/external/boringssl/src/crypto/curve25519/ |
D | x25519_test.cc | 86 static const uint8_t kZeros[32] = {0}; in TEST() local 87 EXPECT_EQ(Bytes(kZeros), Bytes(out)); in TEST()
|
/external/boringssl/src/crypto/cipher_extra/ |
D | aead_test.cc | 612 static const uint8_t kZeros[32] = {0}; in TEST() local 618 ASSERT_TRUE(EVP_AEAD_CTX_init(ctx.get(), EVP_aead_aes_128_gcm(), kZeros, 16, in TEST() 629 nullptr /* nonce */, 0, kZeros /* in */, in TEST() 630 sizeof(kZeros), nullptr /* ad */, 0)); in TEST() 637 ASSERT_TRUE(EVP_AEAD_CTX_init(ctx.get(), EVP_aead_aes_256_gcm(), kZeros, 32, in TEST() 648 nullptr /* nonce */, 0, kZeros /* in */, in TEST() 649 sizeof(kZeros), nullptr /* ad */, 0)); in TEST()
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 685 static const uint8_t kZeros[32] = {0}; in TEST() local 688 RSA_sign(NID_sha256, kZeros, sizeof(kZeros), sig, &sig_len, rsa.get())); in TEST() 690 RSA_verify(NID_sha256, kZeros, sizeof(kZeros), sig, sig_len, rsa.get())); in TEST()
|
/external/boringssl/src/crypto/bytestring/ |
D | bytestring_test.cc | 788 static const uint8_t kZeros[256] = {0}; in TEST() local 791 ASSERT_TRUE(CBB_add_bytes(&child, kZeros, sizeof(kZeros))); in TEST() 804 ASSERT_FALSE(CBB_add_bytes(cbb.get(), kZeros, sizeof(kZeros))); in TEST()
|
/external/boringssl/src/crypto/evp/ |
D | evp_extra_test.cc | 619 static const uint8_t kZeros[32] = {0}; in TEST() local 620 bssl::UniquePtr<EVP_PKEY> pubkey2(EVP_PKEY_new_ed25519_public(kZeros)); in TEST()
|
/external/boringssl/src/ssl/test/ |
D | bssl_shim.cc | 934 static const uint8_t kZeros[16] = {0}; in TicketKeyCallback() local 937 OPENSSL_memcpy(key_name, kZeros, sizeof(kZeros)); in TicketKeyCallback() 939 } else if (OPENSSL_memcmp(key_name, kZeros, 16) != 0) { in TicketKeyCallback() 943 if (!HMAC_Init_ex(hmac_ctx, kZeros, sizeof(kZeros), EVP_sha256(), NULL) || in TicketKeyCallback() 944 !EVP_CipherInit_ex(ctx, EVP_aes_128_cbc(), NULL, kZeros, iv, encrypt)) { in TicketKeyCallback()
|
/external/boringssl/src/ssl/ |
D | ssl_test.cc | 2230 static const uint8_t kZeros[16] = {0}; in RenewTicketCallback() local 2233 OPENSSL_memcpy(key_name, kZeros, sizeof(kZeros)); in RenewTicketCallback() 2235 } else if (OPENSSL_memcmp(key_name, kZeros, 16) != 0) { in RenewTicketCallback() 2239 if (!HMAC_Init_ex(hmac_ctx, kZeros, sizeof(kZeros), EVP_sha256(), NULL) || in RenewTicketCallback() 2240 !EVP_CipherInit_ex(ctx, EVP_aes_128_cbc(), NULL, kZeros, iv, encrypt)) { in RenewTicketCallback() 2262 static const uint8_t kZeros[16] = {0}; in GetServerTicketTime() local 2266 if (!EVP_DecryptInit_ex(ctx.get(), EVP_aes_128_cbc(), nullptr, kZeros, iv) || in GetServerTicketTime()
|
/external/skia/tests/ |
D | GrShapeTest.cpp | 81 const uint8_t* kZeros = reinterpret_cast<uint8_t*>(calloc(kRes, 1)); in test_bounds_by_rasterizing() local 83 static constexpr uint8_t kZeros[kRes] = {0}; in test_bounds_by_rasterizing() local 87 if (0 != memcmp(kZeros, row, kRes)) { in test_bounds_by_rasterizing() 92 free(const_cast<uint8_t*>(kZeros)); in test_bounds_by_rasterizing()
|
/external/skqp/tests/ |
D | GrShapeTest.cpp | 81 const uint8_t* kZeros = reinterpret_cast<uint8_t*>(calloc(kRes, 1)); in test_bounds_by_rasterizing() local 83 static constexpr uint8_t kZeros[kRes] = {0}; in test_bounds_by_rasterizing() local 87 if (0 != memcmp(kZeros, row, kRes)) { in test_bounds_by_rasterizing() 92 free(const_cast<uint8_t*>(kZeros)); in test_bounds_by_rasterizing()
|
/external/boringssl/src/third_party/fiat/ |
D | curve25519.c | 3200 static const uint8_t kZeros[32] = {0}; in X25519() local 3203 return CRYPTO_memcmp(kZeros, out_shared_key, 32) != 0; in X25519()
|