/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
SHA384.java | 1 package org.bouncycastle.jcajce.provider.digest; 22 static public class Digest 26 public Digest() 34 Digest d = (Digest)super.clone(); 35 d.digest = new SHA384Digest((SHA384Digest)digest); 84 provider.addAlgorithm("MessageDigest.SHA-384", PREFIX + "$Digest");
|
SHA512.java | 1 package org.bouncycastle.jcajce.provider.digest; 25 static public class Digest 29 public Digest() 37 Digest d = (Digest)super.clone(); 38 d.digest = new SHA512Digest((SHA512Digest)digest); 58 // d.digest = new SHA512tDigest((SHA512tDigest)digest); 167 provider.addAlgorithm("MessageDigest.SHA-512", PREFIX + "$Digest"); [all...] |
SHA1.java | 1 package org.bouncycastle.jcajce.provider.digest; 31 static public class Digest 35 public Digest() 43 Digest d = (Digest)super.clone(); 44 d.digest = new SHA1Digest((SHA1Digest)digest); 138 int digest = SHA1; local 141 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 143 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param) [all...] |
/external/tpm2/ |
PCR_fp.h | 36 TPMI_ALG_HASH hashAlg, // IN: hash algorithm to compute digest 39 TPM2B_DIGEST *digest // OUT: digest 65 const TPM2B_DIGEST *digest // IN: the digest to modify the PCR 81 TPML_DIGEST *digest, // OUT: digest
|
Attest_spt.c | 116 // TPM_RC_VALUE digest generated for the given scheme is greater than the modulus of 136 TPM2B_DIGEST digest; local 161 digest.t.size = CryptStartHash(hashAlg, &hashState); 163 CryptCompleteHash2B(&hashState, &digest.b); 172 CryptUpdateDigest(&hashState, digest.t.size, digest.t.buffer); 173 CryptCompleteHash2B(&hashState, &digest.b); 179 &digest,
|
/external/vboot_reference/tests/ |
sha_benchmark.c | 35 uint8_t* digest = (uint8_t*) malloc(SHA512_DIGEST_SIZE); /* Maximum size of local 36 * the digest. */ 42 hash_functions[i].hash(buffer, TEST_BUFFER_SIZE, digest); 55 free(digest);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest1Test.java | 124 * java.security.MessageDigest#digest() 128 assertEquals("incorrect result", 0, md.digest().length); 133 * java.security.MessageDigest#digest(byte[]) 138 assertEquals("incorrect result", 0, md.digest(b).length); 143 * java.security.MessageDigest#digest(byte[], int, int) 148 assertEquals("incorrect result", 0, md.digest(b, 2, 3)); 149 assertTrue("digest failed", md.runEngineDigest); 156 md.digest(null, 0, 1); 162 md.digest(bytes, 0, bytes.length + 1); 168 md.digest(bytes, Integer.MAX_VALUE, 1) 188 MessageDigest digest = MessageDigest.getInstance("TestDigest", new TestProvider()); local [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/utils/ |
FingerprintUtils.java | 38 MessageDigest digest = MessageDigest.getInstance(hashAlgorithm); local 39 return toHexadecimalString(digest.digest(cert.getEncoded()));
|
/system/keymaster/ |
hmac_key.cpp | 70 keymaster_digest_t digest; 71 if (!key_description.GetTagValue(TAG_DIGEST, &digest)) { 77 switch (digest) { 101 // digest was not matched
|
/external/vboot_reference/firmware/2lib/ |
2api.c | 112 /* Must have initialized hash digest work area */ 133 const uint8_t *digest; local 138 digest = vb2_get_boot_state_digest(ctx); 142 digest = vb2_get_sd(ctx)->gbb_hwid_digest; 149 if (digest == NULL || *dest_size < digest_size) 152 memcpy(dest, digest, digest_size);
|
/external/vboot_reference/futility/ |
cmd_pcr.c | 16 "Usage: " MYNAME " %s [OPTIONS] DIGEST [...]\n" 20 "Each DIGEST arg should be a hex string (spaces optional) of the\n" 21 "appropriate length. The PCR is extended with each digest in turn\n" 25 " -i Initialize the PCR with the first DIGEST argument\n" 87 fprintf(stderr, "Invalid DIGEST \"%s\"\n", str); 108 uint8_t *digest; local 144 fprintf(stderr, "You must extend at least one DIGEST\n"); 168 digest = DigestBuf(accum, digest_size * 2, digest_alg); 169 if (!digest) { 170 fprintf(stderr, "Error computing digest!\n") [all...] |
/frameworks/base/obex/javax/obex/ |
ObexSession.java | 75 * the authentication challenge and it represents the challenge digest 154 * 0x00 and is the response digest. The first optional tag is 0x01 and 169 byte[] digest = new byte[challenge.length + password.length + 1]; 170 System.arraycopy(challenge, 0, digest, 0, challenge.length); 172 digest[challenge.length] = (byte)0x3A; 173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); 175 // Add the Response Digest 179 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16);
|
/external/libchrome/crypto/ |
hmac_unittest.cc | 27 const char *digest; member in struct:__anon15916 95 const char *digest; member in struct:__anon15917 153 unsigned char digest[kSHA1DigestSize]; local 154 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); 155 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize)); 248 unsigned char digest[kSHA1DigestSize]; local 249 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); 250 EXPECT_EQ(0, memcmp(kSimpleHmacCases[i].digest, digest, kSHA1DigestSize)) 292 unsigned char digest[kSHA1DigestSize]; local [all...] |
/external/boringssl/src/crypto/ecdsa/ |
ecdsa.c | 66 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, 69 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey); 72 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, 76 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, 83 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey); 101 ret = ECDSA_do_verify(digest, digest_len, s, eckey); 109 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian 112 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, 117 /* Need to truncate digest if it is too long: first truncate whole 122 if (!BN_bin2bn(digest, digest_len, out)) [all...] |
/external/pdfium/core/src/fdrm/crypto/ |
fx_crypt_sha.cpp | 26 static void SHATransform(unsigned int* digest, unsigned int* block) { 37 a = digest[0]; 38 b = digest[1]; 39 c = digest[2]; 40 d = digest[3]; 41 e = digest[4]; 75 digest[0] += a; 76 digest[1] += b; 77 digest[2] += c; 78 digest[3] += d [all...] |
/external/boringssl/src/include/openssl/ |
dsa.h | 143 /* DSA_do_sign returns a signature of the hash in |digest| by the key in |dsa| 145 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, 149 * |dsa|, of the hash in |digest|. It returns one if so, zero if invalid and -1 158 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len, 162 * is a valid signature, by the public key in |dsa| of the hash in |digest| 167 OPENSSL_EXPORT int DSA_do_check_signature(int *out_valid, const uint8_t *digest, 178 /* DSA_sign signs |digest| with the key in |dsa| and writes the resulting 184 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len, 189 * key in |dsa|, of the hash in |digest|. It returns one if so, zero if invalid 200 OPENSSL_EXPORT int DSA_verify(int type, const uint8_t *digest, [all...] |
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/third_party/dns/ |
entropy.py | 26 self.digest = None 85 if self.digest is None or self.next_byte == self.hash_len: 87 self.digest = self.hash.digest() 88 self.stir(self.digest, True) 90 value = ord(self.digest[self.next_byte])
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/commands/ |
hash.py | 113 format_func = lambda digest: Base64EncodeHash(digest.hexdigest()) 124 format_func = lambda digest: digest.hexdigest() 178 for name, digest in hash_dict.iteritems(): 179 print '\tHash (%s):\t\t%s' % (name, format_func(digest))
|
/external/vboot_reference/firmware/lib/cryptolib/ |
rsa_utility.c | 90 uint8_t* digest = NULL; local 112 digest = DigestBuf(buf, len, algorithm); 114 (uint8_t)algorithm, digest); 116 VbExFree(digest); 123 * of data, its digest is passed as the argument. */ 126 const uint8_t* digest, 152 (uint8_t)algorithm, digest);
|
/external/vboot_reference/firmware/lib20/ |
api.c | 131 uint8_t *digest; local 146 /* Must have initialized hash digest work area */ 154 /* Allocate the digest */ 155 digest = vb2_workbuf_alloc(&wb, digest_size); 156 if (!digest) 159 /* Finalize the digest */ 161 rv = vb2ex_hwcrypto_digest_finalize(digest, digest_size); 163 rv = vb2_digest_finalize(dc, digest, digest_size); 187 * Check digest vs. signature. Note that this destroys the signature. 190 rv = vb2_verify_digest(&key, &pre->body_signature, digest, &wb) [all...] |
/external/vboot_reference/firmware/lib21/ |
api.c | 123 uint8_t *digest; local 137 /* Must have initialized hash digest work area */ 145 /* Allocate the digest */ 146 digest = vb2_workbuf_alloc(&wb, digest_size); 147 if (!digest) 150 /* Finalize the digest */ 152 rv = vb2ex_hwcrypto_digest_finalize(digest, digest_size); 154 rv = vb2_digest_finalize(dc, digest, digest_size); 159 if (vb2_safe_memcmp(digest, (const uint8_t *)sig + sig->sig_offset,
|
/external/boringssl/src/crypto/evp/ |
pbkdf.c | 65 const EVP_MD *digest, size_t key_len, uint8_t *out_key) { 72 mdlen = EVP_MD_size(digest); 76 if (!HMAC_Init_ex(&hctx_tpl, password, password_len, digest, NULL)) {
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/oauth2client/oauth2client/ |
xsrfutil.py | 71 digest = digester.digest() 73 token = base64.urlsafe_b64encode(digest + DELIMITER + when)
|
/external/libchrome/crypto/third_party/nss/ |
chromium-blapi.h | 54 extern void SHA256_End(SHA256Context *cx, unsigned char *digest, 72 extern void SHA512_End(SHA512Context *cx, unsigned char *digest, 90 extern void SHA384_End(SHA384Context *cx, unsigned char *digest,
|
/external/lzma/CPP/Common/ |
CrcReg.cpp | 44 STDMETHOD_(void, Final)(Byte *digest);
59 STDMETHODIMP_(void) CCrcHasher::Final(Byte *digest)
62 SetUi32(digest, val);
|