HomeSort by relevance Sort by last modified time
    Searched refs:hashed (Results 1 - 25 of 49) sorted by null

1 2

  /prebuilts/go/darwin-x86/src/crypto/ecdsa/
ecdsa_test.go 48 hashed := []byte("testing")
53 _, _, _ = Sign(rand.Reader, priv, hashed)
60 hashed := []byte("testing")
65 _, _, _ = Sign(rand.Reader, priv, hashed)
72 hashed := []byte("testing")
74 r, s, _ := Sign(rand.Reader, priv, hashed)
78 Verify(&priv.PublicKey, hashed, r, s)
95 hashed := []byte("testing")
96 r, s, err := Sign(rand.Reader, priv, hashed)
102 if !Verify(&priv.PublicKey, hashed, r, s)
    [all...]
  /prebuilts/go/linux-x86/src/crypto/ecdsa/
ecdsa_test.go 48 hashed := []byte("testing")
53 _, _, _ = Sign(rand.Reader, priv, hashed)
60 hashed := []byte("testing")
65 _, _, _ = Sign(rand.Reader, priv, hashed)
72 hashed := []byte("testing")
74 r, s, _ := Sign(rand.Reader, priv, hashed)
78 Verify(&priv.PublicKey, hashed, r, s)
95 hashed := []byte("testing")
96 r, s, err := Sign(rand.Reader, priv, hashed)
102 if !Verify(&priv.PublicKey, hashed, r, s)
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/dsa/
dsa_test.go 14 hashed := []byte("testing")
15 r, s, err := Sign(rand.Reader, priv, hashed)
21 if !Verify(&priv.PublicKey, hashed, r, s) {
118 hashed := []byte("testing")
119 if _, _, err := Sign(rand.Reader, &priv, hashed); err == nil {
  /prebuilts/go/linux-x86/src/crypto/dsa/
dsa_test.go 14 hashed := []byte("testing")
15 r, s, err := Sign(rand.Reader, priv, hashed)
21 if !Verify(&priv.PublicKey, hashed, r, s) {
118 hashed := []byte("testing")
119 if _, _, err := Sign(rand.Reader, &priv, hashed); err == nil {
  /prebuilts/go/darwin-x86/src/crypto/rsa/
pss_test.go 62 hashed := hash.Sum(nil)
64 encoded, err := emsaPSSEncode(hashed, 1023, salt, sha1.New())
72 if err = emsaPSSVerify(hashed, encoded, 1023, len(salt), sha1.New()); err != nil {
129 var hashed []byte
157 hashed = h.Sum(hashed[:0])
159 if err := VerifyPSS(key, hash, hashed, sig, opts); err != nil {
174 hashed := h.Sum(nil)
187 if err := VerifyPSS(&rsaPrivateKey.PublicKey, hash, hashed, sig, nil); err != nil {
196 hashed := h.Sum(nil
    [all...]
pss.go 33 return nil, errors.New("crypto/rsa: input must be hashed message")
190 // signPSSWithSalt calculates the signature of hashed using PSS [1] with specified salt.
191 // Note that hashed must be the result of hashing the input message using the
194 func signPSSWithSalt(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed, salt []byte) (s []byte, err error) {
196 em, err := emsaPSSEncode(hashed, nBits-1, salt, hash.New())
245 // SignPSS calculates the signature of hashed using RSASSA-PSS [1].
246 // Note that hashed must be the result of hashing the input message using the
249 func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed []byte, opts *PSSOptions) ([]byte, error) {
266 return signPSSWithSalt(rand, priv, hash, hashed, salt)
270 // hashed is the result of hashing the input message using the given has
    [all...]
pkcs1v15.go 215 // SignPKCS1v15 calculates the signature of hashed using
216 // RSASSA-PKCS1-V1_5-SIGN from RSA PKCS#1 v1.5. Note that hashed must
218 // function. If hash is zero, hashed is signed directly. This isn't
228 func SignPKCS1v15(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed []byte) ([]byte, error) {
229 hashLen, prefix, err := pkcs1v15HashInfo(hash, len(hashed))
247 copy(em[k-hashLen:k], hashed)
260 // hashed is the result of hashing the input message using the given hash
262 // returning a nil error. If hash is zero then hashed is used directly. This
264 func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error {
265 hashLen, prefix, err := pkcs1v15HashInfo(hash, len(hashed))
    [all...]
example_test.go 100 hashed := sha256.Sum256(message)
102 signature, err := SignPKCS1v15(rng, rsaPrivateKey, crypto.SHA256, hashed[:])
120 hashed := sha256.Sum256(message)
122 err := VerifyPKCS1v15(&rsaPrivateKey.PublicKey, crypto.SHA256, hashed[:], signature)
  /prebuilts/go/linux-x86/src/crypto/rsa/
pss_test.go 62 hashed := hash.Sum(nil)
64 encoded, err := emsaPSSEncode(hashed, 1023, salt, sha1.New())
72 if err = emsaPSSVerify(hashed, encoded, 1023, len(salt), sha1.New()); err != nil {
129 var hashed []byte
157 hashed = h.Sum(hashed[:0])
159 if err := VerifyPSS(key, hash, hashed, sig, opts); err != nil {
174 hashed := h.Sum(nil)
187 if err := VerifyPSS(&rsaPrivateKey.PublicKey, hash, hashed, sig, nil); err != nil {
196 hashed := h.Sum(nil
    [all...]
pss.go 33 return nil, errors.New("crypto/rsa: input must be hashed message")
190 // signPSSWithSalt calculates the signature of hashed using PSS [1] with specified salt.
191 // Note that hashed must be the result of hashing the input message using the
194 func signPSSWithSalt(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed, salt []byte) (s []byte, err error) {
196 em, err := emsaPSSEncode(hashed, nBits-1, salt, hash.New())
245 // SignPSS calculates the signature of hashed using RSASSA-PSS [1].
246 // Note that hashed must be the result of hashing the input message using the
249 func SignPSS(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed []byte, opts *PSSOptions) ([]byte, error) {
266 return signPSSWithSalt(rand, priv, hash, hashed, salt)
270 // hashed is the result of hashing the input message using the given has
    [all...]
pkcs1v15.go 215 // SignPKCS1v15 calculates the signature of hashed using
216 // RSASSA-PKCS1-V1_5-SIGN from RSA PKCS#1 v1.5. Note that hashed must
218 // function. If hash is zero, hashed is signed directly. This isn't
228 func SignPKCS1v15(rand io.Reader, priv *PrivateKey, hash crypto.Hash, hashed []byte) ([]byte, error) {
229 hashLen, prefix, err := pkcs1v15HashInfo(hash, len(hashed))
247 copy(em[k-hashLen:k], hashed)
260 // hashed is the result of hashing the input message using the given hash
262 // returning a nil error. If hash is zero then hashed is used directly. This
264 func VerifyPKCS1v15(pub *PublicKey, hash crypto.Hash, hashed []byte, sig []byte) error {
265 hashLen, prefix, err := pkcs1v15HashInfo(hash, len(hashed))
    [all...]
example_test.go 100 hashed := sha256.Sum256(message)
102 signature, err := SignPKCS1v15(rng, rsaPrivateKey, crypto.SHA256, hashed[:])
120 hashed := sha256.Sum256(message)
122 err := VerifyPKCS1v15(&rsaPrivateKey.PublicKey, crypto.SHA256, hashed[:], signature)
  /device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/test/
test_hash.py 16 hashed = map(hash, objlist)
17 for h in hashed[1:]:
18 if h != hashed[0]:
19 self.fail("hashed values differ: %r" % (objlist,))
  /external/python/cpython2/Lib/test/
test_hash.py 24 hashed = map(hash, objlist)
25 for h in hashed[1:]:
26 if h != hashed[0]:
27 self.fail("hashed values differ: %r" % (objlist,))
  /prebuilts/gdb/darwin-x86/lib/python2.7/test/
test_hash.py 24 hashed = map(hash, objlist)
25 for h in hashed[1:]:
26 if h != hashed[0]:
27 self.fail("hashed values differ: %r" % (objlist,))
  /prebuilts/gdb/linux-x86/lib/python2.7/test/
test_hash.py 24 hashed = map(hash, objlist)
25 for h in hashed[1:]:
26 if h != hashed[0]:
27 self.fail("hashed values differ: %r" % (objlist,))
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_hash.py 24 hashed = map(hash, objlist)
25 for h in hashed[1:]:
26 if h != hashed[0]:
27 self.fail("hashed values differ: %r" % (objlist,))
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_hash.py 24 hashed = map(hash, objlist)
25 for h in hashed[1:]:
26 if h != hashed[0]:
27 self.fail("hashed values differ: %r" % (objlist,))
  /external/openssh/regress/
keygen-knownhosts.sh 112 # CA key output is not hashed.
118 # Revoked key output is not hashed.
124 # Key with wildcard hostname should not be hashed.
129 # Comma-separated hostnames should be expanded and hashed.
181 cp $OBJ/kh.hosts $OBJ/kh.hashed.orig
187 check_hashed_find host-a "find simple in hashed" $OBJ/kh.hosts
192 check_hashed_find host-h "find simple in hashed" $OBJ/kh.hosts
195 cp $OBJ/kh.hashed.orig $OBJ/kh.hashed
196 ${SSHKEYGEN} -qf $OBJ/kh.hashed -R host-a 2>/dev/nul
    [all...]
  /external/boringssl/src/ssl/test/runner/ed25519/
ed25519.go 51 // handle pre-hashed messages. Thus opts.HashFunc() must return zero to
52 // indicate the message hasn't been hashed. This can be achieved by passing
56 return nil, errors.New("ed25519: cannot sign hashed message")
  /external/openssh/
hostfile.c 658 int hashed = *names == HASH_DELIM; local
663 *was_hashed = hashed;
664 if (hashed) {
682 int hashed; local
736 &hashed)) == -1) {
744 (hashed ? HKF_MATCH_HOST_HASHED : 0);
749 &hashed)) == -1) {
758 (hashed ? HKF_MATCH_IP_HASHED : 0);
ssh-keyscan.c 327 const char *known_host, *hashed; local
331 if (hash_hosts && (hashed = host_hash(host, NULL, 0)) == NULL)
333 known_host = hash_hosts ? hashed : hostport;
  /external/fio/
file.h 175 FILE_FLAG_FNS(hashed); variable
  /external/toybox/toys/pending/
tcpsvd.c 65 struct hashed { struct
70 struct hashed h[HASH_NR];
  /prebuilts/go/darwin-x86/src/cmd/compile/internal/gc/
alg.go 30 // Type can be compared/hashed as regular memory.
43 // IsRegularMemory reports whether t can be compared/hashed as regular memory.

Completed in 3333 milliseconds

1 2