/external/dbus/dbus/ |
dbus-sha.h | 39 dbus_uint32_t digest[5]; /**< Message digest */ member in struct:DBusSHAContext
|
dbus-sha.c | 90 /* The SHA block size and message digest sizes, in bytes */ 171 SHATransform(dbus_uint32_t *digest, dbus_uint32_t *data) 177 A = digest[0]; 178 B = digest[1]; 179 C = digest[2]; 180 D = digest[3]; 181 E = digest[4]; 269 /* Build message digest */ 270 digest[0] += A; 271 digest[1] += B 459 unsigned char digest[20]; local 487 DBusString digest; local [all...] |
/external/openssl/android.testssl/ |
testssl.sh | 29 digest='-sha1' 31 x509cmd="adb shell /system/bin/openssl x509 $digest"
|
/external/openssl/patches/ |
testssl.sh | 29 digest='-sha1' 31 x509cmd="adb shell /system/bin/openssl x509 $digest"
|
/external/chromium/crypto/ |
hmac_mac.cc | 43 unsigned char* digest, 68 digest);
|
hmac_openssl.cc | 44 unsigned char* digest, 49 ScopedOpenSSLSafeSizeBuffer<EVP_MAX_MD_SIZE> result(digest, digest_length);
|
hmac_nss.cc | 77 unsigned char* digest, 109 digest, &len, digest_length) != SECSuccess) {
|
/libcore/luni/src/main/java/java/security/ |
MessageDigest.java | 26 * <i>message</i>, and the fixed-length byte sequence is the <i>digest</i> or 27 * <i>message digest</i>. 30 * <p>The basic pattern to digest an {@link java.io.InputStream} looks like this: 38 * byte[] digest = digester.digest(); 42 * call {@link #update(byte[],int,int)} for each block of input data, and then call {@link #digest} 43 * to get the final digest. Note that calling {@code digest} resets the {@code MessageDigest}. 45 * calling {@code digest}. 227 * After the digest is computed the receiver is reset 232 public byte[] digest() { method in class:MessageDigest 254 public int digest(byte[] buf, int offset, int len) throws DigestException { method in class:MessageDigest 275 public byte[] digest(byte[] input) { method in class:MessageDigest [all...] |
/external/chromium/net/http/ |
http_auth_handler_digest_unittest.cc | 21 "Digest realm=\"Oblivion\", nonce=\"nonce-value\""; 101 "Digest nonce=\"xyz\", realm=\"Thunder Bluff\"", 113 "Digest nonce=\"xyz\", realm=ThunderBluff", 126 "Digest nonce=\"xyz\"", 138 "Digest realm=\"\", nonce=\"xyz\"", 150 "Digest realm=\"Thunder Bluff\"", 163 "Digest nonce=xyz, realm=\"Thunder Bluff\"", 175 "Digest nonce=\"xyz\", realm=\"Thunder Bluff\", foo=\"bar\"", 187 "Digest nonce=\"xyz\", algorithm=\"awezum\", realm=\"Thunder\"", 201 "Digest nonce=\"xyz\", algorithm=\"mD5\", realm=\"Oblivion\"" 354 HttpAuthHandlerDigest* digest = local 514 HttpAuthHandlerDigest* digest = local [all...] |
/external/openssl/crypto/ecdsa/ |
ecdsatest.c | 185 unsigned char digest[20]; local 193 /* get the message digest */ 196 EVP_DigestFinal(&md_ctx, digest, &dgst_len); 207 signature = ECDSA_do_sign(digest, 20, key); 223 if (ECDSA_do_verify(digest, 20, signature, key) != 1) 289 unsigned char digest[20], wrong_digest[20]; local 294 /* fill digest values with some random data */ 295 if (!RAND_pseudo_bytes(digest, 20) || 384 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) 392 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1 [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_pwd_common.c | 36 void H_Final(HMAC_CTX *ctx, u8 *digest) 40 HMAC_Final(ctx, digest, &mdlen); 50 unsigned char digest[SHA256_DIGEST_LENGTH]; local 63 HMAC_Update(&hctx, digest, mdlen); 67 HMAC_Final(&hctx, digest, &mdlen); 69 os_memcpy(result + len, digest, resultbytelen - len); 71 os_memcpy(result + len, digest, mdlen);
|
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 53 * Digest authentication scheme as defined in RFC 2617. 63 * Since the digest username is included as clear text in the generated 85 * Hexa values used when creating 32 character long digest in HTTP DigestScheme 95 /** Whether the digest authentication process is complete */ 108 * Default constructor for the digest authetication scheme. 116 * Processes the Digest challenge. 162 * Tests if the Digest authentication process has been completed. 164 * @return <tt>true</tt> if Digest authorization has been processed, 177 * Returns textual designation of the digest authentication scheme. 179 * @return <code>digest</code 238 String digest = createDigest(credentials); local [all...] |
/libcore/luni/src/main/java/java/util/jar/ |
JarVerifier.java | 72 * Stores and a hash and a message digest and verifies that massage digest 79 private MessageDigest digest; field in class:JarVerifier.VerifierEntry 85 VerifierEntry(String name, MessageDigest digest, byte[] hash, 88 this.digest = digest; 94 * Updates a digest with one byte. 98 digest.update((byte) value); 102 * Updates a digest with byte array. 106 digest.update(buf, off, nbytes) [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
DigestInputStreamTest.java | 43 * Message digest algorithm name used during testing 59 * Test message for digest computations 117 * Assertion: updates associated digest<br> 130 // check that associated digest has been updated properly 133 dis.getMessageDigest().digest(), 149 * Assertion: must not update digest if EOS had been 166 // check that 3 previous read() calls did not update digest 168 Arrays.equals(dis.getMessageDigest().digest(), 182 * Assertion: <code>read()</code> must not update digest if it is off<br> 183 * Assertion: <code>on(boolean)</code> turns digest functionality o [all...] |
/external/openssl/crypto/hmac/ |
hmactest.c | 88 unsigned char *digest; member in struct:test_st 150 if (strcmp(p,(char *)test[i].digest) != 0) 153 printf("got %s instead of %s\n",p,test[i].digest);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
DigestInputStreamTest.java | 44 * Message digest algorithm name used during testing 60 * Test message for digest computations 110 * Assertion: updates associated digest<br> 123 // check that associated digest has been updated properly 126 dis.getMessageDigest().digest(), 142 * Assertion: must not update digest if EOS had been 159 // check that 3 previous read() calls did not update digest 161 Arrays.equals(dis.getMessageDigest().digest(), 175 * Assertion: <code>read()</code> must not update digest if it is off<br> 176 * Assertion: <code>on(boolean)</code> turns digest functionality o [all...] |
/external/ppp/pppd/ |
chap-new.c | 53 struct chap_digest_type *digest, 83 struct chap_digest_type *digest; member in struct:chap_client_state 84 unsigned char priv[64]; /* private area for digest's use */ 98 struct chap_digest_type *digest; member in struct:chap_server_state 123 struct chap_digest_type *digest, 135 /* List of digest types that we know about */ 157 * Add a new digest type to the list. 212 fatal("CHAP digest 0x%x requested but not available", 215 ss->digest = dp; 242 fatal("CHAP digest 0x%x requested but not available" [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest_Impl2Test.java | 116 assertEquals("incorrect result", "MESSAGE DIGEST ABC", md.toString()); 130 assertEquals("incorrect digest result", 0, md1.digest().length); 131 assertEquals("getProvider() failed", 0, md1.digest(b, 2, 3)); 132 assertTrue("digest failed", ((MyMessageDigest1) md1).runEngineDigest); 155 assertEquals("incorrect digest result", 0, md2.digest().length); 156 assertEquals("getProvider() failed", 0, md2.digest(b, 2, 3)); 157 assertTrue("digest failed", MyMessageDigest2.runEngineDigest);
|
/external/quake/src/com/android/quake/ |
DownloaderActivity.java | 627 MessageDigest digest = null; local 629 digest = createDigest(); 634 readIntoDigest(is, bytesToSkip, digest); 644 part.size, digest); 645 if (digest != null) { 646 String hash = getHash(digest); 720 MessageDigest digest = createDigest(); local 721 readIntoDigest(is, part.size, digest); 722 String hash = getHash(digest); 741 MessageDigest digest) throws IOException 755 MessageDigest digest; local [all...] |
/external/webkit/Tools/DumpRenderTree/win/ |
MD5.cpp | 77 hash[i] = context->digest[i];
|
/frameworks/compile/libbcc/tools/ |
gen-sha1-stamp.py | 25 return h.digest()
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
DigitalSignatureTest.java | 72 sha.digest(sha_hash, 0, sha_hash.length); 73 md5.digest(md5_hash, 0, md5_hash.length);
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
HandshakeProtocol.java | 351 byte[] digest = new byte[md5_digest.length + sha_digest.length]; 352 System.arraycopy(md5_digest, 0, digest, 0, md5_digest.length); 353 System.arraycopy(sha_digest, 0, digest, md5_digest.length, 357 label.getBytes(), digest); 387 "Could not initialize the Digest Algorithms.", 396 byte[] b = md5.digest(SSLv3Constants.MD5pad1); 399 System.arraycopy(md5.digest(b), 0, buf, 0, 16); 404 b = sha.digest(SSLv3Constants.SHApad1); 407 System.arraycopy(sha.digest(b), 0, buf, 16, 20);
|
/external/chromium/net/base/ |
dnssec_chain_verifier.cc | 68 The verifier is now entering the named zone. It reads ahead and extracts the entry key from the zone entry data and synthisises a DS record for the given digest type and verifies the signature. It then enters the next zone. 505 // DigestKey calculates a DS digest as specified in 520 const uint8* digest; local 527 digest = reinterpret_cast<const uint8*>(temp.data()); 531 digest = temp2; 543 memcpy(output + 4, digest, digest_len); 728 base::StringPiece digest; local 730 !VariableLength16(&digest)) { 735 lookahead[i] = digest.empty(); 736 if (!digest.empty() 750 base::StringPiece digest; local [all...] |
/frameworks/compile/libbcc/helper/ |
sha1.c | 238 /* Add padding and return the message digest. */ 240 void SHA1Final(unsigned char digest[HASHSIZE], SHA1_CTX* 259 digest[i] = (unsigned char) 278 it in the 20-byte array digest. If fname is NULL, stdin is 281 void sha1file(char *fname, unsigned char* digest) 294 memset(digest, 0, HASHSIZE); 308 SHA1Final(digest, &context); 332 unsigned char digest[HASHSIZE]; local 367 sha1file(s, digest); 372 err |= digest[k] 422 unsigned char digest[HASHSIZE]; local [all...] |