HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 51 - 75 of 250) sorted by null

1 23 4 5 6 7 8 910

  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
DigestOutputStreamTest.java 44 * Message digest algorithm name used during testing
60 * Test message for digest computations
105 MessageDigest digest = new MyMessageDigest1(); local
109 DigestOutputStream dos = new DigestOutputStream(out, digest);
110 assertSame(digest, dos.getMessageDigest());
122 MessageDigest digest = new MyMessageDigest1(); local
128 dos.setMessageDigest(digest);
129 assertSame(digest, dos.getMessageDigest());
141 * Assertion: updates associated digest<br>
155 // check that associated digest has been updated properl
    [all...]
MessageDigest1Test.java 124 * java.security.MessageDigest#digest()
128 assertEquals("incorrect result", 0, md.digest().length);
133 * java.security.MessageDigest#digest(byte[])
138 assertEquals("incorrect result", 0, md.digest(b).length);
143 * java.security.MessageDigest#digest(byte[], int, int)
148 assertEquals("incorrect result", 0, md.digest(b, 2, 3));
149 assertTrue("digest failed", md.runEngineDigest);
156 md.digest(null, 0, 1);
162 md.digest(bytes, 0, bytes.length + 1);
168 md.digest(bytes, Integer.MAX_VALUE, 1)
188 MessageDigest digest = MessageDigest.getInstance("TestDigest", new TestProvider()); local
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/asn1/x509/
AuthorityKeyIdentifier.java 13 import org.bouncycastle.crypto.Digest;
108 Digest digest = new SHA1Digest(); local
109 byte[] resBuf = new byte[digest.getDigestSize()];
112 digest.update(bytes, 0, bytes.length);
113 digest.doFinal(resBuf, 0);
126 Digest digest = new SHA1Digest(); local
127 byte[] resBuf = new byte[digest.getDigestSize()];
130 digest.update(bytes, 0, bytes.length)
    [all...]
SubjectKeyIdentifier.java 8 import org.bouncycastle.crypto.Digest;
129 Digest digest = new SHA1Digest(); local
130 byte[] resBuf = new byte[digest.getDigestSize()];
133 digest.update(bytes, 0, bytes.length);
134 digest.doFinal(resBuf, 0);
  /external/ppp/pppd/
openssl-hash.h 30 #define SHA1_Final(digest, ctx) { \
32 EVP_DigestFinal_ex(ctx, digest, &md_len); \
  /bootable/bootloader/legacy/libc/
sha.h 48 /* Convenience method. Returns digest parameter value. */
49 const uint8_t* SHA(const void *data, int len, uint8_t *digest);
  /external/chromium/third_party/libjingle/source/talk/base/
md5.h 2 * This is the header file for the MD5 message-digest algorithm.
11 * To compute the message digest of a chunk of bytes, declare an
14 * will fill a supplied 16-byte array with the digest.
38 void MD5Final(unsigned char digest[16], struct MD5Context *context);
  /external/wpa_supplicant/
md5.h 31 void MD5Final(unsigned char digest[16], struct MD5Context *context);
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
md5.h 31 void MD5Final(unsigned char digest[16], struct MD5Context *context);
  /frameworks/base/core/java/android/content/pm/
ManifestDigest.java 11 * Represents the manifest digest for a package. This is suitable for comparison
17 /** The digest of the manifest in our preferred order. */
20 /** Digest field names to look for in preferred order. */
22 "SHA1-Digest", "SHA-Digest", "MD5-Digest",
28 ManifestDigest(byte[] digest) {
29 mDigest = digest;
55 final byte[] digest = Base64.decode(encodedDigest, Base64.DEFAULT);
56 return new ManifestDigest(digest);
    [all...]
  /frameworks/base/core/tests/coretests/src/android/content/pm/
ManifestDigestTest.java 38 private static final Attributes.Name SHA1_DIGEST = new Attributes.Name("SHA1-Digest");
40 private static final Attributes.Name MD5_DIGEST = new Attributes.Name("MD5-Digest");
78 ManifestDigest digest = ManifestDigest.fromAttributes(a); local
81 digest.writeToParcel(p, 0);
87 + digest.toString() + " and " + fromParcel.toString(), digest,
  /system/core/include/mincrypt/
sha.h 54 /* Convenience method. Returns digest parameter value. */
55 const uint8_t* SHA(const void* data, int len, uint8_t* digest);
  /external/chromium/chrome/common/
visitedlink_common.cc 87 MD5Digest digest; local
88 MD5Final(&digest, &ctx);
90 // This is the same as "return *(Fingerprint*)&digest.a;" but if we do that
96 *reinterpret_cast<uint8(*)[8]>(&digest.a));
  /frameworks/base/obex/javax/obex/
ObexSession.java 70 * the authentication challenge and it represents the challenge digest
148 * 0x00 and is the response digest. The first optional tag is 0x01 and
163 byte[] digest = new byte[challenge.length + password.length + 1];
164 System.arraycopy(challenge, 0, digest, 0, challenge.length);
166 digest[challenge.length] = (byte)0x3A;
167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length);
169 // Add the Response Digest
173 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16);
  /libcore/luni/src/main/java/org/apache/harmony/security/provider/crypto/
SHA1_MessageDigestImpl.java 40 // - 82-86 - frame for current message digest
71 * digest - byte array
73 * offset - offset in digest
75 private void processDigest(byte[] digest, int offset) {
124 digest[j ] = (byte) ( k >>>24 ); // getting first byte from left
125 digest[j+1] = (byte) ( k >>>16 ); // getting second byte from left
126 digest[j+2] = (byte) ( k >>> 8 ); // getting third byte from left
127 digest[j+3] = (byte) ( k ); // getting fourth byte from left
153 * Computes a message digest value. <BR>
160 * byte array containing message digest valu
    [all...]
  /external/openssl/crypto/rsa/
rsa_sign.c 79 ASN1_OCTET_STRING digest; local
110 sig.digest= &digest;
111 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */
112 sig.digest->length=m_len;
244 if (md && (EVP_MD_size(md) != sig->digest->length))
249 memcpy(rm, sig->digest->data,
250 sig->digest->length);
251 *prm_len = sig->digest->length;
255 else if (((unsigned int)sig->digest->length != m_len) |
    [all...]
  /external/webkit/Source/JavaScriptCore/wtf/
SHA1.cpp 56 Vector<uint8_t, 20> digest;
57 sha1.computeHash(digest);
61 snprintf(buffer, 3, "%02X", digest.at(i));
129 void SHA1::computeHash(Vector<uint8_t, 20>& digest)
133 digest.clear();
134 digest.resize(20);
139 digest[4 * i + (3 - j)] = hashValue & 0xFF;
  /external/openssl/crypto/evp/
bio_ok.c 90 with it's length and suffixed with it's digest. So you need only
92 it's digest.
96 1) the digest of the block is computed over the whole stream
103 *) digest is initialized with random seed instead of
107 of the digest is also written to output.
110 and then compare the digest output.
418 *ppmd=ctx->md.digest;
466 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return;
468 EVP_DigestInit_ex(md, md->digest, NULL);
472 RAND_pseudo_bytes(md->md_data, md->digest->md_size)
    [all...]
  /external/chromium/crypto/
hmac_unittest.cc 70 const char *digest; member in struct:__anon3399
128 unsigned char digest[kSHA1DigestSize]; local
129 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize));
130 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize));
217 const char *digest; member in struct:__anon3400
232 unsigned char digest[kSHA1DigestSize]; local
233 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize));
234 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize))
    [all...]
signature_verifier_openssl.cc 47 const EVP_MD* digest = EVP_get_digestbyobj(algorithm.get()->algorithm); local
48 DCHECK(digest);
64 int rv = EVP_VerifyInit_ex(verify_context_->ctx.get(), digest, NULL);
hmac.h 46 // returned in |digest|, which has |digest_length| bytes of storage available.
47 bool Sign(const std::string& data, unsigned char* digest, int digest_length);
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
PRF.java 61 "Could not initialize the Digest Algorithms."));
77 byte[] digest;
85 md5.update(sha.digest());
86 digest = md5.digest(); // length == 16
88 System.arraycopy(digest, 0, out, pos, out.length - pos);
91 System.arraycopy(digest, 0, out, pos, 16);
ConnectionStateSSLv3.java 38 // digest to create and check the message integrity info
125 client_key = md5.digest();
130 server_key = md5.digest();
137 clientIV = new IvParameterSpec(md5.digest(), 0, iv_size);
140 serverIV = new IvParameterSpec(md5.digest(), 0, iv_size);
245 byte[] digest = messageDigest.digest();
248 messageDigest.update(digest);
249 digest = messageDigest.digest();
    [all...]
  /external/chromium/crypto/third_party/nss/
blapi.h 54 extern void SHA256_End(SHA256Context *cx, unsigned char *digest,
72 extern void SHA512_End(SHA512Context *cx, unsigned char *digest,
90 extern void SHA384_End(SHA384Context *cx, unsigned char *digest,
  /external/grub/stage2/
md5.c 215 unsigned char *digest; local
241 digest = md5_final ();
242 memcpy (alt_result, digest, 16);
254 digest = md5_final ();
258 memcpy (alt_result, digest, 16);
277 digest = md5_final ();
284 digest[i == 4 ? 5 : 12+i] | (digest[6+i] << 8) | (digest[i] << 16);
301 unsigned int w = digest[11]
339 unsigned char* digest = md5 (buffer); local
    [all...]

Completed in 480 milliseconds

1 23 4 5 6 7 8 910