/external/avb/libavb/ |
H A D | avb_hash_descriptor.c | 46 dest->digest_len = avb_be32toh(dest->digest_len); 52 !avb_safe_add_to(&expected_size, dest->digest_len)) {
|
H A D | avb_hash_descriptor.h | 45 * |digest_len| bytes of the digest. 56 uint32_t digest_len; member in struct:AvbHashDescriptor
|
/external/boringssl/include/openssl/ |
H A D | ecdsa.h | 71 /* ECDSA_sign signs |digest_len| bytes from |digest| with |key| and writes the 77 size_t digest_len, uint8_t *sig, 85 size_t digest_len, const uint8_t *sig, 109 /* ECDSA_do_sign signs |digest_len| bytes from |digest| with |key| and returns 112 size_t digest_len, const EC_KEY *key); 117 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, 137 size_t digest_len, 144 size_t digest_len, uint8_t *sig,
|
H A D | dsa.h | 159 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, 172 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len, 182 size_t digest_len, DSA_SIG *sig, 198 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len, 215 size_t digest_len, const uint8_t *sig, 225 size_t digest_len, const uint8_t *sig,
|
/external/boringssl/src/include/openssl/ |
H A D | ecdsa.h | 71 /* ECDSA_sign signs |digest_len| bytes from |digest| with |key| and writes the 77 size_t digest_len, uint8_t *sig, 85 size_t digest_len, const uint8_t *sig, 109 /* ECDSA_do_sign signs |digest_len| bytes from |digest| with |key| and returns 112 size_t digest_len, const EC_KEY *key); 117 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, 137 size_t digest_len, 144 size_t digest_len, uint8_t *sig,
|
H A D | dsa.h | 159 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, 172 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len, 182 size_t digest_len, DSA_SIG *sig, 198 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len, 215 size_t digest_len, const uint8_t *sig, 225 size_t digest_len, const uint8_t *sig,
|
/external/webrtc/webrtc/base/ |
H A D | sslfingerprint.cc | 34 size_t digest_len; local 36 algorithm, digest_val, sizeof(digest_val), &digest_len); 41 return new SSLFingerprint(algorithm, digest_val, digest_len); 67 size_t digest_len) 69 digest.SetData(digest_in, digest_len); 65 SSLFingerprint(const std::string& algorithm, const uint8_t* digest_in, size_t digest_len) argument
|
H A D | sslstreamadapterhelper.cc | 90 size_t digest_len) { 100 if (expected_len != digest_len) 103 peer_certificate_digest_value_.SetData(digest_val, digest_len); 87 SetPeerCertificateDigest( const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
|
H A D | sslfingerprint.h | 36 size_t digest_len);
|
H A D | sslidentity_unittest.cc | 118 size_t digest_len; local 123 sizeof(DigestType), &digest_len); 125 EXPECT_EQ(expected_len, digest_len); 130 sizeof(DigestType), &digest_len); 132 EXPECT_EQ(expected_len, digest_len); 165 size_t digest_len; local 170 &digest_len); 172 EXPECT_EQ(expected_len, digest_len);
|
/external/boringssl/src/crypto/hkdf/ |
H A D | hkdf.c | 63 const size_t digest_len = EVP_MD_size(digest); local 71 n = (out_len + digest_len - 1) / digest_len; 72 if (out_len + digest_len < out_len || n > 255) { 87 !HMAC_Update(&hmac, previous, digest_len))) { 96 todo = digest_len;
|
/external/boringssl/src/fipstools/ |
H A D | cavp_ecdsa2_sigver_test.cc | 46 unsigned digest_len; local 51 !EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, nullptr)) { 60 if (ECDSA_do_verify(digest, digest_len, sig.get(), key.get())) {
|
H A D | cavp_sha_test.cc | 65 unsigned digest_len; local 66 if (!EVP_Digest(msg.data(), msg_len, out.data(), &digest_len, md, nullptr) || 67 digest_len != out.size()) {
|
H A D | cavp_rsa2_sigver_test.cc | 75 unsigned digest_len; local 77 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) { 83 ok = RSA_verify_pss_mgf1(key.get(), digest_buf, digest_len, md, md, -1, 86 ok = RSA_verify(EVP_MD_type(md), digest_buf, digest_len, sig.data(),
|
H A D | cavp_sha_monte_test.cc | 66 unsigned digest_len; local 67 if (!EVP_Digest(msg.data(), msg.size(), out.data(), &digest_len, md, 69 digest_len != out.size()) {
|
H A D | cavp_ecdsa2_siggen_test.cc | 53 unsigned digest_len; local 59 digest_len = EVP_MD_size(md); 61 } else if (!EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, 66 bssl::UniquePtr<ECDSA_SIG> sig(ECDSA_do_sign(digest, digest_len, key.get()));
|
H A D | cavp_rsa2_siggen_test.cc | 79 unsigned digest_len; local 82 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) { 88 digest_buf, digest_len, md, md, -1)) { 93 if (!RSA_sign(EVP_MD_type(md), digest_buf, digest_len, sig.data(),
|
/external/boringssl/src/crypto/digest_extra/ |
H A D | digest_test.cc | 146 size_t digest_len) { 150 for (size_t i = 0; i < digest_len; i++) { 154 digest_hex[2*digest_len] = '\0'; 168 unsigned digest_len; local 169 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); 170 CompareDigest(test, digest.get(), digest_len); 180 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); 181 EXPECT_EQ(EVP_MD_size(test->md.func()), digest_len); 182 CompareDigest(test, digest.get(), digest_len); 144 CompareDigest(const TestVector *test, const uint8_t *digest, size_t digest_len) argument
|
/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
H A D | ecdsa.c | 67 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian 70 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, argument 77 if (8 * digest_len > num_bits) { 78 digest_len = (num_bits + 7) / 8; 80 if (!BN_bin2bn(digest, digest_len, out)) { 86 if ((8 * digest_len > num_bits) && 119 ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest, size_t digest_len, argument 121 return ECDSA_do_sign_ex(digest, digest_len, NULL, NULL, key); 124 int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, argument 169 if (!digest_to_bn(m, digest, digest_len, orde 215 ecdsa_sign_setup(const EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument 349 ECDSA_do_sign_ex(const uint8_t *digest, size_t digest_len, const BIGNUM *in_kinv, const BIGNUM *in_r, const EC_KEY *eckey) argument [all...] |
/external/openssh/ |
H A D | dns.c | 82 u_char **digest, size_t *digest_len, struct sshkey *key) 126 digest_len)) != 0) 132 *digest_len = 0; 144 u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) 154 *digest_len = rdata_len - 2; 156 if (*digest_len > 0) { 157 *digest = xmalloc(*digest_len); 158 memcpy(*digest, rdata + 2, *digest_len); 81 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, u_char **digest, size_t *digest_len, struct sshkey *key) argument 143 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) argument
|
H A D | digest-openssl.c | 52 size_t digest_len; member in struct:ssh_digest 104 return digest == NULL ? 0 : digest->digest_len; 163 if (dlen < digest->digest_len) /* No truncation allowed */ 167 if (l != digest->digest_len) /* sanity */ 192 if (dlen < digest->digest_len)
|
/external/selinux/libselinux/utils/ |
H A D | selabel_digest.c | 9 static size_t digest_len; variable 47 rc = strncmp(selabel_digest, files_ptr + 1, digest_len * 2); 140 rc = selabel_digest(hnd, &sha1_digest, &digest_len, &specfiles, 155 sha1_buf = malloc(digest_len * 2 + 1); 164 for (i = 0; i < digest_len; i++)
|
/external/boringssl/src/crypto/ecdsa_extra/ |
H A D | ecdsa_asn1.c | 69 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, argument 72 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, 76 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, 80 int ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, argument 92 s = ECDSA_do_sign_ex(digest, digest_len, kinv, r, eckey); 117 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, argument 138 ret = ECDSA_do_verify(digest, digest_len, s, eckey);
|
/external/vboot_reference/tests/ |
H A D | rsa_verify_benchmark.c | 25 uint64_t digest_len, sig_len; local 48 digest = BufferFromFile(file_name, &digest_len);
|
/external/boringssl/src/crypto/dsa/ |
H A D | dsa.c | 507 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument 546 if (digest_len > BN_num_bytes(dsa->q)) { 550 digest_len = BN_num_bytes(dsa->q); 553 if (BN_bin2bn(digest, digest_len, &m) == NULL) { 603 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, argument 606 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) { 613 size_t digest_len, DSA_SIG *sig, const DSA *dsa) { 665 if (digest_len > (i >> 3)) { 669 digest_len = (i >> 3); 672 if (BN_bin2bn(digest, digest_len, 612 DSA_do_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, DSA_SIG *sig, const DSA *dsa) argument 720 DSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *out_sig, unsigned int *out_siglen, DSA *dsa) argument 735 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument 744 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument [all...] |