/system/keymaster/km_openssl/ |
D | hmac.cpp | 31 return SHA256_DIGEST_LENGTH; in DigestLength() 57 uint8_t tmp[SHA256_DIGEST_LENGTH]; in Sign() 59 if (digest_len >= SHA256_DIGEST_LENGTH) digest = out_digest; in Sign() 64 if (digest_len < SHA256_DIGEST_LENGTH) memcpy(out_digest, tmp, digest_len); in Sign() 76 if (digest_len != SHA256_DIGEST_LENGTH) return false; in Verify() 78 uint8_t computed_digest[SHA256_DIGEST_LENGTH]; in Verify() 81 return 0 == CRYPTO_memcmp(digest, computed_digest, SHA256_DIGEST_LENGTH); in Verify()
|
D | soft_keymaster_enforcement.cpp | 111 unsigned digest_len = SHA256_DIGEST_LENGTH; in hmacSha256() 176 if (!hmac_key_.Reset(SHA256_DIGEST_LENGTH)) return KM_ERROR_MEMORY_ALLOCATION_FAILED; in ComputeSharedHmac()
|
/system/core/fs_mgr/libfs_avb/ |
D | sha.h | 27 uint8_t hash[SHA256_DIGEST_LENGTH]; 30 enum { DIGEST_SIZE = SHA256_DIGEST_LENGTH };
|
D | fs_avb.cpp | 125 expected_digest_size = SHA256_DIGEST_LENGTH * 2; in Create()
|
/system/extras/libfec/include/fec/ |
D | io.h | 34 #ifndef SHA256_DIGEST_LENGTH 35 #define SHA256_DIGEST_LENGTH 32 macro 52 uint8_t hash[SHA256_DIGEST_LENGTH];
|
/system/apex/apexd/ |
D | apex_sha.cpp | 77 uint8_t hash[SHA256_DIGEST_LENGTH]; in CalculateSha256() 81 for (int i = 0; i < SHA256_DIGEST_LENGTH; i++) { in CalculateSha256()
|
/system/nvram/core/ |
D | crypto_boringssl.cpp | 35 uint8_t buffer[SHA256_DIGEST_LENGTH]; in SHA256()
|
/system/extras/libfec/ |
D | fec_read.cpp | 94 uint64_t hash_offset = (offset / FEC_BLOCKSIZE) * SHA256_DIGEST_LENGTH; in is_zero() 97 hashtree.hash_data.size() - SHA256_DIGEST_LENGTH)) { in is_zero() 102 SHA256_DIGEST_LENGTH); in is_zero() 310 (f->hashtree().hash_data.size() - SHA256_DIGEST_LENGTH) / in verity_read() 311 SHA256_DIGEST_LENGTH; in verity_read()
|
D | fec_open.cpp | 85 verity_get_size(size, NULL, NULL, SHA256_DIGEST_LENGTH); in get_verity_size() 184 uint8_t hash[SHA256_DIGEST_LENGTH]; in parse_ecc_header() 187 f->ecc.valid = !memcmp(hash, header.hash, SHA256_DIGEST_LENGTH); in parse_ecc_header() 333 offset += verity_get_size(offset, NULL, NULL, SHA256_DIGEST_LENGTH); in load_verity()
|
D | fec_verity.cpp | 150 digest_length_ = nid == NID_sha1 ? SHA_DIGEST_LENGTH : SHA256_DIGEST_LENGTH; in initialize() 152 padded_digest_length_ = SHA256_DIGEST_LENGTH; in initialize() 367 uint8_t root[SHA256_DIGEST_LENGTH]; in parse_table()
|
/system/keymaster/key_blob_utils/ |
D | ocb_utils.cpp | 77 UniquePtr<uint8_t[]> hash_buf(new (std::nothrow) uint8_t[SHA256_DIGEST_LENGTH]); in InitializeKeyWrappingContext() 79 Eraser hash_eraser(hash_buf.get(), SHA256_DIGEST_LENGTH); in InitializeKeyWrappingContext()
|
/system/tools/hidl/hashing/ |
D | Hash.cpp | 32 const std::vector<uint8_t> Hash::kEmptyHash = std::vector<uint8_t>(SHA256_DIGEST_LENGTH, 0); 60 std::vector<uint8_t> ret = std::vector<uint8_t>(SHA256_DIGEST_LENGTH); in sha256File()
|
/system/extras/verity/ |
D | verity_verifier.cpp | 54 uint8_t hash_buf[SHA256_DIGEST_LENGTH]; in verify_table()
|
/system/update_engine/common/ |
D | hash_calculator.cc | 78 raw_hash_.resize(SHA256_DIGEST_LENGTH); in Finalize()
|
/system/extras/verity/fec/ |
D | image.cpp | 282 uint8_t hash[SHA256_DIGEST_LENGTH]; in image_ecc_load() 285 if (memcmp(hash, p->hash, SHA256_DIGEST_LENGTH) != 0) { in image_ecc_load()
|
/system/extras/libfec/test/ |
D | fec_unittest.cpp | 155 nullptr, SHA256_DIGEST_LENGTH); in TEST_F() 253 nullptr, SHA256_DIGEST_LENGTH); in TEST_F()
|
/system/security/keystore/ |
D | keystore_attestation_id.cpp | 54 std::vector<uint8_t> digest_buffer(SHA256_DIGEST_LENGTH); in signature2SHA256()
|
/system/security/ondevice-signing/ |
D | CertUtils.cpp | 109 uint8_t hashBuf[SHA256_DIGEST_LENGTH]; in verifySignature()
|
/system/keymaster/cppcose/ |
D | cppcose.cpp | 663 bytevec retval(SHA256_DIGEST_LENGTH); in ECDH_HKDF_DeriveKey() 690 bytevec retval(SHA256_DIGEST_LENGTH); in x25519_HKDF_DeriveKey() 758 bytevec ret(SHA256_DIGEST_LENGTH); in sha256()
|
/system/nvram/hal/tests/ |
D | nvram_hal_test.cc | 194 uint8_t hash[SHA256_DIGEST_LENGTH]; in SHA256HashString() 196 return std::string(reinterpret_cast<const char*>(hash), SHA256_DIGEST_LENGTH); in SHA256HashString()
|
/system/keymaster/include/keymaster/cppcose/ |
D | cppcose.h | 48 using HmacSha256 = std::array<uint8_t, SHA256_DIGEST_LENGTH>;
|
/system/keymaster/android_keymaster/ |
D | android_keymaster.cpp | 460 std::vector<uint8_t> ephemeral_mac_key(SHA256_DIGEST_LENGTH, 0 /* value */); in GenerateCsr()
|