/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
sha2.c | 328 * digest to a readable hexadecimal character string: 566 void SHA256_Final(sha2_byte digest[], SHA256_CTX* context) { 567 sha2_word32 *d = (sha2_word32*)digest; 573 /* If no digest buffer is passed, we don't bother doing this: */ 574 if (digest != (sha2_byte*)0) { 630 sha2_byte digest[SHA256_DIGEST_LENGTH], *d = digest; local 637 SHA256_Final(digest, context); 648 bzero(digest, SHA256_DIGEST_LENGTH); 652 char* SHA256_Data(const sha2_byte* data, size_t len, char digest[SHA256_DIGEST_STRING_LENGTH]) 959 sha2_byte digest[SHA512_DIGEST_LENGTH], *d = digest; local 1034 sha2_byte digest[SHA384_DIGEST_LENGTH], *d = digest; local [all...] |
/external/chromium/base/ |
md5.cc | 5 * This code implements the MD5 message-digest algorithm. 15 * To compute the message digest of a chunk of bytes, declare an 18 * will fill a supplied 16-byte array with the digest. 212 void MD5Final(MD5Digest* digest, MD5Context *pCtx){ 249 memcpy(digest->a, ctx->buf, 16); 253 std::string MD5DigestToBase16(const MD5Digest& digest){ 261 int a = digest.a[i]; 268 void MD5Sum(const void* data, size_t length, MD5Digest* digest) { 272 MD5Final(digest, &ctx); 276 MD5Digest digest; local [all...] |
/cts/tools/tradefed-host/src/com/android/cts/tradefed/result/ |
TestPackageResult.java | 48 private static final String DIGEST_ATTR = "digest"; 78 public void setDigest(String digest) { 79 mDigest = digest; 210 String digest = metrics.get(CtsTest.PACKAGE_DIGEST_METRIC); local 211 if (digest != null) { 212 setDigest(digest);
|
/external/openssl/crypto/engine/ |
eng_openssl.c | 117 static int openssl_digests(ENGINE *e, const EVP_MD **digest, 345 static int openssl_digests(ENGINE *e, const EVP_MD **digest, 348 if(!digest) 354 /* We are being asked for a specific digest */ 356 *digest = &test_sha_md; 363 *digest = NULL;
|
/bootable/bootloader/legacy/libc/ |
sha.c | 132 const uint8_t* SHA(const void *data, int len, uint8_t *digest) { 140 digest[i] = *p++; 142 return digest;
|
/dalvik/libdex/ |
sha1.cpp | 239 /* Add padding and return the message digest. */ 241 void SHA1Final(unsigned char digest[HASHSIZE], SHA1_CTX* 260 digest[i] = (unsigned char) 279 it in the 20-byte array digest. If fname is NULL, stdin is 282 void sha1file(char *fname, unsigned char* digest) 295 memset(digest, 0, HASHSIZE); 309 SHA1Final(digest, &context); 333 unsigned char digest[HASHSIZE]; local 368 sha1file(s, digest); 373 err |= digest[k] 423 unsigned char digest[HASHSIZE]; local [all...] |
/external/chromium/chrome/browser/safe_browsing/ |
malware_details_cache.cc | 181 MD5Digest digest; local 182 MD5Sum(data.c_str(), data.size(), &digest); 183 pb_response->set_bodydigest(MD5DigestToBase16(digest));
|
/external/chromium/crypto/ |
hmac_win.cc | 158 unsigned char* digest, 165 data.size(), digest, digest_length); 194 return !!CryptGetHashParam(hash, HP_HASHVAL, digest, &sha1_size, 0);
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
MessageDigestAlgorithm.java | 21 * to produce the digest and a checksum. 34 * @return a digest response as defined in rfc2617 55 // digest as specified by rfc2617 95 * to produce the digest and a checksum. 111 * @return a digest response as defined in rfc2617 132 // digest as specified by rfc2617 181 MessageDigest digest = MessageDigest.getInstance("MD5"); local 183 return toHexString(digest.digest(data.getBytes()));
|
/external/openssl/crypto/evp/ |
bio_md.c | 65 /* BIO_put and BIO_get both add to the digest, 66 * BIO_gets returns the digest */ 79 BIO_TYPE_MD,"message digest", 182 ret = EVP_DigestInit_ex(ctx,ctx->digest, NULL); 192 *ppmd=ctx->digest; 254 if (size < ctx->digest->md_size)
|
p5_crpt2.c | 81 const EVP_MD *digest, 89 mdlen = EVP_MD_size(digest); 113 HMAC_Init_ex(&hctx, pass, passlen, digest, NULL); 120 HMAC(digest, pass, passlen,
|
/external/openssl/crypto/pkcs12/ |
p12_mutl.c | 121 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length) 122 || memcmp (mac, p12->mac->dinfo->digest->data, maclen)) return 0; 144 if (!(M_ASN1_OCTET_STRING_set (p12->mac->dinfo->digest, mac, maclen))) {
|
/libcore/luni/src/test/java/libcore/java/security/ |
MessageDigestTest.java | 41 assertEquals(Arrays.toString(sha_456), Arrays.toString(sha.digest())); 203 actual = md.digest(); 209 actual = md.digest();
|
/bootable/recovery/applypatch/ |
main.c | 57 uint8_t digest[SHA_DIGEST_SIZE]; local 67 if (ParseSha1(argv[i], digest) != 0) {
|
applypatch.h | 50 int ParseSha1(const char* str, uint8_t* digest);
|
/external/chromium/chrome/browser/web_applications/ |
web_app.cc | 103 void GetImageCheckSum(const SkBitmap& image, MD5Digest* digest) { 104 DCHECK(digest); 107 MD5Sum(image.getPixels(), image.getSize(), digest); 115 MD5Digest digest; 116 GetImageCheckSum(image, &digest); 120 reinterpret_cast<const char*>(&digest), 121 sizeof(digest)) == sizeof(digest);
|
/external/chromium/net/websockets/ |
websocket_handshake_handler.cc | 346 MD5Digest digest; local 347 MD5Sum(challenge.data(), challenge.size(), &digest); 349 const char* digest_data = reinterpret_cast<char*>(digest.a); 350 response_message.append(digest_data, sizeof(digest.a)); 385 MD5Digest digest; local 386 MD5Sum(challenge.data(), challenge.size(), &digest); 388 const char* digest_data = reinterpret_cast<char*>(digest.a); 389 response_message.append(digest_data, sizeof(digest.a));
|
/external/dropbear/libtomcrypt/src/mac/hmac/ |
hmac_test.c | 42 unsigned char digest[MAXBLOCKSIZE]; 52 unsigned char digest[MAXBLOCKSIZE]; 61 digest = 0x4c1a03424b55e07fe7f27be1d58bb9324a9a5a04 62 digest-96 = 0x4c1a03424b55e07fe7f27be1 78 digest = 0xaa4ae5e15272d00e95705637ce8a3b55ed402112 103 digest = 0xe8e99d0f45237d786d6bbaa7965c7808bbff1a91 131 digest = 0x92 94 72 7a 148 digest = 0x750c783e6ab0b503eaa86e310a5db738 162 digest = 0x56be34521d144c88dbb8c733f0e8b3f6 181 digest = 0x697eaf0aca3a3aea3a75164746ffaa7 [all...] |
/external/nist-sip/java/gov/nist/javax/sip/ |
Utils.java | 139 byte cid[] = digester.digest(date.getBytes()); 175 byte bid[] = digester.digest(Long.toString(num).getBytes());
|
/external/quake/quake/src/QW/client/ |
md4.c | 44 License to copy and use this software is granted provided that it is identified as the ?RSA Data Security, Inc. MD4 Message-Digest Algorithm? in all material mentioning or referencing this software or this function. 45 License is also granted to make and use derivative works provided that such works are identified as ?derived from the RSA Data Security, Inc. MD4 Message-Digest Algorithm? in all material mentioning or referencing the derived work. 63 /* MD4C.C - RSA Data Security, Inc., MD4 message-digest algorithm */ 67 RSA Data Security, Inc. MD4 Message-Digest Algorithm 70 derived from the RSA Data Security, Inc. MD4 Message-Digest Algorithm 128 /* MD4 block update operation. Continues an MD4 message-digest operation, processing another message block, and updating the context. */ 163 /* MD4 finalization. Ends an MD4 message-digest operation, writing the the message digest and zeroizing the context. */ 164 void MD4Final (unsigned char digest[16], MD4_CTX *context) 180 /* Store state in digest */ 286 int digest[4]; local [all...] |
/external/dbus/dbus/ |
dbus-md5.c | 369 md5_finish (DBusMD5Context *context, unsigned char digest[16]) 388 digest[i] = (unsigned char)(context->abcd[i >> 2] >> ((i & 3) << 3)); 431 * MD5 finalization. Ends an MD5 message-digest operation, writing the 432 * the message digest and zeroing the context. The results are 433 * returned as a raw 16-byte digest, not as the ascii-hex-digits 434 * string form of the digest. 437 * @param results string to append the 16-byte MD5 digest to 438 * @returns #FALSE if not enough memory to append the digest 445 unsigned char digest[16]; local 447 md5_finish (context, digest); 473 DBusString digest; local [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/asymmetric/ec/ |
Signature.java | 19 import org.bouncycastle.crypto.Digest; 44 Signature(Digest digest, DSA signer, DSAEncoder encoder) 46 super(digest, signer, encoder); 81 digest.reset(); 101 digest.reset();
|
/external/wpa_supplicant/ |
sha1.h | 38 void SHA1Final(unsigned char digest[20], struct SHA1Context *context);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha1.h | 39 void SHA1Final(unsigned char digest[20], struct SHA1Context *context);
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
HandshakeIODataStream.java | 77 "Could not initialize the Digest Algorithms."); 371 // ---------------------- Message Digest Functionality ---------------- 374 * Returns the MD5 digest of the data passed throught the stream 375 * @return MD5 digest 383 return md5.digest(); 388 * Returns the SHA-1 digest of the data passed throught the stream 389 * @return SHA-1 digest 397 return sha.digest(); 402 * Returns the MD5 digest of the data passed throught the stream 404 * @return MD5 digest [all...] |