/system/keymaster/km_openssl/ |
D | hmac.cpp | 31 return SHA256_DIGEST_LENGTH; in DigestLength() 58 uint8_t tmp[SHA256_DIGEST_LENGTH]; in Sign() 60 if (digest_len >= SHA256_DIGEST_LENGTH) in Sign() 66 if (digest_len < SHA256_DIGEST_LENGTH) in Sign() 79 if (digest_len != SHA256_DIGEST_LENGTH) in Verify() 82 uint8_t computed_digest[SHA256_DIGEST_LENGTH]; in Verify() 86 return 0 == CRYPTO_memcmp(digest, computed_digest, SHA256_DIGEST_LENGTH); in Verify()
|
D | soft_keymaster_enforcement.cpp | 99 unsigned digest_len = SHA256_DIGEST_LENGTH; in hmacSha256() 164 if (!hmac_key_.Reset(SHA256_DIGEST_LENGTH)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in ComputeSharedHmac()
|
/system/vold/ |
D | cryptfs.h | 104 #if !defined(SHA256_DIGEST_LENGTH) 105 #define SHA256_DIGEST_LENGTH 32 macro 142 __le8 hash_first_block[SHA256_DIGEST_LENGTH]; /* When CRYPT_ENCRYPTION_IN_PROGRESS 173 unsigned char sha256[SHA256_DIGEST_LENGTH];
|
D | cryptfs.cpp | 2368 __le8 hash_first_block[SHA256_DIGEST_LENGTH]; in cryptfs_enable_internal()
|
/system/core/fs_mgr/libfs_avb/ |
D | sha.h | 27 uint8_t hash[SHA256_DIGEST_LENGTH]; 30 enum { DIGEST_SIZE = SHA256_DIGEST_LENGTH };
|
D | fs_avb.cpp | 122 expected_digest_size = SHA256_DIGEST_LENGTH * 2; in Create()
|
/system/extras/libfec/ |
D | fec_verity.cpp | 105 hashes = fec_div_round_up(hashes * SHA256_DIGEST_LENGTH, FEC_BLOCKSIZE); in verity_get_size() 146 uint8_t hash[SHA256_DIGEST_LENGTH]; in verity_check_block() 154 return !memcmp(expected, hash, SHA256_DIGEST_LENGTH); in verity_check_block() 164 if (hash && fec_pread(f, hash, SHA256_DIGEST_LENGTH, hash_offset) != in ecc_read_hashes() 165 SHA256_DIGEST_LENGTH) { in ecc_read_hashes() 188 uint8_t hash[SHA256_DIGEST_LENGTH]; in verify_tree() 270 if (!raw_pread(f, hash, SHA256_DIGEST_LENGTH, in verify_tree() 271 hash_offset + j * SHA256_DIGEST_LENGTH) || in verify_tree() 281 hash_offset + j * SHA256_DIGEST_LENGTH, hash, in verify_tree() 293 if (!raw_pwrite(f, hash, SHA256_DIGEST_LENGTH, in verify_tree() [all …]
|
D | fec_read.cpp | 82 return !verity_check_block(f, &f->verity.hash[n * SHA256_DIGEST_LENGTH], in is_erasure() 95 uint64_t hash_offset = (offset / FEC_BLOCKSIZE) * SHA256_DIGEST_LENGTH; in is_zero() 98 v->hash_data_blocks * FEC_BLOCKSIZE - SHA256_DIGEST_LENGTH)) { in is_zero() 102 return !memcmp(v->zero_hash, &v->hash[hash_offset], SHA256_DIGEST_LENGTH); in is_zero() 310 SHA256_DIGEST_LENGTH) / SHA256_DIGEST_LENGTH; in verity_read() 315 uint8_t *hash = &f->verity.hash[curr * SHA256_DIGEST_LENGTH]; in verity_read()
|
D | fec_private.h | 89 uint8_t zero_hash[SHA256_DIGEST_LENGTH];
|
D | fec_open.cpp | 182 uint8_t hash[SHA256_DIGEST_LENGTH]; in parse_ecc_header() 185 f->ecc.valid = !memcmp(hash, header.hash, SHA256_DIGEST_LENGTH); in parse_ecc_header()
|
/system/extras/libfec/include/fec/ |
D | io.h | 34 #ifndef SHA256_DIGEST_LENGTH 35 #define SHA256_DIGEST_LENGTH 32 macro 52 uint8_t hash[SHA256_DIGEST_LENGTH];
|
/system/nvram/core/ |
D | crypto_boringssl.cpp | 35 uint8_t buffer[SHA256_DIGEST_LENGTH]; in SHA256()
|
/system/core/gatekeeperd/ |
D | SoftGateKeeper.h | 39 uint8_t digest[SHA256_DIGEST_LENGTH]; 144 return memcmp(computed.digest, fast_hash.digest, SHA256_DIGEST_LENGTH) == 0; in VerifyFast()
|
/system/tools/hidl/hashing/ |
D | Hash.cpp | 31 const std::vector<uint8_t> Hash::kEmptyHash = std::vector<uint8_t>(SHA256_DIGEST_LENGTH, 0); 59 std::vector<uint8_t> ret = std::vector<uint8_t>(SHA256_DIGEST_LENGTH); in sha256File()
|
/system/keymaster/key_blob_utils/ |
D | ocb_utils.cpp | 81 UniquePtr<uint8_t[]> hash_buf(new (std::nothrow) uint8_t[SHA256_DIGEST_LENGTH]); in InitializeKeyWrappingContext() 84 Eraser hash_eraser(hash_buf.get(), SHA256_DIGEST_LENGTH); in InitializeKeyWrappingContext()
|
/system/extras/verity/ |
D | verity_verifier.cpp | 54 uint8_t hash_buf[SHA256_DIGEST_LENGTH]; in verify_table()
|
/system/core/fs_mgr/ |
D | fs_mgr_verity.cpp | 120 uint8_t hash_buf[SHA256_DIGEST_LENGTH]; in verify_table() 550 uint8_t curr[SHA256_DIGEST_LENGTH]; in compare_last_signature() 551 uint8_t prev[SHA256_DIGEST_LENGTH]; in compare_last_signature() 575 if (metadata_find(entry.verity_loc.c_str(), tag, SHA256_DIGEST_LENGTH, &offset) < 0) { in compare_last_signature() 592 *match = !memcmp(curr, prev, SHA256_DIGEST_LENGTH); in compare_last_signature()
|
/system/update_engine/common/ |
D | hash_calculator.cc | 78 raw_hash_.resize(SHA256_DIGEST_LENGTH); in Finalize()
|
/system/extras/verity/fec/ |
D | image.cpp | 282 uint8_t hash[SHA256_DIGEST_LENGTH]; in image_ecc_load() 285 if (memcmp(hash, p->hash, SHA256_DIGEST_LENGTH) != 0) { in image_ecc_load()
|
/system/security/keystore/ |
D | keystore_attestation_id.cpp | 53 std::vector<uint8_t> digest_buffer(SHA256_DIGEST_LENGTH); in signature2SHA256()
|
/system/nvram/hal/tests/ |
D | nvram_hal_test.cc | 194 uint8_t hash[SHA256_DIGEST_LENGTH]; in SHA256HashString() 196 return std::string(reinterpret_cast<const char*>(hash), SHA256_DIGEST_LENGTH); in SHA256HashString()
|
/system/bt/btif/src/ |
D | btif_config.cc | 656 uint8_t hash[SHA256_DIGEST_LENGTH]; in hash_file() 666 for (int i = 0; i < SHA256_DIGEST_LENGTH; i++) { in hash_file()
|
/system/netd/resolv/ |
D | DnsTlsSocket.cpp | 50 constexpr size_t SHA256_SIZE = SHA256_DIGEST_LENGTH;
|
/system/core/adb/client/ |
D | auth.cpp | 130 result.resize(SHA256_DIGEST_LENGTH); in hash_key()
|