Home
last modified time | relevance | path

Searched refs:digest_len (Results 1 – 18 of 18) sorted by relevance

/external/boringssl/src/crypto/ecdsa/
Decdsa.c64 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, in ECDSA_sign() argument
67 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey); in ECDSA_sign()
70 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, in ECDSA_sign()
74 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, in ECDSA_verify() argument
81 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey); in ECDSA_verify()
97 ret = ECDSA_do_verify(digest, digest_len, s, eckey); in ECDSA_verify()
108 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, in digest_to_bn() argument
115 if (8 * digest_len > num_bits) { in digest_to_bn()
116 digest_len = (num_bits + 7) / 8; in digest_to_bn()
118 if (!BN_bin2bn(digest, digest_len, out)) { in digest_to_bn()
[all …]
Decdsa_test.cc75 size_t digest_len, const ECDSA_SIG *ecdsa_sig, in VerifyECDSASig() argument
91 actual_result = ECDSA_verify(0, digest, digest_len, bssl::vector_data(&signature), in VerifyECDSASig()
97 actual_result = ECDSA_do_verify(digest, digest_len, ecdsa_sig, eckey); in VerifyECDSASig()
110 size_t digest_len, ECDSA_SIG *ecdsa_sig, in TestTamperedSig() argument
140 !VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 0)) { in TestTamperedSig()
149 !VerifyECDSASig(api, digest, digest_len, ecdsa_sig, eckey, 1)) { in TestTamperedSig()
/external/boringssl/src/crypto/hkdf/
Dhkdf.c30 const size_t digest_len = EVP_MD_size(digest); in HKDF() local
41 n = (out_len + digest_len - 1) / digest_len; in HKDF()
42 if (out_len + digest_len < out_len || n > 255) { in HKDF()
53 assert(prk_len == digest_len); in HKDF()
64 !HMAC_Update(&hmac, previous, digest_len))) { in HKDF()
73 todo = digest_len; in HKDF()
/external/boringssl/src/crypto/dsa/
Ddsa.c192 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { in DSA_do_sign() argument
194 return dsa->meth->sign(digest, digest_len, dsa); in DSA_do_sign()
196 return DSA_default_method.sign(digest, digest_len, dsa); in DSA_do_sign()
199 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, in DSA_do_verify() argument
202 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) { in DSA_do_verify()
209 size_t digest_len, DSA_SIG *sig, const DSA *dsa) { in DSA_do_check_signature() argument
211 return dsa->meth->verify(out_valid, digest, digest_len, sig, dsa); in DSA_do_check_signature()
214 return DSA_default_method.verify(out_valid, digest, digest_len, sig, dsa); in DSA_do_check_signature()
217 int DSA_sign(int type, const uint8_t *digest, size_t digest_len, in DSA_sign() argument
221 s = DSA_do_sign(digest, digest_len, dsa); in DSA_sign()
[all …]
Ddsa_impl.c80 BIGNUM **rp, const uint8_t *digest, size_t digest_len) { in sign_setup() argument
113 if (digest_len > 0) { in sign_setup()
114 ok = BN_generate_dsa_nonce(&k, dsa->q, dsa->priv_key, digest, digest_len, in sign_setup()
188 static DSA_SIG *sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { in sign() argument
227 if (digest_len > BN_num_bytes(dsa->q)) { in sign()
231 digest_len = BN_num_bytes(dsa->q); in sign()
234 if (BN_bin2bn(digest, digest_len, &m) == NULL) { in sign()
284 static int verify(int *out_valid, const uint8_t *dgst, size_t digest_len, in verify() argument
338 if (digest_len > (i >> 3)) { in verify()
342 digest_len = (i >> 3); in verify()
[all …]
/external/boringssl/src/crypto/digest/
Ddigest_test.cc139 size_t digest_len) { in CompareDigest() argument
144 for (i = 0; i < digest_len; i++) { in CompareDigest()
148 digest_hex[2*digest_len] = '\0'; in CompareDigest()
175 unsigned digest_len; in TestDigest() local
176 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) { in TestDigest()
180 if (!CompareDigest(test, digest, digest_len)) { in TestDigest()
201 if (!EVP_DigestFinal_ex(ctx.get(), digest, &digest_len)) { in TestDigest()
205 if (digest_len != EVP_MD_size(test->md.func())) { in TestDigest()
209 if (!CompareDigest(test, digest, digest_len)) { in TestDigest()
/external/boringssl/src/include/openssl/
Ddsa.h148 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len,
161 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len,
171 size_t digest_len, DSA_SIG *sig,
187 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len,
204 size_t digest_len, const uint8_t *sig,
214 size_t digest_len, const uint8_t *sig,
323 DSA_SIG *(*sign)(const uint8_t *digest, size_t digest_len, DSA *dsa);
326 const uint8_t *digest, size_t digest_len);
328 int (*verify)(int *out_valid, const uint8_t *digest, size_t digest_len,
Decdsa.h77 size_t digest_len, uint8_t *sig,
85 size_t digest_len, const uint8_t *sig,
112 size_t digest_len, EC_KEY *key);
117 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len,
137 size_t digest_len,
144 size_t digest_len, uint8_t *sig,
Dec_key.h265 int (*sign)(const uint8_t *digest, size_t digest_len, uint8_t *sig,
269 int (*verify)(const uint8_t *digest, size_t digest_len, const uint8_t *sig,
/external/openssh/
Ddns.c82 u_char **digest, size_t *digest_len, struct sshkey *key) in dns_read_key() argument
126 digest_len)) != 0) in dns_read_key()
132 *digest_len = 0; in dns_read_key()
144 u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) in dns_read_rdata() argument
154 *digest_len = rdata_len - 2; in dns_read_rdata()
156 if (*digest_len > 0) { in dns_read_rdata()
157 *digest = (u_char *) xmalloc(*digest_len); in dns_read_rdata()
158 memcpy(*digest, rdata + 2, *digest_len); in dns_read_rdata()
Ddigest-openssl.c52 size_t digest_len; member
104 return digest == NULL ? 0 : digest->digest_len; in ssh_digest_bytes()
163 if (dlen < digest->digest_len) /* No truncation allowed */ in ssh_digest_final()
167 if (l != digest->digest_len) /* sanity */ in ssh_digest_final()
192 if (dlen < digest->digest_len) in ssh_digest_memory()
Ddigest-libc.c52 size_t digest_len; member
158 return digest == NULL ? 0 : digest->digest_len; in ssh_digest_bytes()
223 if (dlen < digest->digest_len) /* No truncation allowed */ in ssh_digest_final()
Dpkcs11.h865 unsigned long *digest_len));
874 unsigned long *digest_len));
/external/vboot_reference/tests/
Drsa_verify_benchmark.c25 uint64_t digest_len, sig_len; in SpeedTestAlgorithm() local
48 digest = BufferFromFile(file_name, &digest_len); in SpeedTestAlgorithm()
/external/boringssl/src/tool/
Ddigest.cc166 unsigned digest_len; in SumFile() local
167 if (!EVP_DigestFinal_ex(&ctx, digest, &digest_len)) { in SumFile()
174 for (unsigned i = 0; i < digest_len; i++) { in SumFile()
179 *out_hex = std::string(hex_digest, digest_len * 2); in SumFile()
/external/boringssl/src/ssl/
Dt1_enc.c522 unsigned int digest_len; in tls1_handshake_digest() local
533 !EVP_DigestFinal_ex(&ctx, out, &digest_len) || in tls1_handshake_digest()
534 digest_len != hash_size /* internal error */) { in tls1_handshake_digest()
539 out += digest_len; in tls1_handshake_digest()
540 out_len -= digest_len; in tls1_handshake_digest()
541 len += digest_len; in tls1_handshake_digest()
Dt1_lib.c2570 int digest_len; in tls1_record_handshake_hashes_for_channel_id() local
2584 digest_len = in tls1_record_handshake_hashes_for_channel_id()
2587 if (digest_len < 0) { in tls1_record_handshake_hashes_for_channel_id()
2591 s->session->original_handshake_hash_len = digest_len; in tls1_record_handshake_hashes_for_channel_id()
/external/conscrypt/src/main/native/
Dorg_conscrypt_NativeCrypto.cpp2077 size_t digest_len, argument
2097 digest_len));