/external/openssl/crypto/pkcs7/ |
pkcs7.h | 166 ASN1_OCTET_STRING *digest; member in struct:pkcs7_digest_st 209 PKCS7_DIGEST *digest; member in union:pkcs7_st::__anon8853
|
/external/openssl/include/openssl/ |
pkcs7.h | 166 ASN1_OCTET_STRING *digest; member in struct:pkcs7_digest_st 209 PKCS7_DIGEST *digest; member in union:pkcs7_st::__anon8896
|
/external/ppp/pppd/ |
sha1.c | 139 /* Add padding and return the message digest. */ 142 SHA1_Final(unsigned char digest[20], SHA1_CTX *context) 157 digest[i] = (unsigned char)
|
/external/wpa_supplicant_8/src/crypto/ |
md5-internal.c | 52 * This code implements the MD5 message-digest algorithm. 62 * To compute the message digest of a chunk of bytes, declare an 65 * will fill a supplied 16-byte array with the digest. 153 void MD5Final(unsigned char digest[16], struct MD5Context *ctx) 190 os_memcpy(digest, ctx->buf, 16);
|
sha1-internal.c | 277 /* Add padding and return the message digest. */ 279 void SHA1Final(unsigned char digest[20], SHA1_CTX* context) 296 digest[i] = (unsigned char)
|
/external/bouncycastle/src/main/java/org/bouncycastle/x509/ |
AttributeCertificateHolder.java | 117 * @param digestedObjectType The digest object type. 133 * Returns the digest object type if an object digest info is used. 144 * @return The digest object type or -1 if no object digest info is set. 157 * Returns the other object type ID if an object digest info is used. 160 * digest info is set. 173 * Returns the hash if an object digest info is used. 175 * @return The hash or <code>null</code> if no object digest info is set. 187 * Returns the digest algorithm ID if an object digest info is used [all...] |
/external/v8/tools/ |
presubmit.py | 135 file_sum = md5er(handle.read()).digest()
|
/libcore/luni/src/main/java/java/io/ |
ObjectStreamClass.java | 416 MessageDigest digest; local 418 digest = MessageDigest.getInstance("SHA"); 584 byte[] hash = digest.digest(sha.toByteArray()); [all...] |
/libcore/luni/src/main/java/java/util/ |
UUID.java | 149 return makeUuid(md.digest(name), 3);
|
/libcore/luni/src/main/java/org/apache/harmony/security/utils/ |
JarUtils.java | 142 // compute the message digest on the ASN.1 DER encoding of the Attributes value. 143 // Otherwise, compute the message digest on the data. 154 // If the authenticatedAttributes field contains the message-digest attribute, 155 // verify that it equals the computed digest of the signature file 164 byte[] computedDigest = md.digest(sfBytes);
|
/external/openssl/apps/ |
req.c | 190 const EVP_MD *md_alg=NULL,*digest=NULL; local 381 digest=md_alg; 424 BIO_printf(bio_err," -[digest] Digest to sign with (md5, sha1, md2, mdc2, md4)\n"); 527 digest=md_alg; 862 if (!(i=X509_sign(x509ss,pkey,digest))) 886 if (!(i=X509_REQ_sign(req,pkey,digest))) [all...] |
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_service_browsertest.cc | 106 // Fill up the database with test hash digest. 325 // This will setup the binary digest prefix in database and prepare protocol 327 void SetupResponseForDigest(const std::string& digest, 331 safe_browsing_util::StringToSBFullHash(digest, &full_hash);
|
/external/flac/libFLAC/ |
md5.c | 16 * This code implements the MD5 message-digest algorithm. 26 * To compute the message digest of a chunk of bytes, declare an 29 * will fill a supplied 16-byte array with the digest. 238 void FLAC__MD5Final(FLAC__byte digest[16], FLAC__MD5Context *ctx) 265 memcpy(digest, ctx->buf, 16);
|
/prebuilt/common/http-client/ |
commons-codec-1.4.jar | |
/cts/tools/tradefed-host/src/com/android/cts/tradefed/testtype/ |
TestPackageDef.java | 343 * Generate a sha1sum digest for a file. 349 * @return a hex {@link String} of the digest 361 return toHexString(md.digest()); 370 return "failed to generate digest";
|
/dalvik/dexgen/src/com/android/dexgen/dex/file/ |
DexFile.java | 618 int amt = md.digest(bytes, 12, 20); 620 throw new RuntimeException("unexpected digest write: " + amt +
|
/dalvik/dx/src/com/android/dx/dex/file/ |
DexFile.java | 637 int amt = md.digest(bytes, 12, 20); 639 throw new RuntimeException("unexpected digest write: " + amt +
|
/external/openssl/crypto/evp/ |
openbsd_hw.c | 413 assert(from->digest->flags&EVP_MD_FLAG_ONESHOT);
|
evp.h | 191 #define EVP_MD_FLAG_ONESHOT 0x0001 /* digest can only handle a single 194 #define EVP_MD_FLAG_PKEY_DIGEST 0x0002 /* digest is a "clone" digest used 199 /* Digest uses EVP_PKEY_METHOD for signing instead of MD specific signing */ 219 /* Digest ctrls */ 264 const EVP_MD *digest; member in struct:env_md_ctx_st 265 ENGINE *engine; /* functional reference if 'digest' is ENGINE-provided */ 276 #define EVP_MD_CTX_FLAG_ONESHOT 0x0001 /* digest update will be called 286 #define EVP_MD_CTX_FLAG_NON_FIPS_ALLOW 0x0008 /* Allow use of non FIPS digest 289 /* The following PAD options are also currently ignored in 1.0.0, digest [all...] |
/external/clang/tools/scan-build/ |
scan-build | 18 use Digest::MD5; 217 # ComputeDigest - Compute a digest of the specified file. 222 DieDiag("Cannot read $FName to compute Digest.\n") if (! -r $FName); 224 # Use Digest::MD5. We don't have to be cryptographically secure. We're 226 # We use Digest::MD5 because it is a standard Perl module that should 228 open(FILE, $FName) or DieDiag("Cannot open $FName when computing Digest.\n"); 230 my $Result = Digest::MD5->new->addfile(*FILE)->hexdigest; 233 # Return the digest. 330 # Compute a digest for the report file. Determine if we have already 333 my $digest = ComputeDigest("$Dir/$FName") [all...] |
/frameworks/base/cmds/keystore/ |
keystore.cpp | 164 uint8_t digest[MD5_DIGEST_LENGTH]; member in struct:blob 208 // encrypted data includes the digest value 216 MD5(mBlob.digested, digestedLength, mBlob.digest); 269 if (memcmp(mBlob.digest, computedDigest, MD5_DIGEST_LENGTH) != 0) {
|
/frameworks/base/core/java/com/android/internal/widget/ |
LockPatternUtils.java | 775 byte[] hash = md.digest(res); 812 byte[] sha1 = MessageDigest.getInstance(algo = "SHA-1").digest(saltedPassword); 813 byte[] md5 = MessageDigest.getInstance(algo = "MD5").digest(saltedPassword); [all...] |
/frameworks/base/media/libstagefright/rtsp/ |
ARTSPConnection.cpp | 868 // so we won't support digest authentication. 872 CHECK(!strncmp(value.c_str(), "Digest", 6)); 873 mAuthType = DIGEST; 959 CHECK_EQ((int)mAuthType, (int)DIGEST); 987 AString digest; local 988 H(tmp, &digest); 991 fragment.append("Authorization: Digest "); 1002 fragment.append(digest);
|
MyTransmitter.h | 274 CHECK(!strncmp(value.c_str(), "Digest", 6)); 275 mAuthType = DIGEST; 300 CHECK_EQ((int)mAuthType, (int)DIGEST); 325 AString digest; local 326 H(tmp, &digest); 328 request->append("Authorization: Digest "); 337 request->append(digest); 830 DIGEST
|
/external/chromium/crypto/third_party/nss/ |
sha512.cc | 433 SHA256_End(SHA256Context *ctx, unsigned char *digest, 469 memcpy(digest, H, padLen); 1086 SHA512_End(SHA512Context *ctx, unsigned char *digest, 1129 memcpy(digest, H, padLen); 1234 SHA384_End(SHA384Context *ctx, unsigned char *digest, 1239 SHA512_End(ctx, digest, digestLen, maxLen); [all...] |