/system/keymaster/ |
android_keymaster_test_utils.h | 239 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest); 240 void SignMessage(const std::string& message, std::string* signature, keymaster_digest_t digest, 245 keymaster_digest_t digest); 247 keymaster_digest_t digest, keymaster_padding_t padding); 252 std::string EncryptMessage(const std::string& message, keymaster_digest_t digest, 257 keymaster_digest_t digest, keymaster_padding_t padding, 268 std::string DecryptMessage(const std::string& ciphertext, keymaster_digest_t digest, 272 std::string DecryptMessage(const std::string& ciphertext, keymaster_digest_t digest, 277 keymaster_digest_t digest, keymaster_padding_t padding, 284 keymaster_digest_t digest, std::string expected_mac) [all...] |
keymaster0_engine.cpp | 253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, 255 ALOGV("ecdsa_sign(%p, %u, %p)", digest, (unsigned)digest_len, ec_key); 257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); 343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, 351 // Truncate digest if it's too long 359 if (!Keymaster0Sign(&sign_params, *key_blob, digest, digest_len, &signature, 378 ALOGV("ecdsa_sign(%p, %u, %p) => success", digest, (unsigned)digest_len, ec_key);
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
poplib.py | 55 APOP name digest apop(name, digest)
286 digest = hashlib.md5(m.group(1)+secret).digest()
287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest))
288 return self._shortcmd('APOP %s %s' % (user, digest))
301 """Return message digest (unique id) list.
|
/external/lzma/C/ |
Sha256.c | 178 void Sha256_Final(CSha256 *p, Byte *digest)
200 *digest++ = (Byte)(p->state[i] >> 24);
201 *digest++ = (Byte)(p->state[i] >> 16);
202 *digest++ = (Byte)(p->state[i] >> 8);
203 *digest++ = (Byte)(p->state[i]);
|
/external/pdfium/testing/ |
embedder_test.cpp | 45 std::string CRYPT_ToBase16(const uint8_t* digest) { 50 uint8_t a = digest[i]; 352 uint8_t digest[16]; 354 expected_stride * expected_height, digest); local 355 EXPECT_EQ(expected_md5sum, CRYPT_ToBase16(digest));
|
/external/tpm2/ |
CryptUtil_fp.h | 47 TPM2B *digest // OUT: HMAC 51 UINT16 digestSize, // IN: size of digest buffer 52 BYTE *digest // OUT: hash digest 56 TPM2B *digest // IN: the size of the buffer Out: requested number of byte 288 TPM2B_DIGEST *digest, // IN: The digest being signed 344 LIB_EXPORT void CryptUpdateDigest2B(void *digestState, // IN: the digest state 355 TPM2B_DIGEST *digest, // IN: The digest being validate [all...] |
CpriECC.c | 789 // It is a fatal error if rOut, sOut, dIn, or digest are not provided. 798 TPM2B *digest // IN: the value to sign 813 pAssert(rOut != NULL && sOut != NULL && dIn != NULL && digest != NULL); [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
poplib.py | 55 APOP name digest apop(name, digest) 286 digest = hashlib.md5(m.group(1)+secret).digest() 287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest)) 288 return self._shortcmd('APOP %s %s' % (user, digest)) 301 """Return message digest (unique id) list.
|
/prebuilts/gdb/linux-x86/lib/python2.7/ |
poplib.py | 55 APOP name digest apop(name, digest) 286 digest = hashlib.md5(m.group(1)+secret).digest() 287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest)) 288 return self._shortcmd('APOP %s %s' % (user, digest)) 301 """Return message digest (unique id) list.
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
poplib.py | 55 APOP name digest apop(name, digest) 286 digest = hashlib.md5(m.group(1)+secret).digest() 287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest)) 288 return self._shortcmd('APOP %s %s' % (user, digest)) 301 """Return message digest (unique id) list.
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
poplib.py | 55 APOP name digest apop(name, digest) 286 digest = hashlib.md5(m.group(1)+secret).digest() 287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest)) 288 return self._shortcmd('APOP %s %s' % (user, digest)) 301 """Return message digest (unique id) list.
|
/system/tpm/trunks/ |
policy_session_test.cc | 105 std::string digest; local 110 EXPECT_EQ(TPM_RC_SUCCESS, session.GetDigest(&digest)); 111 EXPECT_EQ(static_cast<size_t>(SHA256_DIGEST_SIZE), digest.size()); 116 std::string digest; local 119 EXPECT_EQ(TPM_RC_FAILURE, session.GetDigest(&digest)); 157 std::string pcr_digest("digest");
|
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.50/ |
bcprov-jdk15on-1.50.jar | |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
KeyGeneratorTest.java | 301 String digest = TestUtils.getHmacAlgorithmDigest(algorithm); local 302 assertNotNull(digest); 314 Arrays.asList(TestUtils.getKeyInfo(key).getDigests()), digest); local 316 // The same digest is specified in algorithm parameters 317 keyGenerator.init(TestUtils.buildUpon(goodSpec).setDigests(digest).build()); 320 Arrays.asList(TestUtils.getKeyInfo(key).getDigests()), digest); local 328 // A different digest specified in algorithm parameters 329 String anotherDigest = "SHA-256".equalsIgnoreCase(digest) ? "SHA-384" : "SHA-256"; 338 .setDigests(digest, anotherDigest) 399 // The digest from HMAC key algorithm must be specified in the list o 424 String digest = TestUtils.getHmacAlgorithmDigest(algorithm); local [all...] |
/external/boringssl/src/crypto/cipher/test/ |
make_legacy_aead_tests.go | 112 digest []byte 169 var digest []byte 174 digest = ssl30MAC(hash, macKey, input, adFull) 179 digest = h.Sum(nil) 208 sealed = make([]byte, 0, len(input)+len(digest)+cbc.BlockSize()) 214 sealed = append(sealed, digest...) 268 digest: digest, 282 fmt.Printf("# DIGEST: %s\n", hex.EncodeToString(t.digest)) [all...] |
/dalvik/libdex/ |
DexFile.cpp | 115 * Format an SHA-1 digest for printing. tmpBuf must be able to hold at 118 const char* dvmSHA1DigestToStr(const unsigned char digest[], char* tmpBuf); 121 * Compute a SHA-1 digest on a range of bytes. 124 unsigned char digest[]) 129 SHA1Final(digest, &context); 133 * Format the SHA-1 digest into the buffer, which must be able to hold at 136 static const char* dexSHA1DigestToStr(const unsigned char digest[],char* tmpBuf) 144 *cp++ = hexDigit[digest[i] >> 4]; 145 *cp++ = hexDigit[digest[i] & 0x0f]; 374 * Verify the SHA-1 digest. (Normally we don't want to do this - [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
CipherSpi.java | 27 import org.bouncycastle.crypto.Digest; 89 Digest digest = DigestFactory.getDigest(mgfParams.getDigestAlgorithm()); local 91 if (digest == null) 93 throw new NoSuchPaddingException("no match on OAEP constructor for digest algorithm: "+ mgfParams.getDigestAlgorithm()); 96 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue()); 316 Digest digest = DigestFactory.getDigest(spec.getDigestAlgorithm()); local 318 if (digest == null) 320 throw new InvalidAlgorithmParameterException("no match on digest algorithm: "+ spec.getDigestAlgorithm()) [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/multiprocessing/ |
connection.py | 409 digest = hmac.new(authkey, message).digest() 411 if response == digest: 415 raise AuthenticationError('digest received was wrong') 423 digest = hmac.new(authkey, message).digest() 424 connection.send_bytes(digest) 427 raise AuthenticationError('digest sent was rejected')
|
/prebuilts/gdb/linux-x86/lib/python2.7/multiprocessing/ |
connection.py | 409 digest = hmac.new(authkey, message).digest() 411 if response == digest: 415 raise AuthenticationError('digest received was wrong') 423 digest = hmac.new(authkey, message).digest() 424 connection.send_bytes(digest) 427 raise AuthenticationError('digest sent was rejected')
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/ |
connection.py | 409 digest = hmac.new(authkey, message).digest() 411 if response == digest: 415 raise AuthenticationError('digest received was wrong') 423 digest = hmac.new(authkey, message).digest() 424 connection.send_bytes(digest) 427 raise AuthenticationError('digest sent was rejected')
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/multiprocessing/ |
connection.py | 409 digest = hmac.new(authkey, message).digest() 411 if response == digest: 415 raise AuthenticationError('digest received was wrong') 423 digest = hmac.new(authkey, message).digest() 424 connection.send_bytes(digest) 427 raise AuthenticationError('digest sent was rejected')
|
/external/boringssl/src/crypto/dsa/ |
dsa.c | 66 #include <openssl/digest.h> 507 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { 547 /* if the digest length is greater than the size of q use the 548 * BN_num_bits(dsa->q) leftmost bits of the digest, see 553 if (BN_bin2bn(digest, digest_len, &m) == NULL) { 603 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, 606 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) { 612 int DSA_do_check_signature(int *out_valid, const uint8_t *digest, 666 /* if the digest length is greater than the size of q use the 667 * BN_num_bits(dsa->q) leftmost bits of the digest, se [all...] |
/bootable/recovery/applypatch/ |
applypatch_modes.cpp | 74 uint8_t digest[SHA_DIGEST_LENGTH]; local 75 if (ParseSha1(pieces[0].c_str(), digest) != 0) {
|
/external/boringssl/src/crypto/x509/ |
x_algor.c | 61 #include <openssl/digest.h>
|
/external/boringssl/src/include/openssl/ |
ec_key.h | 247 int (*sign)(const uint8_t *digest, size_t digest_len, uint8_t *sig, 251 int (*verify)(const uint8_t *digest, size_t digest_len, const uint8_t *sig,
|