/external/libchrome/crypto/ |
hmac.cc | 49 size_t digest_length = DigestLength(); 51 new unsigned char[digest_length]); 52 if (!Sign(data, computed_digest.get(), digest_length)) 56 std::min(digest.size(), digest_length));
|
hmac.h | 67 // returned in |digest|, which has |digest_length| bytes of storage available. 69 size_t digest_length) const WARN_UNUSED_RESULT;
|
hmac_nss.cc | 79 size_t digest_length) const { 110 digest, &len, digest_length) != SECSuccess) {
|
/system/update_engine/ |
certificate_checker.cc | 147 unsigned int digest_length; local 152 &digest_length, 162 string digest_string = base::HexEncode(digest, digest_length);
|
/system/tpm/trunks/ |
hmac_authorization_delegate.cc | 274 unsigned int digest_length; local 277 &digest_length); local 278 CHECK_EQ(digest_length, kHashDigestSize); 279 return std::string(reinterpret_cast<char*>(digest), digest_length);
|
/external/toybox/toys/lsb/ |
md5sum.c | 255 int digest_length; member in struct:hash 281 for (i = 0; i<hash->digest_length; i++)
|
/external/webrtc/webrtc/base/ |
opensslstreamadapter.cc | 1052 size_t digest_length; local 1057 &digest_length)) { 1062 Buffer computed_digest(digest, digest_length); [all...] |