/external/chromium_org/base/ |
D | sha1_win.cc | 38 DWORD hash_len = 0; in SHA1HashString() local 39 DWORD buffer_size = sizeof hash_len; in SHA1HashString() 41 reinterpret_cast<unsigned char*>(&hash_len), in SHA1HashString() 51 reinterpret_cast<BYTE*>(WriteInto(&result, hash_len + 1)), &hash_len, in SHA1HashString() 57 if (hash_len != kSHA1Length) { in SHA1HashString() 58 DLOG(ERROR) << "Returned hash value is wrong length: " << hash_len in SHA1HashString()
|
/external/srtp/crypto/test/ |
D | sha1_driver.c | 57 unsigned hash_len; /* number of octets output by hash */ member 70 unsigned hash_len) { in hash_test_case_add() argument 83 tmp_len = hex_string_to_octet_string((char *)test_case->hash, hex_hash, hash_len*2); in hash_test_case_add() 84 if (tmp_len != hash_len*2) in hash_test_case_add() 88 test_case->hash_len = hash_len; in hash_test_case_add() 105 if (test_case->hash_len != 20) in sha1_test_case_validate()
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/test/ |
D | sha1_driver.c | 57 unsigned hash_len; /* number of octets output by hash */ member 70 unsigned hash_len) { in hash_test_case_add() argument 83 tmp_len = hex_string_to_octet_string((char *)test_case->hash, hex_hash, hash_len*2); in hash_test_case_add() 84 if (tmp_len != hash_len*2) in hash_test_case_add() 88 test_case->hash_len = hash_len; in hash_test_case_add() 105 if (test_case->hash_len != 20) in sha1_test_case_validate()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 119 size_t hash_len; in ikev2_prf_plus() local 129 hash_len = prf->hash_len; in ikev2_prf_plus() 132 len[0] = hash_len; in ikev2_prf_plus() 151 clen = hash_len; in ikev2_prf_plus() 399 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; in ikev2_derive_auth_data() 408 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data() 413 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, in ikev2_derive_auth_data() 458 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { in ikev2_decrypt_payload() 467 integ = end - integ_alg->hash_len; in ikev2_decrypt_payload() 480 if (os_memcmp_const(integ, hash, integ_alg->hash_len) != 0) { in ikev2_decrypt_payload() [all …]
|
D | ikev2_common.h | 255 size_t hash_len; member 261 size_t hash_len; member
|
D | eap_ikev2_common.c | 83 icv_len = integ->hash_len; in eap_ikev2_validate_icv()
|
/external/chromium_org/chrome/browser/safe_browsing/ |
D | protocol_parser.cc | 204 size_t hash_len; in ParseGetHash() local 205 if (!base::StringToSizeT(cmd_parts[1], &hash_len)) in ParseGetHash() 209 if (hash_len != sizeof(SBFullHash)) in ParseGetHash() 227 if (hash_len * hash_count > reader.length()) in ParseGetHash() 232 reader.Advance(hash_len * hash_count); in ParseGetHash() 239 if (!reader.GetData(&full_hash.hash, hash_len)) in ParseGetHash()
|
/external/chromium_org/crypto/ |
D | signature_verifier_nss.cc | 38 unsigned int hash_len = HASH_ResultLenContext(hash_context); in VerifyRSAPSS_End() local 39 std::vector<unsigned char> hash(hash_len); in VerifyRSAPSS_End() 40 HASH_End(hash_context, &hash[0], &hash_len, hash.size()); in VerifyRSAPSS_End()
|
/external/chromium_org/net/http/ |
D | des.cc | 213 DWORD hash_len = 8; in DESEncrypt() local 214 CryptEncrypt(key, 0, FALSE, 0, hash, &hash_len, 8); in DESEncrypt()
|
/external/wpa_supplicant_8/src/tls/ |
D | pkcs1.h | 27 const u8 *hash, size_t hash_len);
|
D | pkcs1.c | 199 const u8 *hash, size_t hash_len) in pkcs1_v15_sig_ver() argument 300 if (hdr.length != hash_len || in pkcs1_v15_sig_ver()
|
D | x509v3.c | 1592 size_t hash_len; in x509_certificate_check_signature() local 1750 hash_len = 16; in x509_certificate_check_signature() 1752 hash, hash_len); in x509_certificate_check_signature() 1757 hash_len = 20; in x509_certificate_check_signature() 1759 hash, hash_len); in x509_certificate_check_signature() 1764 hash_len = 32; in x509_certificate_check_signature() 1766 hash, hash_len); in x509_certificate_check_signature() 1778 if (hdr.length != hash_len || in x509_certificate_check_signature()
|
/external/wpa_supplicant_8/src/utils/ |
D | http-utils.h | 25 size_t hash_len; member
|
D | http_curl.c | 462 n->hash_len = ASN1_STRING_length(hash->hashValue); in add_logo() 463 n->hash = os_malloc(n->hash_len); in add_logo() 468 os_memcpy(n->hash, ASN1_STRING_data(hash->hashValue), n->hash_len); in add_logo()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_attr_build.c | 390 size_t hash_len; in wps_build_oob_dev_pw() local 397 hash_len = wpabuf_len(pubkey); in wps_build_oob_dev_pw() 398 sha256_vector(1, addr, &hash_len, pubkey_hash); in wps_build_oob_dev_pw()
|
/external/chromium_org/net/quic/crypto/ |
D | proof_verifier_chromium.cc | 284 unsigned int hash_len = 32; // 32 is the length of a SHA-256 hash. in VerifySignature() local 287 hash_alg, mask_hash_alg, hash_len, in VerifySignature()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | ikev2.c | 107 skeyseed, prf->hash_len); in ikev2_derive_keys() 567 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 573 auth_data, prf->hash_len); in ikev2_process_auth_secret() 1007 wpabuf_put(msg, prf->hash_len)) < 0) { in ikev2_build_auth()
|
D | eap_aka.c | 493 size_t hash_len; in eap_aka_verify_checkcode() local 508 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? in eap_aka_verify_checkcode() 511 if (checkcode_len != hash_len) { in eap_aka_verify_checkcode() 528 if (os_memcmp_const(hash, checkcode, hash_len) != 0) { in eap_aka_verify_checkcode()
|
D | eap_ikev2.c | 172 icv_len = integ->hash_len; in eap_ikev2_build_msg()
|
D | eap.c | 1359 size_t len = data->peer_cert.hash_len * 2 + 1; in eap_peer_sm_tls_event() 1364 data->peer_cert.hash_len); in eap_peer_sm_tls_event()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | ikev2.c | 111 skeyseed, prf->hash_len); in ikev2_derive_keys() 635 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 641 auth_data, prf->hash_len); in ikev2_process_auth_secret() 1073 wpabuf_put(msg, prf->hash_len)) < 0) { in ikev2_build_auth()
|
D | eap_server_aka.c | 306 size_t hash_len; in eap_aka_verify_checkcode() local 321 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? in eap_aka_verify_checkcode() 324 if (checkcode_len != hash_len) { in eap_aka_verify_checkcode() 339 if (os_memcmp_const(hash, checkcode, hash_len) != 0) { in eap_aka_verify_checkcode()
|
D | eap_server_ikev2.c | 167 icv_len = integ->hash_len; in eap_ikev2_build_msg()
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls.h | 61 size_t hash_len; member
|
D | crypto_cryptoapi.c | 106 int cryptoapi_hash_vector(ALG_ID alg, size_t hash_len, size_t num_elem, in cryptoapi_hash_vector() argument 134 hlen = hash_len; in cryptoapi_hash_vector()
|