/external/tpm2/ |
PCR_Extend_fp.h | 14 TPML_DIGEST_VALUES digests; member in struct:__anon40445
|
PCR_Event_fp.h | 17 typedef struct { TPML_DIGEST_VALUES digests; } PCR_Event_Out; member in struct:__anon40444
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/digests/ |
EncodableDigest.java | 1 package org.bouncycastle.crypto.digests; 4 * Encodable digests allow you to download an encoded copy of their internal state. This is useful for the situation where 14 * @return an encoding of the digests internal state.
|
AndroidDigestFactory.java | 17 package org.bouncycastle.crypto.digests;
|
AndroidDigestFactoryBouncyCastle.java | 17 package org.bouncycastle.crypto.digests;
|
AndroidDigestFactoryInterface.java | 17 package org.bouncycastle.crypto.digests;
|
AndroidDigestFactoryOpenSSL.java | 17 package org.bouncycastle.crypto.digests;
|
NullDigest.java | 1 package org.bouncycastle.crypto.digests;
|
SHA384Digest.java | 1 package org.bouncycastle.crypto.digests;
|
SHA512Digest.java | 1 package org.bouncycastle.crypto.digests;
|
GeneralDigest.java | 1 package org.bouncycastle.crypto.digests;
|
OpenSSLDigest.java | 17 package org.bouncycastle.crypto.digests;
|
/frameworks/base/core/java/android/util/ |
PackageUtils.java | 40 * Computes the SHA256 digests of a list of signatures. Items in the 49 final String[] digests = new String[signatureCount]; local 51 digests[i] = computeSha256Digest(signatures[i].toByteArray()); 53 return digests; 56 * Computes a SHA256 digest of the signatures' SHA256 digests. First, 76 * Computes a SHA256 digest in of the signatures SHA256 digests. First,
|
/libcore/ojluni/src/main/java/sun/security/util/ |
ManifestEntryVerifier.java | 60 /** the digests in use for a given entry*/ 61 ArrayList<MessageDigest> digests; field in class:ManifestEntryVerifier 63 /** the manifest hashes for the digests in use */ 81 digests = new ArrayList<MessageDigest>(); 95 digests.clear(); 108 /* if there aren't any, we can't verify any digests for this entry */ 146 digests.add(digest); 155 * update the digests for the digests we are interested in 160 for (int i=0; i < digests.size(); i++) [all...] |
/system/tpm/trunks/ |
policy_session_test.cc | 124 std::vector<std::string> digests; local 125 digests.push_back("digest1"); 126 digests.push_back("digest2"); 127 digests.push_back("digest3"); 131 EXPECT_EQ(TPM_RC_SUCCESS, session.PolicyOR(digests)); 132 EXPECT_EQ(tpm_digests.count, digests.size()); 133 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[0]), digests[0]); local 134 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[1]), digests[1]) local 135 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[2]), digests[2]); local 140 std::vector<std::string> digests; local 149 std::vector<std::string> digests; local [all...] |
/system/keymaster/tests/ |
android_keymaster_messages_test.cpp | 109 keymaster_digest_t digests[] = {KM_DIGEST_NONE, KM_DIGEST_MD5, KM_DIGEST_SHA1}; local 111 rsp.SetResults(digests); 114 EXPECT_EQ(array_length(digests), deserialized->results_length); 115 EXPECT_EQ(0, memcmp(deserialized->results, digests, array_size(digests)));
|
/external/boringssl/src/ssl/ |
ssl_transcript.cc | 381 uint8_t digests[EVP_MAX_MD_SIZE]; local 383 if (!GetHash(digests, &digests_len)) { 390 label, MakeConstSpan(digests, digests_len), {})) {
|
t1_enc.cc | 311 uint8_t digests[EVP_MAX_MD_SIZE]; local 313 if (!hs->transcript.GetHash(digests, &digests_len) || 315 MakeConstSpan(digests, digests_len), {})) {
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedDataGenerator.java | 122 digests.clear(); // clear the current preserved digest state 186 digests.put(inf.getDigestAlgorithm().getAlgorithm().getId(), calcDigest);
|
CMSSignedData.java | 101 * Content with detached signature, digests precomputed 103 * @param hashes a map of precomputed digests for content indexed by name of hash. 347 Set<AlgorithmIdentifier> digests = new HashSet<AlgorithmIdentifier>(signedData.getDigestAlgorithms().size()); local 351 digests.add(AlgorithmIdentifier.getInstance(en.nextElement())); 354 return Collections.unmodifiableSet(digests); 517 ASN1Set digests = new DERSet(digestAlgs); local 527 vec.add(digests);
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSecretKeyFactorySpi.java | 95 @KeyProperties.DigestEnum String[] digests; local 148 digests = KeyProperties.Digest.allFromKeymaster( 205 digests,
|
/libcore/luni/src/test/java/com/android/org/bouncycastle/crypto/digests/ |
DigestTest.java | 17 package com.android.org.bouncycastle.crypto.digests; 31 * Processes the two given message digests for the same data and checks
|
/system/keymaster/legacy_support/ |
keymaster1_legacy_support.cpp | 61 keymaster_digest_t* digests; local 64 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); 66 LOG(ERROR) << "Error " << error << " getting supported digests from keymaster1 device"; 69 std::unique_ptr<keymaster_digest_t, Malloc_Delete> digests_deleter(digests); 71 auto digest_vec = make_vector(digests, digests_length);
|
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v2/ |
V2SchemeSigner.java | 205 List<Pair<Integer, byte[]>> digests = local 216 digests.add(Pair.of(signatureAlgorithm.getId(), contentDigest)); 218 signedData.digests = digests; 223 // * length-prefixed sequence of length-prefixed digests: 233 encodeAsSequenceOfLengthPrefixedPairsOfIntAndLengthPrefixedBytes(signedData.digests), 287 public List<Pair<Integer, byte[]>> digests; field in class:V2SchemeSigner.V2SignatureSchemeBlock.SignedData
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
SecretKeyFactoryTest.java | 101 String[] digests; local 105 digests = new String[] {digest}; 108 digests = new String[] {KeyProperties.DIGEST_SHA384}; 116 .setDigests(digests) 130 TestUtils.assertContentsInAnyOrder(Arrays.asList(digests), keyInfo.getDigests());
|