HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 76 - 100 of 250) sorted by null

1 2 34 5 6 7 8 910

  /external/dbus/dbus/
dbus-sha.h 39 dbus_uint32_t digest[5]; /**< Message digest */ member in struct:DBusSHAContext
dbus-sha.c 90 /* The SHA block size and message digest sizes, in bytes */
171 SHATransform(dbus_uint32_t *digest, dbus_uint32_t *data)
177 A = digest[0];
178 B = digest[1];
179 C = digest[2];
180 D = digest[3];
181 E = digest[4];
269 /* Build message digest */
270 digest[0] += A;
271 digest[1] += B
459 unsigned char digest[20]; local
487 DBusString digest; local
    [all...]
  /external/openssl/android.testssl/
testssl.sh 29 digest='-sha1'
31 x509cmd="adb shell /system/bin/openssl x509 $digest"
  /external/openssl/patches/
testssl.sh 29 digest='-sha1'
31 x509cmd="adb shell /system/bin/openssl x509 $digest"
  /external/chromium/crypto/
hmac_mac.cc 43 unsigned char* digest,
68 digest);
hmac_openssl.cc 44 unsigned char* digest,
49 ScopedOpenSSLSafeSizeBuffer<EVP_MAX_MD_SIZE> result(digest, digest_length);
hmac_nss.cc 77 unsigned char* digest,
109 digest, &len, digest_length) != SECSuccess) {
  /libcore/luni/src/main/java/java/security/
MessageDigest.java 26 * <i>message</i>, and the fixed-length byte sequence is the <i>digest</i> or
27 * <i>message digest</i>.
30 * <p>The basic pattern to digest an {@link java.io.InputStream} looks like this:
38 * byte[] digest = digester.digest();
42 * call {@link #update(byte[],int,int)} for each block of input data, and then call {@link #digest}
43 * to get the final digest. Note that calling {@code digest} resets the {@code MessageDigest}.
45 * calling {@code digest}.
227 * After the digest is computed the receiver is reset
232 public byte[] digest() { method in class:MessageDigest
254 public int digest(byte[] buf, int offset, int len) throws DigestException { method in class:MessageDigest
275 public byte[] digest(byte[] input) { method in class:MessageDigest
    [all...]
  /external/chromium/net/http/
http_auth_handler_digest_unittest.cc 21 "Digest realm=\"Oblivion\", nonce=\"nonce-value\"";
101 "Digest nonce=\"xyz\", realm=\"Thunder Bluff\"",
113 "Digest nonce=\"xyz\", realm=ThunderBluff",
126 "Digest nonce=\"xyz\"",
138 "Digest realm=\"\", nonce=\"xyz\"",
150 "Digest realm=\"Thunder Bluff\"",
163 "Digest nonce=xyz, realm=\"Thunder Bluff\"",
175 "Digest nonce=\"xyz\", realm=\"Thunder Bluff\", foo=\"bar\"",
187 "Digest nonce=\"xyz\", algorithm=\"awezum\", realm=\"Thunder\"",
201 "Digest nonce=\"xyz\", algorithm=\"mD5\", realm=\"Oblivion\""
354 HttpAuthHandlerDigest* digest = local
514 HttpAuthHandlerDigest* digest = local
    [all...]
  /external/openssl/crypto/ecdsa/
ecdsatest.c 185 unsigned char digest[20]; local
193 /* get the message digest */
196 EVP_DigestFinal(&md_ctx, digest, &dgst_len);
207 signature = ECDSA_do_sign(digest, 20, key);
223 if (ECDSA_do_verify(digest, 20, signature, key) != 1)
289 unsigned char digest[20], wrong_digest[20]; local
294 /* fill digest values with some random data */
295 if (!RAND_pseudo_bytes(digest, 20) ||
384 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey))
392 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_pwd_common.c 36 void H_Final(HMAC_CTX *ctx, u8 *digest)
40 HMAC_Final(ctx, digest, &mdlen);
50 unsigned char digest[SHA256_DIGEST_LENGTH]; local
63 HMAC_Update(&hctx, digest, mdlen);
67 HMAC_Final(&hctx, digest, &mdlen);
69 os_memcpy(result + len, digest, resultbytelen - len);
71 os_memcpy(result + len, digest, mdlen);
  /external/apache-http/src/org/apache/http/impl/auth/
DigestScheme.java 53 * Digest authentication scheme as defined in RFC 2617.
63 * Since the digest username is included as clear text in the generated
85 * Hexa values used when creating 32 character long digest in HTTP DigestScheme
95 /** Whether the digest authentication process is complete */
108 * Default constructor for the digest authetication scheme.
116 * Processes the Digest challenge.
162 * Tests if the Digest authentication process has been completed.
164 * @return <tt>true</tt> if Digest authorization has been processed,
177 * Returns textual designation of the digest authentication scheme.
179 * @return <code>digest</code
238 String digest = createDigest(credentials); local
    [all...]
  /libcore/luni/src/main/java/java/util/jar/
JarVerifier.java 72 * Stores and a hash and a message digest and verifies that massage digest
79 private MessageDigest digest; field in class:JarVerifier.VerifierEntry
85 VerifierEntry(String name, MessageDigest digest, byte[] hash,
88 this.digest = digest;
94 * Updates a digest with one byte.
98 digest.update((byte) value);
102 * Updates a digest with byte array.
106 digest.update(buf, off, nbytes)
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
DigestInputStreamTest.java 43 * Message digest algorithm name used during testing
59 * Test message for digest computations
117 * Assertion: updates associated digest<br>
130 // check that associated digest has been updated properly
133 dis.getMessageDigest().digest(),
149 * Assertion: must not update digest if EOS had been
166 // check that 3 previous read() calls did not update digest
168 Arrays.equals(dis.getMessageDigest().digest(),
182 * Assertion: <code>read()</code> must not update digest if it is off<br>
183 * Assertion: <code>on(boolean)</code> turns digest functionality o
    [all...]
  /external/openssl/crypto/hmac/
hmactest.c 88 unsigned char *digest; member in struct:test_st
150 if (strcmp(p,(char *)test[i].digest) != 0)
153 printf("got %s instead of %s\n",p,test[i].digest);
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
DigestInputStreamTest.java 44 * Message digest algorithm name used during testing
60 * Test message for digest computations
110 * Assertion: updates associated digest<br>
123 // check that associated digest has been updated properly
126 dis.getMessageDigest().digest(),
142 * Assertion: must not update digest if EOS had been
159 // check that 3 previous read() calls did not update digest
161 Arrays.equals(dis.getMessageDigest().digest(),
175 * Assertion: <code>read()</code> must not update digest if it is off<br>
176 * Assertion: <code>on(boolean)</code> turns digest functionality o
    [all...]
  /external/ppp/pppd/
chap-new.c 53 struct chap_digest_type *digest,
83 struct chap_digest_type *digest; member in struct:chap_client_state
84 unsigned char priv[64]; /* private area for digest's use */
98 struct chap_digest_type *digest; member in struct:chap_server_state
123 struct chap_digest_type *digest,
135 /* List of digest types that we know about */
157 * Add a new digest type to the list.
212 fatal("CHAP digest 0x%x requested but not available",
215 ss->digest = dp;
242 fatal("CHAP digest 0x%x requested but not available"
    [all...]
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
MessageDigest_Impl2Test.java 116 assertEquals("incorrect result", "MESSAGE DIGEST ABC", md.toString());
130 assertEquals("incorrect digest result", 0, md1.digest().length);
131 assertEquals("getProvider() failed", 0, md1.digest(b, 2, 3));
132 assertTrue("digest failed", ((MyMessageDigest1) md1).runEngineDigest);
155 assertEquals("incorrect digest result", 0, md2.digest().length);
156 assertEquals("getProvider() failed", 0, md2.digest(b, 2, 3));
157 assertTrue("digest failed", MyMessageDigest2.runEngineDigest);
  /external/quake/src/com/android/quake/
DownloaderActivity.java 627 MessageDigest digest = null; local
629 digest = createDigest();
634 readIntoDigest(is, bytesToSkip, digest);
644 part.size, digest);
645 if (digest != null) {
646 String hash = getHash(digest);
720 MessageDigest digest = createDigest(); local
721 readIntoDigest(is, part.size, digest);
722 String hash = getHash(digest);
741 MessageDigest digest) throws IOException
755 MessageDigest digest; local
    [all...]
  /external/webkit/Tools/DumpRenderTree/win/
MD5.cpp 77 hash[i] = context->digest[i];
  /frameworks/compile/libbcc/tools/
gen-sha1-stamp.py 25 return h.digest()
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
DigitalSignatureTest.java 72 sha.digest(sha_hash, 0, sha_hash.length);
73 md5.digest(md5_hash, 0, md5_hash.length);
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
HandshakeProtocol.java 351 byte[] digest = new byte[md5_digest.length + sha_digest.length];
352 System.arraycopy(md5_digest, 0, digest, 0, md5_digest.length);
353 System.arraycopy(sha_digest, 0, digest, md5_digest.length,
357 label.getBytes(), digest);
387 "Could not initialize the Digest Algorithms.",
396 byte[] b = md5.digest(SSLv3Constants.MD5pad1);
399 System.arraycopy(md5.digest(b), 0, buf, 0, 16);
404 b = sha.digest(SSLv3Constants.SHApad1);
407 System.arraycopy(sha.digest(b), 0, buf, 16, 20);
  /external/chromium/net/base/
dnssec_chain_verifier.cc 68 The verifier is now entering the named zone. It reads ahead and extracts the entry key from the zone entry data and synthisises a DS record for the given digest type and verifies the signature. It then enters the next zone.
505 // DigestKey calculates a DS digest as specified in
520 const uint8* digest; local
527 digest = reinterpret_cast<const uint8*>(temp.data());
531 digest = temp2;
543 memcpy(output + 4, digest, digest_len);
728 base::StringPiece digest; local
730 !VariableLength16(&digest)) {
735 lookahead[i] = digest.empty();
736 if (!digest.empty()
750 base::StringPiece digest; local
    [all...]
  /frameworks/compile/libbcc/helper/
sha1.c 238 /* Add padding and return the message digest. */
240 void SHA1Final(unsigned char digest[HASHSIZE], SHA1_CTX*
259 digest[i] = (unsigned char)
278 it in the 20-byte array digest. If fname is NULL, stdin is
281 void sha1file(char *fname, unsigned char* digest)
294 memset(digest, 0, HASHSIZE);
308 SHA1Final(digest, &context);
332 unsigned char digest[HASHSIZE]; local
367 sha1file(s, digest);
372 err |= digest[k]
422 unsigned char digest[HASHSIZE]; local
    [all...]

Completed in 1172 milliseconds

1 2 34 5 6 7 8 910