HomeSort by relevance Sort by last modified time
    Searched defs:digest_len (Results 1 - 25 of 26) sorted by null

1 2

  /external/avb/libavb/
avb_hash_descriptor.h 55 * |digest_len| bytes of the digest.
62 * - digest_len may be zero, which indicates the use of a persistent digest
70 uint32_t digest_len; member in struct:AvbHashDescriptor
avb_slot_verify.c 194 size_t digest_len; local
238 } else if (hash_desc.digest_len == 0 && avb_strlen(ab_suffix) != 0) {
302 digest_len = AVB_SHA256_DIGEST_SIZE;
309 digest_len = AVB_SHA512_DIGEST_SIZE;
316 if (hash_desc.digest_len == 0) {
319 expected_digest_len = digest_len;
323 read_persistent_digest(ops, part_name, digest_len, expected_digest_buf);
329 expected_digest_len = hash_desc.digest_len;
333 if (digest_len != expected_digest_len) {
340 if (avb_safe_memcmp(digest, expected_digest, digest_len) != 0)
993 size_t digest_len = 0; local
    [all...]
  /external/boringssl/src/crypto/hkdf/
hkdf.c 63 const size_t digest_len = EVP_MD_size(digest); local
71 n = (out_len + digest_len - 1) / digest_len;
72 if (out_len + digest_len < out_len || n > 255) {
87 !HMAC_Update(&hmac, previous, digest_len))) {
96 todo = digest_len;
  /external/boringssl/src/fipstools/
cavp_ecdsa2_siggen_test.cc 53 unsigned digest_len; local
59 digest_len = EVP_MD_size(md);
61 } else if (!EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md,
66 bssl::UniquePtr<ECDSA_SIG> sig(ECDSA_do_sign(digest, digest_len, key.get()));
cavp_ecdsa2_sigver_test.cc 46 unsigned digest_len; local
51 !EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, nullptr)) {
60 if (ECDSA_do_verify(digest, digest_len, sig.get(), key.get())) {
cavp_kas_test.cc 96 unsigned digest_len; local
98 !EVP_Digest(shared_bytes, shared_bytes_len, digest, &digest_len, md,
109 digest_len == expected_shared_bytes.size() &&
110 OPENSSL_memcmp(digest, expected_shared_bytes.data(), digest_len) == 0;
114 EncodeHex(digest, digest_len).c_str(), ok ? 'P' : 'F');
129 EncodeHex(digest, digest_len).c_str());
cavp_sha_monte_test.cc 66 unsigned digest_len; local
67 if (!EVP_Digest(msg.data(), msg.size(), out.data(), &digest_len, md,
69 digest_len != out.size()) {
cavp_sha_test.cc 65 unsigned digest_len; local
66 if (!EVP_Digest(msg.data(), msg_len, out.data(), &digest_len, md, nullptr) ||
67 digest_len != out.size()) {
cavp_rsa2_siggen_test.cc 79 unsigned digest_len; local
82 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) {
88 digest_buf, digest_len, md, md, -1)) {
93 if (!RSA_sign(EVP_MD_type(md), digest_buf, digest_len, sig.data(),
cavp_rsa2_sigver_test.cc 75 unsigned digest_len; local
77 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) {
83 ok = RSA_verify_pss_mgf1(key.get(), digest_buf, digest_len, md, md, -1,
86 ok = RSA_verify(EVP_MD_type(md), digest_buf, digest_len, sig.data(),
  /external/webrtc/webrtc/base/
sslfingerprint.cc 34 size_t digest_len; local
36 algorithm, digest_val, sizeof(digest_val), &digest_len);
41 return new SSLFingerprint(algorithm, digest_val, digest_len);
67 size_t digest_len)
69 digest.SetData(digest_in, digest_len);
ssladapter_unittest.cc 250 size_t digest_len = sizeof(digest); local
252 digest_len);
sslidentity_unittest.cc 118 size_t digest_len; local
123 sizeof(DigestType), &digest_len);
125 EXPECT_EQ(expected_len, digest_len);
130 sizeof(DigestType), &digest_len);
132 EXPECT_EQ(expected_len, digest_len);
165 size_t digest_len; local
170 &digest_len);
172 EXPECT_EQ(expected_len, digest_len);
sslstreamadapter_unittest.cc 330 size_t digest_len; local
337 &digest_len);
344 digest_len);
349 digest, 20, &digest_len);
356 digest_len);
    [all...]
  /external/vboot_reference/tests/
rsa_verify_benchmark.c 25 uint64_t digest_len, sig_len; local
48 digest = BufferFromFile(file_name, &digest_len);
  /external/selinux/libselinux/utils/
selabel_digest.c 9 static size_t digest_len; variable
47 rc = strncmp(selabel_digest, files_ptr + 1, digest_len * 2);
140 rc = selabel_digest(hnd, &sha1_digest, &digest_len, &specfiles,
155 sha1_buf = malloc(digest_len * 2 + 1);
164 for (i = 0; i < digest_len; i++)
  /system/keymaster/km_openssl/
hmac_operation.cpp 171 unsigned int digest_len; local
172 if (!HMAC_Final(&ctx_, digest, &digest_len)) return TranslateLastOpenSslError();
176 if (mac_length_ > digest_len) return KM_ERROR_UNSUPPORTED_MAC_LENGTH;
182 if (siglen > digest_len || siglen < kMinHmacLengthBits / 8)
soft_keymaster_enforcement.cpp 103 unsigned digest_len = SHA256_DIGEST_LENGTH; local
104 if (!output->Reset(digest_len)) return KM_ERROR_MEMORY_ALLOCATION_FAILED;
118 if (!HMAC_Final(ctx.get(), output->writable_data(), &digest_len)) {
122 if (digest_len != output->data_length) return KM_ERROR_UNKNOWN_ERROR;
  /external/boringssl/src/crypto/digest_extra/
digest_test.cc 148 size_t digest_len) {
152 for (size_t i = 0; i < digest_len; i++) {
156 digest_hex[2*digest_len] = '\0';
170 unsigned digest_len; local
171 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len));
172 CompareDigest(test, digest.get(), digest_len);
182 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len));
183 EXPECT_EQ(EVP_MD_size(test->md.func()), digest_len);
184 CompareDigest(test, digest.get(), digest_len);
  /external/boringssl/src/crypto/cipher_extra/
e_ssl3.c 131 const size_t digest_len = EVP_MD_CTX_size(&ssl3_ctx->md_ctx); local
134 return digest_len;
138 // An overflow of |in_len + digest_len| doesn't affect the result mod
141 const size_t pad_len = block_size - ((in_len + digest_len) % block_size);
142 return digest_len + pad_len;
  /external/boringssl/src/tool/
digest.cc 166 unsigned digest_len; local
167 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) {
174 for (unsigned i = 0; i < digest_len; i++) {
179 *out_hex = std::string(hex_digest, digest_len * 2);
  /system/netd/server/dns/
DnsTlsSocket.cpp 119 unsigned int digest_len = 0; local
120 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), NULL);
125 if (digest_len != out->size()) {
126 ALOGW("Wrong digest length: %d", digest_len);
  /system/netd/tests/dns_responder/
dns_tls_frontend.cpp 49 unsigned int digest_len = 0; local
50 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), NULL);
55 if (digest_len != out->size()) {
56 ALOGE("Wrong digest length: %d", digest_len);
  /external/boringssl/src/ssl/
handshake_client.cc 1447 size_t digest_len; local
    [all...]
handshake_server.cc 1325 size_t digest_len; local
    [all...]

Completed in 480 milliseconds

1 2