/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/digests/ |
EncodableDigest.java | 1 package org.bouncycastle.crypto.digests; 4 * Encodable digests allow you to download an encoded copy of their internal state. This is useful for the situation where 14 * @return an encoding of the digests internal state.
|
AndroidDigestFactoryBouncyCastle.java | 17 package org.bouncycastle.crypto.digests;
|
AndroidDigestFactoryInterface.java | 17 package org.bouncycastle.crypto.digests;
|
AndroidDigestFactoryOpenSSL.java | 17 package org.bouncycastle.crypto.digests;
|
NullDigest.java | 1 package org.bouncycastle.crypto.digests;
|
/external/tpm2/ |
PCR_Extend.c | 27 // NOTE: This function assumes that the unmarshaling function for 'digests' will 55 for(i = 0; i < in->digests.count; i++) 57 PCRExtend(in->pcrHandle, in->digests.digests[i].hashAlg, 58 CryptGetHashDigestSize(in->digests.digests[i].hashAlg), 59 (BYTE *) &in->digests.digests[i].digest);
|
PCR_Event.c | 49 out->digests.count = HASH_COUNT; 55 out->digests.digests[i].hashAlg = hash; 59 (BYTE *) &out->digests.digests[i].digest); 62 (BYTE *) &out->digests.digests[i].digest);
|
PCR_Extend_fp.h | 14 TPML_DIGEST_VALUES digests; member in struct:__anon40445
|
EventSequenceComplete.c | 71 out->results.digests[out->results.count].hashAlg = hashAlg; 74 (BYTE *) &out->results.digests[out->results.count].digest); 80 (BYTE *) &out->results.digests[out->results.count].digest);
|
PCR_Event_fp.h | 17 typedef struct { TPML_DIGEST_VALUES digests; } PCR_Event_Out; member in struct:__anon40444
|
PolicyOR.c | 36 &in->pHashList.digests[i].b)) 58 CryptUpdateDigest2B(&hashState, &in->pHashList.digests[i].b);
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/HashLibBaseCryptoRouter/ |
HashLibBaseCryptoRouterCommon.c | 72 &DigestList->digests[DigestList->count],
73 &Digest->digests[0],
74 sizeof(Digest->digests[0])
|
/frameworks/base/services/core/java/com/android/server/net/watchlist/ |
HarmfulDigests.java | 29 * Helper class to store all harmful digests in memory. 36 HarmfulDigests(List<byte[]> digests) { 38 final int size = digests.size(); 40 tmpDigestSet.add(HexDump.toHexString(digests.get(i)));
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/bc/ |
BcDefaultDigestProvider.java | 16 // import org.bouncycastle.crypto.digests.GOST3411Digest; 17 // import org.bouncycastle.crypto.digests.MD2Digest; 18 // import org.bouncycastle.crypto.digests.MD4Digest; 19 import org.bouncycastle.crypto.digests.MD5Digest; 21 // import org.bouncycastle.crypto.digests.RIPEMD128Digest; 22 // import org.bouncycastle.crypto.digests.RIPEMD160Digest; 23 // import org.bouncycastle.crypto.digests.RIPEMD256Digest; 24 import org.bouncycastle.crypto.digests.SHA1Digest; 25 import org.bouncycastle.crypto.digests.SHA224Digest; 26 import org.bouncycastle.crypto.digests.SHA256Digest [all...] |
/tools/apksig/src/main/java/com/android/apksig/internal/util/ |
MessageDigestSink.java | 30 public MessageDigestSink(MessageDigest[] digests) { 31 mMessageDigests = digests;
|
/libcore/ojluni/src/main/java/sun/security/util/ |
ManifestEntryVerifier.java | 60 /** the digests in use for a given entry*/ 61 ArrayList<MessageDigest> digests; field in class:ManifestEntryVerifier 63 /** the manifest hashes for the digests in use */ 81 digests = new ArrayList<MessageDigest>(); 95 digests.clear(); 108 /* if there aren't any, we can't verify any digests for this entry */ 146 digests.add(digest); 155 * update the digests for the digests we are interested in 160 for (int i=0; i < digests.size(); i++) [all...] |
/system/tpm/trunks/ |
policy_session_test.cc | 124 std::vector<std::string> digests; local 125 digests.push_back("digest1"); 126 digests.push_back("digest2"); 127 digests.push_back("digest3"); 131 EXPECT_EQ(TPM_RC_SUCCESS, session.PolicyOR(digests)); 132 EXPECT_EQ(tpm_digests.count, digests.size()); 133 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[0]), digests[0]); local 134 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[1]), digests[1]) local 135 EXPECT_EQ(StringFrom_TPM2B_DIGEST(tpm_digests.digests[2]), digests[2]); local 140 std::vector<std::string> digests; local 149 std::vector<std::string> digests; local [all...] |
policy_session_impl.cc | 90 TPM_RC PolicySessionImpl::PolicyOR(const std::vector<std::string>& digests) { 91 if (digests.size() >= arraysize(TPML_DIGEST::digests)) { 92 LOG(ERROR) << "TPM2.0 Spec only allows for up to 8 digests."; 96 tpm_digests.count = digests.size(); 97 for (size_t i = 0; i < digests.size(); i++) { 98 tpm_digests.digests[i] = Make_TPM2B_DIGEST(digests[i]);
|
policy_session.h | 59 // of policy digests. After the command is executed, the policy represented 61 virtual TPM_RC PolicyOR(const std::vector<std::string>& digests) = 0;
|
/tools/apksig/src/main/java/com/android/apksig/util/ |
DataSinks.java | 54 public static DataSink asDataSink(MessageDigest... digests) { 55 return new MessageDigestSink(digests);
|
/frameworks/base/core/java/android/util/ |
PackageUtils.java | 40 * Computes the SHA256 digests of a list of signatures. Items in the 49 final String[] digests = new String[signatureCount]; local 51 digests[i] = computeSha256Digest(signatures[i].toByteArray()); 53 return digests; 56 * Computes a SHA256 digest of the signatures' SHA256 digests. First, 76 * Computes a SHA256 digest in of the signatures SHA256 digests. First,
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/ |
Tpm2Help.c | 244 @param[in] HashAlgorithmMask HASH bits corresponding to the desired digests to copy.
265 if (!IsHashAlgSupportedInHashAlgorithmMask(DigestList->digests[Index].hashAlg, HashAlgorithmMask)) {
266 DEBUG ((EFI_D_ERROR, "WARNING: TPM2 Event log has HashAlg unsupported by PCR bank (0x%x)\n", DigestList->digests[Index].hashAlg));
269 CopyMem (Buffer, &DigestList->digests[Index].hashAlg, sizeof(DigestList->digests[Index].hashAlg));
270 Buffer = (UINT8 *)Buffer + sizeof(DigestList->digests[Index].hashAlg);
271 DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg);
272 CopyMem (Buffer, &DigestList->digests[Index].digest, DigestSize);
300 DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg);
301 TotalSize += sizeof(DigestList->digests[Index].hashAlg) + DigestSize; [all...] |
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v3/ |
V3SchemeSigner.java | 190 List<Pair<Integer, byte[]>> digests = local 201 digests.add(Pair.of(signatureAlgorithm.getId(), contentDigest)); 203 signedData.digests = digests; 257 byte[] digests = 260 signedData.digests)); 267 // * length-prefixed sequence of length-prefixed digests: 280 digests.length 288 result.put(digests); 316 public List<Pair<Integer, byte[]>> digests; field in class:V3SchemeSigner.V3SignatureSchemeBlock.SignedData [all...] |
/device/linaro/bootloader/edk2/SecurityPkg/Library/HashInstanceLibSha1/ |
HashInstanceLibSha1.c | 38 DigestList->digests[0].hashAlg = TPM_ALG_SHA1;
40 DigestList->digests[0].digest.sha1,
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/HashInstanceLibSha256/ |
HashInstanceLibSha256.c | 38 DigestList->digests[0].hashAlg = TPM_ALG_SHA256;
40 DigestList->digests[0].digest.sha256,
|