/system/update_engine/common/ |
H A D | hash_calculator.cc | 31 valid_ = (SHA256_Init(&ctx_) == 1); 42 TEST_AND_RETURN_FALSE(SHA256_Update(&ctx_, data, length) == 1); 79 TEST_AND_RETURN_FALSE(SHA256_Final(raw_hash_.data(), &ctx_) == 1); 113 return string(reinterpret_cast<const char*>(&ctx_), sizeof(ctx_)); 117 TEST_AND_RETURN_FALSE(context.size() == sizeof(ctx_)); 118 memcpy(&ctx_, context.data(), sizeof(ctx_));
|
H A D | hash_calculator.h | 88 SHA256_CTX ctx_; member in class:chromeos_update_engine::HashCalculator
|
/system/keymaster/ |
H A D | hmac_operation.cpp | 97 HMAC_CTX_init(&ctx_); 138 HMAC_Init_ex(&ctx_, key_data, key_data_size, md, NULL /* engine */); 142 HMAC_CTX_cleanup(&ctx_); 153 if (!HMAC_Update(&ctx_, input.peek_read(), input.available_read())) 172 if (!HMAC_Final(&ctx_, digest, &digest_len))
|
H A D | openssl_utils.h | 37 explicit EvpMdCtxCleaner(EVP_MD_CTX* ctx) : ctx_(ctx) {} 38 ~EvpMdCtxCleaner() { EVP_MD_CTX_cleanup(ctx_); } 41 EVP_MD_CTX* ctx_; member in class:keymaster::EvpMdCtxCleaner
|
H A D | ocb_utils.cpp | 36 AeCtx() : ctx_(ae_allocate(NULL)) {} 38 ae_clear(ctx_); 39 ae_free(ctx_); 42 ae_ctx* get() { return ctx_; } 45 ae_ctx* ctx_; member in class:keymaster::AeCtx
|
H A D | integrity_assured_key_blob.cpp | 45 explicit HmacCleanup(HMAC_CTX* ctx) : ctx_(ctx) {} 46 ~HmacCleanup() { HMAC_CTX_cleanup(ctx_); } 49 HMAC_CTX* ctx_; member in class:keymaster::HmacCleanup
|
H A D | hmac_operation.h | 45 HMAC_CTX ctx_; member in class:keymaster::HmacOperation
|
H A D | aes_operation.cpp | 173 EVP_CIPHER_CTX_init(&ctx_); 177 EVP_CIPHER_CTX_cleanup(&ctx_); 228 if (!EVP_CipherFinal_ex(&ctx_, output->peek_write(), &output_written)) { 323 if (!EVP_CipherInit_ex(&ctx_, cipher, NULL /* engine */, key_, iv_.get(), evp_encrypt_mode())) 328 EVP_CIPHER_CTX_set_padding(&ctx_, 0 /* disable padding */); 417 if (EVP_CipherUpdate(&ctx_, nullptr /* out */, &output_written, aad_block_buf_.get(), 429 if (EVP_CipherUpdate(&ctx_, nullptr /* out */, &output_written, data, blocks * AES_BLOCK_SIZE)) 461 if (!EVP_CipherUpdate(&ctx_, output->peek_write(), &output_written, input, input_length)) { 523 if (!EVP_CIPHER_CTX_ctrl(&ctx_, EVP_CTRL_GCM_GET_TAG, tag_length_, output->peek_write())) 639 !EVP_CIPHER_CTX_ctrl(&ctx_, EVP_CTRL_GCM_SET_TA [all...] |
H A D | keymaster_enforcement.cpp | 394 EvpMdCtx() { EVP_MD_CTX_init(&ctx_); } 395 ~EvpMdCtx() { EVP_MD_CTX_cleanup(&ctx_); } 397 EVP_MD_CTX* get() { return &ctx_; } 400 EVP_MD_CTX ctx_; member in class:keymaster::EvpMdCtx
|
H A D | aes_operation.h | 93 EVP_CIPHER_CTX ctx_; member in class:keymaster::AesEvpOperation
|
/system/netd/tests/dns_responder/ |
H A D | dns_tls_frontend.cpp | 146 ctx_.reset(SSL_CTX_new(TLS_server_method())); 147 if (!ctx_) { 152 SSL_CTX_set_ecdh_auto(ctx_.get(), 1); 156 if (SSL_CTX_use_certificate(ctx_.get(), cert.get()) <= 0) { 166 if (SSL_CTX_use_PrivateKey(ctx_.get(), key.get()) <= 0 ) { 270 bssl::UniquePtr<SSL> ssl(SSL_new(ctx_.get())); 350 ctx_.reset();
|
H A D | dns_tls_frontend.h | 72 bssl::UniquePtr<SSL_CTX> ctx_; member in class:test::DnsTlsFrontend
|
/system/security/keystore/ |
H A D | keymaster_enforcement.cpp | 396 EvpMdCtx() { EVP_MD_CTX_init(&ctx_); } 397 ~EvpMdCtx() { EVP_MD_CTX_cleanup(&ctx_); } 399 EVP_MD_CTX* get() { return &ctx_; } 402 EVP_MD_CTX ctx_; member in class:keystore::EvpMdCtx
|