/external/tpm2-tss/src/tss2-fapi/api/ |
D | Fapi_VerifySignature.c | 64 size_t digestSize, in Fapi_VerifySignature() argument 78 r = Fapi_VerifySignature_Async(context, keyPath, digest, digestSize, in Fapi_VerifySignature() 136 size_t digestSize, in Fapi_VerifySignature_Async() argument 143 LOGBLOB_TRACE(digest, digestSize, "digest"); in Fapi_VerifySignature_Async() 145 LOG_TRACE("digset: (null) digestSize: %zi", digestSize); in Fapi_VerifySignature_Async() 169 uint8_t * digestBuffer = malloc(digestSize); in Fapi_VerifySignature_Async() 175 memcpy(digestBuffer, digest, digestSize); in Fapi_VerifySignature_Async() 179 command->digestSize = digestSize; in Fapi_VerifySignature_Async() 242 command->signatureSize, command->digest, command->digestSize); in Fapi_VerifySignature_Finish()
|
D | Fapi_Sign.c | 78 size_t digestSize, in Fapi_Sign() argument 108 r = Fapi_Sign_Async(context, keyPath, padding, digest, digestSize); in Fapi_Sign() 169 size_t digestSize) in Fapi_Sign_Async() argument 175 LOGBLOB_TRACE(digest, digestSize, "digest"); in Fapi_Sign_Async() 177 LOG_TRACE("digest: (null) digestSize: %zi", digestSize); in Fapi_Sign_Async() 205 command->digest.size, digest, digestSize); in Fapi_Sign_Async()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
D | BCMessageDigest.java | 13 protected int digestSize; field in BCMessageDigest 21 this.digestSize = digest.getDigestSize(); in BCMessageDigest() 57 return digestSize; in engineGetDigestLength() 62 byte[] digestBytes = new byte[digestSize]; in engineDigest()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/digest/ |
D | BCMessageDigest.java | 17 protected int digestSize; field in BCMessageDigest 25 this.digestSize = digest.getDigestSize(); in BCMessageDigest() 61 return digestSize; in engineGetDigestLength() 66 byte[] digestBytes = new byte[digestSize]; in engineDigest()
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jcajce/provider/digest/ |
D | BCMessageDigest.java | 17 protected int digestSize; field in BCMessageDigest 25 this.digestSize = digest.getDigestSize(); in BCMessageDigest() 61 return digestSize; in engineGetDigestLength() 66 byte[] digestBytes = new byte[digestSize]; in engineDigest()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/crypt/ |
D | CryptHash.c | 164 return CryptGetHashDef(hashAlg)->digestSize; in CryptHashGetDigestSize() 330 dOutSize = MIN(dOutSize, hashState->def->digestSize); in HashEnd() 376 retVal = hashState->def->digestSize; in CryptHashStart() 529 if(hashDef->digestSize != 0) in CryptHmacStart() 537 hashDef->digestSize, in CryptHmacStart() 571 return hashDef->digestSize; in CryptHmacStart() 607 HashEnd(hState, hState->def->digestSize, temp); in CryptHmacEnd() 611 CryptDigestUpdate(hState, hState->def->digestSize, temp); in CryptHmacEnd() 684 if((hDef->digestSize == 0) || (mSize == 0)) in CryptMGF_KDF() 688 hLen = hDef->digestSize; in CryptMGF_KDF() [all …]
|
D | CryptUtil.c | 61 UINT32 digestSize; in CryptHmacSign() local 63 digestSize = CryptHmacStart2B(&hmacState, signature->signature.any.hashAlg, in CryptHmacSign() 66 CryptHmacEnd(&hmacState, digestSize, in CryptHmacSign() 134 UINT16 digestSize; in CryptGenerateKeyedHash() local 148 digestSize = CryptHashGetDigestSize(hashAlg); in CryptGenerateKeyedHash() 164 if(sensitiveCreate->data.t.size < (digestSize / 2)) in CryptGenerateKeyedHash() 178 DRBG_Generate(rand, sensitive->sensitive.bits.t.buffer, digestSize); in CryptGenerateKeyedHash() 671 UINT16 digestSize; in CryptSecretDecrypt() local 690 digestSize = CryptHashGetDigestSize(scheme.details.oaep.hashAlg); in CryptSecretDecrypt() 691 if(scheme.scheme != TPM_ALG_OAEP || digestSize == 0) in CryptSecretDecrypt() [all …]
|
D | CryptRand.c | 641 state->digestSize = CryptHashGetDigestSize(hashAlg); in DRBG_InstantiateSeededKdf() 788 if((((kdf->counter * kdf->digestSize) + randomSize) * 8) > kdf->limit) in DRBG_Generate() 807 [kdf->digestSize - kdf->residual.t.size], size); in DRBG_Generate() 820 UINT16 blocks = (UINT16)(bytesLeft / kdf->digestSize); in DRBG_Generate() 825 UINT16 size = blocks * kdf->digestSize; in DRBG_Generate()
|
D | AlgorithmTests.c | 94 UINT16 digestSize; in TestHash() local 117 digestSize = CryptHashGetDigestSize(hashAlg); in TestHash() 118 CryptHmacStart(&state, hashAlg, digestSize * 2, in TestHash() 122 computed.t.size = digestSize; in TestHash() 123 CryptHmacEnd(&state, digestSize, computed.t.buffer); in TestHash()
|
D | CryptEccSignature.c | 320 UINT16 digestSize = CryptHashGetDigestSize(hashAlg); in BnSignEcSchnorr() local 340 if(digestSize == 0) in BnSignEcSchnorr() 358 e->size = CryptHashEnd(&hashState, digestSize, e->buffer); in BnSignEcSchnorr() 721 UINT16 digestSize = CryptHashGetDigestSize(hashAlg); in BnValidateSignatureEcSchnorr() local 744 Ex2.t.size = CryptHashEnd(&hashState, digestSize, Ex2.t.buffer); in BnValidateSignatureEcSchnorr()
|
D | CryptRsa.c | 811 *buffer++ = (BYTE)(6 + oidSize + info->digestSize); // in MakeDerTag() 821 *buffer++ = (BYTE)(info->digestSize); in MakeDerTag() 903 UINT16 digestSize; in RSASSA_Decode() local 928 digestSize = hIn->size; in RSASSA_Decode() 930 for(; digestSize > 0; digestSize--) in RSASSA_Decode()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
D | HMac.java | 25 private int digestSize; field in HMac 99 this.digestSize = digest.getDigestSize(); in HMac() 102 this.outputBuf = new byte[blockLength + digestSize]; in HMac() 128 keyLength = digestSize; in init() 162 return digestSize; in getMacSize()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/macs/ |
D | HMac.java | 27 private int digestSize; field in HMac 101 this.digestSize = digest.getDigestSize(); in HMac() 104 this.outputBuf = new byte[blockLength + digestSize]; in HMac() 130 keyLength = digestSize; in init() 164 return digestSize; in getMacSize()
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/crypto/macs/ |
D | HMac.java | 27 private int digestSize; field in HMac 101 this.digestSize = digest.getDigestSize(); in HMac() 104 this.outputBuf = new byte[blockLength + digestSize]; in HMac() 130 keyLength = digestSize; in init() 164 return digestSize; in getMacSize()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/command/EA/ |
D | PolicyAuthorize.c | 61 UINT16 digestSize; in TPM2_PolicyAuthorize() local 76 digestSize = CryptHashGetDigestSize(hashAlg); in TPM2_PolicyAuthorize() 77 if(digestSize != (in->keySign.t.size - 2)) in TPM2_PolicyAuthorize()
|
/external/tpm2-tss/src/tss2-fapi/ |
D | fapi_crypto.h | 43 size_t digestSize); 51 size_t digestSize, 72 size_t *digestSize);
|
D | fapi_crypto.c | 772 size_t digestSize) in rsa_verify_signature() argument 784 switch (digestSize) { in rsa_verify_signature() 820 if (1 != EVP_PKEY_verify(ctx, signature, signatureSize, digest, digestSize)) { in rsa_verify_signature() 862 size_t digestSize) in ecdsa_verify_signature() argument 875 int rc = ECDSA_verify(0, digest, digestSize, signature, signatureSize, eccKey); in ecdsa_verify_signature() 1188 size_t digestSize, in ifapi_verify_signature_quote() argument 1260 if (1 != EVP_DigestVerifyUpdate(mdctx, digest, digestSize)) { in ifapi_verify_signature_quote() 1303 size_t digestSize) in ifapi_verify_signature() argument 1341 digestSize); in ifapi_verify_signature() 1346 digest, digestSize); in ifapi_verify_signature() [all …]
|
/external/lzma/CPP/7zip/UI/Common/ |
D | HashCalc.cpp | 93 UInt32 digestSize = hasher->GetDigestSize(); in SetMethods() local 94 if (digestSize > k_HashCalc_DigestSize_Max) in SetMethods() 99 h.DigestSize = digestSize; in SetMethods() 101 memset(h.Digests[k], 0, digestSize); in SetMethods()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/subsystem/ |
D | PCR.c | 927 UINT32 digestSize in PCRAllocate() local 953 *sizeNeeded += digestSize; in PCRAllocate() 989 UINT16 digestSize; in PCRSetValue() local 1007 digestSize = CryptHashGetDigestSize(hash); in PCRSetValue() 1010 pcrData[digestSize - 1] = initialValue; in PCRSetValue() 1014 MemorySet(pcrData, 0, digestSize - 1); in PCRSetValue() 1016 MemorySet(pcrData, -1, digestSize - 1); in PCRSetValue()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
D | DSASigner.java | 159 int digestSize = digest.getDigestSize(); in checkKey() local 171 if (!(digest instanceof NullDigest) && valueN > digestSize * 8) { in checkKey()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
D | DSASigner.java | 163 int digestSize = digest.getDigestSize(); in checkKey() local 175 if (!(digest instanceof NullDigest) && valueN > digestSize * 8) { in checkKey()
|
/external/tpm2-tss/include/tss2/ |
D | tss2_fapi.h | 269 size_t digestSize, 280 size_t digestSize); 293 size_t digestSize, 301 size_t digestSize,
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
D | DSASigner.java | 163 int digestSize = digest.getDigestSize(); in checkKey() local 175 if (!(digest instanceof NullDigest) && valueN > digestSize * 8) { in checkKey()
|
/external/ms-tpm-20-ref/TPMCmd/tpm/src/command/Object/ |
D | Object_spt.c | 324 UINT16 digestSize; in AdjustAuthSize() local 328 digestSize = (nameAlg == TPM_ALG_NULL) ? sizeof(TPMU_HA) in AdjustAuthSize() 330 if(digestSize < MemoryRemoveTrailingZeros(auth)) in AdjustAuthSize() 332 else if(digestSize > auth->t.size) in AdjustAuthSize() 333 MemoryPad2B(&auth->b, digestSize); in AdjustAuthSize() 334 auth->t.size = digestSize; in AdjustAuthSize()
|
/external/lzma/CPP/7zip/UI/Console/ |
D | HashCon.cpp | 119 static unsigned GetColumnWidth(unsigned digestSize) in GetColumnWidth() argument 121 unsigned width = digestSize * 2; in GetColumnWidth()
|