Searched defs:digest_len (Results 1 - 20 of 20) sorted by relevance

/external/vboot_reference/tests/
H A Drsa_verify_benchmark.c25 uint64_t digest_len, sig_len; local
48 digest = BufferFromFile(file_name, &digest_len);
/external/webrtc/webrtc/base/
H A Dsslfingerprint.cc34 size_t digest_len; local
36 algorithm, digest_val, sizeof(digest_val), &digest_len);
41 return new SSLFingerprint(algorithm, digest_val, digest_len);
67 size_t digest_len)
69 digest.SetData(digest_in, digest_len);
65 SSLFingerprint(const std::string& algorithm, const uint8_t* digest_in, size_t digest_len) argument
H A Dsslstreamadapterhelper.cc90 size_t digest_len) {
100 if (expected_len != digest_len)
103 peer_certificate_digest_value_.SetData(digest_val, digest_len);
87 SetPeerCertificateDigest( const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
H A Dssladapter_unittest.cc250 size_t digest_len = sizeof(digest); local
252 digest_len);
H A Dsslidentity_unittest.cc118 size_t digest_len; local
123 sizeof(DigestType), &digest_len);
125 EXPECT_EQ(expected_len, digest_len);
130 sizeof(DigestType), &digest_len);
132 EXPECT_EQ(expected_len, digest_len);
165 size_t digest_len; local
170 &digest_len);
172 EXPECT_EQ(expected_len, digest_len);
H A Dopensslstreamadapter.cc337 size_t digest_len) {
347 if (expected_len != digest_len)
350 peer_certificate_digest_value_.SetData(digest_val, digest_len);
333 SetPeerCertificateDigest(const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
H A Dsslstreamadapter_unittest.cc330 size_t digest_len; local
337 &digest_len);
344 digest_len);
349 digest, 20, &digest_len);
356 digest_len);
/external/boringssl/src/crypto/hkdf/
H A Dhkdf.c30 const size_t digest_len = EVP_MD_size(digest); local
41 n = (out_len + digest_len - 1) / digest_len;
42 if (out_len + digest_len < out_len || n > 255) {
53 assert(prk_len == digest_len);
64 !HMAC_Update(&hmac, previous, digest_len))) {
73 todo = digest_len;
/external/selinux/libselinux/utils/
H A Dselabel_digest.c9 static size_t digest_len; variable
47 rc = strncmp(selabel_digest, files_ptr + 1, digest_len * 2);
138 rc = selabel_digest(hnd, &sha1_digest, &digest_len, &specfiles,
153 sha1_buf = malloc(digest_len * 2 + 1);
162 for (i = 0; i < digest_len; i++)
/external/boringssl/src/crypto/digest/
H A Ddigest_test.cc139 size_t digest_len) {
144 for (i = 0; i < digest_len; i++) {
148 digest_hex[2*digest_len] = '\0';
175 unsigned digest_len; local
176 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) {
180 if (!CompareDigest(test, digest, digest_len)) {
201 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) {
205 if (digest_len != EVP_MD_size(test->md.func())) {
209 if (!CompareDigest(test, digest, digest_len)) {
137 CompareDigest(const TestVector *test, const uint8_t *digest, size_t digest_len) argument
/external/boringssl/src/crypto/ecdsa/
H A Decdsa_test.cc74 size_t digest_len, const ECDSA_SIG *ecdsa_sig,
86 actual_result = ECDSA_verify(0, digest, digest_len, der, der_len, eckey);
91 actual_result = ECDSA_do_verify(digest, digest_len, ecdsa_sig, eckey);
104 size_t digest_len, ECDSA_SIG *ecdsa_sig,
132 !VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 0)) {
140 !VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 1)) {
73 VerifyECDSASig(Api api, const uint8_t *digest, size_t digest_len, const ECDSA_SIG *ecdsa_sig, EC_KEY *eckey, int expected_result) argument
103 TestTamperedSig(FILE *out, Api api, const uint8_t *digest, size_t digest_len, ECDSA_SIG *ecdsa_sig, EC_KEY *eckey, const BIGNUM *order) argument
H A Decdsa.c66 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, argument
69 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey);
72 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL,
76 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, argument
83 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey);
101 ret = ECDSA_do_verify(digest, digest_len, s, eckey);
109 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian
112 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, argument
119 if (8 * digest_len > num_bits) {
120 digest_len
137 ECDSA_do_sign(const uint8_t *digest, size_t digest_len, EC_KEY *key) argument
142 ECDSA_do_verify(const uint8_t *digest, size_t digest_len, const ECDSA_SIG *sig, EC_KEY *eckey) argument
233 ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument
364 ECDSA_do_sign_ex(const uint8_t *digest, size_t digest_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey) argument
461 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
[all...]
/external/selinux/libselinux/src/
H A Dlabel.c446 unsigned char **digest, size_t *digest_len,
455 *digest_len = DIGEST_SPECFILE_SIZE;
445 selabel_digest(struct selabel_handle *rec, unsigned char **digest, size_t *digest_len, char ***specfiles, size_t *num_specfiles) argument
/external/boringssl/src/tool/
H A Ddigest.cc166 unsigned digest_len; local
167 if (!EVP_DigestFinal_ex(&ctx, digest, &digest_len)) {
174 for (unsigned i = 0; i < digest_len; i++) {
179 *out_hex = std::string(hex_digest, digest_len * 2);
/external/webrtc/webrtc/p2p/base/
H A Ddtlstransportchannel.cc201 size_t digest_len) {
202 rtc::Buffer remote_fingerprint_value(digest, digest_len);
215 RTC_DCHECK(!digest_len);
198 SetRemoteFingerprint( const std::string& digest_alg, const uint8_t* digest, size_t digest_len) argument
/external/boringssl/src/crypto/dsa/
H A Ddsa.c473 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument
512 if (digest_len > BN_num_bytes(dsa->q)) {
516 digest_len = BN_num_bytes(dsa->q);
519 if (BN_bin2bn(digest, digest_len, &m) == NULL) {
569 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, argument
572 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) {
579 size_t digest_len, DSA_SIG *sig, const DSA *dsa) {
632 if (digest_len > (i >> 3)) {
636 digest_len = (i >> 3);
639 if (BN_bin2bn(digest, digest_len,
578 DSA_do_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, DSA_SIG *sig, const DSA *dsa) argument
688 DSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *out_sig, unsigned int *out_siglen, DSA *dsa) argument
703 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
712 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
[all...]
/external/boringssl/src/ssl/
H A Ds3_clnt.c1808 size_t digest_len; local
1809 if (!ssl3_cert_verify_hash(ssl, digest, &digest_len, &md,
1824 digest, digest_len);
2036 size_t digest_len; local
2037 if (!tls1_channel_id_hash(ssl, digest, &digest_len)) {
2041 sig = ECDSA_do_sign(digest, digest_len, ec_key);
H A Ds3_srvr.c1323 unsigned digest_len = 0; local
1331 EVP_DigestFinal_ex(&md_ctx, digest, &digest_len);
1340 digest, digest_len);
H A Dt1_lib.c2818 int digest_len; local
2826 digest_len =
2829 if (digest_len < 0) {
2833 ssl->session->original_handshake_hash_len = digest_len;
/external/conscrypt/src/main/native/
H A Dorg_conscrypt_NativeCrypto.cpp2081 size_t digest_len,
2101 digest_len));
2123 size_t /* digest_len */,
2080 EcdsaMethodSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len, EC_KEY* ec_key) argument

Completed in 732 milliseconds