/prebuilts/go/darwin-x86/src/crypto/ecdsa/ |
ecdsa_test.go | 48 hashed := []byte("testing") 53 _, _, _ = Sign(rand.Reader, priv, hashed) 60 hashed := []byte("testing") 65 _, _, _ = Sign(rand.Reader, priv, hashed) 72 hashed := []byte("testing") 74 r, s, _ := Sign(rand.Reader, priv, hashed) 78 Verify(&priv.PublicKey, hashed, r, s) 95 hashed := []byte("testing") 96 r, s, err := Sign(rand.Reader, priv, hashed) 102 if !Verify(&priv.PublicKey, hashed, r, s) [all...] |
/prebuilts/go/linux-x86/src/crypto/ecdsa/ |
ecdsa_test.go | 48 hashed := []byte("testing") 53 _, _, _ = Sign(rand.Reader, priv, hashed) 60 hashed := []byte("testing") 65 _, _, _ = Sign(rand.Reader, priv, hashed) 72 hashed := []byte("testing") 74 r, s, _ := Sign(rand.Reader, priv, hashed) 78 Verify(&priv.PublicKey, hashed, r, s) 95 hashed := []byte("testing") 96 r, s, err := Sign(rand.Reader, priv, hashed) 102 if !Verify(&priv.PublicKey, hashed, r, s) [all...] |
/prebuilts/go/darwin-x86/src/crypto/dsa/ |
dsa_test.go | 14 hashed := []byte("testing") 15 r, s, err := Sign(rand.Reader, priv, hashed) 21 if !Verify(&priv.PublicKey, hashed, r, s) { 118 hashed := []byte("testing") 119 if _, _, err := Sign(rand.Reader, &priv, hashed); err == nil {
|
/prebuilts/go/linux-x86/src/crypto/dsa/ |
dsa_test.go | 14 hashed := []byte("testing") 15 r, s, err := Sign(rand.Reader, priv, hashed) 21 if !Verify(&priv.PublicKey, hashed, r, s) { 118 hashed := []byte("testing") 119 if _, _, err := Sign(rand.Reader, &priv, hashed); err == nil {
|
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
pss_test.go | 62 hashed := hash.Sum(nil) 64 encoded, err := emsaPSSEncode(hashed, 1023, salt, sha1.New()) 72 if err = emsaPSSVerify(hashed, encoded, 1023, len(salt), sha1.New()); err != nil { 129 var hashed []byte 157 hashed = h.Sum(hashed[:0]) 159 if err := VerifyPSS(key, hash, hashed, sig, opts); err != nil { 174 hashed := h.Sum(nil) 187 if err := VerifyPSS(&rsaPrivateKey.PublicKey, hash, hashed, sig, nil); err != nil { 196 hashed := h.Sum(nil [all...] |
pss.go | 33 return nil, errors.New("crypto/rsa: input must be hashed message") 190 // signPSSWithSalt calculates the signature of hashed using PSS [1] with specified salt. 191 // Note that hashed must be the result of hashing the input message using the 194 func signPSSWithSalt(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed, salt []byte) (s []byte, err error) { 196 em, err := emsaPSSEncode(hashed, nBits-1, salt, hash.New()) 245 // SignPSS calculates the signature of hashed using RSASSA-PSS [1]. 246 // Note that hashed must be the result of hashing the input message using the 249 func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed []byte, opts *PSSOptions) ([]byte, error) { 266 return signPSSWithSalt(rand, priv, hash, hashed, salt) 270 // hashed is the result of hashing the input message using the given has [all...] |
pkcs1v15.go | 215 // SignPKCS1v15 calculates the signature of hashed using 216 // RSASSA-PKCS1-V1_5-SIGN from RSA PKCS#1 v1.5. Note that hashed must 218 // function. If hash is zero, hashed is signed directly. This isn't 228 func SignPKCS1v15(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed []byte) ([]byte, error) { 229 hashLen, prefix, err := pkcs1v15HashInfo(hash, len(hashed)) 247 copy(em[k-hashLen:k], hashed) 260 // hashed is the result of hashing the input message using the given hash 262 // returning a nil error. If hash is zero then hashed is used directly. This 264 func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error { 265 hashLen, prefix, err := pkcs1v15HashInfo(hash, len(hashed)) [all...] |
example_test.go | 100 hashed := sha256.Sum256(message) 102 signature, err := SignPKCS1v15(rng, rsaPrivateKey, crypto.SHA256, hashed[:]) 120 hashed := sha256.Sum256(message) 122 err := VerifyPKCS1v15(&rsaPrivateKey.PublicKey, crypto.SHA256, hashed[:], signature)
|
/prebuilts/go/linux-x86/src/crypto/rsa/ |
pss_test.go | 62 hashed := hash.Sum(nil) 64 encoded, err := emsaPSSEncode(hashed, 1023, salt, sha1.New()) 72 if err = emsaPSSVerify(hashed, encoded, 1023, len(salt), sha1.New()); err != nil { 129 var hashed []byte 157 hashed = h.Sum(hashed[:0]) 159 if err := VerifyPSS(key, hash, hashed, sig, opts); err != nil { 174 hashed := h.Sum(nil) 187 if err := VerifyPSS(&rsaPrivateKey.PublicKey, hash, hashed, sig, nil); err != nil { 196 hashed := h.Sum(nil [all...] |
pss.go | 33 return nil, errors.New("crypto/rsa: input must be hashed message") 190 // signPSSWithSalt calculates the signature of hashed using PSS [1] with specified salt. 191 // Note that hashed must be the result of hashing the input message using the 194 func signPSSWithSalt(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed, salt []byte) (s []byte, err error) { 196 em, err := emsaPSSEncode(hashed, nBits-1, salt, hash.New()) 245 // SignPSS calculates the signature of hashed using RSASSA-PSS [1]. 246 // Note that hashed must be the result of hashing the input message using the 249 func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed []byte, opts *PSSOptions) ([]byte, error) { 266 return signPSSWithSalt(rand, priv, hash, hashed, salt) 270 // hashed is the result of hashing the input message using the given has [all...] |
pkcs1v15.go | 215 // SignPKCS1v15 calculates the signature of hashed using 216 // RSASSA-PKCS1-V1_5-SIGN from RSA PKCS#1 v1.5. Note that hashed must 218 // function. If hash is zero, hashed is signed directly. This isn't 228 func SignPKCS1v15(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed []byte) ([]byte, error) { 229 hashLen, prefix, err := pkcs1v15HashInfo(hash, len(hashed)) 247 copy(em[k-hashLen:k], hashed) 260 // hashed is the result of hashing the input message using the given hash 262 // returning a nil error. If hash is zero then hashed is used directly. This 264 func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error { 265 hashLen, prefix, err := pkcs1v15HashInfo(hash, len(hashed)) [all...] |
example_test.go | 100 hashed := sha256.Sum256(message) 102 signature, err := SignPKCS1v15(rng, rsaPrivateKey, crypto.SHA256, hashed[:]) 120 hashed := sha256.Sum256(message) 122 err := VerifyPKCS1v15(&rsaPrivateKey.PublicKey, crypto.SHA256, hashed[:], signature)
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/ |
test_hash.py | 16 hashed = map(hash, objlist)
17 for h in hashed[1:]:
18 if h != hashed[0]:
19 self.fail("hashed values differ: %r" % (objlist,))
|
/external/python/cpython2/Lib/test/ |
test_hash.py | 24 hashed = map(hash, objlist) 25 for h in hashed[1:]: 26 if h != hashed[0]: 27 self.fail("hashed values differ: %r" % (objlist,))
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
test_hash.py | 24 hashed = map(hash, objlist) 25 for h in hashed[1:]: 26 if h != hashed[0]: 27 self.fail("hashed values differ: %r" % (objlist,))
|
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
test_hash.py | 24 hashed = map(hash, objlist) 25 for h in hashed[1:]: 26 if h != hashed[0]: 27 self.fail("hashed values differ: %r" % (objlist,))
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_hash.py | 24 hashed = map(hash, objlist) 25 for h in hashed[1:]: 26 if h != hashed[0]: 27 self.fail("hashed values differ: %r" % (objlist,))
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_hash.py | 24 hashed = map(hash, objlist) 25 for h in hashed[1:]: 26 if h != hashed[0]: 27 self.fail("hashed values differ: %r" % (objlist,))
|
/external/openssh/regress/ |
keygen-knownhosts.sh | 112 # CA key output is not hashed. 118 # Revoked key output is not hashed. 124 # Key with wildcard hostname should not be hashed. 129 # Comma-separated hostnames should be expanded and hashed. 181 cp $OBJ/kh.hosts $OBJ/kh.hashed.orig 187 check_hashed_find host-a "find simple in hashed" $OBJ/kh.hosts 192 check_hashed_find host-h "find simple in hashed" $OBJ/kh.hosts 195 cp $OBJ/kh.hashed.orig $OBJ/kh.hashed 196 ${SSHKEYGEN} -qf $OBJ/kh.hashed -R host-a 2>/dev/nul [all...] |
/external/boringssl/src/ssl/test/runner/ed25519/ |
ed25519.go | 51 // handle pre-hashed messages. Thus opts.HashFunc() must return zero to 52 // indicate the message hasn't been hashed. This can be achieved by passing 56 return nil, errors.New("ed25519: cannot sign hashed message")
|
/external/openssh/ |
hostfile.c | 658 int hashed = *names == HASH_DELIM; local 663 *was_hashed = hashed; 664 if (hashed) { 682 int hashed; local 736 &hashed)) == -1) { 744 (hashed ? HKF_MATCH_HOST_HASHED : 0); 749 &hashed)) == -1) { 758 (hashed ? HKF_MATCH_IP_HASHED : 0);
|
ssh-keyscan.c | 327 const char *known_host, *hashed; local 331 if (hash_hosts && (hashed = host_hash(host, NULL, 0)) == NULL) 333 known_host = hash_hosts ? hashed : hostport;
|
/external/fio/ |
file.h | 175 FILE_FLAG_FNS(hashed); variable
|
/external/toybox/toys/pending/ |
tcpsvd.c | 65 struct hashed { struct 70 struct hashed h[HASH_NR];
|
/prebuilts/go/darwin-x86/src/cmd/compile/internal/gc/ |
alg.go | 30 // Type can be compared/hashed as regular memory. 43 // IsRegularMemory reports whether t can be compared/hashed as regular memory.
|