HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 426 - 450 of 1173) sorted by null

<<11121314151617181920>>

  /system/keymaster/
ecdsa_operation.cpp 46 keymaster_digest_t digest; local
47 if (!GetAndValidateDigest(begin_params, key, &digest, error))
51 Operation* op = InstantiateOperation(digest, pkey.release());
rsa_operation.cpp 36 // additional overhead, for the digest algorithmIdentifier required by PKCS#1.
75 keymaster_digest_t digest = KM_DIGEST_NONE; local
76 if (require_digest && !GetAndValidateDigest(begin_params, key, &digest, error))
83 RsaOperation* op = InstantiateOperation(digest, padding, rsa.release());
105 if (op->digest() != KM_DIGEST_NONE) {
112 if (op->digest() == KM_DIGEST_NONE) {
186 // to the length of the selected digest.
228 RsaDigestingOperation::RsaDigestingOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,
230 : RsaOperation(purpose, digest, padding, key) {
250 LOG_E("Input too long: %d-byte digest cannot be used with %d-byte RSA key in PSS
    [all...]
  /external/vboot_reference/firmware/2lib/
2sha1.c 259 void vb2_sha1_finalize(struct vb2_sha1_context *ctx, uint8_t *digest)
275 *digest++ = (uint8_t)(tmp >> 24);
276 *digest++ = (uint8_t)(tmp >> 16);
277 *digest++ = (uint8_t)(tmp >> 8);
278 *digest++ = (uint8_t)(tmp >> 0);
  /external/llvm/include/llvm/ADT/
ImmutableSet.h 233 uint32_t digest; member in class:llvm::ImutAVLTree
247 IsCanonicalized(0), value(v), digest(0), refCount(0)
261 /// hasCachedDigest - Returns true if the digest for this tree is cached.
298 uint32_t digest = 0; local
301 digest += L->computeDigest();
303 // Compute digest of stored data.
306 digest += ID.ComputeHash();
309 digest += R->computeDigest();
311 return digest;
315 // Check the lowest bit to determine if digest has actually bee
615 unsigned digest = TNew->computeDigest(); local
    [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python2/
httplib2test.py     [all...]
  /external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python3/
httplib2test.py     [all...]
  /system/tpm/trunks/
tpm_utility_test.cc 431 EXPECT_EQ(TPM_RC_SUCCESS, utility_.ExtendPCR(1, "test digest",
435 std::string hash_string = crypto::SHA256HashString("test digest");
437 digests.digests[0].digest.sha256,
447 utility_.ExtendPCR(pcr_index, "test digest", nullptr));
451 EXPECT_EQ(TPM_RC_FAILURE, utility_.ExtendPCR(-1, "test digest", nullptr));
765 std::string digest(32, 'a');
786 digest,
795 std::string digest(32, 'a');
810 digest,
818 std::string digest(32, 'a')
    [all...]
  /external/apache-http/android/src/android/net/http/
RequestHandle.java 233 * Create and queue an HTTP authentication-response (digest) request.
249 mHeaders.put(authorizationHeader(isProxy), "Digest " + response);
298 * @return Digest-scheme authentication response.
326 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce); local
333 response += "response=" + doubleQuote(digest) ;
362 * @return Double-quoted MD5 digest.
396 byte[] d = md5.digest(param.getBytes());
  /external/chromium-trace/catapult/third_party/Paste/paste/auth/
cookie.py 55 _signature_size = len(hmac.new(b'x', b'x', sha1).digest())
148 hmac.new(self.secret, content, sha1).digest() +
167 if signature == hmac.new(self.secret, content, sha1).digest():
  /external/vboot_reference/tests/
vb20_api_tests.c 156 int vb2ex_hwcrypto_digest_finalize(uint8_t *digest,
192 uint8_t *digest,
207 const uint8_t *digest,
  /external/webrtc/webrtc/base/
ssladapter_unittest.cc 248 // Set a bogus peer certificate digest.
249 unsigned char digest[20]; local
250 size_t digest_len = sizeof(digest);
251 ssl_stream_adapter_->SetPeerCertificateDigest(rtc::DIGEST_SHA_1, digest,
opensslidentity.cc 297 unsigned char* digest,
300 return ComputeDigest(x509_, algorithm, digest, size, length);
305 unsigned char* digest,
317 X509_digest(x509, md, digest, &n);
sslidentity.h 63 // Gets the name of the digest algorithm that was used to compute this
67 // Compute the digest of the certificate given algorithm
69 unsigned char* digest,
  /frameworks/base/packages/Osu/src/com/android/hotspot2/osu/
SPVerifier.java 161 MessageDigest digest = MessageDigest.getInstance(hash.getJCEName()); local
162 byte[] computed = digest.digest(iconData.getIconData());
  /libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/
CertBlacklistTest.java 36 import com.android.org.bouncycastle.crypto.Digest;
180 MessageDigest digest = MessageDigest.getInstance("SHA1"); local
181 byte[] hexlifiedHash = Hex.encode(digest.digest(encoded));
  /cts/tests/tests/security/src/android/security/cts/
CertificateTest.java 105 byte[] sha1 = messageDigest.digest();
  /external/autotest/client/site_tests/power_HotCPUSuspend/
power_HotCPUSuspend.py 23 sha512_hash = hashlib.sha512(sha512_hash).digest()
  /external/autotest/server/site_tests/firmware_TPMExtend/
firmware_TPMExtend.py 28 extended = hashlib.sha1('\0' * 20 + hash_obj.digest()[:20]).hexdigest()
34 logging.info('Verifying HWID digest in PCR1')
39 error.TestFail('PCR1 was not extended with SHA256 digest of HWID!')
41 logging.info('Verifying bootmode digest in PCR0 in normal mode')
50 logging.info('Verifying bootmode digest in PCR0 in recovery mode')
63 logging.info('Verifying bootmode digest in PCR0 in developer mode')
72 logging.info('Verifying bootmode digest in PCR0 in dev-recovery mode')
  /external/boringssl/src/crypto/evp/
digestsign.c 61 #include "../digest/internal.h"
140 size_t s = EVP_MD_size(ctx->digest);
  /external/chromium-trace/catapult/third_party/Paste/tests/test_auth/
test_auth_digest.py 5 from paste.auth.digest import *
41 assert "Digest" in response and username in response
  /external/chromium-trace/catapult/third_party/gsutil/gslib/
tracker_file.py 252 """Creates an MD5 hex digest of the parameters for a rewrite call.
275 MD5 hex digest Hash of the input parameters, or None if required parameters
300 rewrite_params_hash: MD5 hex digest of rewrite call parameters constructed
334 rewrite_params_hash: MD5 hex digest of rewrite call parameters constructed
  /external/conscrypt/src/main/java/org/conscrypt/ct/
CTLogInfo.java 41 .digest(publicKey.getEncoded());
  /external/conscrypt/src/platform/java/org/conscrypt/
PinListEntry.java 114 byte[] fingerprint = dgst.digest(encoded);
  /external/ppp/pppd/plugins/
winbind.c 99 struct chap_digest_type *digest,
512 struct chap_digest_type *digest,
545 switch (digest->code) {
656 error("WINBIND: Challenge type %u unsupported", digest->code);
  /external/vboot_reference/firmware/lib/include/
vboot_common.h 109 * Verify a secure hash digest from DigestBuf() or DigestFinal(), using
112 int VerifyDigest(const uint8_t *digest, const VbSignature *sig,

Completed in 1479 milliseconds

<<11121314151617181920>>