Searched refs:digest (Results 76 - 100 of 338) sorted by relevance

1234567891011>>

/external/vboot_reference/firmware/2lib/
H A D2sha_utility.c5 * Utility functions for message digest functions.
136 uint8_t *digest,
145 vb2_sha1_finalize(&dc->sha1, digest);
150 vb2_sha256_finalize(&dc->sha256, digest);
155 vb2_sha512_finalize(&dc->sha512, digest);
135 vb2_digest_finalize(struct vb2_digest_context *dc, uint8_t *digest, uint32_t digest_size) argument
H A D2api.c112 /* Must have initialized hash digest work area */
133 const uint8_t *digest; local
138 digest = vb2_get_boot_state_digest(ctx);
142 digest = vb2_get_sd(ctx)->gbb_hwid_digest;
149 if (digest == NULL || *dest_size < digest_size)
152 memcpy(dest, digest, digest_size);
/external/vboot_reference/firmware/2lib/include/
H A D2sha.h64 /* Hash algorithm independent digest context; includes all of the above. */
82 /* 1 if digest is computed with vb2ex_hwcrypto routines, else 0 */
113 * Finalize a hash digest.
116 * @param digest Destination for hash; must be VB_SHA*_DIGEST_SIZE bytes
118 void vb2_sha1_finalize(struct vb2_sha1_context *ctx, uint8_t *digest);
119 void vb2_sha256_finalize(struct vb2_sha256_context *ctx, uint8_t *digest);
120 void vb2_sha512_finalize(struct vb2_sha512_context *ctx, uint8_t *digest);
134 * Return the size of the digest for a hash algorithm.
137 * @return The size of the digest, or 0 if error.
142 * Initialize a digest contex
[all...]
/external/vboot_reference/utility/
H A Dverify_data.c54 uint8_t* digest = NULL; local
77 (digest = DigestFile(argv[4], algorithm))) {
78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) {
92 free(digest);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/
H A DDSASigner.java45 private Digest digest; field in class:DSASigner
50 Digest digest,
53 this.digest = digest;
90 digest.reset();
116 digest.reset();
124 digest.update(b);
133 digest.update(b, off, len);
139 byte[] hash = new byte[digest.getDigestSize()];
141 digest
49 DSASigner( Digest digest, DSA signer) argument
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
H A DMD5.java1 package org.bouncycastle.jcajce.provider.digest;
53 d.digest = new MD5Digest((MD5Digest)digest);
H A DSHA224.java1 package org.bouncycastle.jcajce.provider.digest;
32 d.digest = new SHA224Digest((SHA224Digest)digest);
H A DSHA256.java1 package org.bouncycastle.jcajce.provider.digest;
33 d.digest = new SHA256Digest((SHA256Digest)digest);
H A DSHA384.java1 package org.bouncycastle.jcajce.provider.digest;
35 d.digest = new SHA384Digest((SHA384Digest)digest);
H A DSHA512.java1 package org.bouncycastle.jcajce.provider.digest;
38 d.digest = new SHA512Digest((SHA512Digest)digest);
58 // d.digest = new SHA512tDigest((SHA512tDigest)digest);
H A DSHA1.java1 package org.bouncycastle.jcajce.provider.digest;
44 d.digest = new SHA1Digest((SHA1Digest)digest);
138 int digest = SHA1;
141 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize);
143 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
/external/openssh/
H A Dssh-dss.c42 #include "digest.h"
54 u_char digest[SSH_DIGEST_MAX_LENGTH], sigblob[SIGBLOB_LEN]; local
71 digest, sizeof(digest))) != 0)
74 if ((sig = DSA_do_sign(digest, dlen, key->dsa)) == NULL) {
122 explicit_bzero(digest, sizeof(digest));
136 u_char digest[SSH_DIGEST_MAX_LENGTH], *sigblob = NULL; local
193 digest, sizeof(digest))) !
[all...]
H A Dssh-rsa.c35 #include "digest.h"
45 u_char digest[SSH_DIGEST_MAX_LENGTH], *sig = NULL; local
69 digest, sizeof(digest))) != 0)
77 if (RSA_sign(nid, digest, dlen, sig, &len, key->rsa) != 1) {
109 explicit_bzero(digest, sizeof(digest));
128 u_char digest[SSH_DIGEST_MAX_LENGTH], *osigblob, *sigblob = NULL; local
176 digest, sizeof(digest))) !
[all...]
/external/skia/experimental/tools/
H A Dskp_to_pdf_md5.cpp107 static bool skp_to_pdf_md5(SkStream* input, SkMD5::Digest* digest) { argument
115 checksumWStream.finish(*digest);
121 SkMD5::Digest* digest) {
133 checksumWStream.finish(*digest);
137 SkString digest_to_hex(const SkMD5::Digest& digest) { argument
139 SkString string(2 * sizeof(digest.data));
141 for (size_t i = 0; i < sizeof(digest.data); ++i) {
142 uint8_t c = digest.data[i];
182 SkMD5::Digest digest; local
187 if (!skp_to_pdf_and_md5(&inputStream, path.c_str(), &digest)) {
119 skp_to_pdf_and_md5(SkStream* input, const char* path, SkMD5::Digest* digest) argument
[all...]
/external/skia/src/utils/
H A DSkBitmapHasher.cpp46 SkMD5::Digest digest; local
47 out.finish(digest);
48 *result = first_8_bytes_as_uint64(digest.data);
/external/vboot_reference/tests/
H A Dsha_benchmark.c35 uint8_t* digest = (uint8_t*) malloc(SHA512_DIGEST_SIZE); /* Maximum size of local
36 * the digest. */
42 hash_functions[i].hash(buffer, TEST_BUFFER_SIZE, digest);
55 free(digest);
/external/skia/tests/
H A DSHA1Test.cpp23 const SkSHA1::Digest digest; member in struct:SHA1Test
43 SkSHA1::Digest digest; local
44 context.finish(digest);
46 REPORTER_ASSERT(reporter, digests_equal(test.digest, digest));
/external/vboot_reference/futility/
H A Dcmd_pcr.c21 "appropriate length. The PCR is extended with each digest in turn\n"
108 uint8_t *digest; local
168 digest = DigestBuf(accum, digest_size * 2, digest_alg);
169 if (!digest) {
170 fprintf(stderr, "Error computing digest!\n");
173 memcpy(pcr, digest, digest_size);
174 free(digest);
/external/boringssl/src/crypto/dsa/
H A Ddsa.c192 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument
194 return dsa->meth->sign(digest, digest_len, dsa);
196 return DSA_default_method.sign(digest, digest_len, dsa);
199 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, argument
202 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) {
208 int DSA_do_check_signature(int *out_valid, const uint8_t *digest, argument
211 return dsa->meth->verify(out_valid, digest, digest_len, sig, dsa);
214 return DSA_default_method.verify(out_valid, digest, digest_len, sig, dsa);
217 int DSA_sign(int type, const uint8_t *digest, size_t digest_len, argument
221 s = DSA_do_sign(digest, digest_le
232 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
241 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument
[all...]
/external/boringssl/src/crypto/ecdsa/
H A Decdsa.c64 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, argument
67 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey);
70 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL,
74 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, argument
81 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey);
97 ret = ECDSA_do_verify(digest, digest_len, s, eckey);
105 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian
108 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, argument
113 /* Need to truncate digest if it is too long: first truncate whole
118 if (!BN_bin2bn(digest, digest_le
133 ECDSA_do_sign(const uint8_t *digest, size_t digest_len, EC_KEY *key) argument
138 ECDSA_do_verify(const uint8_t *digest, size_t digest_len, const ECDSA_SIG *sig, EC_KEY *eckey) argument
234 ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument
356 ECDSA_do_sign_ex(const uint8_t *digest, size_t digest_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey) argument
455 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
[all...]
/external/pdfium/core/src/fdrm/crypto/
H A Dfx_crypt_sha.cpp27 static void SHATransform(unsigned int * digest, unsigned int * block) argument
39 a = digest[0];
40 b = digest[1];
41 c = digest[2];
42 d = digest[3];
43 e = digest[4];
79 digest[0] += a;
80 digest[1] += b;
81 digest[2] += c;
82 digest[
124 CRYPT_SHA1Finish(FX_LPVOID context, FX_BYTE digest[20]) argument
157 CRYPT_SHA1Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[20]) argument
380 CRYPT_SHA256Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[32]) argument
658 CRYPT_SHA384Finish(FX_LPVOID context, FX_BYTE digest[48]) argument
681 CRYPT_SHA384Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[64]) argument
708 CRYPT_SHA512Finish(FX_LPVOID context, FX_BYTE digest[64]) argument
733 CRYPT_SHA512Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[64]) argument
[all...]
/external/antlr/antlr-3.4/runtime/Perl5/tools/
H A Dport.pl53 my $digest = $sha1->hexdigest;
55 return $digest;
126 my $digest = sha1sum($path);
128 'sha1' => $digest,
146 my $digest = sha1sum($path);
148 if ($digest ne $fstatus->{sha1}) {
/external/vboot_reference/firmware/lib/cryptolib/
H A Drsa_utility.c90 uint8_t* digest = NULL; local
112 digest = DigestBuf(buf, len, algorithm);
114 (uint8_t)algorithm, digest);
116 VbExFree(digest);
123 * of data, its digest is passed as the argument. */
126 const uint8_t* digest,
152 (uint8_t)algorithm, digest);
124 RSAVerifyBinaryWithDigest_f(const uint8_t* key_blob, const RSAPublicKey* key, const uint8_t* digest, const uint8_t* sig, unsigned int algorithm) argument
/external/vboot_reference/firmware/lib20/
H A Dapi.c131 uint8_t *digest; local
146 /* Must have initialized hash digest work area */
154 /* Allocate the digest */
155 digest = vb2_workbuf_alloc(&wb, digest_size);
156 if (!digest)
159 /* Finalize the digest */
161 rv = vb2ex_hwcrypto_digest_finalize(digest, digest_size);
163 rv = vb2_digest_finalize(dc, digest, digest_size);
187 * Check digest vs. signature. Note that this destroys the signature.
190 rv = vb2_verify_digest(&key, &pre->body_signature, digest,
[all...]
/external/vboot_reference/firmware/lib21/
H A Dapi.c123 uint8_t *digest; local
137 /* Must have initialized hash digest work area */
145 /* Allocate the digest */
146 digest = vb2_workbuf_alloc(&wb, digest_size);
147 if (!digest)
150 /* Finalize the digest */
152 rv = vb2ex_hwcrypto_digest_finalize(digest, digest_size);
154 rv = vb2_digest_finalize(dc, digest, digest_size);
159 if (vb2_safe_memcmp(digest, (const uint8_t *)sig + sig->sig_offset,

Completed in 1952 milliseconds

1234567891011>>