/external/boringssl/src/crypto/hkdf/ |
H A D | hkdf.c | 30 const size_t digest_len = EVP_MD_size(digest); local 41 n = (out_len + digest_len - 1) / digest_len; 42 if (out_len + digest_len < out_len || n > 255) { 53 assert(prk_len == digest_len); 64 !HMAC_Update(&hmac, previous, digest_len))) { 73 todo = digest_len;
|
/external/boringssl/include/openssl/ |
H A D | ecdsa.h | 71 /* ECDSA_sign signs |digest_len| bytes from |digest| with |key| and writes the 77 size_t digest_len, uint8_t *sig, 85 size_t digest_len, const uint8_t *sig, 109 /* ECDSA_do_sign signs |digest_len| bytes from |digest| with |key| and returns 112 size_t digest_len, EC_KEY *key); 117 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, 137 size_t digest_len, 144 size_t digest_len, uint8_t *sig,
|
H A D | dsa.h | 145 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, 158 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len, 168 size_t digest_len, DSA_SIG *sig, 184 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len, 201 size_t digest_len, const uint8_t *sig, 211 size_t digest_len, const uint8_t *sig,
|
H A D | ec_key.h | 259 int (*sign)(const uint8_t *digest, size_t digest_len, uint8_t *sig, 263 int (*verify)(const uint8_t *digest, size_t digest_len, const uint8_t *sig,
|
/external/boringssl/src/include/openssl/ |
H A D | ecdsa.h | 71 /* ECDSA_sign signs |digest_len| bytes from |digest| with |key| and writes the 77 size_t digest_len, uint8_t *sig, 85 size_t digest_len, const uint8_t *sig, 109 /* ECDSA_do_sign signs |digest_len| bytes from |digest| with |key| and returns 112 size_t digest_len, EC_KEY *key); 117 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, 137 size_t digest_len, 144 size_t digest_len, uint8_t *sig,
|
H A D | dsa.h | 145 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, 158 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len, 168 size_t digest_len, DSA_SIG *sig, 184 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len, 201 size_t digest_len, const uint8_t *sig, 211 size_t digest_len, const uint8_t *sig,
|
H A D | ec_key.h | 259 int (*sign)(const uint8_t *digest, size_t digest_len, uint8_t *sig, 263 int (*verify)(const uint8_t *digest, size_t digest_len, const uint8_t *sig,
|
/external/webrtc/webrtc/base/ |
H A D | sslfingerprint.cc | 34 size_t digest_len; local 36 algorithm, digest_val, sizeof(digest_val), &digest_len); 41 return new SSLFingerprint(algorithm, digest_val, digest_len); 67 size_t digest_len) 69 digest.SetData(digest_in, digest_len); 65 SSLFingerprint(const std::string& algorithm, const uint8_t* digest_in, size_t digest_len) argument
|
H A D | sslstreamadapterhelper.cc | 90 size_t digest_len) { 100 if (expected_len != digest_len) 103 peer_certificate_digest_value_.SetData(digest_val, digest_len); 87 SetPeerCertificateDigest( const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
|
H A D | sslfingerprint.h | 36 size_t digest_len);
|
H A D | sslidentity_unittest.cc | 118 size_t digest_len; local 123 sizeof(DigestType), &digest_len); 125 EXPECT_EQ(expected_len, digest_len); 130 sizeof(DigestType), &digest_len); 132 EXPECT_EQ(expected_len, digest_len); 165 size_t digest_len; local 170 &digest_len); 172 EXPECT_EQ(expected_len, digest_len);
|
H A D | sslstreamadapterhelper.h | 43 size_t digest_len) override;
|
H A D | sslstreamadapter.h | 153 size_t digest_len) = 0;
|
H A D | opensslstreamadapter.h | 70 size_t digest_len) override;
|
H A D | ssladapter_unittest.cc | 250 size_t digest_len = sizeof(digest); local 252 digest_len);
|
/external/boringssl/src/crypto/digest/ |
H A D | digest_test.cc | 139 size_t digest_len) { 144 for (i = 0; i < digest_len; i++) { 148 digest_hex[2*digest_len] = '\0'; 175 unsigned digest_len; local 176 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) { 180 if (!CompareDigest(test, digest, digest_len)) { 201 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) { 205 if (digest_len != EVP_MD_size(test->md.func())) { 209 if (!CompareDigest(test, digest, digest_len)) { 137 CompareDigest(const TestVector *test, const uint8_t *digest, size_t digest_len) argument
|
/external/boringssl/src/crypto/ecdsa/ |
H A D | ecdsa.c | 66 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, argument 69 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey); 72 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, 76 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, argument 83 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey); 101 ret = ECDSA_do_verify(digest, digest_len, s, eckey); 109 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian 112 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, argument 119 if (8 * digest_len > num_bits) { 120 digest_len 137 ECDSA_do_sign(const uint8_t *digest, size_t digest_len, EC_KEY *key) argument 142 ECDSA_do_verify(const uint8_t *digest, size_t digest_len, const ECDSA_SIG *sig, EC_KEY *eckey) argument 233 ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument 364 ECDSA_do_sign_ex(const uint8_t *digest, size_t digest_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey) argument 461 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument [all...] |
H A D | ecdsa_test.cc | 74 size_t digest_len, const ECDSA_SIG *ecdsa_sig, 86 actual_result = ECDSA_verify(0, digest, digest_len, der, der_len, eckey); 91 actual_result = ECDSA_do_verify(digest, digest_len, ecdsa_sig, eckey); 104 size_t digest_len, ECDSA_SIG *ecdsa_sig, 132 !VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 0)) { 140 !VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 1)) { 73 VerifyECDSASig(Api api, const uint8_t *digest, size_t digest_len, const ECDSA_SIG *ecdsa_sig, EC_KEY *eckey, int expected_result) argument 103 TestTamperedSig(FILE *out, Api api, const uint8_t *digest, size_t digest_len, ECDSA_SIG *ecdsa_sig, EC_KEY *eckey, const BIGNUM *order) argument
|
/external/selinux/libselinux/utils/ |
H A D | selabel_digest.c | 9 static size_t digest_len; variable 47 rc = strncmp(selabel_digest, files_ptr + 1, digest_len * 2); 138 rc = selabel_digest(hnd, &sha1_digest, &digest_len, &specfiles, 153 sha1_buf = malloc(digest_len * 2 + 1); 162 for (i = 0; i < digest_len; i++)
|
/external/vboot_reference/tests/ |
H A D | rsa_verify_benchmark.c | 25 uint64_t digest_len, sig_len; local 48 digest = BufferFromFile(file_name, &digest_len);
|
/external/boringssl/src/crypto/dsa/ |
H A D | dsa.c | 473 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument 512 if (digest_len > BN_num_bytes(dsa->q)) { 516 digest_len = BN_num_bytes(dsa->q); 519 if (BN_bin2bn(digest, digest_len, &m) == NULL) { 569 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, argument 572 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) { 579 size_t digest_len, DSA_SIG *sig, const DSA *dsa) { 632 if (digest_len > (i >> 3)) { 636 digest_len = (i >> 3); 639 if (BN_bin2bn(digest, digest_len, 578 DSA_do_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, DSA_SIG *sig, const DSA *dsa) argument 688 DSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *out_sig, unsigned int *out_siglen, DSA *dsa) argument 703 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument 712 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument [all...] |
/external/selinux/libselinux/include/selinux/ |
H A D | label.h | 117 * @digest_len: returns length of digest in bytes. 125 unsigned char **digest, size_t *digest_len,
|
/external/webrtc/webrtc/p2p/base/ |
H A D | transportchannelimpl.h | 94 size_t digest_len) = 0;
|
H A D | dtlstransportchannel.cc | 201 size_t digest_len) { 202 rtc::Buffer remote_fingerprint_value(digest, digest_len); 215 RTC_DCHECK(!digest_len); 198 SetRemoteFingerprint( const std::string& digest_alg, const uint8_t* digest, size_t digest_len) argument
|
/external/boringssl/src/tool/ |
H A D | digest.cc | 166 unsigned digest_len; local 167 if (!EVP_DigestFinal_ex(&ctx, digest, &digest_len)) { 174 for (unsigned i = 0; i < digest_len; i++) { 179 *out_hex = std::string(hex_digest, digest_len * 2);
|