/bootable/recovery/ |
verifier.h | 49 : hash_len(hash_len_), 55 int hash_len; member in struct:Certificate
|
/external/wpa_supplicant_8/src/utils/ |
http-utils.h | 25 size_t hash_len; member in struct:http_logo
|
/external/libchrome/crypto/ |
signature_verifier_nss.cc | 39 unsigned int hash_len = HASH_ResultLenContext(hash_context); local 40 std::vector<unsigned char> hash(hash_len); 41 HASH_End(hash_context, &hash[0], &hash_len, hash.size());
|
/external/srtp/crypto/test/ |
sha1_driver.c | 57 unsigned hash_len; /* number of octets output by hash */ member in struct:hash_test_case_t 70 unsigned hash_len) { 83 tmp_len = hex_string_to_octet_string((char *)test_case->hash, hex_hash, hash_len*2); 84 if (tmp_len != hash_len*2) 88 test_case->hash_len = hash_len; 105 if (test_case->hash_len != 20)
|
/system/gatekeeper/ |
gatekeeper.cpp | 235 uint32_t hash_len = (uint32_t)((uint8_t *)&token->hmac - (uint8_t *)token); local 237 reinterpret_cast<uint8_t *>(token), hash_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 118 size_t hash_len; local 128 hash_len = prf->hash_len; 131 len[0] = hash_len; 150 clen = hash_len; 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 411 os_memcpy(pos, hash, prf->hash_len); 416 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 470 integ = end - integ_alg->hash_len; [all...] |
ikev2_common.h | 255 size_t hash_len; member in struct:ikev2_integ_alg 261 size_t hash_len; member in struct:ikev2_prf_alg
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_ocsp.c | 124 unsigned int hash_len; local 181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, 183 if (hash_len == 0 || name_hash_len != hash_len || 184 os_memcmp(name_hash, hash, hash_len) != 0) { 187 hash, hash_len); 205 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, 207 if (hash_len == 0 || key_hash_len != hash_len || 208 os_memcmp(key_hash, hash, hash_len) != 0) [all...] |
x509v3.c | 1747 size_t hash_len; local [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 408 size_t hash_len; local 415 hash_len = wpabuf_len(pubkey); 416 sha256_vector(1, addr, &hash_len, pubkey_hash);
|
/system/keymaster/ |
keymaster_enforcement.cpp | 399 unsigned int hash_len; local 402 EVP_DigestFinal_ex(ctx.get(), hash, &hash_len)) { 403 assert(hash_len >= sizeof(*keyid));
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server.c | 698 size_t hash_len; local 704 hash_len = 32; 707 hash_len = 16; 713 hash_len = 0; 716 if (hash_len) 717 plen += 1 + hash_len; 736 wpabuf_put_data(msg, hash, hash_len); 795 size_t hash_len; local 899 hash_len = 32; 907 hash_len = 16 [all...] |
eap_server_aka.c | 306 size_t hash_len; local 321 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 324 if (checkcode_len != hash_len) { 339 if (os_memcmp_const(hash, checkcode, hash_len) != 0) { [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 63 size_t hash_len; member in struct:tls_event_data::__anon28324
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 1591 size_t hash_len; local [all...] |
eap_aka.c | 493 size_t hash_len; local 508 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 511 if (checkcode_len != hash_len) { 528 if (os_memcmp_const(hash, checkcode, hash_len) != 0) { [all...] |
/external/valgrind/coregrind/m_debuginfo/ |
readpdb.c | 390 unsigned long hash_len; member in struct:_PDB_TYPES [all...] |