/external/chromium/base/ |
sha1_win.cc | 38 DWORD hash_len = 0; local 39 DWORD buffer_size = sizeof hash_len; 41 reinterpret_cast<unsigned char*>(&hash_len), 50 // but so that result.length() is correctly set to |hash_len|. 51 reinterpret_cast<BYTE*>(WriteInto(&result, hash_len + 1)), &hash_len, 57 if (hash_len != SHA1_LENGTH) { 58 LOG(ERROR) << "Returned hash value is wrong length: " << hash_len
|
/external/chromium_org/base/ |
sha1_win.cc | 38 DWORD hash_len = 0; local 39 DWORD buffer_size = sizeof hash_len; 41 reinterpret_cast<unsigned char*>(&hash_len), 50 // but so that result.length() is correctly set to |hash_len|. 51 reinterpret_cast<BYTE*>(WriteInto(&result, hash_len + 1)), &hash_len, 57 if (hash_len != kSHA1Length) { 58 DLOG(ERROR) << "Returned hash value is wrong length: " << hash_len
|
/bootable/recovery/ |
verifier.h | 23 int hash_len; // SHA_DIGEST_SIZE (SHA-1) or SHA256_DIGEST_SIZE (SHA-256) member in struct:Certificate
|
verifier.cpp | 147 switch (pKeys[i].hash_len) { 192 switch (pKeys[i].hash_len) { 201 RSANUMBYTES, hash, pKeys[i].hash_len)) { 268 cert->hash_len = SHA_DIGEST_SIZE; 275 cert->hash_len = SHA_DIGEST_SIZE; 279 cert->hash_len = SHA256_DIGEST_SIZE; 283 cert->hash_len = SHA256_DIGEST_SIZE; 323 LOGI("read key e=%d hash=%d\n", key->exponent, cert->hash_len);
|
verifier_test.cpp | 148 cert->hash_len = SHA_DIGEST_SIZE; 153 cert->hash_len = SHA256_DIGEST_SIZE;
|
/system/core/include/mincrypt/ |
rsa.h | 52 const int hash_len);
|
/external/srtp/crypto/test/ |
sha1_driver.c | 57 unsigned hash_len; /* number of octets output by hash */ member in struct:hash_test_case_t 70 unsigned hash_len) { 83 tmp_len = hex_string_to_octet_string((char *)test_case->hash, hex_hash, hash_len*2); 84 if (tmp_len != hash_len*2) 88 test_case->hash_len = hash_len; 105 if (test_case->hash_len != 20)
|
/external/chromium_org/chrome/browser/safe_browsing/ |
protocol_parser.cc | 216 const int hash_len = atoi(cmd_parts[2].c_str()); local 217 if (hash_len != sizeof(SBPrefix) && hash_len != sizeof(SBFullHash)) { 218 VLOG(1) << "ParseChunk got unknown hashlen " << hash_len; 232 if (!ParseAddChunk(list_name, chunk_data, chunk_len, hash_len, 237 if (!ParseSubChunk(list_name, chunk_data, chunk_len, hash_len, 258 int hash_len, 263 SBEntry::Type type = hash_len == sizeof(SBPrefix) ? 270 DCHECK_EQ(0, remaining % hash_len); 271 prefix_count = remaining / hash_len; 391 int hash_len = entry->HashLen(); local [all...] |
protocol_parser.h | 90 int hash_len, 95 int hash_len,
|
/external/chromium/chrome/browser/safe_browsing/ |
protocol_parser.cc | 290 const int hash_len = atoi(cmd_parts[2].c_str()); local 291 if (hash_len != sizeof(SBPrefix) && hash_len != sizeof(SBFullHash)) { 292 VLOG(1) << "ParseChunk got unknown hashlen " << hash_len; 306 if (!ParseAddChunk(list_name, chunk_data, chunk_len, hash_len, 311 if (!ParseSubChunk(list_name, chunk_data, chunk_len, hash_len, 332 int hash_len, 337 SBEntry::Type type = hash_len == sizeof(SBPrefix) ? 342 DCHECK_EQ(0, remaining % hash_len); 343 prefix_count = remaining / hash_len; 435 int hash_len = entry->HashLen(); local [all...] |
protocol_parser.h | 109 int hash_len, 114 int hash_len,
|
/system/core/libmincrypt/ |
rsa.c | 243 // Both e=3 and e=65537 are supported. hash_len may be 253 const int hash_len) { 266 if (hash_len != SHA_DIGEST_SIZE && 267 hash_len != SHA256_DIGEST_SIZE) { 282 for (i = len - hash_len; i < len; ++i) { 287 switch (hash_len) { 301 for (i = 0; i < hash_len; ++i) {
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 119 size_t hash_len; local 129 hash_len = prf->hash_len; 132 len[0] = hash_len; 151 clen = hash_len; 464 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 473 os_memcpy(pos, hash, prf->hash_len); 478 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, 523 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 532 integ = end - integ_alg->hash_len; [all...] |
eap_ikev2_common.c | 93 icv_len = integ->hash_len;
|
ikev2_common.h | 259 size_t hash_len; member in struct:ikev2_integ_alg 265 size_t hash_len; member in struct:ikev2_prf_alg
|
/external/chromium/net/http/ |
des.cc | 213 DWORD hash_len = 8; local 214 CryptEncrypt(key, 0, FALSE, 0, hash, &hash_len, 8);
|
/external/chromium_org/net/http/ |
des.cc | 213 DWORD hash_len = 8; local 214 CryptEncrypt(key, 0, FALSE, 0, hash, &hash_len, 8);
|
/external/chromium_org/crypto/ |
signature_verifier_nss.cc | 38 unsigned int hash_len = HASH_ResultLenContext(hash_context); local 39 std::vector<unsigned char> hash(hash_len); 40 HASH_End(hash_context, &hash[0], &hash_len, hash.size());
|
/external/chromium_org/net/quic/crypto/ |
proof_verifier_chromium.cc | 200 unsigned int hash_len = 32; // 32 is the length of a SHA-256 hash. local 202 version >= QUIC_VERSION_8 ? hash_len : signature.size() - hash_len - 2;
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 371 size_t hash_len; local 376 hash_len = wpabuf_len(pubkey); 377 sha256_vector(1, addr, &hash_len, pubkey_hash);
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 60 size_t hash_len; member in struct:tls_event_data::__anon30619
|
crypto_cryptoapi.c | 106 int cryptoapi_hash_vector(ALG_ID alg, size_t hash_len, size_t num_elem, 134 hlen = hash_len;
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 1590 size_t hash_len; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 124 skeyseed, prf->hash_len); 601 if (auth_len != prf->hash_len || 607 auth_data, prf->hash_len); 1054 wpabuf_put(msg, prf->hash_len)) < 0) { [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 111 skeyseed, prf->hash_len); 635 if (auth_len != prf->hash_len || 641 auth_data, prf->hash_len); 1073 wpabuf_put(msg, prf->hash_len)) < 0) {
|