/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
DigestOutputStreamTest.java | 44 * Message digest algorithm name used during testing 60 * Test message for digest computations 105 MessageDigest digest = new MyMessageDigest1(); local 109 DigestOutputStream dos = new DigestOutputStream(out, digest); 110 assertSame(digest, dos.getMessageDigest()); 122 MessageDigest digest = new MyMessageDigest1(); local 128 dos.setMessageDigest(digest); 129 assertSame(digest, dos.getMessageDigest()); 141 * Assertion: updates associated digest<br> 155 // check that associated digest has been updated properl [all...] |
MessageDigest1Test.java | 124 * java.security.MessageDigest#digest() 128 assertEquals("incorrect result", 0, md.digest().length); 133 * java.security.MessageDigest#digest(byte[]) 138 assertEquals("incorrect result", 0, md.digest(b).length); 143 * java.security.MessageDigest#digest(byte[], int, int) 148 assertEquals("incorrect result", 0, md.digest(b, 2, 3)); 149 assertTrue("digest failed", md.runEngineDigest); 156 md.digest(null, 0, 1); 162 md.digest(bytes, 0, bytes.length + 1); 168 md.digest(bytes, Integer.MAX_VALUE, 1) 188 MessageDigest digest = MessageDigest.getInstance("TestDigest", new TestProvider()); local [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/asn1/x509/ |
AuthorityKeyIdentifier.java | 13 import org.bouncycastle.crypto.Digest; 108 Digest digest = new SHA1Digest(); local 109 byte[] resBuf = new byte[digest.getDigestSize()]; 112 digest.update(bytes, 0, bytes.length); 113 digest.doFinal(resBuf, 0); 126 Digest digest = new SHA1Digest(); local 127 byte[] resBuf = new byte[digest.getDigestSize()]; 130 digest.update(bytes, 0, bytes.length) [all...] |
SubjectKeyIdentifier.java | 8 import org.bouncycastle.crypto.Digest; 129 Digest digest = new SHA1Digest(); local 130 byte[] resBuf = new byte[digest.getDigestSize()]; 133 digest.update(bytes, 0, bytes.length); 134 digest.doFinal(resBuf, 0);
|
/external/ppp/pppd/ |
openssl-hash.h | 30 #define SHA1_Final(digest, ctx) { \ 32 EVP_DigestFinal_ex(ctx, digest, &md_len); \
|
/bootable/bootloader/legacy/libc/ |
sha.h | 48 /* Convenience method. Returns digest parameter value. */ 49 const uint8_t* SHA(const void *data, int len, uint8_t *digest);
|
/external/chromium/third_party/libjingle/source/talk/base/ |
md5.h | 2 * This is the header file for the MD5 message-digest algorithm. 11 * To compute the message digest of a chunk of bytes, declare an 14 * will fill a supplied 16-byte array with the digest. 38 void MD5Final(unsigned char digest[16], struct MD5Context *context);
|
/external/wpa_supplicant/ |
md5.h | 31 void MD5Final(unsigned char digest[16], struct MD5Context *context);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
md5.h | 31 void MD5Final(unsigned char digest[16], struct MD5Context *context);
|
/frameworks/base/core/java/android/content/pm/ |
ManifestDigest.java | 11 * Represents the manifest digest for a package. This is suitable for comparison 17 /** The digest of the manifest in our preferred order. */ 20 /** Digest field names to look for in preferred order. */ 22 "SHA1-Digest", "SHA-Digest", "MD5-Digest", 28 ManifestDigest(byte[] digest) { 29 mDigest = digest; 55 final byte[] digest = Base64.decode(encodedDigest, Base64.DEFAULT); 56 return new ManifestDigest(digest); [all...] |
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
ManifestDigestTest.java | 38 private static final Attributes.Name SHA1_DIGEST = new Attributes.Name("SHA1-Digest"); 40 private static final Attributes.Name MD5_DIGEST = new Attributes.Name("MD5-Digest"); 78 ManifestDigest digest = ManifestDigest.fromAttributes(a); local 81 digest.writeToParcel(p, 0); 87 + digest.toString() + " and " + fromParcel.toString(), digest,
|
/system/core/include/mincrypt/ |
sha.h | 54 /* Convenience method. Returns digest parameter value. */ 55 const uint8_t* SHA(const void* data, int len, uint8_t* digest);
|
/external/chromium/chrome/common/ |
visitedlink_common.cc | 87 MD5Digest digest; local 88 MD5Final(&digest, &ctx); 90 // This is the same as "return *(Fingerprint*)&digest.a;" but if we do that 96 *reinterpret_cast<uint8(*)[8]>(&digest.a));
|
/frameworks/base/obex/javax/obex/ |
ObexSession.java | 70 * the authentication challenge and it represents the challenge digest 148 * 0x00 and is the response digest. The first optional tag is 0x01 and 163 byte[] digest = new byte[challenge.length + password.length + 1]; 164 System.arraycopy(challenge, 0, digest, 0, challenge.length); 166 digest[challenge.length] = (byte)0x3A; 167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); 169 // Add the Response Digest 173 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16);
|
/libcore/luni/src/main/java/org/apache/harmony/security/provider/crypto/ |
SHA1_MessageDigestImpl.java | 40 // - 82-86 - frame for current message digest 71 * digest - byte array 73 * offset - offset in digest 75 private void processDigest(byte[] digest, int offset) { 124 digest[j ] = (byte) ( k >>>24 ); // getting first byte from left 125 digest[j+1] = (byte) ( k >>>16 ); // getting second byte from left 126 digest[j+2] = (byte) ( k >>> 8 ); // getting third byte from left 127 digest[j+3] = (byte) ( k ); // getting fourth byte from left 153 * Computes a message digest value. <BR> 160 * byte array containing message digest valu [all...] |
/external/openssl/crypto/rsa/ |
rsa_sign.c | 79 ASN1_OCTET_STRING digest; local 110 sig.digest= &digest; 111 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */ 112 sig.digest->length=m_len; 244 if (md && (EVP_MD_size(md) != sig->digest->length)) 249 memcpy(rm, sig->digest->data, 250 sig->digest->length); 251 *prm_len = sig->digest->length; 255 else if (((unsigned int)sig->digest->length != m_len) | [all...] |
/external/webkit/Source/JavaScriptCore/wtf/ |
SHA1.cpp | 56 Vector<uint8_t, 20> digest; 57 sha1.computeHash(digest); 61 snprintf(buffer, 3, "%02X", digest.at(i)); 129 void SHA1::computeHash(Vector<uint8_t, 20>& digest) 133 digest.clear(); 134 digest.resize(20); 139 digest[4 * i + (3 - j)] = hashValue & 0xFF;
|
/external/openssl/crypto/evp/ |
bio_ok.c | 90 with it's length and suffixed with it's digest. So you need only 92 it's digest. 96 1) the digest of the block is computed over the whole stream 103 *) digest is initialized with random seed instead of 107 of the digest is also written to output. 110 and then compare the digest output. 418 *ppmd=ctx->md.digest; 466 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return; 468 EVP_DigestInit_ex(md, md->digest, NULL); 472 RAND_pseudo_bytes(md->md_data, md->digest->md_size) [all...] |
/external/chromium/crypto/ |
hmac_unittest.cc | 70 const char *digest; member in struct:__anon3399 128 unsigned char digest[kSHA1DigestSize]; local 129 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); 130 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize)); 217 const char *digest; member in struct:__anon3400 232 unsigned char digest[kSHA1DigestSize]; local 233 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); 234 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize)) [all...] |
signature_verifier_openssl.cc | 47 const EVP_MD* digest = EVP_get_digestbyobj(algorithm.get()->algorithm); local 48 DCHECK(digest); 64 int rv = EVP_VerifyInit_ex(verify_context_->ctx.get(), digest, NULL);
|
hmac.h | 46 // returned in |digest|, which has |digest_length| bytes of storage available. 47 bool Sign(const std::string& data, unsigned char* digest, int digest_length);
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
PRF.java | 61 "Could not initialize the Digest Algorithms.")); 77 byte[] digest; 85 md5.update(sha.digest()); 86 digest = md5.digest(); // length == 16 88 System.arraycopy(digest, 0, out, pos, out.length - pos); 91 System.arraycopy(digest, 0, out, pos, 16);
|
ConnectionStateSSLv3.java | 38 // digest to create and check the message integrity info 125 client_key = md5.digest(); 130 server_key = md5.digest(); 137 clientIV = new IvParameterSpec(md5.digest(), 0, iv_size); 140 serverIV = new IvParameterSpec(md5.digest(), 0, iv_size); 245 byte[] digest = messageDigest.digest(); 248 messageDigest.update(digest); 249 digest = messageDigest.digest(); [all...] |
/external/chromium/crypto/third_party/nss/ |
blapi.h | 54 extern void SHA256_End(SHA256Context *cx, unsigned char *digest, 72 extern void SHA512_End(SHA512Context *cx, unsigned char *digest, 90 extern void SHA384_End(SHA384Context *cx, unsigned char *digest,
|
/external/grub/stage2/ |
md5.c | 215 unsigned char *digest; local 241 digest = md5_final (); 242 memcpy (alt_result, digest, 16); 254 digest = md5_final (); 258 memcpy (alt_result, digest, 16); 277 digest = md5_final (); 284 digest[i == 4 ? 5 : 12+i] | (digest[6+i] << 8) | (digest[i] << 16); 301 unsigned int w = digest[11] 339 unsigned char* digest = md5 (buffer); local [all...] |