HomeSort by relevance Sort by last modified time
    Searched refs:Digest (Results 101 - 125 of 199) sorted by null

1 2 3 45 6 7 8

  /external/skqp/tools/
get_images_from_skps.cpp 42 static SkTHashSet<SkMD5::Digest> gSeen;
55 SkMD5::Digest digest; local
56 md5.finish(digest);
58 if (gSeen.contains(digest)) {
61 gSeen.add(digest);
  /external/skia/tests/
CodecTest.cpp 46 static void md5(const SkBitmap& bm, SkMD5::Digest* digest) {
53 md5.finish(*digest);
57 * Compute the digest for bm and compare it to a known good digest.
58 * @param r Reporter to assert that bm's digest matches goodDigest.
59 * @param goodDigest The known good digest to compare to.
62 static void compare_to_good_digest(skiatest::Reporter* r, const SkMD5::Digest& goodDigest,
64 SkMD5::Digest digest; local
    [all...]
  /external/skqp/tests/
CodecTest.cpp 44 static void md5(const SkBitmap& bm, SkMD5::Digest* digest) {
51 md5.finish(*digest);
55 * Compute the digest for bm and compare it to a known good digest.
56 * @param r Reporter to assert that bm's digest matches goodDigest.
57 * @param goodDigest The known good digest to compare to.
60 static void compare_to_good_digest(skiatest::Reporter* r, const SkMD5::Digest& goodDigest,
62 SkMD5::Digest digest; local
    [all...]
  /device/linaro/bootloader/edk2/SecurityPkg/Tcg/Tcg2Dxe/
Tcg2Dxe.c 361 DEBUG ((EFI_D_INFO, " Digest - "));
363 DEBUG ((EFI_D_INFO, "%02x ", EventHdr->Digest.digest[Index]));
401 DEBUG ((EFI_D_INFO, " digest(%d)\n", Index));
459 DEBUG ((EFI_D_INFO, " DigestCount: 0x%08x\n", TcgPcrEvent2->Digest.count));
461 DigestCount = TcgPcrEvent2->Digest.count;
462 HashAlgo = TcgPcrEvent2->Digest.digests[0].hashAlg;
463 DigestBuffer = (UINT8 *)&TcgPcrEvent2->Digest.digests[0].digest;
466 DEBUG ((EFI_D_INFO, " Digest(%d): ", DigestIndex));
    [all...]
  /frameworks/base/keystore/java/android/security/keystore/
KeyProperties.java 249 throw new IllegalArgumentException("Unsupported HMAC digest: "
250 + Digest.fromKeymaster(keymasterDigest));
261 * @return keymaster digest or {@code -1} if the algorithm does not involve a digest.
280 "Unsupported HMAC digest: " + digestUpper);
534 * No digest: sign/authenticate the raw message.
539 * MD5 digest.
544 * SHA-1 digest.
549 * SHA-2 224 (aka SHA-224) digest.
554 * SHA-2 256 (aka SHA-256) digest
    [all...]
KeymasterUtils.java 52 throw new IllegalArgumentException("Unknown digest: " + keymasterDigest);
199 // digest. This is because we do not offer a way to generate shorter MACs and
205 + ". Exactly one digest must be authorized");
211 "HMAC key authorized for unsupported digest: "
212 + KeyProperties.Digest.fromKeymaster(keymasterDigest));
AndroidKeyStoreRSACipherSpi.java 199 keymasterDigest = KeyProperties.Digest.toKeymaster(jcaDigest);
202 "Unsupported digest: " + jcaDigest, e);
214 "Unsupported digest: " + jcaDigest);
229 "Unsupported MGF1 digest: " + mgf1JcaDigest
275 KeyProperties.Digest.fromKeymaster(mKeymasterDigest),
471 // Keymaster sign/verify requires digest to be specified. For raw sign/verify it's NONE.
AndroidKeyStoreKeyPairGeneratorSpi.java 227 // Authorized to be used with any digest (including no digest).
244 // Authorized to be used with any digest (including no digest).
339 mKeymasterDigests = KeyProperties.Digest.allToKeymaster(spec.getDigests());
    [all...]
AndroidKeyStoreSecretKeyFactorySpi.java 148 digests = KeyProperties.Digest.allFromKeymaster(
AndroidKeyStoreSpi.java 294 // Authorized to be used with any digest (including no digest).
310 // Authorized to be used with any digest (including no digest).
479 KeyProperties.Digest.allToKeymaster(spec.getDigests()));
640 // JCA HMAC key algorithm implies a digest (e.g., HmacSHA256 key algorithm
641 // implies SHA-256 digest). Because keymaster HMAC key is authorized only for one
642 // digest, we don't let import parameters override the digest implied by the key.
643 // If the parameters specify digests at all, they must specify only one digest, th
795 String digest = spec.getDigests()[0]; local
    [all...]
  /device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/
AuthService.c 310 UINT8 Digest[SHA256_DIGEST_SIZE];
341 ZeroMem (Digest, SHA256_DIGEST_SIZE);
358 Status = Sha256Final (HashContext, Digest);
384 Digest,
  /hardware/interfaces/keymaster/3.0/vts/functional/
key_param_output.cpp 42 ::std::ostream& operator<<(::std::ostream& os, Digest value) {
87 case Tag::DIGEST:
88 return os << param.f.digest;
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
mssip.h 76 CRYPT_HASH_BLOB Digest;
  /device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/Ikev2/
Utility.c     [all...]
Sa.c     [all...]
  /external/nos/host/generic/nugget/proto/nugget/app/keymaster/
keymaster_defs.proto 45 DIGEST = 0x20005; // (TagType:ENUM_REP | 5)
128 enum Digest {
  /external/skia/src/core/
SkICC.cpp 144 sizeof(kDescriptionTagBodyPrefix) + 2 * sizeof(SkMD5::Digest), "");
421 SkMD5::Digest digest; local
422 md5.finish(digest);
424 for (unsigned i = 0; i < sizeof(SkMD5::Digest); ++i) {
425 uint8_t byte = digest.data[i];
  /external/skqp/src/core/
SkICC.cpp 144 sizeof(kDescriptionTagBodyPrefix) + 2 * sizeof(SkMD5::Digest), "");
421 SkMD5::Digest digest; local
422 md5.finish(digest);
424 for (unsigned i = 0; i < sizeof(SkMD5::Digest); ++i) {
425 uint8_t byte = digest.data[i];
  /hardware/interfaces/keymaster/4.0/support/
authorization_set.cpp 498 Authorization(TAG_DIGEST, Digest::NONE);
526 AuthorizationSetBuilder& AuthorizationSetBuilder::Digest(
527 std::initializer_list<V4_0::Digest> digests) {
528 for (auto digest : digests) {
529 push_back(TAG_DIGEST, digest);
  /device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/
Tpm2Sequences.c 79 TPM2B_DIGEST Digest;
271 This command adds the last part of data, if any, to an Event sequence and returns the result in a digest list.
272 If pcrHandle references a PCR and not TPM_RH_NULL, then the returned digest list is processed in
273 the same manner as the digest list input parameter to TPM2_PCR_Extend() with the pcrHandle in each
274 bank extended with the associated digest value.
390 &Results->digests[Index].digest,
405 @param[out] Result The returned HMAC or digest in a sized buffer
495 BufferPtr = (UINT8 *)&Res.Digest;
  /external/boringssl/src/ssl/
t1_enc.cc 158 bool tls1_prf(const EVP_MD *digest, Span<uint8_t> out,
161 return 1 == CRYPTO_tls1_prf(digest, out.data(), out.size(), secret.data(),
314 !tls1_prf(hs->transcript.Digest(), out_span, premaster, label,
327 if (!tls1_prf(hs->transcript.Digest(), out_span, premaster, label,
365 const EVP_MD *digest = ssl_session_get_digest(session); local
366 return tls1_prf(digest, out_span, master_key, label, ssl->s3->server_random,
423 const EVP_MD *digest = ssl_session_get_digest(session); local
425 digest, MakeSpan(out, out_len),
  /external/nos/host/android/hals/keymaster/
import_wrapped_key.cpp 37 using ::android::hardware::keymaster::V4_0::Digest;
137 case Tag::DIGEST:
138 kp.f.digest = (Digest)val;
308 * digest [5] EXPLICIT SET OF INTEGER OPTIONAL,
416 {Tag::DIGEST, parse_asn1_set},
  /external/selinux/libselinux/src/
sha1.c 191 // Performs the final calculation of the hash and returns the digest (20 byte buffer containing 160bit hash). After
198 SHA1_HASH* Digest
218 Digest->bytes[i] = (uint8_t)((Context->State[i>>2] >> ((3-(i & 3)) * 8) ) & 255);
  /device/linaro/bootloader/edk2/SecurityPkg/Tcg/TcgDxe/
TcgDxe.c 275 Single function calculates SHA1 digest value for all raw data. It
280 @param[out] Digest Pointer to a buffer that stores the final digest.
282 @retval EFI_SUCCESS Always successfully calculate the final digest.
289 OUT TPM_DIGEST *Digest
301 Sha1Final (Sha1Ctx, (UINT8 *)Digest);
578 &NewEventHdr->Digest
587 &NewEventHdr->Digest,
    [all...]
  /device/linaro/bootloader/edk2/SecurityPkg/Tcg/Tcg2Pei/
Tcg2Pei.c 273 @param[in] DigestList A list of digest.
303 Status = GetDigestFromDigestList (TPM_ALG_SHA1, DigestList, &NewEventHdr->Digest);
336 DigestBuffer = (UINT8 *)&TcgPcrEvent2->Digest;
803 // separator with an error digest (0x01) into PCRs 0 through 7.

Completed in 1145 milliseconds

1 2 3 45 6 7 8