/bootable/recovery/ |
print_sha1.h | 35 static std::string print_sha1(const uint8_t sha1[SHA_DIGEST_LENGTH]) { 36 return print_sha1(sha1, SHA_DIGEST_LENGTH); 39 static std::string short_sha1(const uint8_t sha1[SHA_DIGEST_LENGTH]) {
|
verifier.cpp | 197 case SHA_DIGEST_LENGTH: need_sha1 = true; break; 226 uint8_t sha1[SHA_DIGEST_LENGTH]; 256 case SHA_DIGEST_LENGTH: 298 LOGI("SHA-1 digest: %s\n", print_hex(sha1, SHA_DIGEST_LENGTH).c_str()); 496 cert.hash_len = SHA_DIGEST_LENGTH; 504 cert.hash_len = SHA_DIGEST_LENGTH;
|
/external/boringssl/src/crypto/cipher/ |
e_tls.c | 480 SHA_DIGEST_LENGTH + 16, /* key len (SHA1 + RC4) */ 482 SHA_DIGEST_LENGTH, /* overhead */ 483 SHA_DIGEST_LENGTH, /* max tag length */ 494 SHA_DIGEST_LENGTH + 16, /* key len (SHA1 + AES128) */ 496 16 + SHA_DIGEST_LENGTH, /* overhead (padding + SHA1) */ 497 SHA_DIGEST_LENGTH, /* max tag length */ 508 SHA_DIGEST_LENGTH + 16 + 16, /* key len (SHA1 + AES128 + IV) */ 510 16 + SHA_DIGEST_LENGTH, /* overhead (padding + SHA1) */ 511 SHA_DIGEST_LENGTH, /* max tag length */ 536 SHA_DIGEST_LENGTH + 32, /* key len (SHA1 + AES256) * [all...] |
e_ssl3.c | 378 SHA_DIGEST_LENGTH + 16, /* key len (SHA1 + RC4) */ 380 SHA_DIGEST_LENGTH, /* overhead */ 381 SHA_DIGEST_LENGTH, /* max tag length */ 392 SHA_DIGEST_LENGTH + 16 + 16, /* key len (SHA1 + AES128 + IV) */ 394 16 + SHA_DIGEST_LENGTH, /* overhead (padding + SHA1) */ 395 SHA_DIGEST_LENGTH, /* max tag length */ 406 SHA_DIGEST_LENGTH + 32 + 16, /* key len (SHA1 + AES256 + IV) */ 408 16 + SHA_DIGEST_LENGTH, /* overhead (padding + SHA1) */ 409 SHA_DIGEST_LENGTH, /* max tag length */ 420 SHA_DIGEST_LENGTH + 24 + 8, /* key len (SHA1 + 3DES + IV) * [all...] |
/bootable/recovery/applypatch/ |
applypatch.h | 28 uint8_t sha1[SHA_DIGEST_LENGTH];
|
applypatch.cpp | 48 const uint8_t target_sha1[SHA_DIGEST_LENGTH], 182 uint8_t parsed_sha[SHA_DIGEST_LENGTH]; 219 uint8_t sha_so_far[SHA_DIGEST_LENGTH]; 227 if (memcmp(sha_so_far, parsed_sha, SHA_DIGEST_LENGTH) == 0) { 487 for (int i = 0; i < SHA_DIGEST_LENGTH * 2; ++i, ++ps) { 514 uint8_t patch_sha1[SHA_DIGEST_LENGTH]; 517 memcmp(patch_sha1, sha1, SHA_DIGEST_LENGTH) == 0) { 646 uint8_t target_sha1[SHA_DIGEST_LENGTH]; 659 if (memcmp(source_file.sha1, target_sha1, SHA_DIGEST_LENGTH) == 0) { 722 uint8_t target_sha1[SHA_DIGEST_LENGTH]; [all...] |
main.cpp | 54 uint8_t digest[SHA_DIGEST_LENGTH];
|
/external/libbrillo/brillo/ |
cryptohome.cc | 65 unsigned char binmd[SHA_DIGEST_LENGTH]; 114 return (sanitized.length() == 2 * SHA_DIGEST_LENGTH) &&
|
/external/boringssl/src/ssl/ |
s3_enc.c | 174 uint8_t buf[16], smd[SHA_DIGEST_LENGTH]; 213 EVP_DigestUpdate(&md5, smd, SHA_DIGEST_LENGTH); 224 OPENSSL_cleanse(smd, SHA_DIGEST_LENGTH);
|
s3_both.c | 447 OPENSSL_COMPILE_ASSERT(EVP_MAX_MD_SIZE > MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH, 475 *out_len = MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH; 481 *out_len = SHA_DIGEST_LENGTH;
|
ssl_cipher.c | 794 *out_mac_secret_len = SHA_DIGEST_LENGTH; 812 *out_mac_secret_len = SHA_DIGEST_LENGTH; 834 *out_mac_secret_len = SHA_DIGEST_LENGTH; 860 *out_mac_secret_len = SHA_DIGEST_LENGTH; 874 *out_mac_secret_len = SHA_DIGEST_LENGTH; [all...] |
/external/boringssl/src/include/openssl/ |
sha.h | 73 /* SHA_DIGEST_LENGTH is the length of a SHA-1 digest. */ 74 #define SHA_DIGEST_LENGTH 20 87 * to |md|, which must have at least |SHA_DIGEST_LENGTH| bytes of space. It 92 * |out|. There must be at least |SHA_DIGEST_LENGTH| bytes of space in
|
x509.h | 262 unsigned char sha1_hash[SHA_DIGEST_LENGTH]; 434 unsigned char sha1_hash[SHA_DIGEST_LENGTH]; [all...] |
/bootable/recovery/tests/component/ |
verifier_test.cpp | 112 certs.back().hash_len = SHA_DIGEST_LENGTH; 120 certs.back().hash_len = SHA_DIGEST_LENGTH;
|
applypatch_test.cpp | 42 uint8_t digest[SHA_DIGEST_LENGTH];
|
/external/boringssl/src/crypto/digest/ |
digests.c | 129 NID_sha1, SHA_DIGEST_LENGTH, 0 /* flags */, sha1_init, 245 MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH,
|
/external/boringssl/src/crypto/x509/ |
t_x509.c | 254 unsigned char SHA1md[SHA_DIGEST_LENGTH]; 267 for (i=0; i < SHA_DIGEST_LENGTH; i++) 283 for (i=0; i < SHA_DIGEST_LENGTH; i++)
|
x509_cmp.c | 181 rv = memcmp(a->sha1_hash, b->sha1_hash, SHA_DIGEST_LENGTH); 229 unsigned char md[SHA_DIGEST_LENGTH];
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl_ocsp.c | 463 unsigned char hash[SHA_DIGEST_LENGTH]; 471 if (rid->value.byKey->length != SHA_DIGEST_LENGTH) 478 SHA_DIGEST_LENGTH) == 0)
|
/system/tpm/attestation/server/ |
pkcs11_key_store.cc | 40 unsigned char output[SHA_DIGEST_LENGTH]; 43 return std::string(reinterpret_cast<char*>(output), SHA_DIGEST_LENGTH);
|
/system/connectivity/shill/shims/ |
crypto_util.cc | 272 unsigned char digest[SHA_DIGEST_LENGTH];
|
/bootable/recovery/updater/ |
install.cpp | 99 char* buffer = reinterpret_cast<char*>(malloc(SHA_DIGEST_LENGTH*2 + 1)); 102 for (i = 0; i < SHA_DIGEST_LENGTH; ++i) { [all...] |
blockimg.cpp | 445 uint8_t digest[SHA_DIGEST_LENGTH]; 723 uint8_t digest[SHA_DIGEST_LENGTH]; [all...] |
/external/ipsec-tools/src/racoon/ |
crypto_openssl.c | [all...] |
/frameworks/native/services/inputflinger/ |
EventHub.cpp | 86 u_char digest[SHA_DIGEST_LENGTH]; 90 for (size_t i = 0; i < SHA_DIGEST_LENGTH; i++) { [all...] |