/external/avb/libavb/ |
avb_hash_descriptor.h | 55 * |digest_len| bytes of the digest. 62 * - digest_len may be zero, which indicates the use of a persistent digest 70 uint32_t digest_len; member in struct:AvbHashDescriptor
|
avb_slot_verify.c | 194 size_t digest_len; local 238 } else if (hash_desc.digest_len == 0 && avb_strlen(ab_suffix) != 0) { 302 digest_len = AVB_SHA256_DIGEST_SIZE; 309 digest_len = AVB_SHA512_DIGEST_SIZE; 316 if (hash_desc.digest_len == 0) { 319 expected_digest_len = digest_len; 323 read_persistent_digest(ops, part_name, digest_len, expected_digest_buf); 329 expected_digest_len = hash_desc.digest_len; 333 if (digest_len != expected_digest_len) { 340 if (avb_safe_memcmp(digest, expected_digest, digest_len) != 0) 993 size_t digest_len = 0; local [all...] |
/external/boringssl/src/crypto/hkdf/ |
hkdf.c | 63 const size_t digest_len = EVP_MD_size(digest); local 71 n = (out_len + digest_len - 1) / digest_len; 72 if (out_len + digest_len < out_len || n > 255) { 87 !HMAC_Update(&hmac, previous, digest_len))) { 96 todo = digest_len;
|
/external/boringssl/src/fipstools/ |
cavp_ecdsa2_siggen_test.cc | 53 unsigned digest_len; local 59 digest_len = EVP_MD_size(md); 61 } else if (!EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, 66 bssl::UniquePtr<ECDSA_SIG> sig(ECDSA_do_sign(digest, digest_len, key.get()));
|
cavp_ecdsa2_sigver_test.cc | 46 unsigned digest_len; local 51 !EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, nullptr)) { 60 if (ECDSA_do_verify(digest, digest_len, sig.get(), key.get())) {
|
cavp_kas_test.cc | 96 unsigned digest_len; local 98 !EVP_Digest(shared_bytes, shared_bytes_len, digest, &digest_len, md, 109 digest_len == expected_shared_bytes.size() && 110 OPENSSL_memcmp(digest, expected_shared_bytes.data(), digest_len) == 0; 114 EncodeHex(digest, digest_len).c_str(), ok ? 'P' : 'F'); 129 EncodeHex(digest, digest_len).c_str());
|
cavp_sha_monte_test.cc | 66 unsigned digest_len; local 67 if (!EVP_Digest(msg.data(), msg.size(), out.data(), &digest_len, md, 69 digest_len != out.size()) {
|
cavp_sha_test.cc | 65 unsigned digest_len; local 66 if (!EVP_Digest(msg.data(), msg_len, out.data(), &digest_len, md, nullptr) || 67 digest_len != out.size()) {
|
cavp_rsa2_siggen_test.cc | 79 unsigned digest_len; local 82 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) { 88 digest_buf, digest_len, md, md, -1)) { 93 if (!RSA_sign(EVP_MD_type(md), digest_buf, digest_len, sig.data(),
|
cavp_rsa2_sigver_test.cc | 75 unsigned digest_len; local 77 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) { 83 ok = RSA_verify_pss_mgf1(key.get(), digest_buf, digest_len, md, md, -1, 86 ok = RSA_verify(EVP_MD_type(md), digest_buf, digest_len, sig.data(),
|
/external/webrtc/webrtc/base/ |
sslfingerprint.cc | 34 size_t digest_len; local 36 algorithm, digest_val, sizeof(digest_val), &digest_len); 41 return new SSLFingerprint(algorithm, digest_val, digest_len); 67 size_t digest_len) 69 digest.SetData(digest_in, digest_len);
|
ssladapter_unittest.cc | 250 size_t digest_len = sizeof(digest); local 252 digest_len);
|
sslidentity_unittest.cc | 118 size_t digest_len; local 123 sizeof(DigestType), &digest_len); 125 EXPECT_EQ(expected_len, digest_len); 130 sizeof(DigestType), &digest_len); 132 EXPECT_EQ(expected_len, digest_len); 165 size_t digest_len; local 170 &digest_len); 172 EXPECT_EQ(expected_len, digest_len);
|
sslstreamadapter_unittest.cc | 330 size_t digest_len; local 337 &digest_len); 344 digest_len); 349 digest, 20, &digest_len); 356 digest_len); [all...] |
/external/vboot_reference/tests/ |
rsa_verify_benchmark.c | 25 uint64_t digest_len, sig_len; local 48 digest = BufferFromFile(file_name, &digest_len);
|
/external/selinux/libselinux/utils/ |
selabel_digest.c | 9 static size_t digest_len; variable 47 rc = strncmp(selabel_digest, files_ptr + 1, digest_len * 2); 140 rc = selabel_digest(hnd, &sha1_digest, &digest_len, &specfiles, 155 sha1_buf = malloc(digest_len * 2 + 1); 164 for (i = 0; i < digest_len; i++)
|
/system/keymaster/km_openssl/ |
hmac_operation.cpp | 171 unsigned int digest_len; local 172 if (!HMAC_Final(&ctx_, digest, &digest_len)) return TranslateLastOpenSslError(); 176 if (mac_length_ > digest_len) return KM_ERROR_UNSUPPORTED_MAC_LENGTH; 182 if (siglen > digest_len || siglen < kMinHmacLengthBits / 8)
|
soft_keymaster_enforcement.cpp | 103 unsigned digest_len = SHA256_DIGEST_LENGTH; local 104 if (!output->Reset(digest_len)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; 118 if (!HMAC_Final(ctx.get(), output->writable_data(), &digest_len)) { 122 if (digest_len != output->data_length) return KM_ERROR_UNKNOWN_ERROR;
|
/external/boringssl/src/crypto/digest_extra/ |
digest_test.cc | 148 size_t digest_len) { 152 for (size_t i = 0; i < digest_len; i++) { 156 digest_hex[2*digest_len] = '\0'; 170 unsigned digest_len; local 171 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); 172 CompareDigest(test, digest.get(), digest_len); 182 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); 183 EXPECT_EQ(EVP_MD_size(test->md.func()), digest_len); 184 CompareDigest(test, digest.get(), digest_len);
|
/external/boringssl/src/crypto/cipher_extra/ |
e_ssl3.c | 131 const size_t digest_len = EVP_MD_CTX_size(&ssl3_ctx->md_ctx); local 134 return digest_len; 138 // An overflow of |in_len + digest_len| doesn't affect the result mod 141 const size_t pad_len = block_size - ((in_len + digest_len) % block_size); 142 return digest_len + pad_len;
|
/external/boringssl/src/tool/ |
digest.cc | 166 unsigned digest_len; local 167 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) { 174 for (unsigned i = 0; i < digest_len; i++) { 179 *out_hex = std::string(hex_digest, digest_len * 2);
|
/system/netd/server/dns/ |
DnsTlsSocket.cpp | 119 unsigned int digest_len = 0; local 120 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), NULL); 125 if (digest_len != out->size()) { 126 ALOGW("Wrong digest length: %d", digest_len);
|
/system/netd/tests/dns_responder/ |
dns_tls_frontend.cpp | 49 unsigned int digest_len = 0; local 50 int ret = EVP_Digest(spki, spki_len, out->data(), &digest_len, EVP_sha256(), NULL); 55 if (digest_len != out->size()) { 56 ALOGE("Wrong digest length: %d", digest_len);
|
/external/boringssl/src/ssl/ |
handshake_client.cc | 1447 size_t digest_len; local [all...] |
handshake_server.cc | 1325 size_t digest_len; local [all...] |