/external/openssh/ |
D | dns.c | 78 u_char **digest, u_int *digest_len, Key *key) in dns_read_key() argument 96 *digest = key_fingerprint_raw(key, SSH_FP_SHA1, digest_len); in dns_read_key() 103 *digest_len = 0; in dns_read_key() 115 u_char **digest, u_int *digest_len, u_char *rdata, int rdata_len) in dns_read_rdata() argument 125 *digest_len = rdata_len - 2; in dns_read_rdata() 127 if (*digest_len > 0) { in dns_read_rdata() 128 *digest = (u_char *) xmalloc(*digest_len); in dns_read_rdata() 129 memcpy(*digest, rdata + 2, *digest_len); in dns_read_rdata()
|
D | schnorr.c | 69 u_int digest_len; in schnorr_hash() local 92 &digest, &digest_len) != 0) { in schnorr_hash() 96 if (BN_bin2bn(digest, (int)digest_len, h) == NULL) { in schnorr_hash() 104 bzero(digest, digest_len); in schnorr_hash() 106 digest_len = 0; in schnorr_hash() 456 u_int digest_len; in hash_buffer() local 470 if (EVP_DigestFinal_ex(&evp_md_ctx, digest, &digest_len) != 1) { in hash_buffer() 474 *digestp = xmalloc(digest_len); in hash_buffer() 475 *lenp = digest_len; in hash_buffer() 481 digest_len = 0; in hash_buffer()
|
D | auth2-jpake.c | 143 u_int digest_len; in derive_rawsalt() local 174 &digest, &digest_len) != 0) in derive_rawsalt() 177 if (len > digest_len) in derive_rawsalt() 179 __func__, len, digest_len); in derive_rawsalt() 181 bzero(digest, digest_len); in derive_rawsalt()
|
D | pkcs11.h | 865 unsigned long *digest_len)); 874 unsigned long *digest_len));
|
/external/chromium/crypto/ |
D | encryptor_nss.cc | 74 unsigned int digest_len; in Encrypt() local 77 &digest_len, in Encrypt() 83 op_len + digest_len); in Encrypt() 112 unsigned int digest_len; in Decrypt() local 115 &digest_len, in Decrypt() 121 op_len + digest_len); in Decrypt()
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
D | sslfingerprint.h | 56 size_t digest_len; in Create() local 58 algorithm, digest_val, sizeof(digest_val), &digest_len); in Create() 63 return new SSLFingerprint(algorithm, digest_val, digest_len); in Create() 89 size_t digest_len) : algorithm(algorithm) { in SSLFingerprint() 90 digest.SetData(digest_in, digest_len); in SSLFingerprint()
|
D | sslstreamadapterhelper.cc | 101 size_t digest_len) { in SetPeerCertificateDigest() argument 111 if (expected_len != digest_len) in SetPeerCertificateDigest() 114 peer_certificate_digest_value_.SetData(digest_val, digest_len); in SetPeerCertificateDigest()
|
D | sslstreamadapter.h | 139 size_t digest_len) = 0;
|
D | sslstreamadapter_unittest.cc | 250 size_t digest_len; in SetPeerIdentitiesByDigest() local 257 &digest_len); in SetPeerIdentitiesByDigest() 264 digest_len); in SetPeerIdentitiesByDigest() 269 digest, 20, &digest_len); in SetPeerIdentitiesByDigest() 276 digest_len); in SetPeerIdentitiesByDigest()
|
D | sslstreamadapterhelper.h | 65 size_t digest_len);
|
D | opensslstreamadapter.h | 87 size_t digest_len);
|
D | opensslstreamadapter.cc | 232 size_t digest_len) { in SetPeerCertificateDigest() argument 242 if (expected_len != digest_len) in SetPeerCertificateDigest() 245 peer_certificate_digest_value_.SetData(digest_val, digest_len); in SetPeerCertificateDigest()
|
/external/chromium_org/crypto/ |
D | encryptor_nss.cc | 139 unsigned int digest_len; in Crypt() local 142 &digest_len, in Crypt() 149 output->resize(op_len + digest_len); in Crypt() 185 unsigned int digest_len; in CryptCTR() local 188 &digest_len, in CryptCTR() 192 CHECK(!digest_len); in CryptCTR()
|
/external/chromium_org/net/android/ |
D | keystore_unittest.cc | 247 int digest_len = static_cast<int>(message.size()); in VerifyTestDSASignature() local 253 0, digest, digest_len, sigbuf, siglen, pub_key.get()); in VerifyTestDSASignature() 294 int digest_len = static_cast<int>(message.size()); in VerifyTestECDSASignature() local 300 0, digest, digest_len, sigbuf, siglen, pub_key.get()); in VerifyTestECDSASignature() 318 unsigned int digest_len = static_cast<unsigned int>(message.size()); in SignWithOpenSSL() local 338 NID_md5_sha1, digest, digest_len, p, &p_len, rsa.get()); in SignWithOpenSSL() 360 int ret = DSA_sign(0, digest, digest_len, p, &p_len, dsa.get()); in SignWithOpenSSL() 383 0, digest, digest_len, p, &p_len, ecdsa.get()); in SignWithOpenSSL()
|
/external/chromium/net/base/ |
D | dnssec_chain_verifier.cc | 521 unsigned digest_len; in DigestKey() local 528 digest_len = base::SHA1_LENGTH; in DigestKey() 532 digest_len = sizeof(temp2); in DigestKey() 537 uint8* output = static_cast<uint8*>(malloc(4 + digest_len)); in DigestKey() 543 memcpy(output + 4, digest, digest_len); in DigestKey() 544 *out = base::StringPiece(reinterpret_cast<char*>(output), 4 + digest_len); in DigestKey()
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
D | transportchannelimpl.h | 105 size_t digest_len) = 0;
|
D | rawtransportchannel.h | 159 size_t digest_len) { in SetRemoteFingerprint() argument
|
D | dtlstransportchannel.cc | 207 size_t digest_len) { in SetRemoteFingerprint() argument 209 talk_base::Buffer remote_fingerprint_value(digest, digest_len); in SetRemoteFingerprint()
|
D | fakesession.h | 118 size_t digest_len) { in SetRemoteFingerprint() argument 119 dtls_fingerprint_ = talk_base::SSLFingerprint(alg, digest, digest_len); in SetRemoteFingerprint()
|
D | dtlstransportchannel.h | 135 size_t digest_len);
|
D | p2ptransportchannel.h | 159 size_t digest_len) { in SetRemoteFingerprint() argument
|