Searched refs:digest (Results 1 – 11 of 11) sorted by relevance
| /third_party/ulib/uboringssl/crypto/fipsmodule/digest/ |
| A D | digest.c | 119 if (in == NULL || in->digest == NULL) { in EVP_MD_CTX_copy_ex() 135 if (out->digest != in->digest) { in EVP_MD_CTX_copy_ex() 136 assert(in->digest->ctx_size != 0); in EVP_MD_CTX_copy_ex() 154 out->digest = in->digest; in EVP_MD_CTX_copy_ex() 176 if (ctx->digest != type) { in EVP_DigestInit_ex() 186 ctx->digest = type; in EVP_DigestInit_ex() 191 ctx->digest->init(ctx); in EVP_DigestInit_ex() 201 ctx->digest->update(ctx, data, len); in EVP_DigestUpdate() 207 ctx->digest->final(ctx, md_out); in EVP_DigestFinal_ex() 209 *size = ctx->digest->md_size; in EVP_DigestFinal_ex() [all …]
|
| /third_party/ulib/uboringssl/crypto/hkdf/ |
| A D | hkdf.c | 26 int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF() argument 33 if (!HKDF_extract(prk, &prk_len, digest, secret, secret_len, salt, in HKDF() 35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { in HKDF() 42 int HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, in HKDF_extract() argument 50 if (HMAC(digest, salt, salt_len, secret, secret_len, out_key, &len) == NULL) { in HKDF_extract() 55 assert(*out_len == EVP_MD_size(digest)); in HKDF_extract() 59 int HKDF_expand(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF_expand() argument 63 const size_t digest_len = EVP_MD_size(digest); in HKDF_expand() 78 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) { in HKDF_expand()
|
| /third_party/ulib/uboringssl/include/openssl/ |
| A D | hkdf.h | 35 OPENSSL_EXPORT int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, 45 const EVP_MD *digest, const uint8_t *secret, 53 const EVP_MD *digest, const uint8_t *prk,
|
| A D | digest.h | 254 OPENSSL_EXPORT int EVP_add_digest(const EVP_MD *digest); 277 const EVP_MD *digest; member
|
| A D | evp.h | 446 unsigned iterations, const EVP_MD *digest, 527 size_t *sig_len, const uint8_t *digest, 545 size_t sig_len, const uint8_t *digest,
|
| /third_party/ulib/cryptolib/ |
| A D | cryptolib.c | 90 uint8_t digest[clHASH_MAX_DIGEST_SIZE]; in clHMAC_final() local 91 memcpy(digest, clHASH_final(&ctx->hash), sizeof(digest)); in clHMAC_final() 94 clHASH_update(&ctx->hash, digest, sizeof(digest)); in clHMAC_final() 197 return digest; in clSHA256() 328 return digest; in clSHA1() 453 buf[i] ^= *digest++; in clRSA2K_verify() 459 digest = clHASH_final(hash); in clRSA2K_verify() 462 return clEqual(digest, clHASH_size(hash), in clRSA2K_verify() 574 const uint8_t* digest; in clPRNG_draw() local 595 digest = clHMAC_final(&hmac); in clPRNG_draw() [all …]
|
| /third_party/ulib/uboringssl/ |
| A D | rules.mk | 28 $(CRYPTO_DIR)/fipsmodule/digest/digest.c \ 29 $(CRYPTO_DIR)/fipsmodule/digest/digests.c \
|
| /third_party/ulib/cryptolib/include/lib/crypto/ |
| A D | cryptolib.h | 94 const uint8_t* clSHA1(const void* data, int len, uint8_t* digest); 103 const uint8_t* clSHA256(const void* data, int len, uint8_t* digest);
|
| /third_party/tools/android/avb/ |
| A D | avbtool | 534 computed_digest = ha.digest() 1451 self.digest = bytearray() 1512 digest = ha.digest() 1514 if len(self.digest) != 0 and digest != self.digest: 2309 digest = hasher.digest() 2818 binary_hash.extend(ha.digest()) 3053 digest = hasher.digest() 3064 h_desc.digest = digest 3416 signed_data.extend(hasher.digest()) 3694 level_output += hasher.digest() [all …]
|
| /third_party/tools/android/ |
| A D | mkbootimg | 69 img_id = pack('32s', sha.digest())
|
| /third_party/lib/acpica/ |
| A D | changes.txt | 6096 correctly digest Windows/DOS formatted files (with CR/LF).
|
Completed in 660 milliseconds