/bootable/bootloader/legacy/usbloader/ |
usbloader.c | 454 unsigned char digest[DIGEST_SIZE]; local 455 compute_digest((void*) kernel_addr, kernel_size, digest); 456 if (is_signature_okay(digest, signature, key_engineering)) {
|
/external/chromium/chrome/browser/bookmarks/ |
bookmark_codec.cc | 336 MD5Digest digest; local 337 MD5Final(&digest, &md5_context_); 338 computed_checksum_ = MD5DigestToBase16(digest);
|
/external/chromium/net/websockets/ |
websocket_handshake.cc | 265 MD5Digest digest; local 266 MD5Sum(challenge, kExpectedResponseSize, &digest); 267 memcpy(expected, digest.a, kExpectedResponseSize);
|
/external/webkit/Source/WebKit/qt/WebCoreSupport/ |
InspectorServerQt.cpp | 55 Vector<uint8_t, 16> digest; local 56 md5.checksum(digest); 57 memcpy(response, digest.data(), 16);
|
/frameworks/base/core/java/android/net/http/ |
RequestHandle.java | 234 * Create and queue an HTTP authentication-response (digest) request. 250 mHeaders.put(authorizationHeader(isProxy), "Digest " + response); 294 * @return Digest-scheme authentication response. 314 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce); local 321 response += "response=" + doubleQuote(digest) ; 350 * @return Double-quoted MD5 digest. 384 byte[] d = md5.digest(param.getBytes());
|
SslCertificate.java | 272 byte[] digest = md.digest(bytes); 273 return fingerprint(digest);
|
/sdk/sdkmanager/libs/sdklib/src/com/android/sdklib/internal/build/ |
SignedJarBuilder.java | 58 private static final String DIGEST_ATTR = "SHA1-Digest"; 59 private static final String DIGEST_MANIFEST_ATTR = "SHA1-Digest-Manifest"; 288 // update the digest 304 attr.putValue(DIGEST_ATTR, mBase64Encoder.encode(mMessageDigest.digest())); 308 /** Writes a .SF file with a digest to the manifest. */ 322 // Digest of the entire manifest 325 main.putValue(DIGEST_MANIFEST_ATTR, base64.encode(md.digest())); 329 // Digest of the manifest stanza for this entry. 338 sfAttr.putValue(DIGEST_ATTR, base64.encode(md.digest()));
|
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 87 byte[] sha1 = messageDigest.digest();
|
/external/ppp/pppd/plugins/ |
winbind.c | 99 struct chap_digest_type *digest, 518 struct chap_digest_type *digest, 551 switch (digest->code) { 668 error("WINBIND: Challenge type %u unsupported", digest->code);
|
/external/wpa_supplicant/ |
md4.c | 35 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx); 54 * This code implements the MD4 message-digest algorithm. 65 * To compute the message digest of a chunk of bytes, declare an 68 * will fill a supplied 16-byte array with the digest. 171 * Final wrapup--call MD4Pad, fill in digest and zero out ctx. 173 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) 178 if (digest != NULL) { 180 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
|
sha1.c | 303 u8 *digest) 328 os_memcpy(digest, tmp, SHA1_MAC_LEN); 335 digest[j] ^= tmp2[j]; 359 unsigned char digest[SHA1_MAC_LEN]; local 364 digest); 366 os_memcpy(pos, digest, plen); 386 static void SHA1Final(unsigned char digest[20], struct SHA1Context *context); 693 /* Add padding and return the message digest. */ 695 void SHA1Final(unsigned char digest[20], SHA1_CTX* context) 712 digest[i] = (unsigned char [all...] |
ms_funcs.c | 329 u8 digest[SHA1_MAC_LEN]; local 342 sha1_vector(4, addr, len, digest); 346 os_memcpy(session_key, digest, session_key_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
md4.c | 35 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx); 54 * This code implements the MD4 message-digest algorithm. 65 * To compute the message digest of a chunk of bytes, declare an 68 * will fill a supplied 16-byte array with the digest. 171 * Final wrapup--call MD4Pad, fill in digest and zero out ctx. 173 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) 178 if (digest != NULL) { 180 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
|
sha1.c | 306 u8 *digest) 331 os_memcpy(digest, tmp, SHA1_MAC_LEN); 338 digest[j] ^= tmp2[j]; 362 unsigned char digest[SHA1_MAC_LEN]; local 367 digest); 369 os_memcpy(pos, digest, plen); 391 static void SHA1Final(unsigned char digest[20], struct SHA1Context *context); 700 /* Add padding and return the message digest. */ 702 void SHA1Final(unsigned char digest[20], SHA1_CTX* context) 719 digest[i] = (unsigned char [all...] |
ms_funcs.c | 329 u8 digest[SHA1_MAC_LEN]; local 342 sha1_vector(4, addr, len, digest); 346 os_memcpy(session_key, digest, session_key_len);
|
/external/wpa_supplicant_8/src/crypto/ |
md4-internal.c | 32 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx); 52 * This code implements the MD4 message-digest algorithm. 63 * To compute the message digest of a chunk of bytes, declare an 66 * will fill a supplied 16-byte array with the digest. 169 * Final wrapup--call MD4Pad, fill in digest and zero out ctx. 171 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) 176 if (digest != NULL) { 178 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
|
ms_funcs.c | 351 u8 digest[SHA1_MAC_LEN]; local 364 if (sha1_vector(4, addr, len, digest)) 369 os_memcpy(session_key, digest, session_key_len);
|
/external/openssl/crypto/pkcs7/ |
pk7_asn1.c | 76 ADB_ENTRY(NID_pkcs7_digest, ASN1_NDEF_EXP_OPT(PKCS7, d.digest, PKCS7_DIGEST, 0)), 223 ASN1_SIMPLE(PKCS7_DIGEST, digest, ASN1_OCTET_STRING)
|
pk7_doit.c | 301 xa = p7->d.digest->md; 302 os = PKCS7_get_octet_string(p7->d.digest->contents); 678 /* Add digest */ 754 os=PKCS7_get_octet_string(p7->d.digest->contents); 756 if(PKCS7_type_is_data(p7->d.digest->contents) && p7->detached) 759 p7->d.digest->contents->d.data = NULL; 791 /* If there are attributes, we add the digest 823 OBJ_obj2nid(p7->d.digest->md->algorithm))) 826 M_ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len) [all...] |
/external/protobuf/python/ |
ez_setup.py | 68 digest = md5(data).hexdigest() 69 if digest != md5_data[egg_name]:
|
/external/ppp/pppd/ |
md5.c | 6 ** RSA Data Security, Inc. MD5 Message-Digest Algorithm ** 18 ** Digest Algorithm" in all material mentioning or referencing this ** 23 ** Data Security, Inc. MD5 Message-Digest Algorithm" in all ** 41 ** Message-digest routines: ** 42 ** To form the message digest for a message M ** 46 ** The message digest is now in mdContext->digest[0...15] ** 102 /* The routine MD5_Init initializes the message-digest context 118 /* The routine MD5Update updates the message-digest context to 120 in the message whose digest is being computed [all...] |
/external/chromium/chrome/browser/sync/util/ |
user_settings.cc | 270 // We use 10 bits of data from the MD5 digest as the hash. 273 int32 GetHashFromDigest(const vector<uint8>& digest) { 276 for (vector<uint8>::const_iterator i = digest.begin(); i != digest.end();
|
/external/chromium/net/server/ |
http_server.cc | 88 MD5Digest digest; local 89 MD5Sum(data, 16, &digest); 104 connection->socket_->Send(reinterpret_cast<char*>(digest.a), 16);
|
/external/valgrind/main/none/tests/ |
sha1_test.c | 66 void SHA1Final(unsigned char digest[20], SHA1_CTX* context); 200 /* Add padding and return the message digest. */ 202 void SHA1Final(unsigned char digest[20], SHA1_CTX* context) 238 digest[i] = (unsigned char)
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
NativeCrypto.java | 60 // --- Message digest functions -------------- 68 // --- Message digest context functions -------------- 74 // --- Digest handling functions ------------------------------------------- 110 byte[] digest = MessageDigest.getInstance(algorithm).digest(principal.getEncoded()); 111 return Memory.peekInt(digest, 0, ByteOrder.LITTLE_ENDIAN);
|