HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 176 - 200 of 1173) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
SHA384.java 1 package org.bouncycastle.jcajce.provider.digest;
22 static public class Digest
26 public Digest()
34 Digest d = (Digest)super.clone();
35 d.digest = new SHA384Digest((SHA384Digest)digest);
84 provider.addAlgorithm("MessageDigest.SHA-384", PREFIX + "$Digest");
SHA512.java 1 package org.bouncycastle.jcajce.provider.digest;
25 static public class Digest
29 public Digest()
37 Digest d = (Digest)super.clone();
38 d.digest = new SHA512Digest((SHA512Digest)digest);
58 // d.digest = new SHA512tDigest((SHA512tDigest)digest);
167 provider.addAlgorithm("MessageDigest.SHA-512", PREFIX + "$Digest");
    [all...]
SHA1.java 1 package org.bouncycastle.jcajce.provider.digest;
31 static public class Digest
35 public Digest()
43 Digest d = (Digest)super.clone();
44 d.digest = new SHA1Digest((SHA1Digest)digest);
138 int digest = SHA1; local
141 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize);
143 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param)
    [all...]
  /external/tpm2/
PCR_fp.h 36 TPMI_ALG_HASH hashAlg, // IN: hash algorithm to compute digest
39 TPM2B_DIGEST *digest // OUT: digest
65 const TPM2B_DIGEST *digest // IN: the digest to modify the PCR
81 TPML_DIGEST *digest, // OUT: digest
Attest_spt.c 116 // TPM_RC_VALUE digest generated for the given scheme is greater than the modulus of
136 TPM2B_DIGEST digest; local
161 digest.t.size = CryptStartHash(hashAlg, &hashState);
163 CryptCompleteHash2B(&hashState, &digest.b);
172 CryptUpdateDigest(&hashState, digest.t.size, digest.t.buffer);
173 CryptCompleteHash2B(&hashState, &digest.b);
179 &digest,
  /external/vboot_reference/tests/
sha_benchmark.c 35 uint8_t* digest = (uint8_t*) malloc(SHA512_DIGEST_SIZE); /* Maximum size of local
36 * the digest. */
42 hash_functions[i].hash(buffer, TEST_BUFFER_SIZE, digest);
55 free(digest);
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
MessageDigest1Test.java 124 * java.security.MessageDigest#digest()
128 assertEquals("incorrect result", 0, md.digest().length);
133 * java.security.MessageDigest#digest(byte[])
138 assertEquals("incorrect result", 0, md.digest(b).length);
143 * java.security.MessageDigest#digest(byte[], int, int)
148 assertEquals("incorrect result", 0, md.digest(b, 2, 3));
149 assertTrue("digest failed", md.runEngineDigest);
156 md.digest(null, 0, 1);
162 md.digest(bytes, 0, bytes.length + 1);
168 md.digest(bytes, Integer.MAX_VALUE, 1)
188 MessageDigest digest = MessageDigest.getInstance("TestDigest", new TestProvider()); local
    [all...]
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/utils/
FingerprintUtils.java 38 MessageDigest digest = MessageDigest.getInstance(hashAlgorithm); local
39 return toHexadecimalString(digest.digest(cert.getEncoded()));
  /system/keymaster/
hmac_key.cpp 70 keymaster_digest_t digest;
71 if (!key_description.GetTagValue(TAG_DIGEST, &digest)) {
77 switch (digest) {
101 // digest was not matched
  /external/vboot_reference/firmware/2lib/
2api.c 112 /* Must have initialized hash digest work area */
133 const uint8_t *digest; local
138 digest = vb2_get_boot_state_digest(ctx);
142 digest = vb2_get_sd(ctx)->gbb_hwid_digest;
149 if (digest == NULL || *dest_size < digest_size)
152 memcpy(dest, digest, digest_size);
  /external/vboot_reference/futility/
cmd_pcr.c 16 "Usage: " MYNAME " %s [OPTIONS] DIGEST [...]\n"
20 "Each DIGEST arg should be a hex string (spaces optional) of the\n"
21 "appropriate length. The PCR is extended with each digest in turn\n"
25 " -i Initialize the PCR with the first DIGEST argument\n"
87 fprintf(stderr, "Invalid DIGEST \"%s\"\n", str);
108 uint8_t *digest; local
144 fprintf(stderr, "You must extend at least one DIGEST\n");
168 digest = DigestBuf(accum, digest_size * 2, digest_alg);
169 if (!digest) {
170 fprintf(stderr, "Error computing digest!\n")
    [all...]
  /frameworks/base/obex/javax/obex/
ObexSession.java 75 * the authentication challenge and it represents the challenge digest
154 * 0x00 and is the response digest. The first optional tag is 0x01 and
169 byte[] digest = new byte[challenge.length + password.length + 1];
170 System.arraycopy(challenge, 0, digest, 0, challenge.length);
172 digest[challenge.length] = (byte)0x3A;
173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length);
175 // Add the Response Digest
179 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16);
  /external/libchrome/crypto/
hmac_unittest.cc 27 const char *digest; member in struct:__anon15916
95 const char *digest; member in struct:__anon15917
153 unsigned char digest[kSHA1DigestSize]; local
154 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize));
155 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize));
248 unsigned char digest[kSHA1DigestSize]; local
249 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize));
250 EXPECT_EQ(0, memcmp(kSimpleHmacCases[i].digest, digest, kSHA1DigestSize))
292 unsigned char digest[kSHA1DigestSize]; local
    [all...]
  /external/boringssl/src/crypto/ecdsa/
ecdsa.c 66 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig,
69 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey);
72 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL,
76 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len,
83 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey);
101 ret = ECDSA_do_verify(digest, digest_len, s, eckey);
109 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian
112 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len,
117 /* Need to truncate digest if it is too long: first truncate whole
122 if (!BN_bin2bn(digest, digest_len, out))
    [all...]
  /external/pdfium/core/src/fdrm/crypto/
fx_crypt_sha.cpp 26 static void SHATransform(unsigned int* digest, unsigned int* block) {
37 a = digest[0];
38 b = digest[1];
39 c = digest[2];
40 d = digest[3];
41 e = digest[4];
75 digest[0] += a;
76 digest[1] += b;
77 digest[2] += c;
78 digest[3] += d
    [all...]
  /external/boringssl/src/include/openssl/
dsa.h 143 /* DSA_do_sign returns a signature of the hash in |digest| by the key in |dsa|
145 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len,
149 * |dsa|, of the hash in |digest|. It returns one if so, zero if invalid and -1
158 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len,
162 * is a valid signature, by the public key in |dsa| of the hash in |digest|
167 OPENSSL_EXPORT int DSA_do_check_signature(int *out_valid, const uint8_t *digest,
178 /* DSA_sign signs |digest| with the key in |dsa| and writes the resulting
184 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len,
189 * key in |dsa|, of the hash in |digest|. It returns one if so, zero if invalid
200 OPENSSL_EXPORT int DSA_verify(int type, const uint8_t *digest,
    [all...]
  /external/chromium-trace/catapult/telemetry/third_party/webpagereplay/third_party/dns/
entropy.py 26 self.digest = None
85 if self.digest is None or self.next_byte == self.hash_len:
87 self.digest = self.hash.digest()
88 self.stir(self.digest, True)
90 value = ord(self.digest[self.next_byte])
  /external/chromium-trace/catapult/third_party/gsutil/gslib/commands/
hash.py 113 format_func = lambda digest: Base64EncodeHash(digest.hexdigest())
124 format_func = lambda digest: digest.hexdigest()
178 for name, digest in hash_dict.iteritems():
179 print '\tHash (%s):\t\t%s' % (name, format_func(digest))
  /external/vboot_reference/firmware/lib/cryptolib/
rsa_utility.c 90 uint8_t* digest = NULL; local
112 digest = DigestBuf(buf, len, algorithm);
114 (uint8_t)algorithm, digest);
116 VbExFree(digest);
123 * of data, its digest is passed as the argument. */
126 const uint8_t* digest,
152 (uint8_t)algorithm, digest);
  /external/vboot_reference/firmware/lib20/
api.c 131 uint8_t *digest; local
146 /* Must have initialized hash digest work area */
154 /* Allocate the digest */
155 digest = vb2_workbuf_alloc(&wb, digest_size);
156 if (!digest)
159 /* Finalize the digest */
161 rv = vb2ex_hwcrypto_digest_finalize(digest, digest_size);
163 rv = vb2_digest_finalize(dc, digest, digest_size);
187 * Check digest vs. signature. Note that this destroys the signature.
190 rv = vb2_verify_digest(&key, &pre->body_signature, digest, &wb)
    [all...]
  /external/vboot_reference/firmware/lib21/
api.c 123 uint8_t *digest; local
137 /* Must have initialized hash digest work area */
145 /* Allocate the digest */
146 digest = vb2_workbuf_alloc(&wb, digest_size);
147 if (!digest)
150 /* Finalize the digest */
152 rv = vb2ex_hwcrypto_digest_finalize(digest, digest_size);
154 rv = vb2_digest_finalize(dc, digest, digest_size);
159 if (vb2_safe_memcmp(digest, (const uint8_t *)sig + sig->sig_offset,
  /external/boringssl/src/crypto/evp/
pbkdf.c 65 const EVP_MD *digest, size_t key_len, uint8_t *out_key) {
72 mdlen = EVP_MD_size(digest);
76 if (!HMAC_Init_ex(&hctx_tpl, password, password_len, digest, NULL)) {
  /external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/
xsrfutil.py 71 digest = digester.digest()
73 token = base64.urlsafe_b64encode(digest + DELIMITER + when)
  /external/libchrome/crypto/third_party/nss/
chromium-blapi.h 54 extern void SHA256_End(SHA256Context *cx, unsigned char *digest,
72 extern void SHA512_End(SHA512Context *cx, unsigned char *digest,
90 extern void SHA384_End(SHA384Context *cx, unsigned char *digest,
  /external/lzma/CPP/Common/
CrcReg.cpp 44 STDMETHOD_(void, Final)(Byte *digest);
59 STDMETHODIMP_(void) CCrcHasher::Final(Byte *digest)
62 SetUi32(digest, val);

Completed in 465 milliseconds

1 2 3 4 5 6 78 91011>>