Searched refs:digest_len (Results 1 - 25 of 56) sorted by relevance

123

/external/avb/libavb/
H A Davb_hash_descriptor.c46 dest->digest_len = avb_be32toh(dest->digest_len);
52 !avb_safe_add_to(&expected_size, dest->digest_len)) {
H A Davb_hash_descriptor.h45 * |digest_len| bytes of the digest.
56 uint32_t digest_len; member in struct:AvbHashDescriptor
/external/boringssl/include/openssl/
H A Decdsa.h71 /* ECDSA_sign signs |digest_len| bytes from |digest| with |key| and writes the
77 size_t digest_len, uint8_t *sig,
85 size_t digest_len, const uint8_t *sig,
109 /* ECDSA_do_sign signs |digest_len| bytes from |digest| with |key| and returns
112 size_t digest_len, const EC_KEY *key);
117 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len,
137 size_t digest_len,
144 size_t digest_len, uint8_t *sig,
H A Ddsa.h159 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len,
172 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len,
182 size_t digest_len, DSA_SIG *sig,
198 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len,
215 size_t digest_len, const uint8_t *sig,
225 size_t digest_len, const uint8_t *sig,
/external/boringssl/src/include/openssl/
H A Decdsa.h71 /* ECDSA_sign signs |digest_len| bytes from |digest| with |key| and writes the
77 size_t digest_len, uint8_t *sig,
85 size_t digest_len, const uint8_t *sig,
109 /* ECDSA_do_sign signs |digest_len| bytes from |digest| with |key| and returns
112 size_t digest_len, const EC_KEY *key);
117 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len,
137 size_t digest_len,
144 size_t digest_len, uint8_t *sig,
H A Ddsa.h159 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len,
172 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len,
182 size_t digest_len, DSA_SIG *sig,
198 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len,
215 size_t digest_len, const uint8_t *sig,
225 size_t digest_len, const uint8_t *sig,
/external/webrtc/webrtc/base/
H A Dsslfingerprint.cc34 size_t digest_len; local
36 algorithm, digest_val, sizeof(digest_val), &digest_len);
41 return new SSLFingerprint(algorithm, digest_val, digest_len);
67 size_t digest_len)
69 digest.SetData(digest_in, digest_len);
65 SSLFingerprint(const std::string& algorithm, const uint8_t* digest_in, size_t digest_len) argument
H A Dsslstreamadapterhelper.cc90 size_t digest_len) {
100 if (expected_len != digest_len)
103 peer_certificate_digest_value_.SetData(digest_val, digest_len);
87 SetPeerCertificateDigest( const std::string &digest_alg, const unsigned char* digest_val, size_t digest_len) argument
H A Dsslfingerprint.h36 size_t digest_len);
H A Dsslidentity_unittest.cc118 size_t digest_len; local
123 sizeof(DigestType), &digest_len);
125 EXPECT_EQ(expected_len, digest_len);
130 sizeof(DigestType), &digest_len);
132 EXPECT_EQ(expected_len, digest_len);
165 size_t digest_len; local
170 &digest_len);
172 EXPECT_EQ(expected_len, digest_len);
/external/boringssl/src/crypto/hkdf/
H A Dhkdf.c63 const size_t digest_len = EVP_MD_size(digest); local
71 n = (out_len + digest_len - 1) / digest_len;
72 if (out_len + digest_len < out_len || n > 255) {
87 !HMAC_Update(&hmac, previous, digest_len))) {
96 todo = digest_len;
/external/boringssl/src/fipstools/
H A Dcavp_ecdsa2_sigver_test.cc46 unsigned digest_len; local
51 !EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, nullptr)) {
60 if (ECDSA_do_verify(digest, digest_len, sig.get(), key.get())) {
H A Dcavp_sha_test.cc65 unsigned digest_len; local
66 if (!EVP_Digest(msg.data(), msg_len, out.data(), &digest_len, md, nullptr) ||
67 digest_len != out.size()) {
H A Dcavp_rsa2_sigver_test.cc75 unsigned digest_len; local
77 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) {
83 ok = RSA_verify_pss_mgf1(key.get(), digest_buf, digest_len, md, md, -1,
86 ok = RSA_verify(EVP_MD_type(md), digest_buf, digest_len, sig.data(),
H A Dcavp_sha_monte_test.cc66 unsigned digest_len; local
67 if (!EVP_Digest(msg.data(), msg.size(), out.data(), &digest_len, md,
69 digest_len != out.size()) {
H A Dcavp_ecdsa2_siggen_test.cc53 unsigned digest_len; local
59 digest_len = EVP_MD_size(md);
61 } else if (!EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md,
66 bssl::UniquePtr<ECDSA_SIG> sig(ECDSA_do_sign(digest, digest_len, key.get()));
H A Dcavp_rsa2_siggen_test.cc79 unsigned digest_len; local
82 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) {
88 digest_buf, digest_len, md, md, -1)) {
93 if (!RSA_sign(EVP_MD_type(md), digest_buf, digest_len, sig.data(),
/external/boringssl/src/crypto/digest_extra/
H A Ddigest_test.cc146 size_t digest_len) {
150 for (size_t i = 0; i < digest_len; i++) {
154 digest_hex[2*digest_len] = '\0';
168 unsigned digest_len; local
169 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len));
170 CompareDigest(test, digest.get(), digest_len);
180 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len));
181 EXPECT_EQ(EVP_MD_size(test->md.func()), digest_len);
182 CompareDigest(test, digest.get(), digest_len);
144 CompareDigest(const TestVector *test, const uint8_t *digest, size_t digest_len) argument
/external/boringssl/src/crypto/fipsmodule/ecdsa/
H A Decdsa.c67 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian
70 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, argument
77 if (8 * digest_len > num_bits) {
78 digest_len = (num_bits + 7) / 8;
80 if (!BN_bin2bn(digest, digest_len, out)) {
86 if ((8 * digest_len > num_bits) &&
119 ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest, size_t digest_len, argument
121 return ECDSA_do_sign_ex(digest, digest_len, NULL, NULL, key);
124 int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, argument
169 if (!digest_to_bn(m, digest, digest_len, orde
215 ecdsa_sign_setup(const EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument
349 ECDSA_do_sign_ex(const uint8_t *digest, size_t digest_len, const BIGNUM *in_kinv, const BIGNUM *in_r, const EC_KEY *eckey) argument
[all...]
/external/openssh/
H A Ddns.c82 u_char **digest, size_t *digest_len, struct sshkey *key)
126 digest_len)) != 0)
132 *digest_len = 0;
144 u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len)
154 *digest_len = rdata_len - 2;
156 if (*digest_len > 0) {
157 *digest = xmalloc(*digest_len);
158 memcpy(*digest, rdata + 2, *digest_len);
81 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, u_char **digest, size_t *digest_len, struct sshkey *key) argument
143 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) argument
H A Ddigest-openssl.c52 size_t digest_len; member in struct:ssh_digest
104 return digest == NULL ? 0 : digest->digest_len;
163 if (dlen < digest->digest_len) /* No truncation allowed */
167 if (l != digest->digest_len) /* sanity */
192 if (dlen < digest->digest_len)
/external/selinux/libselinux/utils/
H A Dselabel_digest.c9 static size_t digest_len; variable
47 rc = strncmp(selabel_digest, files_ptr + 1, digest_len * 2);
140 rc = selabel_digest(hnd, &sha1_digest, &digest_len, &specfiles,
155 sha1_buf = malloc(digest_len * 2 + 1);
164 for (i = 0; i < digest_len; i++)
/external/boringssl/src/crypto/ecdsa_extra/
H A Decdsa_asn1.c69 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, argument
72 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len,
76 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL,
80 int ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, argument
92 s = ECDSA_do_sign_ex(digest, digest_len, kinv, r, eckey);
117 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, argument
138 ret = ECDSA_do_verify(digest, digest_len, s, eckey);
/external/vboot_reference/tests/
H A Drsa_verify_benchmark.c25 uint64_t digest_len, sig_len; local
48 digest = BufferFromFile(file_name, &digest_len);
/external/boringssl/src/crypto/dsa/
H A Ddsa.c507 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument
546 if (digest_len > BN_num_bytes(dsa->q)) {
550 digest_len = BN_num_bytes(dsa->q);
553 if (BN_bin2bn(digest, digest_len, &m) == NULL) {
603 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, argument
606 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) {
613 size_t digest_len, DSA_SIG *sig, const DSA *dsa) {
665 if (digest_len > (i >> 3)) {
669 digest_len = (i >> 3);
672 if (BN_bin2bn(digest, digest_len,
612 DSA_do_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, DSA_SIG *sig, const DSA *dsa) argument
720 DSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *out_sig, unsigned int *out_siglen, DSA *dsa) argument
735 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
744 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
[all...]

Completed in 879 milliseconds

123