HomeSort by relevance Sort by last modified time
    Searched full:digest_len (Results 1 - 21 of 21) sorted by null

  /external/chromium/crypto/
encryptor_nss.cc 74 unsigned int digest_len; local
77 &digest_len,
83 op_len + digest_len);
112 unsigned int digest_len; local
115 &digest_len,
121 op_len + digest_len);
  /external/chromium_org/third_party/libjingle/source/talk/base/
sslfingerprint.h 56 size_t digest_len; local
58 algorithm, digest_val, sizeof(digest_val), &digest_len);
63 return new SSLFingerprint(algorithm, digest_val, digest_len);
89 size_t digest_len) : algorithm(algorithm) {
90 digest.SetData(digest_in, digest_len);
sslstreamadapterhelper.cc 101 size_t digest_len) {
111 if (expected_len != digest_len)
114 peer_certificate_digest_value_.SetData(digest_val, digest_len);
sslstreamadapter_unittest.cc 250 size_t digest_len; local
257 &digest_len);
264 digest_len);
269 digest, 20, &digest_len);
276 digest_len);
sslstreamadapterhelper.h 65 size_t digest_len);
opensslstreamadapter.h 87 size_t digest_len);
sslstreamadapter.h 139 size_t digest_len) = 0;
opensslstreamadapter.cc 232 size_t digest_len) {
242 if (expected_len != digest_len)
245 peer_certificate_digest_value_.SetData(digest_val, digest_len);
  /external/openssh/
dns.c 78 u_char **digest, u_int *digest_len, Key *key)
96 *digest = key_fingerprint_raw(key, SSH_FP_SHA1, digest_len);
103 *digest_len = 0;
115 u_char **digest, u_int *digest_len, u_char *rdata, int rdata_len)
125 *digest_len = rdata_len - 2;
127 if (*digest_len > 0) {
128 *digest = (u_char *) xmalloc(*digest_len);
129 memcpy(*digest, rdata + 2, *digest_len);
schnorr.c 69 u_int digest_len; local
92 &digest, &digest_len) != 0) {
96 if (BN_bin2bn(digest, (int)digest_len, h) == NULL) {
104 bzero(digest, digest_len);
106 digest_len = 0;
456 u_int digest_len; local
470 if (EVP_DigestFinal_ex(&evp_md_ctx, digest, &digest_len) != 1) {
474 *digestp = xmalloc(digest_len);
475 *lenp = digest_len;
481 digest_len = 0
    [all...]
auth2-jpake.c 143 u_int digest_len; local
174 &digest, &digest_len) != 0)
177 if (len > digest_len)
179 __func__, len, digest_len);
181 bzero(digest, digest_len);
pkcs11.h 865 unsigned long *digest_len));
874 unsigned long *digest_len));
    [all...]
  /external/chromium_org/crypto/
encryptor_nss.cc 139 unsigned int digest_len; local
142 &digest_len,
149 output->resize(op_len + digest_len);
185 unsigned int digest_len; local
188 &digest_len,
192 CHECK(!digest_len);
  /external/chromium_org/net/android/
keystore_unittest.cc 247 int digest_len = static_cast<int>(message.size()); local
253 0, digest, digest_len, sigbuf, siglen, pub_key.get());
294 int digest_len = static_cast<int>(message.size()); local
300 0, digest, digest_len, sigbuf, siglen, pub_key.get());
318 unsigned int digest_len = static_cast<unsigned int>(message.size()); local
338 NID_md5_sha1, digest, digest_len, p, &p_len, rsa.get());
360 int ret = DSA_sign(0, digest, digest_len, p, &p_len, dsa.get());
383 0, digest, digest_len, p, &p_len, ecdsa.get());
  /external/chromium/net/base/
dnssec_chain_verifier.cc 521 unsigned digest_len; local
528 digest_len = base::SHA1_LENGTH;
532 digest_len = sizeof(temp2);
537 uint8* output = static_cast<uint8*>(malloc(4 + digest_len));
543 memcpy(output + 4, digest, digest_len);
544 *out = base::StringPiece(reinterpret_cast<char*>(output), 4 + digest_len);
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
rawtransportchannel.h 159 size_t digest_len) {
transportchannelimpl.h 105 size_t digest_len) = 0;
dtlstransportchannel.cc 207 size_t digest_len) {
209 talk_base::Buffer remote_fingerprint_value(digest, digest_len);
fakesession.h 118 size_t digest_len) {
119 dtls_fingerprint_ = talk_base::SSLFingerprint(alg, digest, digest_len);
dtlstransportchannel.h 135 size_t digest_len);
p2ptransportchannel.h 159 size_t digest_len) {

Completed in 1440 milliseconds