/external/boringssl/src/crypto/hkdf/ |
D | hkdf_test.c | 39 EVP_sha256, 59 EVP_sha256, 98 EVP_sha256,
|
/external/scrypt/patches/ |
D | use_openssl_pbkdf2.patch | 22 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B… 34 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf); 62 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B… 74 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf);
|
D | arm-neon.patch | 399 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B… 412 + PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf);
|
/external/boringssl/src/crypto/evp/ |
D | pbkdf_test.cc | 89 if (!TestPBKDF2("password", 8, NULL, 0, 2, EVP_sha256(), sizeof(kKey), in TestEmptySalt() 91 !TestPBKDF2("password", 8, "", 0, 2, EVP_sha256(), sizeof(kKey), kKey)) { in TestEmptySalt() 141 if (!TestPBKDF2("password", 8, "salt", 4, 2, EVP_sha256(), sizeof(kKey1), in TestSHA2()
|
D | evp_extra_test.cc | 458 !EVP_DigestSignInit(md_ctx.get(), NULL, EVP_sha256(), NULL, pkey.get()) || in TestEVP_DigestSignInit() 482 if (!EVP_DigestVerifyInit(md_ctx.get(), NULL, EVP_sha256(), NULL, in TestEVP_DigestSignInit() 496 !EVP_DigestVerifyInit(md_ctx.get(), NULL, EVP_sha256(), NULL, in TestEVP_DigestVerifyInit() 555 !EVP_DigestSignInit(md_ctx.get(), NULL, EVP_sha256(), NULL, pkey.get()) || in TestEVP_DigestSignAlgorithm() 564 if (!EVP_DigestSignInit(md_ctx.get(), &pkey_ctx, EVP_sha256(), NULL, in TestEVP_DigestSignAlgorithm()
|
D | evp_test.cc | 96 return EVP_sha256(); in GetDigest()
|
/external/libweave/third_party/libuweave/src/ |
D | crypto_hmac.c | 22 if (!HMAC_Init(&context, key, key_len, EVP_sha256())) in uw_crypto_hmac_() 33 const size_t kFullDigestLen = (size_t)EVP_MD_size(EVP_sha256()); in uw_crypto_hmac_()
|
/external/libweave/examples/provider/ |
D | event_http_server.cc | 125 CHECK(X509_sign(x509, pkey, EVP_sha256())) << GetSslError(); in GenerateX509() 127 cert_fingerprint_.resize(EVP_MD_size(EVP_sha256())); in GenerateX509() 129 CHECK(X509_digest(x509, EVP_sha256(), cert_fingerprint_.data(), &len)); in GenerateX509()
|
/external/libchrome/crypto/ |
D | signature_verifier_openssl.cc | 27 return EVP_sha256(); in ToOpenSSLDigest() 62 digest = EVP_sha256(); in VerifyInit()
|
D | hmac_openssl.cc | 51 return !!::HMAC(hash_alg_ == SHA1 ? EVP_sha1() : EVP_sha256(), in Sign()
|
D | signature_creator_openssl.cc | 27 return EVP_sha256(); in ToOpenSSLDigest()
|
/external/boringssl/src/crypto/digest/ |
D | digests.c | 175 const EVP_MD *EVP_sha256(void) { return &sha256_md; } in EVP_sha256() function 269 { NID_sha256, EVP_sha256, SN_sha256, LN_sha256 }, 282 { NID_sha256WithRSAEncryption, EVP_sha256, SN_sha256WithRSAEncryption,
|
D | digest_test.cc | 43 static const MD sha256 = { "SHA256", &EVP_sha256, &SHA256 };
|
/external/scrypt/lib/crypto/ |
D | crypto_scrypt-neon.c | 267 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); in crypto_scrypt() 280 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf); in crypto_scrypt()
|
D | crypto_scrypt-ref.c | 263 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); in crypto_scrypt() 276 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf); in crypto_scrypt()
|
D | crypto_scrypt-sse.c | 340 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, salt, saltlen, 1, EVP_sha256(), p * 128 * r, B); in crypto_scrypt() 353 PKCS5_PBKDF2_HMAC((const char *)passwd, passwdlen, B, p * 128 * r, 1, EVP_sha256(), buflen, buf); in crypto_scrypt()
|
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
D | sha2.h | 151 #define EVP_sha2_256 EVP_sha256
|
/external/webrtc/webrtc/base/ |
D | openssldigest.cc | 68 md = EVP_sha256(); in GetDigestEVP()
|
/external/boringssl/src/include/openssl/ |
D | digest.h | 83 OPENSSL_EXPORT const EVP_MD *EVP_sha256(void);
|
/external/google-tv-pairing-protocol/cpp/src/polo/util/ |
D | certificateutil.cc | 101 X509_sign(x509, pkey, EVP_sha256()); in GenerateSelfSignedCert()
|
/external/google-tv-pairing-protocol/cpp/tests/polo/util/ |
D | certificateutiltest.cc | 92 X509_sign(x509, pkey, EVP_sha256()); in TEST()
|
/external/boringssl/src/crypto/hmac/ |
D | hmac_test.cc | 79 return EVP_sha256(); in GetDigest()
|
/external/boringssl/src/crypto/cipher/ |
D | e_tls.c | 386 EVP_sha256(), 0); in aead_aes_128_cbc_sha256_tls_init() 408 EVP_sha256(), 0); in aead_aes_256_cbc_sha256_tls_init()
|
/external/tpm2/ |
D | CpriHash.c | 23 #define EVP_sm3_256 EVP_sha256 46 return (EVP_MD *)EVP_sha256(); in GetHashServer()
|
/external/boringssl/src/tool/ |
D | digest.cc | 467 return DigestSum(EVP_sha256(), args); in SHA256Sum()
|