/external/vboot_reference/firmware/2lib/ |
H A D | 2sha_utility.c | 5 * Utility functions for message digest functions. 136 uint8_t *digest, 145 vb2_sha1_finalize(&dc->sha1, digest); 150 vb2_sha256_finalize(&dc->sha256, digest); 155 vb2_sha512_finalize(&dc->sha512, digest); 135 vb2_digest_finalize(struct vb2_digest_context *dc, uint8_t *digest, uint32_t digest_size) argument
|
H A D | 2api.c | 112 /* Must have initialized hash digest work area */ 133 const uint8_t *digest; local 138 digest = vb2_get_boot_state_digest(ctx); 142 digest = vb2_get_sd(ctx)->gbb_hwid_digest; 149 if (digest == NULL || *dest_size < digest_size) 152 memcpy(dest, digest, digest_size);
|
/external/vboot_reference/firmware/2lib/include/ |
H A D | 2sha.h | 64 /* Hash algorithm independent digest context; includes all of the above. */ 82 /* 1 if digest is computed with vb2ex_hwcrypto routines, else 0 */ 113 * Finalize a hash digest. 116 * @param digest Destination for hash; must be VB_SHA*_DIGEST_SIZE bytes 118 void vb2_sha1_finalize(struct vb2_sha1_context *ctx, uint8_t *digest); 119 void vb2_sha256_finalize(struct vb2_sha256_context *ctx, uint8_t *digest); 120 void vb2_sha512_finalize(struct vb2_sha512_context *ctx, uint8_t *digest); 134 * Return the size of the digest for a hash algorithm. 137 * @return The size of the digest, or 0 if error. 142 * Initialize a digest contex [all...] |
/external/vboot_reference/utility/ |
H A D | verify_data.c | 54 uint8_t* digest = NULL; local 77 (digest = DigestFile(argv[4], algorithm))) { 78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) { 92 free(digest);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
H A D | DSASigner.java | 45 private Digest digest; field in class:DSASigner 50 Digest digest, 53 this.digest = digest; 90 digest.reset(); 116 digest.reset(); 124 digest.update(b); 133 digest.update(b, off, len); 139 byte[] hash = new byte[digest.getDigestSize()]; 141 digest 49 DSASigner( Digest digest, DSA signer) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
H A D | MD5.java | 1 package org.bouncycastle.jcajce.provider.digest; 53 d.digest = new MD5Digest((MD5Digest)digest);
|
H A D | SHA224.java | 1 package org.bouncycastle.jcajce.provider.digest; 32 d.digest = new SHA224Digest((SHA224Digest)digest);
|
H A D | SHA256.java | 1 package org.bouncycastle.jcajce.provider.digest; 33 d.digest = new SHA256Digest((SHA256Digest)digest);
|
H A D | SHA384.java | 1 package org.bouncycastle.jcajce.provider.digest; 35 d.digest = new SHA384Digest((SHA384Digest)digest);
|
H A D | SHA512.java | 1 package org.bouncycastle.jcajce.provider.digest; 38 d.digest = new SHA512Digest((SHA512Digest)digest); 58 // d.digest = new SHA512tDigest((SHA512tDigest)digest);
|
H A D | SHA1.java | 1 package org.bouncycastle.jcajce.provider.digest; 44 d.digest = new SHA1Digest((SHA1Digest)digest); 138 int digest = SHA1; 141 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 143 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
|
/external/openssh/ |
H A D | ssh-dss.c | 42 #include "digest.h" 54 u_char digest[SSH_DIGEST_MAX_LENGTH], sigblob[SIGBLOB_LEN]; local 71 digest, sizeof(digest))) != 0) 74 if ((sig = DSA_do_sign(digest, dlen, key->dsa)) == NULL) { 122 explicit_bzero(digest, sizeof(digest)); 136 u_char digest[SSH_DIGEST_MAX_LENGTH], *sigblob = NULL; local 193 digest, sizeof(digest))) ! [all...] |
H A D | ssh-rsa.c | 35 #include "digest.h" 45 u_char digest[SSH_DIGEST_MAX_LENGTH], *sig = NULL; local 69 digest, sizeof(digest))) != 0) 77 if (RSA_sign(nid, digest, dlen, sig, &len, key->rsa) != 1) { 109 explicit_bzero(digest, sizeof(digest)); 128 u_char digest[SSH_DIGEST_MAX_LENGTH], *osigblob, *sigblob = NULL; local 176 digest, sizeof(digest))) ! [all...] |
/external/skia/experimental/tools/ |
H A D | skp_to_pdf_md5.cpp | 107 static bool skp_to_pdf_md5(SkStream* input, SkMD5::Digest* digest) { argument 115 checksumWStream.finish(*digest); 121 SkMD5::Digest* digest) { 133 checksumWStream.finish(*digest); 137 SkString digest_to_hex(const SkMD5::Digest& digest) { argument 139 SkString string(2 * sizeof(digest.data)); 141 for (size_t i = 0; i < sizeof(digest.data); ++i) { 142 uint8_t c = digest.data[i]; 182 SkMD5::Digest digest; local 187 if (!skp_to_pdf_and_md5(&inputStream, path.c_str(), &digest)) { 119 skp_to_pdf_and_md5(SkStream* input, const char* path, SkMD5::Digest* digest) argument [all...] |
/external/skia/src/utils/ |
H A D | SkBitmapHasher.cpp | 46 SkMD5::Digest digest; local 47 out.finish(digest); 48 *result = first_8_bytes_as_uint64(digest.data);
|
/external/vboot_reference/tests/ |
H A D | sha_benchmark.c | 35 uint8_t* digest = (uint8_t*) malloc(SHA512_DIGEST_SIZE); /* Maximum size of local 36 * the digest. */ 42 hash_functions[i].hash(buffer, TEST_BUFFER_SIZE, digest); 55 free(digest);
|
/external/skia/tests/ |
H A D | SHA1Test.cpp | 23 const SkSHA1::Digest digest; member in struct:SHA1Test 43 SkSHA1::Digest digest; local 44 context.finish(digest); 46 REPORTER_ASSERT(reporter, digests_equal(test.digest, digest));
|
/external/vboot_reference/futility/ |
H A D | cmd_pcr.c | 21 "appropriate length. The PCR is extended with each digest in turn\n" 108 uint8_t *digest; local 168 digest = DigestBuf(accum, digest_size * 2, digest_alg); 169 if (!digest) { 170 fprintf(stderr, "Error computing digest!\n"); 173 memcpy(pcr, digest, digest_size); 174 free(digest);
|
/external/boringssl/src/crypto/dsa/ |
H A D | dsa.c | 192 DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument 194 return dsa->meth->sign(digest, digest_len, dsa); 196 return DSA_default_method.sign(digest, digest_len, dsa); 199 int DSA_do_verify(const uint8_t *digest, size_t digest_len, DSA_SIG *sig, argument 202 if (!DSA_do_check_signature(&valid, digest, digest_len, sig, dsa)) { 208 int DSA_do_check_signature(int *out_valid, const uint8_t *digest, argument 211 return dsa->meth->verify(out_valid, digest, digest_len, sig, dsa); 214 return DSA_default_method.verify(out_valid, digest, digest_len, sig, dsa); 217 int DSA_sign(int type, const uint8_t *digest, size_t digest_len, argument 221 s = DSA_do_sign(digest, digest_le 232 DSA_verify(int type, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument 241 DSA_check_signature(int *out_valid, const uint8_t *digest, size_t digest_len, const uint8_t *sig, size_t sig_len, const DSA *dsa) argument [all...] |
/external/boringssl/src/crypto/ecdsa/ |
H A D | ecdsa.c | 64 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, argument 67 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey); 70 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, 74 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, argument 81 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey); 97 ret = ECDSA_do_verify(digest, digest_len, s, eckey); 105 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian 108 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, argument 113 /* Need to truncate digest if it is too long: first truncate whole 118 if (!BN_bin2bn(digest, digest_le 133 ECDSA_do_sign(const uint8_t *digest, size_t digest_len, EC_KEY *key) argument 138 ECDSA_do_verify(const uint8_t *digest, size_t digest_len, const ECDSA_SIG *sig, EC_KEY *eckey) argument 234 ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument 356 ECDSA_do_sign_ex(const uint8_t *digest, size_t digest_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey) argument 455 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument [all...] |
/external/pdfium/core/src/fdrm/crypto/ |
H A D | fx_crypt_sha.cpp | 27 static void SHATransform(unsigned int * digest, unsigned int * block) argument 39 a = digest[0]; 40 b = digest[1]; 41 c = digest[2]; 42 d = digest[3]; 43 e = digest[4]; 79 digest[0] += a; 80 digest[1] += b; 81 digest[2] += c; 82 digest[ 124 CRYPT_SHA1Finish(FX_LPVOID context, FX_BYTE digest[20]) argument 157 CRYPT_SHA1Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[20]) argument 380 CRYPT_SHA256Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[32]) argument 658 CRYPT_SHA384Finish(FX_LPVOID context, FX_BYTE digest[48]) argument 681 CRYPT_SHA384Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[64]) argument 708 CRYPT_SHA512Finish(FX_LPVOID context, FX_BYTE digest[64]) argument 733 CRYPT_SHA512Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[64]) argument [all...] |
/external/antlr/antlr-3.4/runtime/Perl5/tools/ |
H A D | port.pl | 53 my $digest = $sha1->hexdigest; 55 return $digest; 126 my $digest = sha1sum($path); 128 'sha1' => $digest, 146 my $digest = sha1sum($path); 148 if ($digest ne $fstatus->{sha1}) {
|
/external/vboot_reference/firmware/lib/cryptolib/ |
H A D | rsa_utility.c | 90 uint8_t* digest = NULL; local 112 digest = DigestBuf(buf, len, algorithm); 114 (uint8_t)algorithm, digest); 116 VbExFree(digest); 123 * of data, its digest is passed as the argument. */ 126 const uint8_t* digest, 152 (uint8_t)algorithm, digest); 124 RSAVerifyBinaryWithDigest_f(const uint8_t* key_blob, const RSAPublicKey* key, const uint8_t* digest, const uint8_t* sig, unsigned int algorithm) argument
|
/external/vboot_reference/firmware/lib20/ |
H A D | api.c | 131 uint8_t *digest; local 146 /* Must have initialized hash digest work area */ 154 /* Allocate the digest */ 155 digest = vb2_workbuf_alloc(&wb, digest_size); 156 if (!digest) 159 /* Finalize the digest */ 161 rv = vb2ex_hwcrypto_digest_finalize(digest, digest_size); 163 rv = vb2_digest_finalize(dc, digest, digest_size); 187 * Check digest vs. signature. Note that this destroys the signature. 190 rv = vb2_verify_digest(&key, &pre->body_signature, digest, [all...] |
/external/vboot_reference/firmware/lib21/ |
H A D | api.c | 123 uint8_t *digest; local 137 /* Must have initialized hash digest work area */ 145 /* Allocate the digest */ 146 digest = vb2_workbuf_alloc(&wb, digest_size); 147 if (!digest) 150 /* Finalize the digest */ 152 rv = vb2ex_hwcrypto_digest_finalize(digest, digest_size); 154 rv = vb2_digest_finalize(dc, digest, digest_size); 159 if (vb2_safe_memcmp(digest, (const uint8_t *)sig + sig->sig_offset,
|