A Drsa_verify_benchmark.c25 uint64_t digest_len, sig_len; local
48 digest = BufferFromFile(file_name, &digest_len);
/external/boringssl/src/crypto/ecdsa/
H A Decdsa_test.cc75 size_t digest_len, const ECDSA_SIG *ecdsa_sig,
91 actual_result = ECDSA_verify(0, digest, digest_len, bssl::vector_data(&signature),
97 actual_result = ECDSA_do_verify(digest, digest_len, ecdsa_sig, eckey);
110 size_t digest_len, ECDSA_SIG *ecdsa_sig,
140 !VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 0)) {
149 !VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 1)) {
74 VerifyECDSASig(Api api, const uint8_t *digest, size_t digest_len, const ECDSA_SIG *ecdsa_sig, EC_KEY *eckey, int expected_result) argument
109 TestTamperedSig(FILE *out, Api api, const uint8_t *digest, size_t digest_len, ECDSA_SIG *ecdsa_sig, EC_KEY *eckey, const BIGNUM *order) argument
H A Decdsa.c64 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, argument
67 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey);
70 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL,
74 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, argument
81 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey);
97 ret = ECDSA_do_verify(digest, digest_len, s, eckey);
105 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian
108 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, argument
115 if (8 * digest_len > num_bits) {
116 digest_len
133 ECDSA_do_sign(const uint8_t *digest, size_t digest_len, EC_KEY *key) argument
138 ECDSA_do_verify(const uint8_t *digest, size_t digest_len, const ECDSA_SIG *sig, EC_KEY *eckey) argument
234 ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument
356 ECDSA_do_sign_ex(const uint8_t *digest, size_t digest_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey) argument
455 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
[all...]
/external/boringssl/src/crypto/hkdf/
H A Dhkdf.c30 const size_t digest_len = EVP_MD_size(digest); local
41 n = (out_len + digest_len - 1) / digest_len;
42 if (out_len + digest_len < out_len || n > 255) {
53 assert(prk_len == digest_len);
64 !HMAC_Update(&hmac, previous, digest_len))) {
73 todo = digest_len;
/external/boringssl/src/crypto/digest/
H A Ddigest_test.cc139 size_t digest_len) {
144 for (i = 0; i < digest_len; i++) {
148 digest_hex[2*digest_len] = '\0';
175 unsigned digest_len; local
176 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) {
180 if (!CompareDigest(test, digest, digest_len)) {
201 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) {
205 if (digest_len != EVP_MD_size(test->md.func())) {
209 if (!CompareDigest(test, digest, digest_len)) {
137 CompareDigest(const TestVector *test, const uint8_t *digest, size_t digest_len) argument
/external/openssh/
H A Ddigest-libc.c52 size_t digest_len; member in struct:ssh_digest
158 return digest == NULL ? 0 : digest->digest_len;
223 if (dlen < digest->digest_len) /* No truncation allowed */
H A Ddigest-openssl.c52 size_t digest_len; member in struct:ssh_digest
104 return digest == NULL ? 0 : digest->digest_len;
163 if (dlen < digest->digest_len) /* No truncation allowed */
167 if (l != digest->digest_len) /* sanity */
192 if (dlen < digest->digest_len)
H A Ddns.c82 u_char **digest, size_t *digest_len, struct sshkey *key)
126 digest_len)) != 0)
132 *digest_len = 0;
144 u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len)
154 *digest_len = rdata_len - 2;
156 if (*digest_len > 0) {
157 *digest = (u_char *) xmalloc(*digest_len);
158 memcpy(*digest, rdata + 2, *digest_len);
81 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, u_char **digest, size_t *digest_len, struct sshkey *key) argument
143 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) argument
/external/boringssl/src/crypto/dsa/
H A Ddsa.c192 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument
194 return dsa->meth->sign(digest, digest_len, dsa);
196 return DSA_default_method.sign(digest, digest_len, dsa);
199 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, argument
202 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) {
209 size_t digest_len, DSA_SIG *sig, const DSA *dsa) {
211 return dsa->meth->verify(out_valid, digest, digest_len, sig, dsa);
214 return DSA_default_method.verify(out_valid, digest, digest_len, sig, dsa);
217 int DSA_sign(int type, const uint8_t *digest, size_t digest_len, argument
221 s = DSA_do_sign(digest, digest_len, ds
208 DSA_do_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, DSA_SIG *sig, const DSA *dsa) argument
232 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
241 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
[all...]
H A Ddsa_impl.c80 BIGNUM **rp, const uint8_t *digest, size_t digest_len) {
113 if (digest_len > 0) {
114 ok = BN_generate_dsa_nonce(&k, dsa->q, dsa->priv_key, digest, digest_len,
188 static DSA_SIG *sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument
227 if (digest_len > BN_num_bytes(dsa->q)) {
231 digest_len = BN_num_bytes(dsa->q);
234 if (BN_bin2bn(digest, digest_len, &m) == NULL) {
284 static int verify(int *out_valid, const uint8_t *dgst, size_t digest_len, argument
338 if (digest_len > (i >> 3)) {
342 digest_len
79 sign_setup(const DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument
[all...]
/external/boringssl/src/ssl/
H A Dt1_enc.c522 unsigned int digest_len; local
533 !EVP_DigestFinal_ex(&ctx, out, &digest_len) ||
534 digest_len != hash_size /* internal error */) {
539 out += digest_len;
540 out_len -= digest_len;
541 len += digest_len;
H A Dt1_lib.c2570 int digest_len; local
2584 digest_len =
2587 if (digest_len < 0) {
2591 s->session->original_handshake_hash_len = digest_len;
/external/boringssl/src/tool/
H A Ddigest.cc166 unsigned digest_len; local
167 if (!EVP_DigestFinal_ex(&ctx, digest, &digest_len)) {
174 for (unsigned i = 0; i < digest_len; i++) {
179 *out_hex = std::string(hex_digest, digest_len * 2);
/external/conscrypt/src/main/native/
H A Dorg_conscrypt_NativeCrypto.cpp2077 size_t digest_len,
2097 digest_len));
2119 size_t /* digest_len */,
2076 EcdsaMethodSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len, EC_KEY* ec_key) argument

Completed in 948 milliseconds