/external/boringssl/src/util/fipstools/cavp/ |
D | cavp_kas_test.cc | 41 size_t digest_len = 0; in TestKAS() local 45 digest_len = SHA224_DIGEST_LENGTH; in TestKAS() 48 digest_len = SHA256_DIGEST_LENGTH; in TestKAS() 51 digest_len = SHA384_DIGEST_LENGTH; in TestKAS() 54 digest_len = SHA512_DIGEST_LENGTH; in TestKAS() 93 if (!ECDH_compute_key_fips(digest, digest_len, their_point.get(), in TestKAS() 104 digest_len == expected_shared_bytes.size() && in TestKAS() 105 OPENSSL_memcmp(digest, expected_shared_bytes.data(), digest_len) == 0; in TestKAS() 109 EncodeHex(bssl::MakeConstSpan(digest, digest_len)).c_str(), in TestKAS() 125 EncodeHex(bssl::MakeConstSpan(digest, digest_len)).c_str()); in TestKAS()
|
D | cavp_rsa2_sigver_test.cc | 75 unsigned digest_len; in TestRSA2SigVer() local 77 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) { in TestRSA2SigVer() 83 ok = RSA_verify_pss_mgf1(key.get(), digest_buf, digest_len, md, md, -1, in TestRSA2SigVer() 86 ok = RSA_verify(EVP_MD_type(md), digest_buf, digest_len, sig.data(), in TestRSA2SigVer()
|
D | cavp_rsa2_siggen_test.cc | 78 unsigned digest_len; in TestRSA2SigGen() local 81 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) { in TestRSA2SigGen() 87 digest_buf, digest_len, md, md, -1)) { in TestRSA2SigGen() 92 if (!RSA_sign(EVP_MD_type(md), digest_buf, digest_len, sig.data(), in TestRSA2SigGen()
|
/external/rust/crates/quiche/deps/boringssl/src/util/fipstools/cavp/ |
D | cavp_kas_test.cc | 41 size_t digest_len = 0; in TestKAS() local 45 digest_len = SHA224_DIGEST_LENGTH; in TestKAS() 48 digest_len = SHA256_DIGEST_LENGTH; in TestKAS() 51 digest_len = SHA384_DIGEST_LENGTH; in TestKAS() 54 digest_len = SHA512_DIGEST_LENGTH; in TestKAS() 93 if (!ECDH_compute_key_fips(digest, digest_len, their_point.get(), in TestKAS() 104 digest_len == expected_shared_bytes.size() && in TestKAS() 105 OPENSSL_memcmp(digest, expected_shared_bytes.data(), digest_len) == 0; in TestKAS() 109 EncodeHex(bssl::MakeConstSpan(digest, digest_len)).c_str(), in TestKAS() 125 EncodeHex(bssl::MakeConstSpan(digest, digest_len)).c_str()); in TestKAS()
|
D | cavp_rsa2_sigver_test.cc | 75 unsigned digest_len; in TestRSA2SigVer() local 77 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) { in TestRSA2SigVer() 83 ok = RSA_verify_pss_mgf1(key.get(), digest_buf, digest_len, md, md, -1, in TestRSA2SigVer() 86 ok = RSA_verify(EVP_MD_type(md), digest_buf, digest_len, sig.data(), in TestRSA2SigVer()
|
D | cavp_rsa2_siggen_test.cc | 78 unsigned digest_len; in TestRSA2SigGen() local 81 !EVP_Digest(msg.data(), msg.size(), digest_buf, &digest_len, md, NULL)) { in TestRSA2SigGen() 87 digest_buf, digest_len, md, md, -1)) { in TestRSA2SigGen() 92 if (!RSA_sign(EVP_MD_type(md), digest_buf, digest_len, sig.data(), in TestRSA2SigGen()
|
D | cavp_ecdsa2_siggen_test.cc | 54 unsigned digest_len; in TestECDSA2SigGenImpl() local 60 digest_len = EVP_MD_size(md); in TestECDSA2SigGenImpl() 62 } else if (!EVP_Digest(msg.data(), msg.size(), digest, &digest_len, md, in TestECDSA2SigGenImpl() 67 bssl::UniquePtr<ECDSA_SIG> sig(ECDSA_do_sign(digest, digest_len, key.get())); in TestECDSA2SigGenImpl()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/ecdsa/ |
D | ecdsa.c | 73 const uint8_t *digest, size_t digest_len) { in digest_to_scalar() argument 78 if (digest_len > num_bytes) { in digest_to_scalar() 79 digest_len = num_bytes; in digest_to_scalar() 82 for (size_t i = 0; i < digest_len; i++) { in digest_to_scalar() 83 out->bytes[i] = digest[digest_len - 1 - i]; in digest_to_scalar() 87 if (8 * digest_len > num_bits) { in digest_to_scalar() 154 int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, in ECDSA_do_verify() argument 183 digest_to_scalar(group, &m, digest, digest_len); in ECDSA_do_verify() 203 size_t digest_len, const EC_SCALAR *priv_key) { in ecdsa_sign_setup() argument 235 SHA512_Update(&sha, digest, digest_len); in ecdsa_sign_setup() [all …]
|
/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
D | ecdsa.c | 73 const uint8_t *digest, size_t digest_len) { in digest_to_scalar() argument 78 if (digest_len > num_bytes) { in digest_to_scalar() 79 digest_len = num_bytes; in digest_to_scalar() 82 for (size_t i = 0; i < digest_len; i++) { in digest_to_scalar() 83 out->bytes[i] = digest[digest_len - 1 - i]; in digest_to_scalar() 87 if (8 * digest_len > num_bits) { in digest_to_scalar() 154 int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, in ECDSA_do_verify() argument 183 digest_to_scalar(group, &m, digest, digest_len); in ECDSA_do_verify() 203 size_t digest_len, const EC_SCALAR *priv_key) { in ecdsa_sign_setup() argument 235 SHA512_Update(&sha, digest, digest_len); in ecdsa_sign_setup() [all …]
|
/external/boringssl/src/crypto/digest_extra/ |
D | digest_test.cc | 157 size_t digest_len) { in CompareDigest() argument 159 EncodeHex(bssl::MakeConstSpan(digest, digest_len))); in CompareDigest() 171 unsigned digest_len; in TestDigest() local 172 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); in TestDigest() 173 CompareDigest(test, digest.get(), digest_len); in TestDigest() 183 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); in TestDigest() 184 EXPECT_EQ(EVP_MD_size(test->md.func()), digest_len); in TestDigest() 185 CompareDigest(test, digest.get(), digest_len); in TestDigest() 198 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); in TestDigest() 199 CompareDigest(test, digest.get(), digest_len); in TestDigest() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/digest_extra/ |
D | digest_test.cc | 152 size_t digest_len) { in CompareDigest() argument 154 EncodeHex(bssl::MakeConstSpan(digest, digest_len))); in CompareDigest() 166 unsigned digest_len; in TestDigest() local 167 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); in TestDigest() 168 CompareDigest(test, digest.get(), digest_len); in TestDigest() 178 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); in TestDigest() 179 EXPECT_EQ(EVP_MD_size(test->md.func()), digest_len); in TestDigest() 180 CompareDigest(test, digest.get(), digest_len); in TestDigest() 193 ASSERT_TRUE(EVP_DigestFinal_ex(ctx.get(), digest.get(), &digest_len)); in TestDigest() 194 CompareDigest(test, digest.get(), digest_len); in TestDigest() [all …]
|
/external/selinux/libselinux/utils/ |
D | selabel_get_digests_all_partial_matches.c | 32 size_t i, digest_len; in main() local 100 digest_len = 0; in main() 106 &digest_len); in main() 108 sha1_buf = calloc(1, digest_len * 2 + 1); in main() 120 for (i = 0; i < digest_len; i++) in main() 137 for (i = 0; i < digest_len; i++) in main() 146 for (i = 0; i < digest_len; i++) in main()
|
D | selabel_digest.c | 9 static size_t digest_len; variable 47 rc = strncmp(selabel_digest, files_ptr + 1, digest_len * 2); in run_check_digest() 140 rc = selabel_digest(hnd, &sha1_digest, &digest_len, &specfiles, in main() 155 sha1_buf = malloc(digest_len * 2 + 1); in main() 164 for (i = 0; i < digest_len; i++) in main()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 63 const size_t digest_len = EVP_MD_size(digest); in HKDF_expand() local 71 n = (out_len + digest_len - 1) / digest_len; in HKDF_expand() 72 if (out_len + digest_len < out_len || n > 255) { in HKDF_expand() 87 !HMAC_Update(&hmac, previous, digest_len))) { in HKDF_expand() 96 todo = digest_len; in HKDF_expand()
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 63 const size_t digest_len = EVP_MD_size(digest); in HKDF_expand() local 71 n = (out_len + digest_len - 1) / digest_len; in HKDF_expand() 72 if (out_len + digest_len < out_len || n > 255) { in HKDF_expand() 87 !HMAC_Update(&hmac, previous, digest_len))) { in HKDF_expand() 96 todo = digest_len; in HKDF_expand()
|
/external/openssh/ |
D | dns.c | 81 u_char **digest, size_t *digest_len, struct sshkey *key) in dns_read_key() argument 130 digest_len)) != 0) in dns_read_key() 136 *digest_len = 0; in dns_read_key() 148 u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) in dns_read_rdata() argument 158 *digest_len = rdata_len - 2; in dns_read_rdata() 160 if (*digest_len > 0) { in dns_read_rdata() 161 *digest = xmalloc(*digest_len); in dns_read_rdata() 162 memcpy(*digest, rdata + 2, *digest_len); in dns_read_rdata()
|
D | digest-openssl.c | 53 size_t digest_len; member 104 return digest == NULL ? 0 : digest->digest_len; in ssh_digest_bytes() 166 if (dlen < digest->digest_len) /* No truncation allowed */ in ssh_digest_final() 170 if (l != digest->digest_len) /* sanity */ in ssh_digest_final() 194 if (dlen < digest->digest_len) in ssh_digest_memory()
|
/external/webrtc/rtc_base/ |
D | ssl_fingerprint.cc | 43 size_t digest_len; in Create() local 45 &digest_len); in Create() 50 algorithm, ArrayView<const uint8_t>(digest_val, digest_len)); in Create() 103 size_t digest_len) in SSLFingerprint() argument 104 : SSLFingerprint(algorithm, MakeArrayView(digest_in, digest_len)) {} in SSLFingerprint()
|
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/ |
D | ecdsa.h | 77 size_t digest_len, uint8_t *sig, 85 size_t digest_len, const uint8_t *sig, 128 size_t digest_len, const EC_KEY *key); 133 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len,
|
D | dsa.h | 194 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, 207 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len, 217 size_t digest_len, DSA_SIG *sig, 233 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len, 250 size_t digest_len, const uint8_t *sig, 260 size_t digest_len, const uint8_t *sig,
|
/external/boringssl/src/include/openssl/ |
D | ecdsa.h | 77 size_t digest_len, uint8_t *sig, 85 size_t digest_len, const uint8_t *sig, 128 size_t digest_len, const EC_KEY *key); 133 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len,
|
D | dsa.h | 194 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, 207 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len, 217 size_t digest_len, DSA_SIG *sig, 233 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len, 250 size_t digest_len, const uint8_t *sig, 260 size_t digest_len, const uint8_t *sig,
|
/external/avb/libavb/ |
D | avb_hash_descriptor.c | 46 dest->digest_len = avb_be32toh(dest->digest_len); in avb_hash_descriptor_validate_and_byteswap() 53 !avb_safe_add_to(&expected_size, dest->digest_len)) { in avb_hash_descriptor_validate_and_byteswap()
|
/external/boringssl/src/crypto/dsa/ |
D | dsa.c | 569 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, const DSA *dsa) { in DSA_do_sign() argument 596 if (digest_len > BN_num_bytes(dsa->q)) { in DSA_do_sign() 600 digest_len = BN_num_bytes(dsa->q); in DSA_do_sign() 603 if (BN_bin2bn(digest, digest_len, &m) == NULL) { in DSA_do_sign() 653 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, in DSA_do_verify() argument 656 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) { in DSA_do_verify() 663 size_t digest_len, DSA_SIG *sig, const DSA *dsa) { in DSA_do_check_signature() argument 698 if (digest_len > (q_bits >> 3)) { in DSA_do_check_signature() 702 digest_len = (q_bits >> 3); in DSA_do_check_signature() 705 if (BN_bin2bn(digest, digest_len, &u1) == NULL) { in DSA_do_check_signature() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/dsa/ |
D | dsa.c | 570 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, const DSA *dsa) { in DSA_do_sign() argument 613 if (digest_len > BN_num_bytes(dsa->q)) { in DSA_do_sign() 617 digest_len = BN_num_bytes(dsa->q); in DSA_do_sign() 620 if (BN_bin2bn(digest, digest_len, &m) == NULL) { in DSA_do_sign() 670 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, in DSA_do_verify() argument 673 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) { in DSA_do_verify() 680 size_t digest_len, DSA_SIG *sig, const DSA *dsa) { in DSA_do_check_signature() argument 732 if (digest_len > (i >> 3)) { in DSA_do_check_signature() 736 digest_len = (i >> 3); in DSA_do_check_signature() 739 if (BN_bin2bn(digest, digest_len, &u1) == NULL) { in DSA_do_check_signature() [all …]
|