/external/wpa_supplicant_8/src/tls/ |
pkcs1.h | 26 const struct asn1_oid *hash_alg,
|
tlsv1_record.h | 45 enum crypto_hash_alg hash_alg; member in struct:tlsv1_record_layer
|
pkcs1.c | 198 const struct asn1_oid *hash_alg, 273 if (!asn1_oid_equal(&oid, hash_alg)) { 276 asn1_oid_to_str(hash_alg, txt2, sizeof(txt2));
|
tlsv1_record.c | 45 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5; 48 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1; 51 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256; 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 436 hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret,
|
/external/chromium_org/crypto/ |
signature_verifier_nss.cc | 22 HASH_HashType ToNSSHashType(SignatureVerifier::HashAlgorithm hash_alg) { 23 switch (hash_alg) { 138 bool SignatureVerifier::VerifyInitRSAPSS(HashAlgorithm hash_alg, 156 hash_alg_ = hash_alg;
|
signature_verifier_openssl.cc | 21 const EVP_MD* ToOpenSSLDigest(SignatureVerifier::HashAlgorithm hash_alg) { 22 switch (hash_alg) { 74 bool SignatureVerifier::VerifyInitRSAPSS(HashAlgorithm hash_alg, 82 const EVP_MD* digest = ToOpenSSLDigest(hash_alg);
|
hmac_openssl.cc | 23 HMAC::HMAC(HashAlgorithm hash_alg) 24 : hash_alg_(hash_alg), plat_(new HMACPlatformData()) {
|
hmac_nss.cc | 23 HMAC::HMAC(HashAlgorithm hash_alg) 24 : hash_alg_(hash_alg), plat_(new HMACPlatformData()) {
|
signature_verifier.h | 73 // |hash_alg|, |mask_hash_alg|, and |salt_len| arguments. 85 bool VerifyInitRSAPSS(HashAlgorithm hash_alg,
|
hmac_win.cc | 106 HMAC::HMAC(HashAlgorithm hash_alg) 107 : hash_alg_(hash_alg), plat_(new HMACPlatformData()) {
|
hmac.h | 31 explicit HMAC(HashAlgorithm hash_alg);
|
symmetric_key_win.cc | 207 // and |key|. The inner hash function will be |hash_alg|. If successful, 212 ALG_ID hash_alg, 221 hmac_info.HashAlgid = hash_alg;
|
/external/chromium_org/net/cert/ |
ct_log_verifier_openssl.cc | 101 const EVP_MD* hash_alg = GetEvpAlg(hash_algorithm_); local 102 if (hash_alg == NULL) 109 1 == EVP_DigestVerifyInit(&ctx, NULL, hash_alg, NULL, public_key_) &&
|
ct_objects_extractor_nss.cc | 413 SECOidTag hash_alg = SECOID_FindOIDTag(&cert_id.hash_algorithm.algorithm); 414 switch (hash_alg) {
|
/external/e2fsprogs/debugfs/ |
htree.c | 45 int hash_alg; local 62 hash_alg = rootnode->hash_version; 63 if ((hash_alg <= EXT2_HASH_TEA) && 65 hash_alg += 3; 87 errcode = ext2fs_dirhash(hash_alg, name, 300 com_err(argv[0], 0, "usage: dx_hash [-h hash_alg] "
|
/external/e2fsprogs/e2fsck/ |
rehash.c | 92 int hash_alg; local 112 hash_alg = fs->super->s_def_hash_version; 113 if ((hash_alg <= EXT2_HASH_TEA) && 115 hash_alg += 3; 156 fd->err = ext2fs_dirhash(hash_alg, dirent->name, 340 int hash_alg; local 345 hash_alg = fs->super->s_def_hash_version; 346 if ((hash_alg <= EXT2_HASH_TEA) && 348 hash_alg += 3; 386 ext2fs_dirhash(hash_alg, ent->dir->name [all...] |
/external/chromium_org/third_party/openssl/patches.chromium/ |
0009-stricter_cutthrough.patch | 64 @@ -1160,6 +1160,8 @@ const EVP_MD *tls12_get_hash(unsigned char hash_alg);
|
0014-new_channelid.patch | 119 + const EVP_MD *tls12_get_hash(unsigned char hash_alg); 358 const EVP_MD *tls12_get_hash(unsigned char hash_alg);
|
/external/chromium_org/net/quic/crypto/ |
proof_verifier_chromium.cc | 314 crypto::SignatureVerifier::HashAlgorithm hash_alg = local 316 crypto::SignatureVerifier::HashAlgorithm mask_hash_alg = hash_alg; 320 hash_alg, mask_hash_alg, hash_len,
|
/external/e2fsprogs/misc/ |
mke2fs.conf.5.in | 155 .I hash_alg 373 .I hash_alg
|
tune2fs.c | 1152 int len, hash_alg; local 1245 } else if (strcmp(token, "hash_alg") == 0 || 1251 hash_alg = e2p_string2hash(arg); 1252 if (hash_alg < 0) { 1259 fs->super->s_def_hash_version = hash_alg; 1262 arg, hash_alg); [all...] |
mke2fs.c | 2370 int val, hash_alg; local [all...] |
/external/openssl/patches/ |
0007-tls12_digests.patch | 277 @@ -2403,47 +2396,49 @@ const EVP_MD *tls12_get_hash(unsigned char hash_alg) 374 md = tls12_get_hash(hash_alg);
|
0002-handshake_cutthrough.patch | 284 const EVP_MD *tls12_get_hash(unsigned char hash_alg);
|
/external/chromium_org/third_party/openssl/openssl/patches/ |
new_channelid.patch | 86 const EVP_MD *tls12_get_hash(unsigned char hash_alg);
|