/external/chromium/base/ |
sha1_win.cc | 22 return std::string(SHA1_LENGTH, '\0'); 29 return std::string(SHA1_LENGTH, '\0'); 35 return std::string(SHA1_LENGTH, '\0'); 44 return std::string(SHA1_LENGTH, '\0'); 54 return std::string(SHA1_LENGTH, '\0'); 57 if (hash_len != SHA1_LENGTH) { 59 << " should be " << SHA1_LENGTH; 60 return std::string(SHA1_LENGTH, '\0');
|
sha1.h | 18 SHA1_LENGTH = 20 // Length in bytes of a SHA-1 hash. 26 // in |hash|. |hash| must be SHA1_LENGTH bytes long.
|
sha1_unittest.cc | 23 for (size_t i = 0; i < base::SHA1_LENGTH; i++) 39 for (size_t i = 0; i < base::SHA1_LENGTH; i++) 54 for (size_t i = 0; i < base::SHA1_LENGTH; i++) 61 unsigned char output[base::SHA1_LENGTH]; 71 for (size_t i = 0; i < base::SHA1_LENGTH; i++) 79 unsigned char output[base::SHA1_LENGTH]; 89 for (size_t i = 0; i < base::SHA1_LENGTH; i++) 96 unsigned char output[base::SHA1_LENGTH]; 106 for (size_t i = 0; i < base::SHA1_LENGTH; i++)
|
/external/chromium_org/crypto/ |
openpgp_symmetric_encryption.cc | 546 if (plaintext_size < SHA1_LENGTH + 2) { 571 if (plaintext[plaintext_size - SHA1_LENGTH - 2] != 0xd3 || 572 plaintext[plaintext_size - SHA1_LENGTH - 1] != 0x14) { 579 HASH_Update(hash_context, plaintext, plaintext_size - SHA1_LENGTH); 580 uint8 digest[SHA1_LENGTH]; 585 if (memcmp(digest, &plaintext[plaintext_size - SHA1_LENGTH], 586 SHA1_LENGTH) != 0) { 591 plaintext_size - SHA1_LENGTH); 740 uint8 digest[SHA1_LENGTH];
|
/external/chromium/net/socket/ |
dns_cert_provenance_checker.cc | 118 uint8 fingerprint[SHA1_LENGTH]; 123 char fingerprint_hex[SHA1_LENGTH * 2 + 1]; 129 fingerprint_hex[SHA1_LENGTH * 2] = 0;
|
ssl_client_socket_nss.cc | 343 hash_length = SHA1_LENGTH; [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
derive.c | 185 unsigned char sha_out[SHA1_LENGTH]; 191 SHA1_End(shaCtx, sha_out, &outLen, SHA1_LENGTH); 192 PORT_Assert(outLen == SHA1_LENGTH); 495 unsigned char sha_out[SHA1_LENGTH]; 501 SHA1_End(shaCtx, sha_out, &outLen, SHA1_LENGTH); 502 PORT_Assert(outLen == SHA1_LENGTH);
|
ssl3con.c | 505 { mac_sha, mmech_sha, 40, SHA1_LENGTH}, 507 {hmac_sha, mmech_sha_hmac, 0, SHA1_LENGTH}, [all...] |
ssl3ecc.c | 271 hashes->u.s.sha, SHA1_LENGTH)); [all...] |
/external/chromium/net/base/ |
x509_certificate_unittest.cc | 35 using base::SHA1_LENGTH; 535 uint8 hash[base::SHA1_LENGTH]; 572 EXPECT_EQ(HexEncode(nistSPKIHash, base::SHA1_LENGTH), 573 HexEncode(verify_result.public_key_hashes[0].data, SHA1_LENGTH)); 575 HexEncode(verify_result.public_key_hashes[1].data, SHA1_LENGTH)); [all...] |
x509_certificate.cc | 129 return memcmp(a, b, base::SHA1_LENGTH); [all...] |
dnssec_chain_verifier.cc | 528 digest_len = base::SHA1_LENGTH;
|
transport_security_state.cc | 383 hash_str.size() == base::SHA1_LENGTH) {
|
/external/chromium/chrome/common/net/ |
x509_certificate_model_nss.cc | 304 return HashCert(cert_handle, HASH_AlgSHA1, SHA1_LENGTH);
|
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_nss.cc | 308 return HashCert(cert_handle, HASH_AlgSHA1, SHA1_LENGTH);
|
/external/chromium_org/net/cert/ |
x509_certificate_win.cc | 333 SHA1_End(sha1_ctx, sha1.data, &result_len, SHA1_LENGTH);
|