/external/tpm2/ |
D | stubs_hash.c | 20 UINT16 digestSize; in _cpri__StartHMAC() local 28 if((digestSize = _cpri__StartHash(hashAlg, FALSE, &localState)) == 0) in _cpri__StartHMAC() 31 _cpri__CompleteHash(&localState, digestSize, oPadKey->buffer); in _cpri__StartHMAC() 32 oPadKey->size = digestSize; in _cpri__StartHMAC() 51 if((digestSize = _cpri__StartHash(hashAlg, sequence, state)) > 0) in _cpri__StartHMAC() 58 return digestSize; in _cpri__StartHMAC() 71 UINT16 digestSize = _cpri__GetDigestSize(state->hashAlg); in _cpri__CompleteHMAC() local 72 _cpri__CompleteHash(hashState, digestSize, digest); in _cpri__CompleteHMAC() 74 if(_cpri__StartHash(state->hashAlg, FALSE, &localState) != digestSize) in _cpri__CompleteHMAC() 77 _cpri__UpdateHash(&localState, digestSize, digest); in _cpri__CompleteHMAC()
|
D | CpriHash.c | 248 return GetHashInfoPointer(hashAlg)->digestSize; in _cpri__GetDigestSize() 505 UINT32 digestSize, // IN: size of the digest buffer in _cpri__HashBlock() argument 531 if(dSize > digestSize) in _cpri__HashBlock() 535 memcpy(digest, b, digestSize); in _cpri__HashBlock() 536 retVal = (UINT16)digestSize; in _cpri__HashBlock() 576 UINT16 digestSize; in _cpri__StartHMAC() local 584 if((digestSize = _cpri__StartHash(hashAlg, FALSE, &localState)) == 0) in _cpri__StartHMAC() 587 _cpri__CompleteHash(&localState, digestSize, oPadKey->buffer); in _cpri__StartHMAC() 588 oPadKey->size = digestSize; in _cpri__StartHMAC() 607 if((digestSize = _cpri__StartHash(hashAlg, sequence, state)) > 0) in _cpri__StartHMAC() [all …]
|
D | PolicyAuthorize.c | 30 UINT16 digestSize; in TPM2_PolicyAuthorize() local 42 digestSize = CryptGetHashDigestSize(hashAlg); in TPM2_PolicyAuthorize() 43 if(digestSize == 0) in TPM2_PolicyAuthorize() 46 if(digestSize != (in->keySign.t.size - 2)) in TPM2_PolicyAuthorize()
|
D | PCR.c | 928 UINT32 digestSize in PCRAllocate() local 950 *sizeNeeded += digestSize; in PCRAllocate() 984 UINT16 digestSize; in PCRSetValue() local 999 digestSize = CryptGetHashDigestSize(hash); in PCRSetValue() 1001 pcrData[digestSize - 1] = initialValue; in PCRSetValue() 1004 MemorySet(pcrData, 0, digestSize - 1); in PCRSetValue() 1006 MemorySet(pcrData, -1, digestSize - 1); in PCRSetValue()
|
D | RSAKeySieve.c | 159 UINT16 digestSize = _cpri__GetDigestSize(ktx->hashAlg); in RandomForRsa() local 163 fill = digestSize; in RandomForRsa() 167 for(i = p->size; i > 0; i -= digestSize) in RandomForRsa() 726 UINT16 digestSize = _cpri__GetDigestSize(hashAlg); in KDFaContextStart() local 730 pAssert(ktx != NULL && outer != NULL && digestSize != 0); in KDFaContextStart()
|
D | CpriECC.c | 1079 UINT16 digestSize = _cpri__GetDigestSize(hashAlg); in SchnorrEcc() local 1093 if(digestSize == 0) in SchnorrEcc() 1149 if(_cpri__CompleteHash(&hashState, digestSize, T2b.b.buffer) != digestSize) in SchnorrEcc() 1151 T2b.t.size = digestSize; in SchnorrEcc() 1558 UINT16 digestSize = _cpri__GetDigestSize(hashAlg); in ValidateSignatureEcSchnorr() local 1562 if(digestSize == 0) in ValidateSignatureEcSchnorr() 1587 if(_cpri__CompleteHash(&hashState, digestSize, rPrime.t.buffer) != digestSize) in ValidateSignatureEcSchnorr() 1589 rPrime.t.size = digestSize; in ValidateSignatureEcSchnorr()
|
D | CpriHash_fp.h | 23 UINT32 digestSize, // IN: size of the digest buffer
|
D | CryptoEngine.h | 59 const NUMBYTES digestSize; member
|
D | CpriRSA.c | 1181 UINT16 digestSize = _cpri__GetDigestSize(hashAlg); in _cpri__GenerateKeyRSA() local 1203 pAssert(digestSize != 0); in _cpri__GenerateKeyRSA() 1258 fill = digestSize; in _cpri__GenerateKeyRSA() 1262 for(i = p->size; i > 0; i -= digestSize) in _cpri__GenerateKeyRSA()
|
D | CryptUtil.c | 427 UINT16 digestSize, // IN: size of digest buffer in CryptCompleteHash() argument 441 return _cpri__CompleteHash(&hashState->state, digestSize, digest); in CryptCompleteHash() 507 UINT32 digestSize, // IN: size of digest buffer in CryptCompleteHMAC() argument 517 digestSize, digest); in CryptCompleteHMAC() 635 UINT32 digestSize; in CryptSignHMAC() local 637 digestSize = CryptStartHMAC2B(scheme->details.hmac.hashAlg, in CryptSignHMAC() 641 pAssert(digestSize > 0); in CryptSignHMAC() 643 CryptCompleteHMAC(&hmacState, digestSize, in CryptSignHMAC()
|
D | NV.c | 1496 UINT16 dataSize, digestSize; in NvGetName() local 1509 digestSize = CryptStartHash(nvIndex.publicArea.nameAlg, &hashState); in NvGetName() 1512 CryptCompleteHash(&hashState, digestSize, &((BYTE *)name)[2]); in NvGetName() 1515 return digestSize + 2; in NvGetName()
|
D | CryptUtil_fp.h | 51 UINT16 digestSize, // IN: size of digest buffer
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
D | HMac.java | 25 private int digestSize; field in HMac 99 this.digestSize = digest.getDigestSize(); in HMac() 102 this.outputBuf = new byte[blockLength + digestSize]; in HMac() 128 keyLength = digestSize; in init() 162 return digestSize; in getMacSize()
|
/external/lzma/CPP/7zip/UI/Common/ |
D | HashCalc.cpp | 105 UInt32 digestSize = hasher->GetDigestSize(); in SetMethods() local 106 if (digestSize > k_HashCalc_DigestSize_Max) in SetMethods() 111 h.DigestSize = digestSize; in SetMethods() 113 memset(h.Digests[i], 0, digestSize); in SetMethods()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/ |
D | DSASigner.java | 170 int digestSize = digest.getDigestSize(); in checkKey() local 182 if (!(digest instanceof NullDigest) && valueN > digestSize * 8) { in checkKey()
|
/external/lzma/CPP/7zip/UI/Console/ |
D | HashCon.cpp | 93 static unsigned GetColumnWidth(unsigned digestSize) in GetColumnWidth() argument 95 unsigned width = digestSize * 2; in GetColumnWidth()
|
/external/bouncycastle/patches/ |
D | bcprov.patch | 1981 + int digestSize = digest.getDigestSize(); 1993 + if (valueN > digestSize * 8) {
|
/external/google-tv-pairing-protocol/java/jar/ |
D | bcprov-jdk15-143.jar | META-INF/MANIFEST.MF
META-INF/BCKEY.SF
META-INF/BCKEY ... |