/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 255 size_t hash_len; member in struct:ikev2_integ_alg 261 size_t hash_len; member in struct:ikev2_prf_alg
|
/external/wpa_supplicant_8/src/tls/ |
pkcs1.c | 199 const u8 *hash, size_t hash_len) 300 if (hdr.length != hash_len ||
|
x509v3.c | 1744 size_t hash_len; local [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_attr_build.c | 408 size_t hash_len; local 415 hash_len = wpabuf_len(pubkey); 416 if (sha256_vector(1, addr, &hash_len, pubkey_hash) < 0)
|
/system/gatekeeper/ |
gatekeeper.cpp | 241 uint32_t hash_len = (uint32_t)((uint8_t *)&token->hmac - (uint8_t *)token); local 243 reinterpret_cast<uint8_t *>(token), hash_len);
|
/system/security/keystore/ |
keymaster_enforcement.cpp | 434 unsigned int hash_len; local 437 EVP_DigestFinal_ex(ctx.get(), hash, &hash_len)) { 438 assert(hash_len >= sizeof(*keyid));
|
/external/avb/libavb/ |
avb_vbmeta_image.c | 162 if (h.hash_size != algorithm->hash_len) {
|
avb_crypto.c | 330 {.padding = NULL, .padding_len = 0, .hash_len = 0}, 334 .hash_len = AVB_SHA256_DIGEST_SIZE}, 338 .hash_len = AVB_SHA256_DIGEST_SIZE}, 342 .hash_len = AVB_SHA256_DIGEST_SIZE}, 346 .hash_len = AVB_SHA512_DIGEST_SIZE}, 350 .hash_len = AVB_SHA512_DIGEST_SIZE}, 354 .hash_len = AVB_SHA512_DIGEST_SIZE},
|
/external/wpa_supplicant_8/src/common/ |
dpp.h | 78 size_t hash_len; member in struct:dpp_curve_params
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 64 size_t hash_len; member in struct:tls_event_data::__anon44629
|
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 107 skeyseed, prf->hash_len); 566 if (auth_len != prf->hash_len || 572 auth_data, prf->hash_len); 1006 wpabuf_put(msg, prf->hash_len)) < 0) {
|
eap.c | 1787 size_t hash_len; local [all...] |
eap_aka.c | 503 size_t hash_len; local 518 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 521 if (checkcode_len != hash_len) { 538 if (os_memcmp_const(hash, checkcode, hash_len) != 0) { [all...] |
eap_ikev2.c | 170 icv_len = integ->hash_len;
|
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 111 skeyseed, prf->hash_len); 634 if (auth_len != prf->hash_len || 640 auth_data, prf->hash_len); 1072 wpabuf_put(msg, prf->hash_len)) < 0) {
|
eap_server_aka.c | 306 size_t hash_len; local 321 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 324 if (checkcode_len != hash_len) { 339 if (os_memcmp_const(hash, checkcode, hash_len) != 0) { [all...] |
eap_server_ikev2.c | 166 icv_len = integ->hash_len;
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 2166 size_t hash_len, prime_len; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 4250 size_t hash_len, prime_len; local [all...] |
/external/brotli/c/enc/ |
hash_longest_match64_inc.h | 72 self->hash_mask_ = (~((uint64_t)0U)) >> (64 - 8 * common->params.hash_len);
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
rsa.c | 378 // hash_len is the expected length of the hash function. 379 uint8_t hash_len; member in struct:pkcs1_sig_prefix 460 if (msg_len != sig_prefix->hash_len) {
|
/external/boringssl/src/ssl/ |
tls13_both.cc | 332 verify_data_len = hs->hash_len;
|
/external/wpa_supplicant_8/src/utils/ |
http_curl.c | 488 n->hash_len = ASN1_STRING_length(hash->hashValue); 489 n->hash = os_memdup(ASN1_STRING_data(hash->hashValue), n->hash_len); [all...] |
/external/scapy/scapy/layers/tls/ |
session.py | 107 self.mac_len = self.hash.hash_len [all...] |
handshake.py | [all...] |