/external/genext2fs/ |
test-gen.lib | 4 # This code is sourced by the other scripts so that digest 43 # calc_digest - Return the MD5 digest of the test image 46 digest=`md5sum ext2.img 2>/dev/null | cut -f 1 -d " "` 47 if [ x$digest != x ] ; then 48 echo $digest 50 digest=`md5 ext2.img 2>/dev/null | cut -f 4 -d " "` 51 echo $digest
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS12ParametersGenerator.java | 4 import org.bouncycastle.crypto.Digest; 24 private Digest digest; field in class:PKCS12ParametersGenerator 31 * accept any digest which also implements ExtendedDigest. 33 * @param digest the digest to be used as the source of derived keys. 34 * @exception IllegalArgumentException if an unknown digest is passed in. 37 Digest digest) 39 this.digest = digest [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/signers/ |
RSADigestSigner.java | 15 import org.bouncycastle.crypto.Digest; 29 private final Digest digest; field in class:RSADigestSigner 57 Digest digest) 59 this.digest = digest; 61 algId = new AlgorithmIdentifier((DERObjectIdentifier)oidMap.get(digest.getAlgorithmName()), DERNull.INSTANCE); 69 return digest.getAlgorithmName() + "withRSA"; 112 * update the internal digest with the byte [all...] |
/dalvik/dx/src/com/android/dx/io/ |
DexHasher.java | 39 MessageDigest digest; local 41 digest = MessageDigest.getInstance("SHA-1"); 48 digest.update(bytes, offset, bytes.length - offset); 49 return digest.digest();
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/asymmetric/ |
EC.java | 99 String digest, 104 String mainName = digest + "WITH" + algorithm; 105 String jdk11Variation1 = digest + "with" + algorithm; 106 String jdk11Variation2 = digest + "With" + algorithm; 107 String alias = digest + "/" + algorithm;
|
/external/chromium/chrome/browser/sync/util/ |
crypto_helpers.cc | 34 MD5Digest digest; local 35 MD5Final(&digest, &context_); 36 bin_digest_.assign(digest.a, digest.a + arraysize(digest.a));
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest2Test.java | 80 + digestAlgs[i], MessageDigest.isEqual(d1.digest(), d2 81 .digest())); 153 byte[] hash = sha.digest(data); 203 byte[] hash = sha.digest(data); 212 * @tests java.security.MessageDigest#digest() 223 byte[] digest = sha.digest(); 224 assertTrue("bug in SHA", MessageDigest.isEqual(digest, MESSAGE_DIGEST)); 231 digest = sha.digest(); 263 MessageDigest digest = MessageDigest.getInstance(digestAlgs[i], local 281 MessageDigest digest = MessageDigest.getInstance(digestAlgs[i], local 297 MessageDigest.getInstance("SHA").digest(new byte[] {}, Integer.MAX_VALUE, 755); method [all...] |
MessageDigest1Test.java | 121 * @tests java.security.MessageDigest#digest() 125 assertEquals("incorrect result", 0, md.digest().length); 130 * @tests java.security.MessageDigest#digest(byte[]) 135 assertEquals("incorrect result", 0, md.digest(b).length); 140 * @tests java.security.MessageDigest#digest(byte[], int, int) 145 assertEquals("incorrect result", 0, md.digest(b, 2, 3)); 146 assertTrue("digest failed", md.runEngineDigest); 153 md.digest(null, 0, 1); 159 md.digest(bytes, 0, bytes.length + 1); 165 md.digest(bytes, Integer.MAX_VALUE, 1) [all...] |
DigestOutputStreamTest.java | 42 * Message digest algorithm name used during testing 58 * Test message for digest computations 103 MessageDigest digest = new MyMessageDigest1(); local 107 DigestOutputStream dos = new DigestOutputStream(out, digest); 108 assertSame(digest, dos.getMessageDigest()); 121 MessageDigest digest = new MyMessageDigest1(); local 127 dos.setMessageDigest(digest); 128 assertSame(digest, dos.getMessageDigest()); 141 * Assertion: updates associated digest<br> 156 // check that associated digest has been updated properl [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKDSASigner.java | 23 import org.bouncycastle.crypto.Digest; 42 private Digest digest; field in class:JDKDSASigner 47 Digest digest, 50 this.digest = digest; 96 digest.reset(); 133 digest.reset(); 141 digest.update(b) [all...] |
JCEPBEKey.java | 18 int digest; field in class:JCEPBEKey 32 int digest, 41 this.digest = digest; 95 return digest;
|
JDKDigestSignature.java | 25 import org.bouncycastle.crypto.Digest; 50 private Digest digest; field in class:JDKDigestSignature 56 Digest digest, 59 this.digest = digest; 67 Digest digest, 70 this.digest = digest [all...] |
JCESecretKeyFactory.java | 110 private int digest; field in class:JCESecretKeyFactory.PBEKeyFactory 119 int digest, 127 this.digest = digest; 143 return new JCEPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 148 param = Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 152 param = Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 155 return new JCEPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param); 167 private int digest; field in class:JCESecretKeyFactory.DESPBEKeyFactory 176 int digest, 598 int digest = SHA1; local [all...] |
/external/openssl/crypto/pkcs12/ |
p12_p8e.c | 84 M_ASN1_OCTET_STRING_free(p8->digest); 85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), 87 if(!p8->digest) {
|
/external/openssl/crypto/evp/ |
p_sign.c | 92 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) 102 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0) 115 v=ctx->digest->required_pkey_type[i]; 129 if (ctx->digest->sign == NULL) 134 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
|
/external/openssl/crypto/asn1/ |
x_sig.c | 66 ASN1_SIMPLE(X509_SIG, digest, ASN1_OCTET_STRING)
|
/external/flac/libFLAC/include/private/ |
md5.h | 5 * This is the header file for the MD5 message-digest algorithm. 15 * To compute the message digest of a chunk of bytes, declare an 18 * will fill a supplied 16-byte array with the digest. 40 void FLAC__MD5Final(FLAC__byte digest[16], FLAC__MD5Context *context);
|
/external/libvpx/ |
md5_utils.h | 2 * This is the header file for the MD5 message-digest algorithm. 12 * To compute the message digest of a chunk of bytes, declare an 15 * will fill a supplied 16-byte array with the digest. 39 void MD5Final(unsigned char digest[16], struct MD5Context *context);
|
/external/wpa_supplicant_8/src/crypto/ |
md5_i.h | 27 void MD5Final(unsigned char digest[16], struct MD5Context *context);
|
sha1_i.h | 26 void SHA1Final(unsigned char digest[20], struct SHA1Context *context);
|
/frameworks/base/tests/CoreTests/android/core/ |
Sha1Test.java | 24 * Tests SHA1 message digest algorithm. 45 MessageDigest digest = MessageDigest.getInstance("SHA-1"); local 49 digest.update(mTestData[i].input.getBytes()); 50 byte[] hash = digest.digest();
|
/frameworks/compile/libbcc/helper/ |
sha1.h | 22 void SHA1Final(unsigned char digest[HASHSIZE], SHA1_CTX* context);
|
/libcore/luni/src/test/java/tests/targets/security/ |
MessageDigestTestMD2.java | 27 @AndroidOnly("Android doesn't include MD2 message digest algorithm") 30 MessageDigest digest = MessageDigest.getInstance("MD2"); local 37 MessageDigest digest = MessageDigest.getInstance( local 52 MessageDigest digest = MessageDigest.getInstance("MD2"); local 54 digest = MessageDigest.getInstance("1.2.840.113549.2.2");
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/ |
SHA1_MessageDigestTest.java | 150 byte digest[]; // implementation variables 160 digest = md.digest(); 161 digestClone = clone.digest(); 163 assertEquals("digest.length != digestClone.length :: " + digestClone.length, 164 digest.length, digestClone.length); 165 for (int i = 0; i < digest.length; i++) { 166 assertEquals("digest[i] != digestClone[i] : i=" + i, digest[i], digestClone[i]); 172 * test against the "byte[] digest()" method [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest2Test.java | 92 MessageDigest.isEqual(d1.digest(), d2.digest())); 153 byte[] hash = sha.digest(data); 196 byte[] hash = sha.digest(data); 201 * java.security.MessageDigest#digest() 207 byte[] digest = sha.digest(); 208 assertTrue("bug in SHA", MessageDigest.isEqual(digest, MESSAGE_DIGEST)); 215 digest = sha.digest(); 244 MessageDigest digest = MessageDigest.getInstance(algorithm, e.getKey().getName()); local 257 MessageDigest digest = MessageDigest.getInstance(algorithm, e.getKey().getName()); local 264 MessageDigest.getInstance("SHA").digest(new byte[] {}, Integer.MAX_VALUE, 755); method [all...] |