| /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/bc/ |
| D | BcDefaultDigestProvider.java | 7 // Android-removed: Unsupported algorithms 19 import org.bouncycastle.crypto.digests.*; 21 // import org.bouncycastle.crypto.digests.Blake3Digest; 22 // import org.bouncycastle.crypto.digests.GOST3411Digest; 23 // import org.bouncycastle.crypto.digests.GOST3411_2012_256Digest; 24 // import org.bouncycastle.crypto.digests.GOST3411_2012_512Digest; 25 // import org.bouncycastle.crypto.digests.MD2Digest; 26 // import org.bouncycastle.crypto.digests.MD4Digest; 27 // import org.bouncycastle.crypto.digests.MD5Digest; 28 // import org.bouncycastle.crypto.digests.RIPEMD128Digest; [all …]
|
| /external/bouncycastle/repackaged_platform/bcpkix/src/main/java/com/android/internal/org/bouncycastle/operator/bc/ |
| D | BcDefaultDigestProvider.java | 8 // Android-removed: Unsupported algorithms 20 import com.android.internal.org.bouncycastle.crypto.digests.*; 22 // import org.bouncycastle.crypto.digests.Blake3Digest; 23 // import org.bouncycastle.crypto.digests.GOST3411Digest; 24 // import org.bouncycastle.crypto.digests.GOST3411_2012_256Digest; 25 // import org.bouncycastle.crypto.digests.GOST3411_2012_512Digest; 26 // import org.bouncycastle.crypto.digests.MD2Digest; 27 // import org.bouncycastle.crypto.digests.MD4Digest; 28 // import org.bouncycastle.crypto.digests.MD5Digest; 29 // import org.bouncycastle.crypto.digests.RIPEMD128Digest; [all …]
|
| /external/tpm2-tss/test/integration/ |
| D | sapi-pcr-extension.int.c | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright (c) 2017-2018, Intel Corporation 20 #include "sapi-util.h" 43 TPML_DIGEST_VALUES digests; in test_invoke() local 59 digests.count = 1; in test_invoke() 60 digests.digests[0].hashAlg = TPM2_ALG_SHA1; in test_invoke() 61 digest_size = GetDigestSize( digests.digests[0].hashAlg ); in test_invoke() 65 digests.digests[0].digest.sha1[i] = (UINT8)(i % 256); in test_invoke() 80 memcpy(&(pcr_before_extend[0]), &(pcr_values.digests[0].buffer[0]), pcr_values.digests[0].size); in test_invoke() 82 rc = Tss2_Sys_PCR_Extend(sapi_context, PCR_8, &sessions_data, &digests, 0); in test_invoke() [all …]
|
| /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/ |
| D | DefaultSignatureNameFinder.java | 6 // BEGIN Android-removed: unsupported algorithms 24 // END Android-removed: unsupported algorithms 33 private static final Map digests = new HashMap(); field in DefaultSignatureNameFinder 40 // BEGIN Android-removed: unsupported algorithms 41 oids.put(PKCSObjectIdentifiers.id_RSASSA_PSS, "RSASSA-PSS"); in oids.put() 53 …ctIdentifiers.id_tc26_signwithdigest_gost_3410_12_256, "GOST3411-2012-256WITHECGOST3410-2012-256"); 54 …ctIdentifiers.id_tc26_signwithdigest_gost_3410_12_512, "GOST3411-2012-512WITHECGOST3410-2012-512"); 55 // oids.put(BSIObjectIdentifiers.ecdsa_plain_SHA1, "SHA1WITHPLAIN-ECDSA"); 56 // oids.put(BSIObjectIdentifiers.ecdsa_plain_SHA224, "SHA224WITHPLAIN-ECDSA"); 57 // oids.put(BSIObjectIdentifiers.ecdsa_plain_SHA256, "SHA256WITHPLAIN-ECDSA"); [all …]
|
| /external/openthread/third_party/mbedtls/repo/include/mbedtls/ |
| D | md5.h | 8 * digests instead. 12 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 36 * stronger message digests instead. 57 * stronger message digests instead. 69 * stronger message digests instead. 82 * stronger message digests instead. 97 * stronger message digests instead. 113 * stronger message digests instead. 130 * stronger message digests instead. 146 * stronger message digests instead. [all …]
|
| D | sha1.h | 4 * \brief This file contains SHA-1 definitions and functions. 6 * The Secure Hash Algorithm 1 (SHA-1) cryptographic hash function is defined in 7 * <em>FIPS 180-4: Secure Hash Standard (SHS)</em>. 9 * \warning SHA-1 is considered a weak message digest and its use constitutes 11 * digests instead. 15 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 26 /** SHA-1 input data was malformed. */ 27 #define MBEDTLS_ERR_SHA1_BAD_INPUT_DATA -0x0073 38 * \brief The SHA-1 context structure. 40 * \warning SHA-1 is considered a weak message digest and its use [all …]
|
| /external/mbedtls/include/mbedtls/ |
| D | md5.h | 8 * digests instead. 12 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 36 * stronger message digests instead. 57 * stronger message digests instead. 69 * stronger message digests instead. 82 * stronger message digests instead. 97 * stronger message digests instead. 113 * stronger message digests instead. 130 * stronger message digests instead. 146 * stronger message digests instead. [all …]
|
| D | sha1.h | 4 * \brief This file contains SHA-1 definitions and functions. 6 * The Secure Hash Algorithm 1 (SHA-1) cryptographic hash function is defined in 7 * <em>FIPS 180-4: Secure Hash Standard (SHS)</em>. 9 * \warning SHA-1 is considered a weak message digest and its use constitutes 11 * digests instead. 15 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 26 /** SHA-1 input data was malformed. */ 27 #define MBEDTLS_ERR_SHA1_BAD_INPUT_DATA -0x0073 38 * \brief The SHA-1 context structure. 40 * \warning SHA-1 is considered a weak message digest and its use [all …]
|
| /external/bouncycastle/repackaged_platform/bcpkix/src/main/java/com/android/internal/org/bouncycastle/operator/ |
| D | DefaultSignatureNameFinder.java | 7 // BEGIN Android-removed: unsupported algorithms 25 // END Android-removed: unsupported algorithms 35 private static final Map digests = new HashMap(); field in DefaultSignatureNameFinder 42 // BEGIN Android-removed: unsupported algorithms 43 oids.put(PKCSObjectIdentifiers.id_RSASSA_PSS, "RSASSA-PSS"); in oids.put() 55 …ctIdentifiers.id_tc26_signwithdigest_gost_3410_12_256, "GOST3411-2012-256WITHECGOST3410-2012-256"); 56 …ctIdentifiers.id_tc26_signwithdigest_gost_3410_12_512, "GOST3411-2012-512WITHECGOST3410-2012-512"); 57 // oids.put(BSIObjectIdentifiers.ecdsa_plain_SHA1, "SHA1WITHPLAIN-ECDSA"); 58 // oids.put(BSIObjectIdentifiers.ecdsa_plain_SHA224, "SHA224WITHPLAIN-ECDSA"); 59 // oids.put(BSIObjectIdentifiers.ecdsa_plain_SHA256, "SHA256WITHPLAIN-ECDSA"); [all …]
|
| /external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jcajce/provider/symmetric/util/ |
| D | PBE.java | 4 // BEGIN Android-added: Needed for compatibility helper 6 // END Android-added: Needed for compatibility helper 11 // BEGIN Android-added: Allow IVs specified in parameters. 13 // END Android-added: Allow IVs specified in parameters. 20 // Android-removed: Unsupported algorithms 21 // import org.bouncycastle.crypto.digests.GOST3411Digest; 22 // import org.bouncycastle.crypto.digests.MD2Digest; 23 // import org.bouncycastle.crypto.digests.RIPEMD160Digest; 24 // import org.bouncycastle.crypto.digests.TigerDigest; 25 // import org.bouncycastle.crypto.digests.SM3Digest; [all …]
|
| /external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/symmetric/util/ |
| D | PBE.java | 4 // BEGIN Android-added: Needed for compatibility helper 6 // END Android-added: Needed for compatibility helper 11 // BEGIN Android-added: Allow IVs specified in parameters. 13 // END Android-added: Allow IVs specified in parameters. 20 // Android-removed: Unsupported algorithms 21 // import org.bouncycastle.crypto.digests.GOST3411Digest; 22 // import org.bouncycastle.crypto.digests.MD2Digest; 23 // import org.bouncycastle.crypto.digests.RIPEMD160Digest; 24 // import org.bouncycastle.crypto.digests.TigerDigest; 25 // import org.bouncycastle.crypto.digests.SM3Digest; [all …]
|
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
| D | PBE.java | 3 // BEGIN Android-added: Needed for compatibility helper 5 // END Android-added: Needed for compatibility helper 10 // BEGIN Android-added: Allow IVs specified in parameters. 12 // END Android-added: Allow IVs specified in parameters. 19 // Android-removed: Unsupported algorithms 20 // import org.bouncycastle.crypto.digests.GOST3411Digest; 21 // import org.bouncycastle.crypto.digests.MD2Digest; 22 // import org.bouncycastle.crypto.digests.RIPEMD160Digest; 23 // import org.bouncycastle.crypto.digests.TigerDigest; 24 // import org.bouncycastle.crypto.digests.SM3Digest; [all …]
|
| /external/ms-tpm-20-ref/TPMCmd/tpm/src/command/PCR/ |
| D | PCR_Extend.c | 55 // NOTE: This function assumes that the unmarshaling function for 'digests' will in TPM2_PCR_Extend() 64 if(in->pcrHandle == TPM_RH_NULL) in TPM2_PCR_Extend() 68 if(!PCRIsExtendAllowed(in->pcrHandle)) in TPM2_PCR_Extend() 73 if(PCRIsStateSaved(in->pcrHandle)) in TPM2_PCR_Extend() 79 for(i = 0; i < in->digests.count; i++) in TPM2_PCR_Extend() 81 PCRExtend(in->pcrHandle, in->digests.digests[i].hashAlg, in TPM2_PCR_Extend() 82 CryptHashGetDigestSize(in->digests.digests[i].hashAlg), in TPM2_PCR_Extend() 83 (BYTE *)&in->digests.digests[i].digest); in TPM2_PCR_Extend()
|
| D | PCR_Event.c | 59 if(in->pcrHandle != TPM_RH_NULL) in TPM2_PCR_Event() 62 if(!PCRIsExtendAllowed(in->pcrHandle)) in TPM2_PCR_Event() 67 if(PCRIsStateSaved(in->pcrHandle)) in TPM2_PCR_Event() 73 out->digests.count = HASH_COUNT; in TPM2_PCR_Event() 79 out->digests.digests[i].hashAlg = hash; in TPM2_PCR_Event() 81 CryptDigestUpdate2B(&hashState, &in->eventData.b); in TPM2_PCR_Event() 83 (BYTE *)&out->digests.digests[i].digest); in TPM2_PCR_Event() 84 if(in->pcrHandle != TPM_RH_NULL) in TPM2_PCR_Event() 85 PCRExtend(in->pcrHandle, hash, size, in TPM2_PCR_Event() 86 (BYTE *)&out->digests.digests[i].digest); in TPM2_PCR_Event()
|
| /external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
| D | DigestSignatureSpi.java | 21 // Android-removed: Unsupported algorithms 28 // Android-removed: Unsupported algorithms 29 // import org.bouncycastle.crypto.digests.MD2Digest; 30 // import org.bouncycastle.crypto.digests.MD4Digest; 31 // import org.bouncycastle.crypto.digests.NullDigest; 32 // import org.bouncycastle.crypto.digests.RIPEMD128Digest; 33 // import org.bouncycastle.crypto.digests.RIPEMD160Digest; 34 // import org.bouncycastle.crypto.digests.RIPEMD256Digest; 37 // Android-changed: Use Android digests 39 import com.android.org.bouncycastle.crypto.digests.AndroidDigestFactory; [all …]
|
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
| D | DigestSignatureSpi.java | 20 // Android-removed: Unsupported algorithms 27 // Android-removed: Unsupported algorithms 28 // import org.bouncycastle.crypto.digests.MD2Digest; 29 // import org.bouncycastle.crypto.digests.MD4Digest; 30 // import org.bouncycastle.crypto.digests.NullDigest; 31 // import org.bouncycastle.crypto.digests.RIPEMD128Digest; 32 // import org.bouncycastle.crypto.digests.RIPEMD160Digest; 33 // import org.bouncycastle.crypto.digests.RIPEMD256Digest; 36 // Android-changed: Use Android digests 38 import org.bouncycastle.crypto.digests.AndroidDigestFactory; [all …]
|
| /external/tpm2-tss/src/tss2-sys/api/ |
| D | Tss2_Sys_PCR_Extend.c | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright (c) 2015 - 2017, Intel Corporation 18 const TPML_DIGEST_VALUES *digests) in Tss2_Sys_PCR_Extend_Prepare() argument 23 if (!ctx || !digests) in Tss2_Sys_PCR_Extend_Prepare() 30 rval = Tss2_MU_UINT32_Marshal(pcrHandle, ctx->cmdBuffer, in Tss2_Sys_PCR_Extend_Prepare() 31 ctx->maxCmdSize, in Tss2_Sys_PCR_Extend_Prepare() 32 &ctx->nextData); in Tss2_Sys_PCR_Extend_Prepare() 36 rval = Tss2_MU_TPML_DIGEST_VALUES_Marshal(digests, ctx->cmdBuffer, in Tss2_Sys_PCR_Extend_Prepare() 37 ctx->maxCmdSize, in Tss2_Sys_PCR_Extend_Prepare() 38 &ctx->nextData); in Tss2_Sys_PCR_Extend_Prepare() [all …]
|
| /external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
| D | DigestSignatureSpi.java | 21 // Android-removed: Unsupported algorithms 28 // Android-removed: Unsupported algorithms 29 // import org.bouncycastle.crypto.digests.MD2Digest; 30 // import org.bouncycastle.crypto.digests.MD4Digest; 31 // import org.bouncycastle.crypto.digests.NullDigest; 32 // import org.bouncycastle.crypto.digests.RIPEMD128Digest; 33 // import org.bouncycastle.crypto.digests.RIPEMD160Digest; 34 // import org.bouncycastle.crypto.digests.RIPEMD256Digest; 37 // Android-changed: Use Android digests 39 import com.android.internal.org.bouncycastle.crypto.digests.AndroidDigestFactory; [all …]
|
| /external/autotest/client/site_tests/platform_PrinterPpds/ |
| D | readme.txt | 2 ----------------------- 12 ------------------------------------------ 24 ------------------------- 31 5. Obtained outputs are verified (see below) - test only. 32 6. A printing pipeline used by CUPS is rerun in shell (see below) - debug only. 33 7. All obtained outputs & logs are saved on the device (see below) - dump only. 43 ---------------------------- 48 A function for digests calculation is in the 'helpers.py' file. Not all 52 expected digests for every test document are stored in the directory "digests". 53 If a digests for given pair (test document, PPD file) is missing, the test [all …]
|
| D | helpers.py | 2 # Use of this source code is governed by a BSD-style license that can be 10 # ==================== Documents digests 56 PJL_MARKER = b'\x1B%-12345X' 78 The function tries to find a PS-Adobe headers in given document and process 89 processed PS-Adobe header or it is a copy of of input position, if 90 no PS-Adobe headers have been foound; the output is adjusted 94 PS_MARKER = b'%!PS-Adobe' 122 position_ji = -1 124 position_ui = -1 170 doc[(LIDIL_JOBID_1_OFF + JOBID_SIZE):(nd - LIDIL_JOBID_2_OFF)], [all …]
|
| /external/tpm2-tss/src/tss2-esys/api/ |
| D | Esys_PCR_Event.c | 1 /* SPDX-License-Identifier: BSD-2-Clause */ 3 * Copyright 2017-2018, Fraunhofer SIT sponsored by Infineon Technologies AG 22 /** One-Call function for TPM2_PCR_Event 24 * This function invokes the TPM2_PCR_Event command in a one-call 26 * available. All input parameters are const. The memory for non-simple output 35 * @param[out] digests . 36 * (callee-allocated) 71 TPML_DIGEST_VALUES **digests) in Esys_PCR_Event() argument 80 int32_t timeouttmp = esysContext->timeout; in Esys_PCR_Event() 81 esysContext->timeout = -1; in Esys_PCR_Event() [all …]
|
| /external/openthread/.github/workflows/ |
| D | docker.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 43 permissions: # added using https://github.com/step-security/secure-workflows 52 fail-fast: false 55 - platform: linux/amd64 56 runner: ubuntu-24.04 57 - platform: linux/arm64 [all …]
|
| /external/arm-trusted-firmware/drivers/measured_boot/event_log/ |
| D | event_log.c | 2 * Copyright (c) 2020-2021, Arm Limited. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 66 * All EV_NO_ACTION events SHALL set TCG_PCR_EVENT2.digests to all 69 .digests = { 90 assert(metadata_ptr->name != NULL); in event_log_record() 94 name_len = (uint32_t)strlen(metadata_ptr->name) + 1U; in event_log_record() 106 ((event2_header_t *)ptr)->pcr_index = metadata_ptr->pcr; in event_log_record() 109 ((event2_header_t *)ptr)->event_type = EV_POST_CODE; in event_log_record() 111 /* TCG_PCR_EVENT2.Digests.Count */ in event_log_record() 112 ptr = (uint8_t *)ptr + offsetof(event2_header_t, digests); in event_log_record() [all …]
|
| /external/trusty/arm-trusted-firmware/drivers/measured_boot/event_log/ |
| D | event_log.c | 2 * Copyright (c) 2020-2022, Arm Limited. All rights reserved. 4 * SPDX-License-Identifier: BSD-3-Clause 70 * All EV_NO_ACTION events SHALL set TCG_PCR_EVENT2.digests to all 73 .digests = { 99 if (metadata_ptr->name != NULL) { in event_log_record() 100 name_len = (uint32_t)strlen(metadata_ptr->name) + 1U; in event_log_record() 113 ((event2_header_t *)ptr)->pcr_index = metadata_ptr->pcr; in event_log_record() 116 ((event2_header_t *)ptr)->event_type = event_type; in event_log_record() 118 /* TCG_PCR_EVENT2.Digests.Count */ in event_log_record() 119 ptr = (uint8_t *)ptr + offsetof(event2_header_t, digests); in event_log_record() [all …]
|
| /external/skia/site/docs/dev/testing/ |
| D | skiagold.md | 1 --- 4 --- 13 - Baselines are managed in Gold outside of Git, but in lockstep with Git 15 - Each commit creates >500k images. 16 - Deviations from the baseline are triaged after a CL lands and images are 21 - We test across a range of dimensions, e.g.: 23 - OS (Windows, Linux, Mac, Android, iOS) 24 - Architectures (Intel, ARM) 25 - Backends (CPU, OpenGL, Vulkan etc.) 26 - etc. [all …]
|