/external/skqp/tools/ |
get_images_from_skps.cpp | 42 static SkTHashSet<SkMD5::Digest> gSeen; 55 SkMD5::Digest digest; local 56 md5.finish(digest); 58 if (gSeen.contains(digest)) { 61 gSeen.add(digest);
|
/external/skia/tests/ |
CodecTest.cpp | 46 static void md5(const SkBitmap& bm, SkMD5::Digest* digest) { 53 md5.finish(*digest); 57 * Compute the digest for bm and compare it to a known good digest. 58 * @param r Reporter to assert that bm's digest matches goodDigest. 59 * @param goodDigest The known good digest to compare to. 62 static void compare_to_good_digest(skiatest::Reporter* r, const SkMD5::Digest& goodDigest, 64 SkMD5::Digest digest; local [all...] |
/external/skqp/tests/ |
CodecTest.cpp | 44 static void md5(const SkBitmap& bm, SkMD5::Digest* digest) { 51 md5.finish(*digest); 55 * Compute the digest for bm and compare it to a known good digest. 56 * @param r Reporter to assert that bm's digest matches goodDigest. 57 * @param goodDigest The known good digest to compare to. 60 static void compare_to_good_digest(skiatest::Reporter* r, const SkMD5::Digest& goodDigest, 62 SkMD5::Digest digest; local [all...] |
/device/linaro/bootloader/edk2/SecurityPkg/Tcg/Tcg2Dxe/ |
Tcg2Dxe.c | 361 DEBUG ((EFI_D_INFO, " Digest - "));
363 DEBUG ((EFI_D_INFO, "%02x ", EventHdr->Digest.digest[Index]));
401 DEBUG ((EFI_D_INFO, " digest(%d)\n", Index));
459 DEBUG ((EFI_D_INFO, " DigestCount: 0x%08x\n", TcgPcrEvent2->Digest.count));
461 DigestCount = TcgPcrEvent2->Digest.count;
462 HashAlgo = TcgPcrEvent2->Digest.digests[0].hashAlg;
463 DigestBuffer = (UINT8 *)&TcgPcrEvent2->Digest.digests[0].digest;
466 DEBUG ((EFI_D_INFO, " Digest(%d): ", DigestIndex)); [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
KeyProperties.java | 249 throw new IllegalArgumentException("Unsupported HMAC digest: " 250 + Digest.fromKeymaster(keymasterDigest)); 261 * @return keymaster digest or {@code -1} if the algorithm does not involve a digest. 280 "Unsupported HMAC digest: " + digestUpper); 534 * No digest: sign/authenticate the raw message. 539 * MD5 digest. 544 * SHA-1 digest. 549 * SHA-2 224 (aka SHA-224) digest. 554 * SHA-2 256 (aka SHA-256) digest [all...] |
KeymasterUtils.java | 52 throw new IllegalArgumentException("Unknown digest: " + keymasterDigest); 199 // digest. This is because we do not offer a way to generate shorter MACs and 205 + ". Exactly one digest must be authorized"); 211 "HMAC key authorized for unsupported digest: " 212 + KeyProperties.Digest.fromKeymaster(keymasterDigest));
|
AndroidKeyStoreRSACipherSpi.java | 199 keymasterDigest = KeyProperties.Digest.toKeymaster(jcaDigest); 202 "Unsupported digest: " + jcaDigest, e); 214 "Unsupported digest: " + jcaDigest); 229 "Unsupported MGF1 digest: " + mgf1JcaDigest 275 KeyProperties.Digest.fromKeymaster(mKeymasterDigest), 471 // Keymaster sign/verify requires digest to be specified. For raw sign/verify it's NONE.
|
AndroidKeyStoreKeyPairGeneratorSpi.java | 227 // Authorized to be used with any digest (including no digest). 244 // Authorized to be used with any digest (including no digest). 339 mKeymasterDigests = KeyProperties.Digest.allToKeymaster(spec.getDigests()); [all...] |
AndroidKeyStoreSecretKeyFactorySpi.java | 148 digests = KeyProperties.Digest.allFromKeymaster(
|
AndroidKeyStoreSpi.java | 294 // Authorized to be used with any digest (including no digest). 310 // Authorized to be used with any digest (including no digest). 479 KeyProperties.Digest.allToKeymaster(spec.getDigests())); 640 // JCA HMAC key algorithm implies a digest (e.g., HmacSHA256 key algorithm 641 // implies SHA-256 digest). Because keymaster HMAC key is authorized only for one 642 // digest, we don't let import parameters override the digest implied by the key. 643 // If the parameters specify digests at all, they must specify only one digest, th 795 String digest = spec.getDigests()[0]; local [all...] |
/device/linaro/bootloader/edk2/SecurityPkg/VariableAuthenticated/EsalVariableDxeSal/ |
AuthService.c | 310 UINT8 Digest[SHA256_DIGEST_SIZE];
341 ZeroMem (Digest, SHA256_DIGEST_SIZE);
358 Status = Sha256Final (HashContext, Digest);
384 Digest,
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
key_param_output.cpp | 42 ::std::ostream& operator<<(::std::ostream& os, Digest value) { 87 case Tag::DIGEST: 88 return os << param.f.digest;
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
mssip.h | 76 CRYPT_HASH_BLOB Digest;
|
/device/linaro/bootloader/edk2/NetworkPkg/IpSecDxe/Ikev2/ |
Utility.c | [all...] |
Sa.c | [all...] |
/external/nos/host/generic/nugget/proto/nugget/app/keymaster/ |
keymaster_defs.proto | 45 DIGEST = 0x20005; // (TagType:ENUM_REP | 5) 128 enum Digest {
|
/external/skia/src/core/ |
SkICC.cpp | 144 sizeof(kDescriptionTagBodyPrefix) + 2 * sizeof(SkMD5::Digest), ""); 421 SkMD5::Digest digest; local 422 md5.finish(digest); 424 for (unsigned i = 0; i < sizeof(SkMD5::Digest); ++i) { 425 uint8_t byte = digest.data[i];
|
/external/skqp/src/core/ |
SkICC.cpp | 144 sizeof(kDescriptionTagBodyPrefix) + 2 * sizeof(SkMD5::Digest), ""); 421 SkMD5::Digest digest; local 422 md5.finish(digest); 424 for (unsigned i = 0; i < sizeof(SkMD5::Digest); ++i) { 425 uint8_t byte = digest.data[i];
|
/hardware/interfaces/keymaster/4.0/support/ |
authorization_set.cpp | 498 Authorization(TAG_DIGEST, Digest::NONE); 526 AuthorizationSetBuilder& AuthorizationSetBuilder::Digest( 527 std::initializer_list<V4_0::Digest> digests) { 528 for (auto digest : digests) { 529 push_back(TAG_DIGEST, digest);
|
/device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/ |
Tpm2Sequences.c | 79 TPM2B_DIGEST Digest;
271 This command adds the last part of data, if any, to an Event sequence and returns the result in a digest list.
272 If pcrHandle references a PCR and not TPM_RH_NULL, then the returned digest list is processed in
273 the same manner as the digest list input parameter to TPM2_PCR_Extend() with the pcrHandle in each
274 bank extended with the associated digest value.
390 &Results->digests[Index].digest,
405 @param[out] Result The returned HMAC or digest in a sized buffer
495 BufferPtr = (UINT8 *)&Res.Digest;
|
/external/boringssl/src/ssl/ |
t1_enc.cc | 158 bool tls1_prf(const EVP_MD *digest, Span<uint8_t> out, 161 return 1 == CRYPTO_tls1_prf(digest, out.data(), out.size(), secret.data(), 314 !tls1_prf(hs->transcript.Digest(), out_span, premaster, label, 327 if (!tls1_prf(hs->transcript.Digest(), out_span, premaster, label, 365 const EVP_MD *digest = ssl_session_get_digest(session); local 366 return tls1_prf(digest, out_span, master_key, label, ssl->s3->server_random, 423 const EVP_MD *digest = ssl_session_get_digest(session); local 425 digest, MakeSpan(out, out_len),
|
/external/nos/host/android/hals/keymaster/ |
import_wrapped_key.cpp | 37 using ::android::hardware::keymaster::V4_0::Digest; 137 case Tag::DIGEST: 138 kp.f.digest = (Digest)val; 308 * digest [5] EXPLICIT SET OF INTEGER OPTIONAL, 416 {Tag::DIGEST, parse_asn1_set},
|
/external/selinux/libselinux/src/ |
sha1.c | 191 // Performs the final calculation of the hash and returns the digest (20 byte buffer containing 160bit hash). After 198 SHA1_HASH* Digest 218 Digest->bytes[i] = (uint8_t)((Context->State[i>>2] >> ((3-(i & 3)) * 8) ) & 255);
|
/device/linaro/bootloader/edk2/SecurityPkg/Tcg/TcgDxe/ |
TcgDxe.c | 275 Single function calculates SHA1 digest value for all raw data. It
280 @param[out] Digest Pointer to a buffer that stores the final digest.
282 @retval EFI_SUCCESS Always successfully calculate the final digest.
289 OUT TPM_DIGEST *Digest
301 Sha1Final (Sha1Ctx, (UINT8 *)Digest);
578 &NewEventHdr->Digest
587 &NewEventHdr->Digest,
[all...] |
/device/linaro/bootloader/edk2/SecurityPkg/Tcg/Tcg2Pei/ |
Tcg2Pei.c | 273 @param[in] DigestList A list of digest.
303 Status = GetDigestFromDigestList (TPM_ALG_SHA1, DigestList, &NewEventHdr->Digest);
336 DigestBuffer = (UINT8 *)&TcgPcrEvent2->Digest;
803 // separator with an error digest (0x01) into PCRs 0 through 7.
|