/external/chromium-trace/catapult/third_party/gsutil/third_party/pyasn1-modules/pyasn1_modules/ |
rfc2315.py | 59 class Digest(univ.OctetString): pass 72 namedtype.NamedType('digest', Digest) 192 namedtype.NamedType('digest', Digest())
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
CipherSpi.java | 27 import org.bouncycastle.crypto.Digest; 88 Digest digest = DigestFactory.getDigest(mgfParams.getDigestAlgorithm()); local 90 if (digest == null) 92 throw new NoSuchPaddingException("no match on OAEP constructor for digest algorithm: "+ mgfParams.getDigestAlgorithm()); 95 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue()); 297 Digest digest = DigestFactory.getDigest(spec.getDigestAlgorithm()); local 299 if (digest == null) 301 throw new InvalidAlgorithmParameterException("no match on digest algorithm: "+ spec.getDigestAlgorithm()) [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
KeymasterUtils.java | 51 throw new IllegalArgumentException("Unknown digest: " + keymasterDigest); 177 // digest. This is because we do not offer a way to generate shorter MACs and 183 + ". Exactly one digest must be authorized"); 189 "HMAC key authorized for unsupported digest: " 190 + KeyProperties.Digest.fromKeymaster(keymasterDigest));
|
KeyProperties.java | 227 throw new IllegalArgumentException("Unsupported HMAC digest: " 228 + Digest.fromKeymaster(keymasterDigest)); 239 * @return keymaster digest or {@code -1} if the algorithm does not involve a digest. 258 "Unsupported HMAC digest: " + digestUpper); 512 * No digest: sign/authenticate the raw message. 517 * MD5 digest. 522 * SHA-1 digest. 527 * SHA-2 224 (aka SHA-224) digest. 532 * SHA-2 256 (aka SHA-256) digest [all...] |
AndroidKeyStoreRSACipherSpi.java | 199 keymasterDigest = KeyProperties.Digest.toKeymaster(jcaDigest); 202 "Unsupported digest: " + jcaDigest, e); 214 "Unsupported digest: " + jcaDigest); 229 "Unsupported MGF1 digest: " + mgf1JcaDigest 275 KeyProperties.Digest.fromKeymaster(mKeymasterDigest), 471 // Keymaster sign/verify requires digest to be specified. For raw sign/verify it's NONE.
|
AndroidKeyStoreKeyPairGeneratorSpi.java | 225 // Authorized to be used with any digest (including no digest). 242 // Authorized to be used with any digest (including no digest). 337 mKeymasterDigests = KeyProperties.Digest.allToKeymaster(spec.getDigests()); [all...] |
AndroidKeyStoreSecretKeyFactorySpi.java | 145 digests = KeyProperties.Digest.allFromKeymaster(
|
AndroidKeyStoreSpi.java | 295 // Authorized to be used with any digest (including no digest). 311 // Authorized to be used with any digest (including no digest). 473 KeyProperties.Digest.allToKeymaster(spec.getDigests())); 633 // JCA HMAC key algorithm implies a digest (e.g., HmacSHA256 key algorithm 634 // implies SHA-256 digest). Because keymaster HMAC key is authorized only for one 635 // digest, we don't let import parameters override the digest implied by the key. 636 // If the parameters specify digests at all, they must specify only one digest, th [all...] |
/external/antlr/antlr-3.4/runtime/Perl5/tools/ |
port.pl | 8 use Digest; 51 my $sha1 = Digest->new('SHA-1'); 53 my $digest = $sha1->hexdigest; 55 return $digest; 126 my $digest = sha1sum($path); 128 'sha1' => $digest, 146 my $digest = sha1sum($path); 148 if ($digest ne $fstatus->{sha1}) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
DESedeWrapEngine.java | 6 import org.bouncycastle.crypto.Digest; 54 // checksum digest 57 Digest sha1 = AndroidDigestFactory.getSHA1(); 59 byte[] digest = new byte[20]; field in class:DESedeWrapEngine 323 sha1.doFinal(digest, 0); 325 System.arraycopy(digest, 0, result, 0, 8);
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
mssip.h | 76 CRYPT_HASH_BLOB Digest;
|
wintrust.h | 498 CRYPT_HASH_BLOB Digest;
|
/system/security/keystore/ |
keystore_client_impl.cpp | 111 authenticate_params.Digest(KM_DIGEST_SHA_2_256); 141 authenticate_params.Digest(KM_DIGEST_SHA_2_256); 446 .Digest(KM_DIGEST_SHA_2_256) 543 keymaster_digest_t digest = KM_DIGEST_NONE; local 544 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_DIGEST, &digest) && 545 !software_enforced_characteristics.GetTagValue(keymaster::TAG_DIGEST, &digest)) || 546 digest != KM_DIGEST_SHA_2_256) { 547 ALOGW("Found authentication key with invalid digest list.");
|
/external/selinux/libselinux/src/ |
sha1.c | 185 // Performs the final calculation of the hash and returns the digest (20 byte buffer containing 160bit hash). After 192 SHA1_HASH* Digest 212 Digest->bytes[i] = (uint8_t)((Context->State[i>>2] >> ((3-(i & 3)) * 8) ) & 255);
|
/external/v8/test/mjsunit/ |
md5.js | 29 // Digest Algorithm, as defined in RFC 1321.
|
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/test/ |
grammar.rb | 9 require 'digest/md5' 10 MD5 = Digest::MD5 308 unless test( ?f, @path ) and MD5.digest( @source ) == MD5.digest( File.read( @path ) )
|
/external/skia/src/pdf/ |
SkPDFMetadata.cpp | 75 SkMD5::Digest digest; local 76 md5.finish(digest); 78 digest.data[6] = (digest.data[6] & 0x0F) | 0x30; 79 digest.data[8] = (digest.data[6] & 0x3F) | 0x80; 80 static_assert(sizeof(digest) == sizeof(UUID), "uuid_size"); 82 memcpy(&uuid, &digest, sizeof(digest)); [all...] |
/libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/ |
CertBlacklistTest.java | 36 import com.android.org.bouncycastle.crypto.Digest; 180 MessageDigest digest = MessageDigest.getInstance("SHA1"); local 181 byte[] hexlifiedHash = Hex.encode(digest.digest(encoded));
|
/external/skia/src/utils/ |
SkMD5.cpp | 63 void SkMD5::finish(Digest& digest) { 82 // Write out digest. 83 encode(digest.data, this->state);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/ |
BcKeyStoreSpi.java | 42 import org.bouncycastle.crypto.Digest; 999 Digest dig = new SHA1Digest(); 1004 // Finalise our digest calculation 1009 // Read the original digest from the stream
|
/external/v8/test/webkit/fast/js/kde/ |
md5-1.js | 31 * Message-Digest Algorithm.
|
md5-2.js | 29 * Digest Algorithm, as defined in RFC 1321.
|
/external/skia/tests/ |
PictureTest.cpp | 875 static void md5(const SkBitmap& bm, SkMD5::Digest* digest) { 883 md5.finish(*digest); 922 SkMD5::Digest referenceDigest; 934 SkMD5::Digest digest2; [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/ |
libhttplib2.tex | 67 \item Digest 144 The server requested a type of Digest authentication that we
|
/system/keymaster/include/keymaster/ |
authorization_set.h | 517 AuthorizationSetBuilder& Digest(keymaster_digest_t digest) { 518 return Authorization(TAG_DIGEST, digest);
|