HomeSort by relevance Sort by last modified time
    Searched refs:Digest (Results 1 - 25 of 41) sorted by null

1 2

  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/generators/
KDF1BytesGenerator.java 3 import org.bouncycastle.crypto.Digest;
16 * @param digest the digest to be used as the source of derived keys.
19 Digest digest)
21 super(0, digest);
KDF2BytesGenerator.java 3 import org.bouncycastle.crypto.Digest;
17 * @param digest the digest to be used as the source of derived keys.
20 Digest digest)
22 super(1, digest);
BaseKDFBytesGenerator.java 6 import org.bouncycastle.crypto.Digest;
19 private Digest digest; field in class:BaseKDFBytesGenerator
27 * @param digest the digest to be used as the source of derived keys.
31 Digest digest)
34 this.digest = digest;
61 * return the underlying digest
    [all...]
MGF1BytesGenerator.java 6 import org.bouncycastle.crypto.Digest;
15 private Digest digest; field in class:MGF1BytesGenerator
20 * @param digest the digest to be used as the source of generated bytes
23 Digest digest)
25 this.digest = digest;
26 this.hLen = digest.getDigestSize()
    [all...]
PKCS5S1ParametersGenerator.java 4 import org.bouncycastle.crypto.Digest;
12 * digest used to drive it.
21 private Digest digest; field in class:PKCS5S1ParametersGenerator
26 * @param digest the digest to be used as the source of derived keys.
29 Digest digest)
31 this.digest = digest;
    [all...]
OpenSSLPBEParametersGenerator.java 4 import org.bouncycastle.crypto.Digest;
20 private Digest digest = new MD5Digest(); field in class:OpenSSLPBEParametersGenerator
48 byte[] buf = new byte[digest.getDigestSize()];
54 digest.update(password, 0, password.length);
55 digest.update(salt, 0, salt.length);
57 digest.doFinal(buf, 0);
71 digest.reset();
72 digest.update(buf, 0, buf.length);
PKCS12ParametersGenerator.java 4 import org.bouncycastle.crypto.Digest;
24 private Digest digest; field in class:PKCS12ParametersGenerator
31 * accept any digest which also implements ExtendedDigest.
33 * @param digest the digest to be used as the source of derived keys.
34 * @exception IllegalArgumentException if an unknown digest is passed in.
37 Digest digest)
39 this.digest = digest
    [all...]
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/
ExtendedDigest.java 4 extends Digest
7 * Return the size in bytes of the internal buffer the digest applies it's compression
DerivationFunction.java 11 * return the message digest used as the basis for the function
13 public Digest getDigest();
Digest.java 4 * interface that a message digest conforms to.
6 public interface Digest
16 * return the size, in bytes, of the digest produced by this message digest.
18 * @return the size, in bytes, of the digest produced by this message digest.
23 * update the message digest with a single byte.
30 * update the message digest with a block of bytes.
39 * close the digest, producing the final digest value. The doFina
    [all...]
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/io/
DigestOutputStream.java 7 import org.bouncycastle.crypto.Digest;
12 protected Digest digest; field in class:DigestOutputStream
16 Digest digest)
19 this.digest = digest;
25 digest.update((byte)b);
35 digest.update(b, off, len);
39 public Digest getDigest(
    [all...]
DigestInputStream.java 7 import org.bouncycastle.crypto.Digest;
12 protected Digest digest; field in class:DigestInputStream
16 Digest digest)
19 this.digest = digest;
29 digest.update((byte)b);
43 digest.update(b, off, n);
48 public Digest getDigest(
    [all...]
  /frameworks/base/tests/CoreTests/android/core/
CryptoTest.java 23 import org.bouncycastle.crypto.Digest;
39 * the results. Requirement is that the results must be equal, the digest
43 * @param oldDigest The old digest implementation, provided by Bouncy Castle
44 * @param newDigest The new digest implementation, provided by OpenSSL
46 public void doTestMessageDigest(Digest oldDigest, Digest newDigest) {
101 Digest oldDigest = new MD4Digest();
102 Digest newDigest = OpenSSLMessageDigest.getInstance("MD4");
111 Digest oldDigest = new MD5Digest();
112 Digest newDigest = OpenSSLMessageDigest.getInstance("MD5")
    [all...]
  /dalvik/libcore/security/src/main/java/org/bouncycastle/jce/provider/
BrokenKDF2BytesGenerator.java 6 import org.bouncycastle.crypto.Digest;
19 private Digest digest; field in class:BrokenKDF2BytesGenerator
26 * use a digest specified in the standard.
32 * @param digest the digest to be used as the source of derived keys.
35 Digest digest)
37 this.digest = digest;
    [all...]
JDKMessageDigest.java 5 import org.bouncycastle.crypto.Digest;
11 Digest digest; field in class:JDKMessageDigest
14 Digest digest)
16 super(digest.getAlgorithmName());
18 this.digest = digest;
23 digest.reset();
29 digest.update(input)
    [all...]
JDKISOSignature.java 14 import org.bouncycastle.crypto.Digest;
30 Digest digest,
35 signer = new ISO9796d2Signer(cipher, digest, true);
JDKDSASigner.java 25 import org.bouncycastle.crypto.Digest;
44 private Digest digest; field in class:JDKDSASigner
50 Digest digest,
55 this.digest = digest;
114 digest.reset();
150 digest.reset();
166 digest.update(b)
    [all...]
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/macs/
HMac.java 6 import org.bouncycastle.crypto.Digest;
22 private Digest digest; field in class:HMac
55 Digest digest)
57 if (digest instanceof ExtendedDigest)
59 return ((ExtendedDigest)digest).getByteLength();
62 Integer b = (Integer)blockLengths.get(digest.getAlgorithmName());
66 throw new IllegalArgumentException("unknown digest passed: " + digest.getAlgorithmName())
    [all...]
OldHMac.java 4 import org.bouncycastle.crypto.Digest;
21 private Digest digest; field in class:OldHMac
30 Digest digest)
32 this.digest = digest;
33 digestSize = digest.getDigestSize();
38 return digest.getAlgorithmName() + "/HMAC";
41 public Digest getUnderlyingDigest(
    [all...]
  /dalvik/libcore/security/src/main/java/org/bouncycastle/asn1/x509/
SubjectKeyIdentifier.java 8 import org.bouncycastle.crypto.Digest;
72 Digest digest = new SHA1Digest(); local
73 byte[] resBuf = new byte[digest.getDigestSize()];
76 digest.update(bytes, 0, bytes.length);
77 digest.doFinal(resBuf, 0);
AuthorityKeyIdentifier.java 7 import org.bouncycastle.crypto.Digest;
95 Digest digest = new SHA1Digest(); local
96 byte[] resBuf = new byte[digest.getDigestSize()];
99 digest.update(bytes, 0, bytes.length);
100 digest.doFinal(resBuf, 0);
113 Digest digest = new SHA1Digest(); local
114 byte[] resBuf = new byte[digest.getDigestSize()];
117 digest.update(bytes, 0, bytes.length)
    [all...]
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/encodings/
OAEPEncoding.java 7 import org.bouncycastle.crypto.Digest;
20 private Digest hash;
34 Digest hash)
41 Digest hash,
  /dalvik/libcore/security/src/main/java/org/bouncycastle/crypto/signers/
ISO9796d2Signer.java 6 import org.bouncycastle.crypto.Digest;
26 private Digest digest; field in class:ISO9796d2Signer
42 * @param digest digest to use.
47 Digest digest,
51 this.digest = digest;
59 if (digest instanceof SHA1Digest
    [all...]
PSSSigner.java 9 import org.bouncycastle.crypto.Digest;
25 private Digest digest; field in class:PSSSigner
41 * @param digest the digest to use.
46 Digest digest,
49 this(cipher, digest, sLen, TRAILER_IMPLICIT);
54 Digest digest,
    [all...]
  /external/ppp/pppd/
chap_ms.c 619 u_char Digest[SHA1_SIGNATURE_SIZE];
626 SHA1_Final(Digest, &sha1Context);
631 SHA1_Update(&sha1Context, Digest, sizeof(Digest));
634 SHA1_Final(Digest, &sha1Context);
637 for (i = 0; i < MAX((MS_AUTH_RESPONSE_LENGTH / 2), sizeof(Digest)); i++)
638 sprintf((char *)&authResponse[i * 2], "%02X", Digest[i]);
673 u_char Digest[SHA1_SIGNATURE_SIZE]; /* >= MPPE_MAX_KEY_LEN */
679 SHA1_Final(Digest, &sha1Context);
682 BCOPY(Digest, mppe_send_key, sizeof(mppe_send_key))
    [all...]

Completed in 502 milliseconds

1 2