/external/boringssl/src/fipstools/ |
cavp_rsa2_siggen_test.cc | 79 unsigned digest_len; local 82 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) { 88 digest_buf, digest_len, md, md, -1)) { 93 if (!RSA_sign(EVP_MD_type(md), digest_buf, digest_len, sig.data(),
|
/external/vboot_reference/tests/ |
rsa_verify_benchmark.c | 25 uint64_t digest_len, sig_len; local 48 digest = BufferFromFile(file_name, &digest_len);
|
/external/boringssl/src/include/openssl/ |
dsa.h | 178 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, 191 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len, 201 size_t digest_len, DSA_SIG *sig, 217 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len, 234 size_t digest_len, const uint8_t *sig, 244 size_t digest_len, const uint8_t *sig,
|
ec_key.h | 269 int (*sign)(const uint8_t *digest, size_t digest_len, uint8_t *sig,
|
/external/boringssl/src/crypto/ecdsa_extra/ |
ecdsa_asn1.c | 69 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, 72 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, 77 ECDSA_SIG *s = ECDSA_do_sign(digest, digest_len, eckey); 102 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, 123 ret = ECDSA_do_verify(digest, digest_len, s, eckey);
|
/external/webrtc/webrtc/base/ |
sslidentity_unittest.cc | 118 size_t digest_len; local 123 sizeof(DigestType), &digest_len); 125 EXPECT_EQ(expected_len, digest_len); 130 sizeof(DigestType), &digest_len); 132 EXPECT_EQ(expected_len, digest_len); 165 size_t digest_len; local 170 &digest_len); 172 EXPECT_EQ(expected_len, digest_len);
|
sslstreamadapter.h | 153 size_t digest_len) = 0;
|
sslstreamadapterhelper.h | 43 size_t digest_len) override;
|
opensslstreamadapter.h | 70 size_t digest_len) override;
|
ssladapter_unittest.cc | 250 size_t digest_len = sizeof(digest); local 252 digest_len);
|
sslstreamadapter_unittest.cc | 330 size_t digest_len; local 337 &digest_len); 344 digest_len); 349 digest, 20, &digest_len); 356 digest_len); [all...] |
/external/boringssl/src/crypto/dsa/ |
dsa.c | 560 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, const DSA *dsa) { 598 if (digest_len > BN_num_bytes(dsa->q)) { 602 digest_len = BN_num_bytes(dsa->q); 605 if (BN_bin2bn(digest, digest_len, &m) == NULL) { 655 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, 658 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) { 665 size_t digest_len, DSA_SIG *sig, const DSA *dsa) { 717 if (digest_len > (i >> 3)) { 721 digest_len = (i >> 3); 724 if (BN_bin2bn(digest, digest_len, &u1) == NULL) [all...] |
/external/selinux/libselinux/include/selinux/ |
label.h | 123 * @digest_len: returns length of digest in bytes. 131 unsigned char **digest, size_t *digest_len,
|
/external/u-boot/lib/libavb/ |
avb_slot_verify.c | 175 size_t digest_len; local 219 } else if (hash_desc.digest_len == 0 && avb_strlen(ab_suffix) != 0) { 283 digest_len = AVB_SHA256_DIGEST_SIZE; 290 digest_len = AVB_SHA512_DIGEST_SIZE; 297 if (hash_desc.digest_len == 0) { 300 expected_digest_len = digest_len; 304 read_persistent_digest(ops, part_name, digest_len, expected_digest_buf); 310 expected_digest_len = hash_desc.digest_len; 314 if (digest_len != expected_digest_len) { 321 if (avb_safe_memcmp(digest, expected_digest, digest_len) != 0) 974 size_t digest_len = 0; local [all...] |
/external/webrtc/webrtc/p2p/base/ |
transportchannelimpl.h | 94 size_t digest_len) = 0;
|
dtlstransportchannel.cc | 201 size_t digest_len) { 202 rtc::Buffer remote_fingerprint_value(digest, digest_len); 215 RTC_DCHECK(!digest_len);
|
/external/avb/libavb/ |
avb_slot_verify.c | 295 size_t digest_len; local 339 } else if (hash_desc.digest_len == 0 && avb_strlen(ab_suffix) != 0) { 395 digest_len = AVB_SHA256_DIGEST_SIZE; 402 digest_len = AVB_SHA512_DIGEST_SIZE; 409 if (hash_desc.digest_len == 0) { 412 expected_digest_len = digest_len; 419 ops, part_name, digest_len, digest, expected_digest_buf); 425 expected_digest_len = hash_desc.digest_len; 429 if (digest_len != expected_digest_len) { 436 if (avb_safe_memcmp(digest, expected_digest, digest_len) != 0) 1087 size_t digest_len = 0; local [all...] |
/external/boringssl/src/tool/ |
digest.cc | 166 unsigned digest_len; local 167 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) { 174 for (unsigned i = 0; i < digest_len; i++) { 179 *out_hex = std::string(hex_digest, digest_len * 2);
|
/external/epid-sdk/epid/member/src/ |
nrprove.c | 108 size_t digest_len = EpidGetHashSize(ctx->hash_alg); local 222 digest = SAFE_ALLOC(digest_len); 249 sts = WriteFfElement(Fp, t2, digest, digest_len); 251 sts = Tpm2Sign(ctx->tpm2_ctx, digest, digest_len, rnu_ctr, NULL, t2);
|
/external/openssh/ |
digest-libc.c | 52 size_t digest_len; member in struct:ssh_digest 158 return digest == NULL ? 0 : digest->digest_len; 223 if (dlen < digest->digest_len) /* No truncation allowed */
|
/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
ecdsa_test.cc | 116 static void VerifyECDSASig(API api, const uint8_t *digest, size_t digest_len, 126 ECDSA_verify(0, digest, digest_len, der, der_len, eckey)); 132 ECDSA_do_verify(digest, digest_len, ecdsa_sig, eckey)); 144 size_t digest_len, ECDSA_SIG *ecdsa_sig, 170 VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 0); 176 VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 1);
|
/external/boringssl/src/crypto/evp/ |
evp_ctx.c | 227 const uint8_t *digest, size_t digest_len) { 236 return ctx->pmeth->sign(ctx, sig, sig_len, digest, digest_len); 250 const uint8_t *digest, size_t digest_len) { 259 return ctx->pmeth->verify(ctx, sig, sig_len, digest, digest_len);
|
/external/epid-sdk/epid/member/tpm2/unittests/ |
sign-test.cc | 42 bool IsSignatureValid(void const* digest, size_t digest_len, 50 BigNumObj digest_bn(digest_len); 51 THROW_ON_EPIDERR(ReadBigNum(digest, digest_len, digest_bn));
|
/external/selinux/libselinux/src/ |
label.c | 340 unsigned char **digest, size_t *digest_len, 349 *digest_len = DIGEST_SPECFILE_SIZE;
|
/external/avb/test/ |
avb_util_unittest.cc | 256 h.digest_len = htobe32(10); 264 EXPECT_EQ(10UL, s.digest_len); 283 bad.digest_len = htobe32(30);
|