/external/chromium_org/base/ |
sha1_win.cc | 38 DWORD hash_len = 0; local 39 DWORD buffer_size = sizeof hash_len; 41 reinterpret_cast<unsigned char*>(&hash_len), 50 // but so that result.length() is correctly set to |hash_len|. 51 reinterpret_cast<BYTE*>(WriteInto(&result, hash_len + 1)), &hash_len, 57 if (hash_len != kSHA1Length) { 58 DLOG(ERROR) << "Returned hash value is wrong length: " << hash_len
|
/bootable/recovery/ |
verifier.h | 34 int hash_len; // SHA_DIGEST_SIZE (SHA-1) or SHA256_DIGEST_SIZE (SHA-256) member in struct:__anon1132
|
/external/wpa_supplicant_8/src/utils/ |
http-utils.h | 25 size_t hash_len; member in struct:http_logo
|
/external/chromium_org/crypto/ |
signature_verifier_nss.cc | 38 unsigned int hash_len = HASH_ResultLenContext(hash_context); local 39 std::vector<unsigned char> hash(hash_len); 40 HASH_End(hash_context, &hash[0], &hash_len, hash.size());
|
/external/chromium_org/net/http/ |
des.cc | 213 DWORD hash_len = 8; local 214 CryptEncrypt(key, 0, FALSE, 0, hash, &hash_len, 8);
|
/external/srtp/crypto/test/ |
sha1_driver.c | 57 unsigned hash_len; /* number of octets output by hash */ member in struct:hash_test_case_t 70 unsigned hash_len) { 83 tmp_len = hex_string_to_octet_string((char *)test_case->hash, hex_hash, hash_len*2); 84 if (tmp_len != hash_len*2) 88 test_case->hash_len = hash_len; 105 if (test_case->hash_len != 20)
|
/external/chromium_org/chrome/browser/safe_browsing/ |
protocol_parser.cc | 204 size_t hash_len; local 205 if (!base::StringToSizeT(cmd_parts[1], &hash_len)) 209 if (hash_len != sizeof(SBFullHash)) 227 if (hash_len * hash_count > reader.length()) 232 reader.Advance(hash_len * hash_count); 239 if (!reader.GetData(&full_hash.hash, hash_len))
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/test/ |
sha1_driver.c | 57 unsigned hash_len; /* number of octets output by hash */ member in struct:hash_test_case_t 70 unsigned hash_len) { 83 tmp_len = hex_string_to_octet_string((char *)test_case->hash, hex_hash, hash_len*2); 84 if (tmp_len != hash_len*2) 88 test_case->hash_len = hash_len; 105 if (test_case->hash_len != 20)
|
/external/chromium_org/net/quic/crypto/ |
proof_verifier_chromium.cc | 284 unsigned int hash_len = 32; // 32 is the length of a SHA-256 hash. local 287 hash_alg, mask_hash_alg, hash_len,
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 119 size_t hash_len; local 129 hash_len = prf->hash_len; 132 len[0] = hash_len; 151 clen = hash_len; 399 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 408 os_memcpy(pos, hash, prf->hash_len); 413 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, 458 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 467 integ = end - integ_alg->hash_len; [all...] |
ikev2_common.h | 255 size_t hash_len; member in struct:ikev2_integ_alg 261 size_t hash_len; member in struct:ikev2_prf_alg
|
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 390 size_t hash_len; local 397 hash_len = wpabuf_len(pubkey); 398 sha256_vector(1, addr, &hash_len, pubkey_hash);
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 61 size_t hash_len; member in struct:tls_event_data::__anon17268
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_aka.c | 306 size_t hash_len; local 321 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 324 if (checkcode_len != hash_len) { 339 if (os_memcmp_const(hash, checkcode, hash_len) != 0) { [all...] |
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 1592 size_t hash_len; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 493 size_t hash_len; local 508 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 511 if (checkcode_len != hash_len) { 528 if (os_memcmp_const(hash, checkcode, hash_len) != 0) { [all...] |
/external/valgrind/main/coregrind/m_debuginfo/ |
readpdb.c | 390 unsigned long hash_len; member in struct:_PDB_TYPES [all...] |