HomeSort by relevance Sort by last modified time
    Searched defs:digest_len (Results 1 - 25 of 25) sorted by null

  /external/avb/libavb/
avb_hash_descriptor.h 45 * |digest_len| bytes of the digest.
56 uint32_t digest_len; member in struct:AvbHashDescriptor
avb_slot_verify.c 89 size_t digest_len; local
190 digest_len = AVB_SHA256_DIGEST_SIZE;
197 digest_len = AVB_SHA512_DIGEST_SIZE;
204 if (digest_len != hash_desc.digest_len) {
211 if (avb_safe_memcmp(digest, desc_digest, digest_len) != 0) {
    [all...]
  /external/boringssl/src/crypto/hkdf/
hkdf.c 63 const size_t digest_len = EVP_MD_size(digest); local
71 n = (out_len + digest_len - 1) / digest_len;
72 if (out_len + digest_len < out_len || n > 255) {
87 !HMAC_Update(&hmac, previous, digest_len))) {
96 todo = digest_len;
  /external/boringssl/src/fipstools/
cavp_ecdsa2_siggen_test.cc 53 unsigned digest_len; local
59 digest_len = EVP_MD_size(md);
61 } else if (!EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md,
66 bssl::UniquePtr<ECDSA_SIG> sig(ECDSA_do_sign(digest, digest_len, key.get()));
cavp_ecdsa2_sigver_test.cc 46 unsigned digest_len; local
51 !EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, nullptr)) {
60 if (ECDSA_do_verify(digest, digest_len, sig.get(), key.get())) {
cavp_sha_monte_test.cc 66 unsigned digest_len; local
67 if (!EVP_Digest(msg.data(), msg.size(), out.data(), &digest_len, md,
69 digest_len != out.size()) {
cavp_sha_test.cc 65 unsigned digest_len; local
66 if (!EVP_Digest(msg.data(), msg_len, out.data(), &digest_len, md, nullptr) ||
67 digest_len != out.size()) {
cavp_rsa2_siggen_test.cc 79 unsigned digest_len; local
82 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) {
88 digest_buf, digest_len, md, md, -1)) {
93 if (!RSA_sign(EVP_MD_type(md), digest_buf, digest_len, sig.data(),
cavp_rsa2_sigver_test.cc 75 unsigned digest_len; local
77 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) {
83 ok = RSA_verify_pss_mgf1(key.get(), digest_buf, digest_len, md, md, -1,
86 ok = RSA_verify(EVP_MD_type(md), digest_buf, digest_len, sig.data(),
  /external/webrtc/webrtc/base/
sslfingerprint.cc 34 size_t digest_len; local
36 algorithm, digest_val, sizeof(digest_val), &digest_len);
41 return new SSLFingerprint(algorithm, digest_val, digest_len);
67 size_t digest_len)
69 digest.SetData(digest_in, digest_len);
ssladapter_unittest.cc 250 size_t digest_len = sizeof(digest); local
252 digest_len);
sslidentity_unittest.cc 118 size_t digest_len; local
123 sizeof(DigestType), &digest_len);
125 EXPECT_EQ(expected_len, digest_len);
130 sizeof(DigestType), &digest_len);
132 EXPECT_EQ(expected_len, digest_len);
165 size_t digest_len; local
170 &digest_len);
172 EXPECT_EQ(expected_len, digest_len);
sslstreamadapter_unittest.cc 330 size_t digest_len; local
337 &digest_len);
344 digest_len);
349 digest, 20, &digest_len);
356 digest_len);
    [all...]
  /external/vboot_reference/tests/
rsa_verify_benchmark.c 25 uint64_t digest_len, sig_len; local
48 digest = BufferFromFile(file_name, &digest_len);
  /system/keymaster/
hmac_operation.cpp 171 unsigned int digest_len; local
172 if (!HMAC_Final(&ctx_, digest, &digest_len))
177 if (mac_length_ > digest_len)
184 if (siglen > digest_len || siglen < kMinHmacLengthBits / 8)
  /external/boringssl/src/crypto/digest_extra/
digest_test.cc 146 size_t digest_len) {
150 for (size_t i = 0; i < digest_len; i++) {
154 digest_hex[2*digest_len] = '\0';
168 unsigned digest_len; local
169 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len));
170 CompareDigest(test, digest.get(), digest_len);
180 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len));
181 EXPECT_EQ(EVP_MD_size(test->md.func()), digest_len);
182 CompareDigest(test, digest.get(), digest_len);
  /external/selinux/libselinux/utils/
selabel_digest.c 9 static size_t digest_len; variable
47 rc = strncmp(selabel_digest, files_ptr + 1, digest_len * 2);
140 rc = selabel_digest(hnd, &sha1_digest, &digest_len, &specfiles,
155 sha1_buf = malloc(digest_len * 2 + 1);
164 for (i = 0; i < digest_len; i++)
  /external/openssh/
digest-libc.c 52 size_t digest_len; member in struct:ssh_digest
158 return digest == NULL ? 0 : digest->digest_len;
223 if (dlen < digest->digest_len) /* No truncation allowed */
digest-openssl.c 52 size_t digest_len; member in struct:ssh_digest
104 return digest == NULL ? 0 : digest->digest_len;
163 if (dlen < digest->digest_len) /* No truncation allowed */
167 if (l != digest->digest_len) /* sanity */
192 if (dlen < digest->digest_len)
  /external/boringssl/src/tool/
digest.cc 166 unsigned digest_len; local
167 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) {
174 for (unsigned i = 0; i < digest_len; i++) {
179 *out_hex = std::string(hex_digest, digest_len * 2);
  /system/netd/server/dns/
DnsTlsTransport.cpp 115 unsigned int digest_len = 0; local
116 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), NULL);
121 if (digest_len != out->size()) {
122 ALOGW("Wrong digest length: %d", digest_len);
  /system/netd/tests/dns_responder/
dns_tls_frontend.cpp 49 unsigned int digest_len = 0; local
50 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), NULL);
55 if (digest_len != out->size()) {
56 ALOGE("Wrong digest length: %d", digest_len);
  /external/boringssl/src/ssl/
handshake_client.cc 1774 size_t digest_len; local
    [all...]
handshake_server.cc 1581 size_t digest_len; local
    [all...]
t1_lib.cc 3363 size_t digest_len; local
3386 size_t digest_len; local
3492 size_t digest_len; local
    [all...]

Completed in 484 milliseconds