/external/vboot_reference/tests/ |
H A D | rsa_verify_benchmark.c | 25 uint64_t digest_len, sig_len; local 48 digest = BufferFromFile(file_name, &digest_len);
|
/external/boringssl/src/crypto/ecdsa/ |
H A D | ecdsa_test.cc | 75 size_t digest_len, const ECDSA_SIG *ecdsa_sig, 91 actual_result = ECDSA_verify(0, digest, digest_len, bssl::vector_data(&signature), 97 actual_result = ECDSA_do_verify(digest, digest_len, ecdsa_sig, eckey); 110 size_t digest_len, ECDSA_SIG *ecdsa_sig, 140 !VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 0)) { 149 !VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 1)) { 74 VerifyECDSASig(Api api, const uint8_t *digest, size_t digest_len, const ECDSA_SIG *ecdsa_sig, EC_KEY *eckey, int expected_result) argument 109 TestTamperedSig(FILE *out, Api api, const uint8_t *digest, size_t digest_len, ECDSA_SIG *ecdsa_sig, EC_KEY *eckey, const BIGNUM *order) argument
|
H A D | ecdsa.c | 64 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, argument 67 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey); 70 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, 74 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, argument 81 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey); 97 ret = ECDSA_do_verify(digest, digest_len, s, eckey); 105 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian 108 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, argument 115 if (8 * digest_len > num_bits) { 116 digest_len 133 ECDSA_do_sign(const uint8_t *digest, size_t digest_len, EC_KEY *key) argument 138 ECDSA_do_verify(const uint8_t *digest, size_t digest_len, const ECDSA_SIG *sig, EC_KEY *eckey) argument 234 ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument 356 ECDSA_do_sign_ex(const uint8_t *digest, size_t digest_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey) argument 455 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument [all...] |
/external/boringssl/src/crypto/hkdf/ |
H A D | hkdf.c | 30 const size_t digest_len = EVP_MD_size(digest); local 41 n = (out_len + digest_len - 1) / digest_len; 42 if (out_len + digest_len < out_len || n > 255) { 53 assert(prk_len == digest_len); 64 !HMAC_Update(&hmac, previous, digest_len))) { 73 todo = digest_len;
|
/external/boringssl/src/crypto/digest/ |
H A D | digest_test.cc | 139 size_t digest_len) { 144 for (i = 0; i < digest_len; i++) { 148 digest_hex[2*digest_len] = '\0'; 175 unsigned digest_len; local 176 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) { 180 if (!CompareDigest(test, digest, digest_len)) { 201 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) { 205 if (digest_len != EVP_MD_size(test->md.func())) { 209 if (!CompareDigest(test, digest, digest_len)) { 137 CompareDigest(const TestVector *test, const uint8_t *digest, size_t digest_len) argument
|
/external/openssh/ |
H A D | digest-libc.c | 52 size_t digest_len; member in struct:ssh_digest 158 return digest == NULL ? 0 : digest->digest_len; 223 if (dlen < digest->digest_len) /* No truncation allowed */
|
H A D | digest-openssl.c | 52 size_t digest_len; member in struct:ssh_digest 104 return digest == NULL ? 0 : digest->digest_len; 163 if (dlen < digest->digest_len) /* No truncation allowed */ 167 if (l != digest->digest_len) /* sanity */ 192 if (dlen < digest->digest_len)
|
H A D | dns.c | 82 u_char **digest, size_t *digest_len, struct sshkey *key) 126 digest_len)) != 0) 132 *digest_len = 0; 144 u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) 154 *digest_len = rdata_len - 2; 156 if (*digest_len > 0) { 157 *digest = (u_char *) xmalloc(*digest_len); 158 memcpy(*digest, rdata + 2, *digest_len); 81 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, u_char **digest, size_t *digest_len, struct sshkey *key) argument 143 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) argument
|
/external/boringssl/src/crypto/dsa/ |
H A D | dsa.c | 192 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument 194 return dsa->meth->sign(digest, digest_len, dsa); 196 return DSA_default_method.sign(digest, digest_len, dsa); 199 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, argument 202 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) { 209 size_t digest_len, DSA_SIG *sig, const DSA *dsa) { 211 return dsa->meth->verify(out_valid, digest, digest_len, sig, dsa); 214 return DSA_default_method.verify(out_valid, digest, digest_len, sig, dsa); 217 int DSA_sign(int type, const uint8_t *digest, size_t digest_len, argument 221 s = DSA_do_sign(digest, digest_len, ds 208 DSA_do_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, DSA_SIG *sig, const DSA *dsa) argument 232 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument 241 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument [all...] |
H A D | dsa_impl.c | 80 BIGNUM **rp, const uint8_t *digest, size_t digest_len) { 113 if (digest_len > 0) { 114 ok = BN_generate_dsa_nonce(&k, dsa->q, dsa->priv_key, digest, digest_len, 188 static DSA_SIG *sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument 227 if (digest_len > BN_num_bytes(dsa->q)) { 231 digest_len = BN_num_bytes(dsa->q); 234 if (BN_bin2bn(digest, digest_len, &m) == NULL) { 284 static int verify(int *out_valid, const uint8_t *dgst, size_t digest_len, argument 338 if (digest_len > (i >> 3)) { 342 digest_len 79 sign_setup(const DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument [all...] |
/external/boringssl/src/ssl/ |
H A D | t1_enc.c | 522 unsigned int digest_len; local 533 !EVP_DigestFinal_ex(&ctx, out, &digest_len) || 534 digest_len != hash_size /* internal error */) { 539 out += digest_len; 540 out_len -= digest_len; 541 len += digest_len;
|
H A D | t1_lib.c | 2570 int digest_len; local 2584 digest_len = 2587 if (digest_len < 0) { 2591 s->session->original_handshake_hash_len = digest_len;
|
/external/boringssl/src/tool/ |
H A D | digest.cc | 166 unsigned digest_len; local 167 if (!EVP_DigestFinal_ex(&ctx, digest, &digest_len)) { 174 for (unsigned i = 0; i < digest_len; i++) { 179 *out_hex = std::string(hex_digest, digest_len * 2);
|
/external/conscrypt/src/main/native/ |
H A D | org_conscrypt_NativeCrypto.cpp | 2077 size_t digest_len, 2097 digest_len)); 2119 size_t /* digest_len */, 2076 EcdsaMethodSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len, EC_KEY* ec_key) argument
|