HomeSort by relevance Sort by last modified time
    Searched refs:hash_len (Results 1 - 25 of 48) sorted by null

1 2

  /external/boringssl/src/ssl/
tls13_enc.cc 37 hs->hash_len = SSL_TRANSCRIPT_digest_len(&hs->transcript);
40 OPENSSL_memset(hs->secret, 0, hs->hash_len);
63 return HKDF_extract(hs->secret, &hs->hash_len,
65 hs->hash_len);
71 const uint8_t *hash, size_t hash_len, size_t len) {
78 hash_len) ||
85 !CBB_add_bytes(&child, hash, hash_len) ||
110 hs->hash_len, label, label_len, context_hash,
198 return derive_secret(hs, hs->early_traffic_secret, hs->hash_len,
202 hs->early_traffic_secret, hs->hash_len) &
330 size_t hash_len = 0; local
375 size_t hash_len = EVP_MD_size(digest); local
410 size_t hash_len = SSL_TRANSCRIPT_digest_len(&hs->transcript); local
    [all...]
tls13_server.cc 450 } else if (!tls13_advance_key_schedule(hs, kZeroes, hs->hash_len)) {
570 hs->hash_len)) {
652 !tls13_advance_key_schedule(hs, kZeroes, hs->hash_len) ||
655 hs->hash_len)) {
670 if (finished_len != hs->hash_len) {
680 assert(hs->hash_len <= 0xff);
681 uint8_t header[4] = {SSL3_MT_FINISHED, 0, 0, static_cast<uint8_t>(hs->hash_len)};
684 hs->hash_len) ||
699 hs->hash_len)) {
727 hs->hash_len)) {
    [all...]
tls13_client.cc 306 } else if (!tls13_advance_key_schedule(hs, kZeroes, hs->hash_len)) {
346 hs->hash_len)) {
356 hs->hash_len)) {
513 !tls13_advance_key_schedule(hs, kZeroes, hs->hash_len) ||
538 hs->hash_len)) {
634 hs->hash_len) ||
636 hs->hash_len) ||
ssl_privkey.cc 433 unsigned hash_len; local
434 if (!EVP_Digest(in, in_len, hash, &hash_len, md, NULL)) {
439 hash, hash_len);
  /external/libconstrainedcrypto/include/constrainedcrypto/
rsa.h 52 const int hash_len);
  /external/avb/libavb/
avb_crypto.h 110 size_t hash_len; member in struct:__anon13241
  /external/wpa_supplicant_8/src/tls/
pkcs1.h 27 const u8 *hash, size_t hash_len);
tlsv1_client_ocsp.c 124 unsigned int hash_len; local
181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn,
183 if (hash_len == 0 || name_hash_len != hash_len ||
184 os_memcmp(name_hash, hash, hash_len) != 0) {
187 hash, hash_len);
205 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key,
207 if (hash_len == 0 || key_hash_len != hash_len ||
208 os_memcmp(key_hash, hash, hash_len) != 0)
    [all...]
pkcs1.c 199 const u8 *hash, size_t hash_len)
300 if (hdr.length != hash_len ||
x509v3.c 1747 size_t hash_len; local
    [all...]
  /bootable/recovery/
verifier.h 50 : hash_len(hash_len_),
56 int hash_len; member in struct:Certificate
verifier.cpp 203 switch (key.hash_len) {
258 switch (key.hash_len) {
274 if (!RSA_verify(hash_nid, hash, key.hash_len, sig_der.data(), sig_der.size(),
282 } else if (key.key_type == Certificate::KEY_TYPE_EC && key.hash_len == SHA256_DIGEST_LENGTH) {
283 if (!ECDSA_verify(0, hash, key.hash_len, sig_der.data(), sig_der.size(), key.ec.get())) {
494 cert.hash_len = SHA_DIGEST_LENGTH;
502 cert.hash_len = SHA_DIGEST_LENGTH;
507 cert.hash_len = SHA256_DIGEST_LENGTH;
512 cert.hash_len = SHA256_DIGEST_LENGTH;
516 cert.hash_len = SHA256_DIGEST_LENGTH
    [all...]
  /external/valgrind/coregrind/m_demangle/
rust-demangle.c 108 static const size_t hash_len = 16; variable
145 if (len <= hash_prefix_len + hash_len)
149 len_without_hash = len - (hash_prefix_len + hash_len);
173 for (end = str + hash_len; str < end; str++)
269 end = sym + strlen (sym) - (hash_prefix_len + hash_len);
  /external/libconstrainedcrypto/
rsa.c 243 // Both e=3 and e=65537 are supported. hash_len may be
253 const int hash_len) {
266 if (hash_len != SHA_DIGEST_SIZE &&
267 hash_len != SHA256_DIGEST_SIZE) {
282 for (i = len - hash_len; i < len; ++i) {
287 switch (hash_len) {
301 for (i = 0; i < hash_len; ++i) {
  /external/wpa_supplicant_8/src/eap_common/
ikev2_common.c 118 size_t hash_len; local
128 hash_len = prf->hash_len;
131 len[0] = hash_len;
150 clen = hash_len;
402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len;
411 os_memcpy(pos, hash, prf->hash_len);
416 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1,
461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) {
470 integ = end - integ_alg->hash_len;
    [all...]
eap_ikev2_common.c 83 icv_len = integ->hash_len;
ikev2_common.h 255 size_t hash_len; member in struct:ikev2_integ_alg
261 size_t hash_len; member in struct:ikev2_prf_alg
  /external/libchrome/crypto/
signature_verifier_nss.cc 51 unsigned int hash_len = HASH_ResultLenContext(hash_context); local
52 std::vector<unsigned char> hash(hash_len);
53 HASH_End(hash_context, &hash[0], &hash_len, hash.size());
  /external/brotli/enc/
quality.h 38 int hash_len; member in struct:BrotliHasherParams
148 hparams->hash_len = 5;
  /external/wpa_supplicant_8/src/utils/
http-utils.h 25 size_t hash_len; member in struct:http_logo
  /external/wpa_supplicant_8/src/eap_server/
eap_server.c 700 size_t hash_len; local
706 hash_len = 32;
709 hash_len = 16;
715 hash_len = 0;
718 if (hash_len)
719 plen += 1 + hash_len;
738 wpabuf_put_data(msg, hash, hash_len);
797 size_t hash_len; local
901 hash_len = 32;
909 hash_len = 16
    [all...]
  /external/boringssl/src/crypto/evp/
p_rsa.c 265 const size_t hash_len = EVP_MD_size(rctx->md); local
272 kDummyHash, hash_len)) {
282 CRYPTO_memcmp(rctx->tbuf, asn1_prefix, asn1_prefix_len - hash_len) != 0) {
295 OPENSSL_memcpy(out, rctx->tbuf + rslen - hash_len, hash_len);
297 *out_len = hash_len;
  /external/wpa_supplicant_8/src/wps/
wps_attr_build.c 408 size_t hash_len; local
415 hash_len = wpabuf_len(pubkey);
416 if (sha256_vector(1, addr, &hash_len, pubkey_hash) < 0)
  /system/keymaster/
keymaster_enforcement.cpp 408 unsigned int hash_len; local
411 EVP_DigestFinal_ex(ctx.get(), hash, &hash_len)) {
412 assert(hash_len >= sizeof(*keyid));
  /system/gatekeeper/
gatekeeper.cpp 241 uint32_t hash_len = (uint32_t)((uint8_t *)&token->hmac - (uint8_t *)token); local
243 reinterpret_cast<uint8_t *>(token), hash_len);

Completed in 1909 milliseconds

1 2