/external/avb/libavb/ |
avb_hash_descriptor.c | 46 dest->digest_len = avb_be32toh(dest->digest_len); 53 !avb_safe_add_to(&expected_size, dest->digest_len)) {
|
avb_hash_descriptor.h | 55 * |digest_len| bytes of the digest. 62 * - digest_len may be zero, which indicates the use of a persistent digest 70 uint32_t digest_len; member in struct:AvbHashDescriptor
|
/external/u-boot/lib/libavb/ |
avb_hash_descriptor.c | 27 dest->digest_len = avb_be32toh(dest->digest_len); 34 !avb_safe_add_to(&expected_size, dest->digest_len)) {
|
avb_hash_descriptor.h | 36 * |digest_len| bytes of the digest. 43 * - digest_len may be zero, which indicates the use of a persistent digest 51 uint32_t digest_len; member in struct:AvbHashDescriptor
|
/external/epid-sdk/epid/member/tpm2/ |
sign.h | 48 \param[in] digest_len 62 EpidStatus Tpm2Sign(Tpm2Ctx* ctx, void const* digest, size_t digest_len,
|
/external/boringssl/src/fipstools/ |
cavp_kas_test.cc | 39 size_t digest_len = 0; local 43 digest_len = SHA224_DIGEST_LENGTH; 46 digest_len = SHA256_DIGEST_LENGTH; 49 digest_len = SHA384_DIGEST_LENGTH; 52 digest_len = SHA512_DIGEST_LENGTH; 91 if (!ECDH_compute_key_fips(digest, digest_len, their_point.get(), 102 digest_len == expected_shared_bytes.size() && 103 OPENSSL_memcmp(digest, expected_shared_bytes.data(), digest_len) == 0; 107 EncodeHex(digest, digest_len).c_str(), ok ? 'P' : 'F'); 122 EncodeHex(digest, digest_len).c_str()) [all...] |
cavp_ecdsa2_sigver_test.cc | 46 unsigned digest_len; local 51 !EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, nullptr)) { 60 if (ECDSA_do_verify(digest, digest_len, sig.get(), key.get())) {
|
cavp_sha_test.cc | 65 unsigned digest_len; local 66 if (!EVP_Digest(msg.data(), msg_len, out.data(), &digest_len, md, nullptr) || 67 digest_len != out.size()) {
|
cavp_rsa2_sigver_test.cc | 75 unsigned digest_len; local 77 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) { 83 ok = RSA_verify_pss_mgf1(key.get(), digest_buf, digest_len, md, md, -1, 86 ok = RSA_verify(EVP_MD_type(md), digest_buf, digest_len, sig.data(),
|
cavp_sha_monte_test.cc | 66 unsigned digest_len; local 67 if (!EVP_Digest(msg.data(), msg.size(), out.data(), &digest_len, md, 69 digest_len != out.size()) {
|
cavp_ecdsa2_siggen_test.cc | 53 unsigned digest_len; local 59 digest_len = EVP_MD_size(md); 61 } else if (!EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, 66 bssl::UniquePtr<ECDSA_SIG> sig(ECDSA_do_sign(digest, digest_len, key.get()));
|
/external/webrtc/webrtc/base/ |
sslfingerprint.cc | 34 size_t digest_len; local 36 algorithm, digest_val, sizeof(digest_val), &digest_len); 41 return new SSLFingerprint(algorithm, digest_val, digest_len); 67 size_t digest_len) 69 digest.SetData(digest_in, digest_len);
|
sslfingerprint.h | 36 size_t digest_len);
|
sslstreamadapterhelper.cc | 90 size_t digest_len) { 100 if (expected_len != digest_len) 103 peer_certificate_digest_value_.SetData(digest_val, digest_len);
|
/external/boringssl/src/crypto/hkdf/ |
hkdf.c | 63 const size_t digest_len = EVP_MD_size(digest); local 71 n = (out_len + digest_len - 1) / digest_len; 72 if (out_len + digest_len < out_len || n > 255) { 87 !HMAC_Update(&hmac, previous, digest_len))) { 96 todo = digest_len;
|
/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
ecdsa.c | 69 // digest_to_scalar interprets |digest_len| bytes from |digest| as a scalar for 73 const uint8_t *digest, size_t digest_len) { 78 if (digest_len > num_bytes) { 79 digest_len = num_bytes; 82 for (size_t i = 0; i < digest_len; i++) { 83 out->bytes[i] = digest[digest_len - 1 - i]; 87 if (8 * digest_len > num_bits) { 146 int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, 172 digest_to_scalar(group, &m, digest, digest_len); 192 size_t digest_len, const EC_SCALAR *priv_key) [all...] |
/external/boringssl/src/include/openssl/ |
ecdsa.h | 71 // ECDSA_sign signs |digest_len| bytes from |digest| with |key| and writes the 77 size_t digest_len, uint8_t *sig, 85 size_t digest_len, const uint8_t *sig, 119 // ECDSA_do_sign signs |digest_len| bytes from |digest| with |key| and returns 122 size_t digest_len, const EC_KEY *key); 127 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len,
|
/external/epid-sdk/epid/member/tpm2/src/ |
sign.c | 54 EpidStatus Tpm2Sign(Tpm2Ctx* ctx, void const* digest, size_t digest_len, 64 if (0 == digest_len || EpidGetHashSize(ctx->hash_alg) != digest_len) { 79 sts = NewBigNum(digest_len, &digest_bn); 85 sts = ReadBigNum(digest, digest_len, digest_bn);
|
/external/epid-sdk/epid/member/src/ |
privateexp.c | 51 size_t digest_len = 0; local 58 digest_len = EpidGetHashSize(ctx->hash_alg); 59 digest = SAFE_ALLOC(digest_len); 64 memset(digest, 0, digest_len); 65 digest[digest_len - 1] = 1; 98 sts = Tpm2Sign(ctx->tpm2_ctx, digest, digest_len, counter, k, s);
|
/external/boringssl/src/crypto/digest_extra/ |
digest_test.cc | 149 size_t digest_len) { 153 for (size_t i = 0; i < digest_len; i++) { 157 digest_hex[2*digest_len] = '\0'; 171 unsigned digest_len; local 172 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); 173 CompareDigest(test, digest.get(), digest_len); 183 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); 184 EXPECT_EQ(EVP_MD_size(test->md.func()), digest_len); 185 CompareDigest(test, digest.get(), digest_len); 198 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); [all...] |
/external/openssh/ |
dns.c | 82 u_char **digest, size_t *digest_len, struct sshkey *key) 126 digest_len)) != 0) 132 *digest_len = 0; 144 u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) 154 *digest_len = rdata_len - 2; 156 if (*digest_len > 0) { 157 *digest = xmalloc(*digest_len); 158 memcpy(*digest, rdata + 2, *digest_len);
|
digest-openssl.c | 52 size_t digest_len; member in struct:ssh_digest 104 return digest == NULL ? 0 : digest->digest_len; 163 if (dlen < digest->digest_len) /* No truncation allowed */ 167 if (l != digest->digest_len) /* sanity */ 192 if (dlen < digest->digest_len)
|
/external/epid-sdk/epid/member/tpm2/ibm_tss/ |
sign.c | 44 EpidStatus Tpm2Sign(Tpm2Ctx* ctx, void const* digest, size_t digest_len, 52 if (0 == digest_len || EpidGetHashSize(ctx->hash_alg) != digest_len) { 69 digest_len)) { 73 in.digest.t.size = (uint16_t)digest_len;
|
/external/selinux/libselinux/utils/ |
selabel_digest.c | 9 static size_t digest_len; variable 47 rc = strncmp(selabel_digest, files_ptr + 1, digest_len * 2); 140 rc = selabel_digest(hnd, &sha1_digest, &digest_len, &specfiles, 155 sha1_buf = malloc(digest_len * 2 + 1); 164 for (i = 0; i < digest_len; i++)
|
/external/boringssl/src/ssl/ |
ssl_transcript.cc | 248 size_t digest_len; local 249 if (!GetHash(digest, &digest_len)) { 256 label, MakeConstSpan(digest, digest_len), {})) {
|