/bootable/recovery/ |
verifier.h | 50 : hash_len(hash_len_), 56 int hash_len; member in struct:Certificate
|
/external/valgrind/coregrind/m_demangle/ |
rust-demangle.c | 108 static const size_t hash_len = 16; variable 145 if (len <= hash_prefix_len + hash_len) 149 len_without_hash = len - (hash_prefix_len + hash_len); 173 for (end = str + hash_len; str < end; str++) 269 end = sym + strlen (sym) - (hash_prefix_len + hash_len);
|
/external/libchrome/crypto/ |
signature_verifier_nss.cc | 51 unsigned int hash_len = HASH_ResultLenContext(hash_context); local 52 std::vector<unsigned char> hash(hash_len); 53 HASH_End(hash_context, &hash[0], &hash_len, hash.size());
|
/external/wpa_supplicant_8/src/utils/ |
http-utils.h | 25 size_t hash_len; member in struct:http_logo
|
/external/avb/libavb/ |
avb_crypto.h | 110 size_t hash_len; member in struct:__anon13241
|
/system/gatekeeper/ |
gatekeeper.cpp | 241 uint32_t hash_len = (uint32_t)((uint8_t *)&token->hmac - (uint8_t *)token); local 243 reinterpret_cast<uint8_t *>(token), hash_len);
|
/external/boringssl/src/crypto/evp/ |
p_rsa.c | 265 const size_t hash_len = EVP_MD_size(rctx->md); local 272 kDummyHash, hash_len)) { 282 CRYPTO_memcmp(rctx->tbuf, asn1_prefix, asn1_prefix_len - hash_len) != 0) { 295 OPENSSL_memcpy(out, rctx->tbuf + rslen - hash_len, hash_len); 297 *out_len = hash_len;
|
/external/boringssl/src/ssl/ |
ssl_privkey.cc | 433 unsigned hash_len; local 434 if (!EVP_Digest(in, in_len, hash, &hash_len, md, NULL)) { 439 hash, hash_len);
|
tls13_enc.cc | 37 hs->hash_len = SSL_TRANSCRIPT_digest_len(&hs->transcript); 40 OPENSSL_memset(hs->secret, 0, hs->hash_len); 63 return HKDF_extract(hs->secret, &hs->hash_len, 65 hs->hash_len); 71 const uint8_t *hash, size_t hash_len, size_t len) { 78 hash_len) || 85 !CBB_add_bytes(&child, hash, hash_len) || 110 hs->hash_len, label, label_len, context_hash, 198 return derive_secret(hs, hs->early_traffic_secret, hs->hash_len, 202 hs->early_traffic_secret, hs->hash_len) & 330 size_t hash_len = 0; local 375 size_t hash_len = EVP_MD_size(digest); local 410 size_t hash_len = SSL_TRANSCRIPT_digest_len(&hs->transcript); local [all...] |
internal.h | 1048 size_t hash_len; member in struct:ssl_handshake_st [all...] |
/external/brotli/enc/ |
quality.h | 38 int hash_len; member in struct:BrotliHasherParams 148 hparams->hash_len = 5;
|
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.c | 118 size_t hash_len; local 128 hash_len = prf->hash_len; 131 len[0] = hash_len; 150 clen = hash_len; 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 411 os_memcpy(pos, hash, prf->hash_len); 416 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 470 integ = end - integ_alg->hash_len; [all...] |
ikev2_common.h | 255 size_t hash_len; member in struct:ikev2_integ_alg 261 size_t hash_len; member in struct:ikev2_prf_alg
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_ocsp.c | 124 unsigned int hash_len; local 181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, 183 if (hash_len == 0 || name_hash_len != hash_len || 184 os_memcmp(name_hash, hash, hash_len) != 0) { 187 hash, hash_len); 205 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, 207 if (hash_len == 0 || key_hash_len != hash_len || 208 os_memcmp(key_hash, hash, hash_len) != 0) [all...] |
x509v3.c | 1747 size_t hash_len; local [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 408 size_t hash_len; local 415 hash_len = wpabuf_len(pubkey); 416 if (sha256_vector(1, addr, &hash_len, pubkey_hash) < 0)
|
/system/keymaster/ |
keymaster_enforcement.cpp | 408 unsigned int hash_len; local 411 EVP_DigestFinal_ex(ctx.get(), hash, &hash_len)) { 412 assert(hash_len >= sizeof(*keyid));
|
/system/security/keystore/ |
keymaster_enforcement.cpp | 410 unsigned int hash_len; local 413 EVP_DigestFinal_ex(ctx.get(), hash, &hash_len)) { 414 assert(hash_len >= sizeof(*keyid));
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
rsa.c | 313 /* hash_len is the expected length of the hash function. */ 314 uint8_t hash_len; member in struct:pkcs1_sig_prefix 395 if (msg_len != sig_prefix->hash_len) {
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 63 size_t hash_len; member in struct:tls_event_data::__anon39428
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server.c | 700 size_t hash_len; local 706 hash_len = 32; 709 hash_len = 16; 715 hash_len = 0; 718 if (hash_len) 719 plen += 1 + hash_len; 738 wpabuf_put_data(msg, hash, hash_len); 797 size_t hash_len; local 901 hash_len = 32; 909 hash_len = 16 [all...] |
eap_server_aka.c | 306 size_t hash_len; local 321 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 324 if (checkcode_len != hash_len) { 339 if (os_memcmp_const(hash, checkcode, hash_len) != 0) { [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 1606 size_t hash_len; local [all...] |
eap_aka.c | 498 size_t hash_len; local 513 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 516 if (checkcode_len != hash_len) { 533 if (os_memcmp_const(hash, checkcode, hash_len) != 0) { [all...] |
/external/valgrind/coregrind/m_debuginfo/ |
readpdb.c | 390 unsigned long hash_len; member in struct:_PDB_TYPES [all...] |