HomeSort by relevance Sort by last modified time
    Searched refs:hash_len (Results 1 - 25 of 32) sorted by null

1 2

  /external/chromium/base/
sha1_win.cc 38 DWORD hash_len = 0; local
39 DWORD buffer_size = sizeof hash_len;
41 reinterpret_cast<unsigned char*>(&hash_len),
50 // but so that result.length() is correctly set to |hash_len|.
51 reinterpret_cast<BYTE*>(WriteInto(&result, hash_len + 1)), &hash_len,
57 if (hash_len != SHA1_LENGTH) {
58 LOG(ERROR) << "Returned hash value is wrong length: " << hash_len
  /external/chromium_org/base/
sha1_win.cc 38 DWORD hash_len = 0; local
39 DWORD buffer_size = sizeof hash_len;
41 reinterpret_cast<unsigned char*>(&hash_len),
50 // but so that result.length() is correctly set to |hash_len|.
51 reinterpret_cast<BYTE*>(WriteInto(&result, hash_len + 1)), &hash_len,
57 if (hash_len != kSHA1Length) {
58 DLOG(ERROR) << "Returned hash value is wrong length: " << hash_len
  /bootable/recovery/
verifier.h 23 int hash_len; // SHA_DIGEST_SIZE (SHA-1) or SHA256_DIGEST_SIZE (SHA-256) member in struct:Certificate
verifier.cpp 147 switch (pKeys[i].hash_len) {
192 switch (pKeys[i].hash_len) {
201 RSANUMBYTES, hash, pKeys[i].hash_len)) {
268 cert->hash_len = SHA_DIGEST_SIZE;
275 cert->hash_len = SHA_DIGEST_SIZE;
279 cert->hash_len = SHA256_DIGEST_SIZE;
283 cert->hash_len = SHA256_DIGEST_SIZE;
323 LOGI("read key e=%d hash=%d\n", key->exponent, cert->hash_len);
verifier_test.cpp 148 cert->hash_len = SHA_DIGEST_SIZE;
153 cert->hash_len = SHA256_DIGEST_SIZE;
  /system/core/include/mincrypt/
rsa.h 52 const int hash_len);
  /external/srtp/crypto/test/
sha1_driver.c 57 unsigned hash_len; /* number of octets output by hash */ member in struct:hash_test_case_t
70 unsigned hash_len) {
83 tmp_len = hex_string_to_octet_string((char *)test_case->hash, hex_hash, hash_len*2);
84 if (tmp_len != hash_len*2)
88 test_case->hash_len = hash_len;
105 if (test_case->hash_len != 20)
  /external/chromium_org/chrome/browser/safe_browsing/
protocol_parser.cc 216 const int hash_len = atoi(cmd_parts[2].c_str()); local
217 if (hash_len != sizeof(SBPrefix) && hash_len != sizeof(SBFullHash)) {
218 VLOG(1) << "ParseChunk got unknown hashlen " << hash_len;
232 if (!ParseAddChunk(list_name, chunk_data, chunk_len, hash_len,
237 if (!ParseSubChunk(list_name, chunk_data, chunk_len, hash_len,
258 int hash_len,
263 SBEntry::Type type = hash_len == sizeof(SBPrefix) ?
270 DCHECK_EQ(0, remaining % hash_len);
271 prefix_count = remaining / hash_len;
391 int hash_len = entry->HashLen(); local
    [all...]
protocol_parser.h 90 int hash_len,
95 int hash_len,
  /external/chromium/chrome/browser/safe_browsing/
protocol_parser.cc 290 const int hash_len = atoi(cmd_parts[2].c_str()); local
291 if (hash_len != sizeof(SBPrefix) && hash_len != sizeof(SBFullHash)) {
292 VLOG(1) << "ParseChunk got unknown hashlen " << hash_len;
306 if (!ParseAddChunk(list_name, chunk_data, chunk_len, hash_len,
311 if (!ParseSubChunk(list_name, chunk_data, chunk_len, hash_len,
332 int hash_len,
337 SBEntry::Type type = hash_len == sizeof(SBPrefix) ?
342 DCHECK_EQ(0, remaining % hash_len);
343 prefix_count = remaining / hash_len;
435 int hash_len = entry->HashLen(); local
    [all...]
protocol_parser.h 109 int hash_len,
114 int hash_len,
  /system/core/libmincrypt/
rsa.c 243 // Both e=3 and e=65537 are supported. hash_len may be
253 const int hash_len) {
266 if (hash_len != SHA_DIGEST_SIZE &&
267 hash_len != SHA256_DIGEST_SIZE) {
282 for (i = len - hash_len; i < len; ++i) {
287 switch (hash_len) {
301 for (i = 0; i < hash_len; ++i) {
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 119 size_t hash_len; local
129 hash_len = prf->hash_len;
132 len[0] = hash_len;
151 clen = hash_len;
464 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len;
473 os_memcpy(pos, hash, prf->hash_len);
478 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1,
523 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) {
532 integ = end - integ_alg->hash_len;
    [all...]
eap_ikev2_common.c 93 icv_len = integ->hash_len;
ikev2_common.h 259 size_t hash_len; member in struct:ikev2_integ_alg
265 size_t hash_len; member in struct:ikev2_prf_alg
  /external/chromium/net/http/
des.cc 213 DWORD hash_len = 8; local
214 CryptEncrypt(key, 0, FALSE, 0, hash, &hash_len, 8);
  /external/chromium_org/net/http/
des.cc 213 DWORD hash_len = 8; local
214 CryptEncrypt(key, 0, FALSE, 0, hash, &hash_len, 8);
  /external/chromium_org/crypto/
signature_verifier_nss.cc 38 unsigned int hash_len = HASH_ResultLenContext(hash_context); local
39 std::vector<unsigned char> hash(hash_len);
40 HASH_End(hash_context, &hash[0], &hash_len, hash.size());
  /external/chromium_org/net/quic/crypto/
proof_verifier_chromium.cc 200 unsigned int hash_len = 32; // 32 is the length of a SHA-256 hash. local
202 version >= QUIC_VERSION_8 ? hash_len : signature.size() - hash_len - 2;
  /external/wpa_supplicant_8/src/wps/
wps_attr_build.c 371 size_t hash_len; local
376 hash_len = wpabuf_len(pubkey);
377 sha256_vector(1, addr, &hash_len, pubkey_hash);
  /external/wpa_supplicant_8/src/crypto/
tls.h 60 size_t hash_len; member in struct:tls_event_data::__anon30619
crypto_cryptoapi.c 106 int cryptoapi_hash_vector(ALG_ID alg, size_t hash_len, size_t num_elem,
134 hlen = hash_len;
  /external/wpa_supplicant_8/src/tls/
x509v3.c 1590 size_t hash_len; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
ikev2.c 124 skeyseed, prf->hash_len);
601 if (auth_len != prf->hash_len ||
607 auth_data, prf->hash_len);
1054 wpabuf_put(msg, prf->hash_len)) < 0) {
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
ikev2.c 111 skeyseed, prf->hash_len);
635 if (auth_len != prf->hash_len ||
641 auth_data, prf->hash_len);
1073 wpabuf_put(msg, prf->hash_len)) < 0) {

Completed in 2981 milliseconds

1 2