/system/keymaster/ |
ecdsa_operation.cpp | 46 keymaster_digest_t digest; local 47 if (!GetAndValidateDigest(begin_params, key, &digest, error)) 51 Operation* op = InstantiateOperation(digest, pkey.release());
|
rsa_operation.cpp | 36 // additional overhead, for the digest algorithmIdentifier required by PKCS#1. 75 keymaster_digest_t digest = KM_DIGEST_NONE; local 76 if (require_digest && !GetAndValidateDigest(begin_params, key, &digest, error)) 83 RsaOperation* op = InstantiateOperation(digest, padding, rsa.release()); 105 if (op->digest() != KM_DIGEST_NONE) { 112 if (op->digest() == KM_DIGEST_NONE) { 186 // to the length of the selected digest. 228 RsaDigestingOperation::RsaDigestingOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, 230 : RsaOperation(purpose, digest, padding, key) { 250 LOG_E("Input too long: %d-byte digest cannot be used with %d-byte RSA key in PSS [all...] |
/external/vboot_reference/firmware/2lib/ |
2sha1.c | 259 void vb2_sha1_finalize(struct vb2_sha1_context *ctx, uint8_t *digest) 275 *digest++ = (uint8_t)(tmp >> 24); 276 *digest++ = (uint8_t)(tmp >> 16); 277 *digest++ = (uint8_t)(tmp >> 8); 278 *digest++ = (uint8_t)(tmp >> 0);
|
/external/llvm/include/llvm/ADT/ |
ImmutableSet.h | 233 uint32_t digest; member in class:llvm::ImutAVLTree 247 IsCanonicalized(0), value(v), digest(0), refCount(0) 261 /// hasCachedDigest - Returns true if the digest for this tree is cached. 298 uint32_t digest = 0; local 301 digest += L->computeDigest(); 303 // Compute digest of stored data. 306 digest += ID.ComputeHash(); 309 digest += R->computeDigest(); 311 return digest; 315 // Check the lowest bit to determine if digest has actually bee 615 unsigned digest = TNew->computeDigest(); local [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python2/ |
httplib2test.py | [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python3/ |
httplib2test.py | [all...] |
/system/tpm/trunks/ |
tpm_utility_test.cc | 431 EXPECT_EQ(TPM_RC_SUCCESS, utility_.ExtendPCR(1, "test digest", 435 std::string hash_string = crypto::SHA256HashString("test digest"); 437 digests.digests[0].digest.sha256, 447 utility_.ExtendPCR(pcr_index, "test digest", nullptr)); 451 EXPECT_EQ(TPM_RC_FAILURE, utility_.ExtendPCR(-1, "test digest", nullptr)); 765 std::string digest(32, 'a'); 786 digest, 795 std::string digest(32, 'a'); 810 digest, 818 std::string digest(32, 'a') [all...] |
/external/apache-http/android/src/android/net/http/ |
RequestHandle.java | 233 * Create and queue an HTTP authentication-response (digest) request. 249 mHeaders.put(authorizationHeader(isProxy), "Digest " + response); 298 * @return Digest-scheme authentication response. 326 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce); local 333 response += "response=" + doubleQuote(digest) ; 362 * @return Double-quoted MD5 digest. 396 byte[] d = md5.digest(param.getBytes());
|
/external/chromium-trace/catapult/third_party/Paste/paste/auth/ |
cookie.py | 55 _signature_size = len(hmac.new(b'x', b'x', sha1).digest()) 148 hmac.new(self.secret, content, sha1).digest() + 167 if signature == hmac.new(self.secret, content, sha1).digest():
|
/external/vboot_reference/tests/ |
vb20_api_tests.c | 156 int vb2ex_hwcrypto_digest_finalize(uint8_t *digest, 192 uint8_t *digest, 207 const uint8_t *digest,
|
/external/webrtc/webrtc/base/ |
ssladapter_unittest.cc | 248 // Set a bogus peer certificate digest. 249 unsigned char digest[20]; local 250 size_t digest_len = sizeof(digest); 251 ssl_stream_adapter_->SetPeerCertificateDigest(rtc::DIGEST_SHA_1, digest,
|
opensslidentity.cc | 297 unsigned char* digest, 300 return ComputeDigest(x509_, algorithm, digest, size, length); 305 unsigned char* digest, 317 X509_digest(x509, md, digest, &n);
|
sslidentity.h | 63 // Gets the name of the digest algorithm that was used to compute this 67 // Compute the digest of the certificate given algorithm 69 unsigned char* digest,
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
SPVerifier.java | 161 MessageDigest digest = MessageDigest.getInstance(hash.getJCEName()); local 162 byte[] computed = digest.digest(iconData.getIconData());
|
/libcore/luni/src/test/java/com/android/org/bouncycastle/jce/provider/ |
CertBlacklistTest.java | 36 import com.android.org.bouncycastle.crypto.Digest; 180 MessageDigest digest = MessageDigest.getInstance("SHA1"); local 181 byte[] hexlifiedHash = Hex.encode(digest.digest(encoded));
|
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 105 byte[] sha1 = messageDigest.digest();
|
/external/autotest/client/site_tests/power_HotCPUSuspend/ |
power_HotCPUSuspend.py | 23 sha512_hash = hashlib.sha512(sha512_hash).digest()
|
/external/autotest/server/site_tests/firmware_TPMExtend/ |
firmware_TPMExtend.py | 28 extended = hashlib.sha1('\0' * 20 + hash_obj.digest()[:20]).hexdigest() 34 logging.info('Verifying HWID digest in PCR1') 39 error.TestFail('PCR1 was not extended with SHA256 digest of HWID!') 41 logging.info('Verifying bootmode digest in PCR0 in normal mode') 50 logging.info('Verifying bootmode digest in PCR0 in recovery mode') 63 logging.info('Verifying bootmode digest in PCR0 in developer mode') 72 logging.info('Verifying bootmode digest in PCR0 in dev-recovery mode')
|
/external/boringssl/src/crypto/evp/ |
digestsign.c | 61 #include "../digest/internal.h" 140 size_t s = EVP_MD_size(ctx->digest);
|
/external/chromium-trace/catapult/third_party/Paste/tests/test_auth/ |
test_auth_digest.py | 5 from paste.auth.digest import * 41 assert "Digest" in response and username in response
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/ |
tracker_file.py | 252 """Creates an MD5 hex digest of the parameters for a rewrite call. 275 MD5 hex digest Hash of the input parameters, or None if required parameters 300 rewrite_params_hash: MD5 hex digest of rewrite call parameters constructed 334 rewrite_params_hash: MD5 hex digest of rewrite call parameters constructed
|
/external/conscrypt/src/main/java/org/conscrypt/ct/ |
CTLogInfo.java | 41 .digest(publicKey.getEncoded());
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
PinListEntry.java | 114 byte[] fingerprint = dgst.digest(encoded);
|
/external/ppp/pppd/plugins/ |
winbind.c | 99 struct chap_digest_type *digest, 512 struct chap_digest_type *digest, 545 switch (digest->code) { 656 error("WINBIND: Challenge type %u unsupported", digest->code);
|
/external/vboot_reference/firmware/lib/include/ |
vboot_common.h | 109 * Verify a secure hash digest from DigestBuf() or DigestFinal(), using 112 int VerifyDigest(const uint8_t *digest, const VbSignature *sig,
|