/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/generators/ |
KDF1BytesGenerator.java | 3 import org.bouncycastle.crypto.Digest; 16 * @param digest the digest to be used as the source of derived keys. 19 Digest digest) 21 super(0, digest);
|
KDF2BytesGenerator.java | 3 import org.bouncycastle.crypto.Digest; 17 * @param digest the digest to be used as the source of derived keys. 20 Digest digest) 22 super(1, digest);
|
BaseKDFBytesGenerator.java | 6 import org.bouncycastle.crypto.Digest; 19 private Digest digest; field in class:BaseKDFBytesGenerator 27 * @param digest the digest to be used as the source of derived keys. 31 Digest digest) 34 this.digest = digest; 61 * return the underlying digest [all...] |
MGF1BytesGenerator.java | 6 import org.bouncycastle.crypto.Digest; 15 private Digest digest; field in class:MGF1BytesGenerator 20 * @param digest the digest to be used as the source of generated bytes 23 Digest digest) 25 this.digest = digest; 26 this.hLen = digest.getDigestSize() [all...] |
PKCS5S1ParametersGenerator.java | 4 import org.bouncycastle.crypto.Digest; 12 * digest used to drive it. 21 private Digest digest; field in class:PKCS5S1ParametersGenerator 26 * @param digest the digest to be used as the source of derived keys. 29 Digest digest) 31 this.digest = digest; [all...] |
OpenSSLPBEParametersGenerator.java | 4 import org.bouncycastle.crypto.Digest; 20 private Digest digest = new MD5Digest(); field in class:OpenSSLPBEParametersGenerator 48 byte[] buf = new byte[digest.getDigestSize()]; 54 digest.update(password, 0, password.length); 55 digest.update(salt, 0, salt.length); 57 digest.doFinal(buf, 0); 71 digest.reset(); 72 digest.update(buf, 0, buf.length);
|
PKCS12ParametersGenerator.java | 4 import org.bouncycastle.crypto.Digest; 24 private Digest digest; field in class:PKCS12ParametersGenerator 31 * accept any digest which also implements ExtendedDigest. 33 * @param digest the digest to be used as the source of derived keys. 34 * @exception IllegalArgumentException if an unknown digest is passed in. 37 Digest digest) 39 this.digest = digest [all...] |
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/ |
ExtendedDigest.java | 4 extends Digest 7 * Return the size in bytes of the internal buffer the digest applies it's compression
|
DerivationFunction.java | 11 * return the message digest used as the basis for the function 13 public Digest getDigest();
|
Digest.java | 4 * interface that a message digest conforms to. 6 public interface Digest 16 * return the size, in bytes, of the digest produced by this message digest. 18 * @return the size, in bytes, of the digest produced by this message digest. 23 * update the message digest with a single byte. 30 * update the message digest with a block of bytes. 39 * close the digest, producing the final digest value. The doFina [all...] |
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/io/ |
DigestOutputStream.java | 7 import org.bouncycastle.crypto.Digest; 12 protected Digest digest; field in class:DigestOutputStream 16 Digest digest) 19 this.digest = digest; 25 digest.update((byte)b); 35 digest.update(b, off, len); 39 public Digest getDigest( [all...] |
DigestInputStream.java | 7 import org.bouncycastle.crypto.Digest; 12 protected Digest digest; field in class:DigestInputStream 16 Digest digest) 19 this.digest = digest; 29 digest.update((byte)b); 43 digest.update(b, off, n); 48 public Digest getDigest( [all...] |
/frameworks/base/tests/CoreTests/android/core/ |
CryptoTest.java | 23 import org.bouncycastle.crypto.Digest; 39 * the results. Requirement is that the results must be equal, the digest 43 * @param oldDigest The old digest implementation, provided by Bouncy Castle 44 * @param newDigest The new digest implementation, provided by OpenSSL 46 public void doTestMessageDigest(Digest oldDigest, Digest newDigest) { 101 Digest oldDigest = new MD4Digest(); 102 Digest newDigest = OpenSSLMessageDigest.getInstance("MD4"); 111 Digest oldDigest = new MD5Digest(); 112 Digest newDigest = OpenSSLMessageDigest.getInstance("MD5") [all...] |
/dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/ |
BrokenKDF2BytesGenerator.java | 6 import org.bouncycastle.crypto.Digest; 19 private Digest digest; field in class:BrokenKDF2BytesGenerator 26 * use a digest specified in the standard. 32 * @param digest the digest to be used as the source of derived keys. 35 Digest digest) 37 this.digest = digest; [all...] |
JDKMessageDigest.java | 5 import org.bouncycastle.crypto.Digest; 11 Digest digest; field in class:JDKMessageDigest 14 Digest digest) 16 super(digest.getAlgorithmName()); 18 this.digest = digest; 23 digest.reset(); 29 digest.update(input) [all...] |
JDKISOSignature.java | 14 import org.bouncycastle.crypto.Digest; 30 Digest digest, 35 signer = new ISO9796d2Signer(cipher, digest, true);
|
JDKDSASigner.java | 25 import org.bouncycastle.crypto.Digest; 44 private Digest digest; field in class:JDKDSASigner 50 Digest digest, 55 this.digest = digest; 114 digest.reset(); 150 digest.reset(); 166 digest.update(b) [all...] |
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/macs/ |
HMac.java | 6 import org.bouncycastle.crypto.Digest; 22 private Digest digest; field in class:HMac 55 Digest digest) 57 if (digest instanceof ExtendedDigest) 59 return ((ExtendedDigest)digest).getByteLength(); 62 Integer b = (Integer)blockLengths.get(digest.getAlgorithmName()); 66 throw new IllegalArgumentException("unknown digest passed: " + digest.getAlgorithmName()) [all...] |
OldHMac.java | 4 import org.bouncycastle.crypto.Digest; 21 private Digest digest; field in class:OldHMac 30 Digest digest) 32 this.digest = digest; 33 digestSize = digest.getDigestSize(); 38 return digest.getAlgorithmName() + "/HMAC"; 41 public Digest getUnderlyingDigest( [all...] |
/dalvik/libcore/security/src/main/java/org/bouncycastle/asn1/x509/ |
SubjectKeyIdentifier.java | 8 import org.bouncycastle.crypto.Digest; 72 Digest digest = new SHA1Digest(); local 73 byte[] resBuf = new byte[digest.getDigestSize()]; 76 digest.update(bytes, 0, bytes.length); 77 digest.doFinal(resBuf, 0);
|
AuthorityKeyIdentifier.java | 7 import org.bouncycastle.crypto.Digest; 95 Digest digest = new SHA1Digest(); local 96 byte[] resBuf = new byte[digest.getDigestSize()]; 99 digest.update(bytes, 0, bytes.length); 100 digest.doFinal(resBuf, 0); 113 Digest digest = new SHA1Digest(); local 114 byte[] resBuf = new byte[digest.getDigestSize()]; 117 digest.update(bytes, 0, bytes.length) [all...] |
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/encodings/ |
OAEPEncoding.java | 7 import org.bouncycastle.crypto.Digest; 20 private Digest hash; 34 Digest hash) 41 Digest hash,
|
/dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/signers/ |
ISO9796d2Signer.java | 6 import org.bouncycastle.crypto.Digest; 26 private Digest digest; field in class:ISO9796d2Signer 42 * @param digest digest to use. 47 Digest digest, 51 this.digest = digest; 59 if (digest instanceof SHA1Digest [all...] |
PSSSigner.java | 9 import org.bouncycastle.crypto.Digest; 25 private Digest digest; field in class:PSSSigner 41 * @param digest the digest to use. 46 Digest digest, 49 this(cipher, digest, sLen, TRAILER_IMPLICIT); 54 Digest digest, [all...] |
/external/ppp/pppd/ |
chap_ms.c | 619 u_char Digest[SHA1_SIGNATURE_SIZE]; 626 SHA1_Final(Digest, &sha1Context); 631 SHA1_Update(&sha1Context, Digest, sizeof(Digest)); 634 SHA1_Final(Digest, &sha1Context); 637 for (i = 0; i < MAX((MS_AUTH_RESPONSE_LENGTH / 2), sizeof(Digest)); i++) 638 sprintf((char *)&authResponse[i * 2], "%02X", Digest[i]); 673 u_char Digest[SHA1_SIGNATURE_SIZE]; /* >= MPPE_MAX_KEY_LEN */ 679 SHA1_Final(Digest, &sha1Context); 682 BCOPY(Digest, mppe_send_key, sizeof(mppe_send_key)) [all...] |