/device/linaro/bootloader/edk2/SecurityPkg/Library/HashInstanceLibSha1/ |
HashInstanceLibSha1.c | 26 The function set SHA1 to digest list.
28 @param DigestList digest list
29 @param Sha1Digest SHA1 digest
40 DigestList->digests[0].digest.sha1,
103 @param DigestList Digest list.
114 UINT8 Digest[SHA1_DIGEST_SIZE];
118 Sha1Final (Sha1Ctx, Digest);
122 Tpm2SetSha1ToDigestList (DigestList, Digest);
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/HashInstanceLibSha256/ |
HashInstanceLibSha256.c | 26 The function set SHA256 to digest list.
28 @param DigestList digest list
29 @param Sha256Digest SHA256 digest
40 DigestList->digests[0].digest.sha256,
103 @param DigestList Digest list.
114 UINT8 Digest[SHA256_DIGEST_SIZE];
118 Sha256Final (Sha256Ctx, Digest);
122 Tpm2SetSha256ToDigestList (DigestList, Digest);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
Digest.java | 4 * interface that a message digest conforms to. 6 public interface Digest 16 * return the size, in bytes, of the digest produced by this message digest. 18 * @return the size, in bytes, of the digest produced by this message digest. 23 * update the message digest with a single byte. 30 * update the message digest with a block of bytes. 39 * close the digest, producing the final digest value. The doFina [all...] |
/external/skia/src/core/ |
SkMD5.h | 13 /* Calculate a 128-bit MD5 message-digest of the bytes sent to this stream. */ 18 /** Processes input, adding it to the digest. 24 struct Digest { 26 bool operator ==(Digest const& other) const { 29 bool operator !=(Digest const& other) const { return !(*this == other); } 32 /** Computes and returns the digest. */ 33 void finish(Digest& digest);
|
/device/linaro/bootloader/edk2/CryptoPkg/Application/Cryptest/ |
HashVerify.c | 18 // Max Known Digest Size is SHA512 Output (64 bytes) by far
23 // Message string for digest validation
77 Validate UEFI-OpenSSL Digest Interfaces.
91 UINT8 Digest[MAX_DIGEST_SIZE];
100 // MD4 Digest Validation
102 ZeroMem (Digest, MAX_DIGEST_SIZE);
121 Status = Md4Final (HashCtx, Digest);
130 if (CompareMem (Digest, Md4Digest, MD5_DIGEST_SIZE) != 0) {
140 // MD5 Digest Validation
142 ZeroMem (Digest, MAX_DIGEST_SIZE); [all...] |
HmacVerify.c | 18 // Max Known Digest Size is SHA512 Output (64 bytes) by far
71 UINT8 Digest[MAX_DIGEST_SIZE];
79 // HMAC-MD5 Digest Validation
81 ZeroMem (Digest, MAX_DIGEST_SIZE);
100 Status = HmacMd5Final (HmacCtx, Digest);
109 if (CompareMem (Digest, HmacMd5Digest, MD5_DIGEST_SIZE) != 0) {
119 // HMAC-SHA1 Digest Validation
121 ZeroMem (Digest, MAX_DIGEST_SIZE);
140 Status = HmacSha1Final (HmacCtx, Digest);
149 if (CompareMem (Digest, HmacSha1Digest, SHA1_DIGEST_SIZE) != 0) { [all...] |
/device/linaro/bootloader/edk2/SecurityPkg/Library/HashLibBaseCryptoRouter/ |
HashLibBaseCryptoRouterDxe.c | 112 @param DigestList Digest list.
126 TPML_DIGEST_VALUES Digest;
143 mHashInterface[Index].HashFinal (HashCtx[Index], &Digest);
144 Tpm2SetHashToDigestList (DigestList, &Digest);
163 @param DigestList Digest list.
|
HashLibBaseCryptoRouterPei.c | 151 @param DigestList Digest list.
165 TPML_DIGEST_VALUES Digest;
188 HashInterfaceHob->HashInterface[Index].HashFinal (HashCtx[Index], &Digest);
189 Tpm2SetHashToDigestList (DigestList, &Digest);
208 @param DigestList Digest list.
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/PeiRsa2048Sha256GuidedSectionExtractLib/ |
PeiRsa2048Sha256GuidedSectionExtractLib.c | 138 UINT8 Digest[SHA256_DIGEST_SIZE];
232 ZeroMem (Digest, SHA256_DIGEST_SIZE);
245 CryptoStatus = Sha256Final (HashContext, Digest);
264 if (CompareMem (Digest, PublicKey, SHA256_DIGEST_SIZE) == 0) {
307 ZeroMem (Digest, SHA256_DIGEST_SIZE);
322 CryptoStatus = Sha256Final (HashContext, Digest);
335 Digest,
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/DxeRsa2048Sha256GuidedSectionExtractLib/ |
DxeRsa2048Sha256GuidedSectionExtractLib.c | 141 UINT8 Digest[SHA256_DIGEST_SIZE];
248 ZeroMem (Digest, SHA256_DIGEST_SIZE);
261 CryptoStatus = Sha256Final (HashContext, Digest);
280 if (CompareMem (Digest, PublicKey, SHA256_DIGEST_SIZE) == 0) {
323 ZeroMem (Digest, SHA256_DIGEST_SIZE);
338 CryptoStatus = Sha256Final (HashContext, Digest);
351 Digest,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
MD5.java | 1 package org.bouncycastle.jcajce.provider.digest; 40 static public class Digest 44 public Digest() 52 Digest d = (Digest)super.clone(); 53 d.digest = new MD5Digest((MD5Digest)digest); 70 provider.addAlgorithm("MessageDigest.MD5", PREFIX + "$Digest");
|
SHA1.java | 1 package org.bouncycastle.jcajce.provider.digest; 27 static public class Digest 31 public Digest() 39 Digest d = (Digest)super.clone(); 40 d.digest = new SHA1Digest((SHA1Digest)digest); 102 provider.addAlgorithm("MessageDigest.SHA-1", PREFIX + "$Digest");
|
SHA224.java | 1 package org.bouncycastle.jcajce.provider.digest; 19 static public class Digest 23 public Digest() 31 Digest d = (Digest)super.clone(); 32 d.digest = new SHA224Digest((SHA224Digest)digest); 67 provider.addAlgorithm("MessageDigest.SHA-224", PREFIX + "$Digest");
|
SHA256.java | 1 package org.bouncycastle.jcajce.provider.digest; 20 static public class Digest 24 public Digest() 32 Digest d = (Digest)super.clone(); 33 d.digest = new SHA256Digest((SHA256Digest)digest); 85 provider.addAlgorithm("MessageDigest.SHA-256", PREFIX + "$Digest");
|
SHA384.java | 1 package org.bouncycastle.jcajce.provider.digest; 22 static public class Digest 26 public Digest() 34 Digest d = (Digest)super.clone(); 35 d.digest = new SHA384Digest((SHA384Digest)digest); 84 provider.addAlgorithm("MessageDigest.SHA-384", PREFIX + "$Digest");
|
SHA512.java | 1 package org.bouncycastle.jcajce.provider.digest; 25 static public class Digest 29 public Digest() 37 Digest d = (Digest)super.clone(); 38 d.digest = new SHA512Digest((SHA512Digest)digest); 58 // d.digest = new SHA512tDigest((SHA512tDigest)digest); 167 provider.addAlgorithm("MessageDigest.SHA-512", PREFIX + "$Digest"); [all...] |
/device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/ |
Tpm2Sequences.c | 79 TPM2B_DIGEST Digest;
271 This command adds the last part of data, if any, to an Event sequence and returns the result in a digest list.
272 If pcrHandle references a PCR and not TPM_RH_NULL, then the returned digest list is processed in
273 the same manner as the digest list input parameter to TPM2_PCR_Extend() with the pcrHandle in each
274 bank extended with the associated digest value.
390 &Results->digests[Index].digest,
405 @param[out] Result The returned HMAC or digest in a sized buffer
495 BufferPtr = (UINT8 *)&Res.Digest;
|
/device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/ |
AuthService.c | 310 UINT8 Digest[SHA256_DIGEST_SIZE];
341 ZeroMem (Digest, SHA256_DIGEST_SIZE);
358 Status = Sha256Final (HashContext, Digest);
384 Digest,
|
/external/libchrome/base/ |
sha1_portable.cc | 27 // memcpy(somewhere, sha.Digest(), 20); 45 // 20 bytes of message digest. 46 const unsigned char* Digest() const { 214 memcpy(hash, sha.Digest(), SecureHashAlgorithm::kDigestSizeBytes);
|
/system/security/keystore/include/keystore/ |
authorization_set.h | 259 AuthorizationSetBuilder& Digest(Digest digest) { 260 return Authorization(TAG_DIGEST, digest); 326 Authorization(TAG_DIGEST, Digest::NONE);
|
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Include/ |
EfiTpm.h | 73 TCG_DIGEST Digest; // Value extended into PCRIndex
84 TCG_DIGEST Digest;
|
/device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/Ikev2/ |
Sa.c | [all...] |
/hardware/interfaces/keymaster/3.0/vts/functional/ |
authorization_set.h | 286 AuthorizationSetBuilder& Digest(std::initializer_list<Digest> digests); 289 // The following forwarding templates enable BlockMode,Digest and Padding to be called with a 294 template <typename... T> AuthorizationSetBuilder& Digest(T&&... a) { 295 return Digest({std::forward<T>(a)...}); 383 Authorization(TAG_DIGEST, Digest::NONE); 400 AuthorizationSetBuilder::Digest(std::initializer_list<V3_0::Digest> digests) { 401 for (auto digest : digests) { 402 Authorization(TAG_DIGEST, digest); [all...] |
/system/keymaster/include/keymaster/ |
authorization_set.h | 529 AuthorizationSetBuilder& Digest(keymaster_digest_t digest) { 530 return Authorization(TAG_DIGEST, digest);
|
/external/ppp/pppd/ |
chap_ms.c | 684 u_char Digest[SHA1_SIGNATURE_SIZE]; 691 SHA1_Final(Digest, &sha1Context); 696 SHA1_Update(&sha1Context, Digest, sizeof(Digest)); 699 SHA1_Final(Digest, &sha1Context); 702 for (i = 0; i < MAX((MS_AUTH_RESPONSE_LENGTH / 2), sizeof(Digest)); i++) 703 sprintf((char *)&authResponse[i * 2], "%02X", Digest[i]); 738 u_char Digest[SHA1_SIGNATURE_SIZE]; /* >= MPPE_MAX_KEY_LEN */ 744 SHA1_Final(Digest, &sha1Context); 747 BCOPY(Digest, mppe_send_key, sizeof(mppe_send_key)) [all...] |