HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 401 - 425 of 1375) sorted by null

<<11121314151617181920>>

  /system/keymaster/
android_keymaster_test_utils.h 239 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest);
240 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest,
245 keymaster_digest_t digest);
247 keymaster_digest_t digest, keymaster_padding_t padding);
252 std::string EncryptMessage(const std::string& message, keymaster_digest_t digest,
257 keymaster_digest_t digest, keymaster_padding_t padding,
268 std::string DecryptMessage(const std::string& ciphertext, keymaster_digest_t digest,
272 std::string DecryptMessage(const std::string& ciphertext, keymaster_digest_t digest,
277 keymaster_digest_t digest, keymaster_padding_t padding,
284 keymaster_digest_t digest, std::string expected_mac)
    [all...]
keymaster0_engine.cpp 253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
255 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned)digest_len, ec_key);
257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key);
343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
351 // Truncate digest if it's too long
359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature,
378 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len, ec_key);
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/
poplib.py 55 APOP name digest apop(name, digest)
286 digest = hashlib.md5(m.group(1)+secret).digest()
287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest))
288 return self._shortcmd('APOP %s %s' % (user, digest))
301 """Return message digest (unique id) list.
  /external/lzma/C/
Sha256.c 178 void Sha256_Final(CSha256 *p, Byte *digest)
200 *digest++ = (Byte)(p->state[i] >> 24);
201 *digest++ = (Byte)(p->state[i] >> 16);
202 *digest++ = (Byte)(p->state[i] >> 8);
203 *digest++ = (Byte)(p->state[i]);
  /external/pdfium/testing/
embedder_test.cpp 45 std::string CRYPT_ToBase16(const uint8_t* digest) {
50 uint8_t a = digest[i];
352 uint8_t digest[16];
354 expected_stride * expected_height, digest); local
355 EXPECT_EQ(expected_md5sum, CRYPT_ToBase16(digest));
  /external/tpm2/
CryptUtil_fp.h 47 TPM2B *digest // OUT: HMAC
51 UINT16 digestSize, // IN: size of digest buffer
52 BYTE *digest // OUT: hash digest
56 TPM2B *digest // IN: the size of the buffer Out: requested number of byte
288 TPM2B_DIGEST *digest, // IN: The digest being signed
344 LIB_EXPORT void CryptUpdateDigest2B(void *digestState, // IN: the digest state
355 TPM2B_DIGEST *digest, // IN: The digest being validate
    [all...]
CpriECC.c 789 // It is a fatal error if rOut, sOut, dIn, or digest are not provided.
798 TPM2B *digest // IN: the value to sign
813 pAssert(rOut != NULL && sOut != NULL && dIn != NULL && digest != NULL);
    [all...]
  /prebuilts/gdb/darwin-x86/lib/python2.7/
poplib.py 55 APOP name digest apop(name, digest)
286 digest = hashlib.md5(m.group(1)+secret).digest()
287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest))
288 return self._shortcmd('APOP %s %s' % (user, digest))
301 """Return message digest (unique id) list.
  /prebuilts/gdb/linux-x86/lib/python2.7/
poplib.py 55 APOP name digest apop(name, digest)
286 digest = hashlib.md5(m.group(1)+secret).digest()
287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest))
288 return self._shortcmd('APOP %s %s' % (user, digest))
301 """Return message digest (unique id) list.
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
poplib.py 55 APOP name digest apop(name, digest)
286 digest = hashlib.md5(m.group(1)+secret).digest()
287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest))
288 return self._shortcmd('APOP %s %s' % (user, digest))
301 """Return message digest (unique id) list.
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
poplib.py 55 APOP name digest apop(name, digest)
286 digest = hashlib.md5(m.group(1)+secret).digest()
287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest))
288 return self._shortcmd('APOP %s %s' % (user, digest))
301 """Return message digest (unique id) list.
  /system/tpm/trunks/
policy_session_test.cc 105 std::string digest; local
110 EXPECT_EQ(TPM_RC_SUCCESS, session.GetDigest(&digest));
111 EXPECT_EQ(static_cast<size_t>(SHA256_DIGEST_SIZE), digest.size());
116 std::string digest; local
119 EXPECT_EQ(TPM_RC_FAILURE, session.GetDigest(&digest));
157 std::string pcr_digest("digest");
  /prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.50/
bcprov-jdk15on-1.50.jar 
  /cts/tests/tests/keystore/src/android/keystore/cts/
KeyGeneratorTest.java 301 String digest = TestUtils.getHmacAlgorithmDigest(algorithm); local
302 assertNotNull(digest);
314 Arrays.asList(TestUtils.getKeyInfo(key).getDigests()), digest); local
316 // The same digest is specified in algorithm parameters
317 keyGenerator.init(TestUtils.buildUpon(goodSpec).setDigests(digest).build());
320 Arrays.asList(TestUtils.getKeyInfo(key).getDigests()), digest); local
328 // A different digest specified in algorithm parameters
329 String anotherDigest = "SHA-256".equalsIgnoreCase(digest) ? "SHA-384" : "SHA-256";
338 .setDigests(digest, anotherDigest)
399 // The digest from HMAC key algorithm must be specified in the list o
424 String digest = TestUtils.getHmacAlgorithmDigest(algorithm); local
    [all...]
  /external/boringssl/src/crypto/cipher/test/
make_legacy_aead_tests.go 112 digest []byte
169 var digest []byte
174 digest = ssl30MAC(hash, macKey, input, adFull)
179 digest = h.Sum(nil)
208 sealed = make([]byte, 0, len(input)+len(digest)+cbc.BlockSize())
214 sealed = append(sealed, digest...)
268 digest: digest,
282 fmt.Printf("# DIGEST: %s\n", hex.EncodeToString(t.digest))
    [all...]
  /dalvik/libdex/
DexFile.cpp 115 * Format an SHA-1 digest for printing. tmpBuf must be able to hold at
118 const char* dvmSHA1DigestToStr(const unsigned char digest[], char* tmpBuf);
121 * Compute a SHA-1 digest on a range of bytes.
124 unsigned char digest[])
129 SHA1Final(digest, &context);
133 * Format the SHA-1 digest into the buffer, which must be able to hold at
136 static const char* dexSHA1DigestToStr(const unsigned char digest[],char* tmpBuf)
144 *cp++ = hexDigit[digest[i] >> 4];
145 *cp++ = hexDigit[digest[i] & 0x0f];
374 * Verify the SHA-1 digest. (Normally we don't want to do this -
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
CipherSpi.java 27 import org.bouncycastle.crypto.Digest;
89 Digest digest = DigestFactory.getDigest(mgfParams.getDigestAlgorithm()); local
91 if (digest == null)
93 throw new NoSuchPaddingException("no match on OAEP constructor for digest algorithm: "+ mgfParams.getDigestAlgorithm());
96 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue());
316 Digest digest = DigestFactory.getDigest(spec.getDigestAlgorithm()); local
318 if (digest == null)
320 throw new InvalidAlgorithmParameterException("no match on digest algorithm: "+ spec.getDigestAlgorithm())
    [all...]
  /prebuilts/gdb/darwin-x86/lib/python2.7/multiprocessing/
connection.py 409 digest = hmac.new(authkey, message).digest()
411 if response == digest:
415 raise AuthenticationError('digest received was wrong')
423 digest = hmac.new(authkey, message).digest()
424 connection.send_bytes(digest)
427 raise AuthenticationError('digest sent was rejected')
  /prebuilts/gdb/linux-x86/lib/python2.7/multiprocessing/
connection.py 409 digest = hmac.new(authkey, message).digest()
411 if response == digest:
415 raise AuthenticationError('digest received was wrong')
423 digest = hmac.new(authkey, message).digest()
424 connection.send_bytes(digest)
427 raise AuthenticationError('digest sent was rejected')
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/
connection.py 409 digest = hmac.new(authkey, message).digest()
411 if response == digest:
415 raise AuthenticationError('digest received was wrong')
423 digest = hmac.new(authkey, message).digest()
424 connection.send_bytes(digest)
427 raise AuthenticationError('digest sent was rejected')
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/multiprocessing/
connection.py 409 digest = hmac.new(authkey, message).digest()
411 if response == digest:
415 raise AuthenticationError('digest received was wrong')
423 digest = hmac.new(authkey, message).digest()
424 connection.send_bytes(digest)
427 raise AuthenticationError('digest sent was rejected')
  /external/boringssl/src/crypto/dsa/
dsa.c 66 #include <openssl/digest.h>
507 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) {
547 /* if the digest length is greater than the size of q use the
548 * BN_num_bits(dsa->q) leftmost bits of the digest, see
553 if (BN_bin2bn(digest, digest_len, &m) == NULL) {
603 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig,
606 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) {
612 int DSA_do_check_signature(int *out_valid, const uint8_t *digest,
666 /* if the digest length is greater than the size of q use the
667 * BN_num_bits(dsa->q) leftmost bits of the digest, se
    [all...]
  /bootable/recovery/applypatch/
applypatch_modes.cpp 74 uint8_t digest[SHA_DIGEST_LENGTH]; local
75 if (ParseSha1(pieces[0].c_str(), digest) != 0) {
  /external/boringssl/src/crypto/x509/
x_algor.c 61 #include <openssl/digest.h>
  /external/boringssl/src/include/openssl/
ec_key.h 247 int (*sign)(const uint8_t *digest, size_t digest_len, uint8_t *sig,
251 int (*verify)(const uint8_t *digest, size_t digest_len, const uint8_t *sig,

Completed in 848 milliseconds

<<11121314151617181920>>