/system/keymaster/ |
hmac.cpp | 31 return SHA256_DIGEST_LENGTH; 58 uint8_t tmp[SHA256_DIGEST_LENGTH]; 60 if (digest_len >= SHA256_DIGEST_LENGTH) 66 if (digest_len < SHA256_DIGEST_LENGTH) 79 if (digest_len != SHA256_DIGEST_LENGTH) 82 uint8_t computed_digest[SHA256_DIGEST_LENGTH]; 86 return 0 == CRYPTO_memcmp(digest, computed_digest, SHA256_DIGEST_LENGTH);
|
ocb_utils.cpp | 81 UniquePtr<uint8_t[]> hash_buf(new (std::nothrow) uint8_t[SHA256_DIGEST_LENGTH]); 84 Eraser hash_eraser(hash_buf.get(), SHA256_DIGEST_LENGTH);
|
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
sha2.h | 50 #define SHA256_DIGEST_LENGTH 32 51 #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1) 125 void SHA256_Final __P((u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*));
|
sha2.c | 338 bcopy(sha256_initial_hash_value, context->state, SHA256_DIGEST_LENGTH); 620 bcopy(context->state, d, SHA256_DIGEST_LENGTH); 630 sha2_byte digest[SHA256_DIGEST_LENGTH], *d = digest; 639 for (i = 0; i < SHA256_DIGEST_LENGTH; i++) { 648 bzero(digest, SHA256_DIGEST_LENGTH); 1128 SHA256_DIGEST_LENGTH, [all...] |
/external/openssh/openbsd-compat/ |
sha2.h | 57 #define SHA256_DIGEST_LENGTH 32 58 #define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1) 86 void SHA256_Final(u_int8_t [SHA256_DIGEST_LENGTH], SHA256_CTX *) 87 __attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
|
sha2.c | 545 SHA256_Final(u_int8_t digest[SHA256_DIGEST_LENGTH], SHA256_CTX *context) 558 memcpy(digest, context->state, SHA256_DIGEST_LENGTH);
|
/system/vold/ |
cryptfs.h | 84 #if !defined(SHA256_DIGEST_LENGTH) 85 #define SHA256_DIGEST_LENGTH 32 122 __le8 hash_first_block[SHA256_DIGEST_LENGTH]; /* When CRYPT_ENCRYPTION_IN_PROGRESS
|
/system/netd/server/ |
SoftapController.cpp | 155 char psk_str[2*SHA256_DIGEST_LENGTH+1]; 214 unsigned char psk[SHA256_DIGEST_LENGTH]; 219 4096, SHA256_DIGEST_LENGTH, psk); 220 for (j=0; j < SHA256_DIGEST_LENGTH; j++) {
|
/hardware/qcom/msm8x84/kernel-headers/linux/ |
qseecom.h | 116 #define SHA256_DIGEST_LENGTH (256/8) 120 char digest[SHA256_DIGEST_LENGTH];
|
/hardware/qcom/msm8x84/original-kernel-headers/linux/ |
qseecom.h | 151 #define SHA256_DIGEST_LENGTH (256/8) 155 * @hash[SHA256_DIGEST_LENGTH] - sha256 digest. 159 char digest[SHA256_DIGEST_LENGTH]; /* in */
|
/external/openssh/ |
md-sha256.c | 74 ssh_sha256.md_size = SHA256_DIGEST_LENGTH;
|
digest-libc.c | 95 SHA256_DIGEST_LENGTH,
|
/system/core/gatekeeperd/ |
SoftGateKeeper.h | 37 uint8_t digest[SHA256_DIGEST_LENGTH]; 149 return memcmp(computed.digest, fast_hash.digest, SHA256_DIGEST_LENGTH) == 0;
|
/external/boringssl/src/include/openssl/ |
sha.h | 138 /* SHA256_DIGEST_LENGTH is the length of a SHA-256 digest. */ 139 #define SHA256_DIGEST_LENGTH 32 148 * to |md|, which must have at least |SHA256_DIGEST_LENGTH| bytes of space. It 153 * |out|. There must be at least |SHA256_DIGEST_LENGTH| bytes of space in
|
ssl.h | 686 peer_sha256[SHA256_DIGEST_LENGTH]; /* SHA256 of peer certificate */ [all...] |
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
polochallengeresponse.cc | 83 Alpha* alpha = new Alpha(SHA256_DIGEST_LENGTH);
|
/system/extras/verity/ |
verify_boot_signature.c | 326 unsigned char digest[SHA256_DIGEST_LENGTH]; 346 if (!RSA_verify(NID_sha256, digest, SHA256_DIGEST_LENGTH,
|
/external/boringssl/src/crypto/dsa/ |
dsa_impl.c | 454 unsigned char seed[SHA256_DIGEST_LENGTH]; 455 unsigned char md[SHA256_DIGEST_LENGTH]; 456 unsigned char buf[SHA256_DIGEST_LENGTH], buf2[SHA256_DIGEST_LENGTH]; 479 qsize != SHA256_DIGEST_LENGTH) {
|
/external/boringssl/src/crypto/sha/ |
sha256.c | 94 sha->md_len = SHA256_DIGEST_LENGTH; 115 static uint8_t buf[SHA256_DIGEST_LENGTH]; 162 case SHA256_DIGEST_LENGTH: \ 163 for (nn = 0; nn < SHA256_DIGEST_LENGTH / 4; nn++) { \ 169 if ((c)->md_len > SHA256_DIGEST_LENGTH) { \
|
/external/boringssl/src/crypto/cipher/ |
e_tls.c | 487 SHA256_DIGEST_LENGTH + 16, /* key len (SHA256 + AES128) */ 489 16 + SHA256_DIGEST_LENGTH, /* overhead (padding + SHA256) */ 526 SHA256_DIGEST_LENGTH + 32, /* key len (SHA256 + AES256) */ 528 16 + SHA256_DIGEST_LENGTH, /* overhead (padding + SHA256) */
|
e_aes.c | [all...] |
/external/boringssl/src/crypto/digest/ |
digests.c | 170 NID_sha256, SHA256_DIGEST_LENGTH, 0 /* flags */,
|
/external/ipsec-tools/src/racoon/ |
crypto_openssl.c | [all...] |
/external/boringssl/src/ssl/ |
ssl_cipher.c | 678 *out_mac_secret_len = SHA256_DIGEST_LENGTH; 700 *out_mac_secret_len = SHA256_DIGEST_LENGTH; [all...] |
s3_srvr.c | [all...] |