/external/webkit/Source/JavaScriptCore/wtf/ |
MD5.cpp | 33 * This code implements the MD5 message-digest algorithm. 43 * To compute the message digest of a chunk of bytes, construct an 46 * with the digest. 71 Vector<uint8_t, 16> digest; 72 md5.checksum(digest); 76 snprintf(buf, 3, "%02x", digest.at(i)); 92 expectMD5("message digest", "f96b697d7cb7938d525a2f31aaf161d0"); 262 void MD5::checksum(Vector<uint8_t, 16>& digest) 299 if (!digest.isEmpty()) 300 digest.clear() [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/provider/crypto/ |
SHA1withDSA_SignatureImpl.java | 192 // BigInteger for message digest 217 digestBI = new BigInteger(1, msgDigest.digest()); 326 byte[] digest; 347 digest = msgDigest.digest(); 372 u1 = (new BigInteger(1, digest)).multiply(w).mod(q);
|
/dalvik/libdex/ |
DexFile.cpp | 115 * Format an SHA-1 digest for printing. tmpBuf must be able to hold at 118 const char* dvmSHA1DigestToStr(const unsigned char digest[], char* tmpBuf); 121 * Compute a SHA-1 digest on a range of bytes. 124 unsigned char digest[]) 129 SHA1Final(digest, &context); 133 * Format the SHA-1 digest into the buffer, which must be able to hold at 136 static const char* dexSHA1DigestToStr(const unsigned char digest[],char* tmpBuf) 144 *cp++ = hexDigit[digest[i] >> 4]; 145 *cp++ = hexDigit[digest[i] & 0x0f]; 374 * Verify the SHA-1 digest. (Normally we don't want to do this - [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JCERSACipher.java | 27 import org.bouncycastle.crypto.Digest; 79 Digest digest = JCEDigestUtil.getDigest(mgfParams.getDigestAlgorithm()); local 81 if (digest == null) 83 throw new NoSuchPaddingException("no match on OAEP constructor for digest algorithm: "+ mgfParams.getDigestAlgorithm()); 86 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue()); 291 Digest digest = JCEDigestUtil.getDigest(spec.getDigestAlgorithm()); local 293 if (digest == null) 295 throw new InvalidAlgorithmParameterException("no match on digest algorithm: "+ spec.getDigestAlgorithm()) [all...] |
/external/chromium/chrome/common/ |
metrics_helpers.cc | 182 MD5Digest digest; local 183 MD5Final(&digest, &ctx); 190 DCHECK(arraysize(digest.a) >= sizeof(reverse_uint64)); 192 reverse[i] = digest.a[sizeof(reverse_uint64) - i - 1]; 201 return std::string(reinterpret_cast<char*>(digest.a), arraysize(digest.a));
|
/external/openssl/crypto/pkcs12/ |
p12_npas.c | 162 ASN1_OCTET_STRING_free(p12->mac->dinfo->digest); 163 p12->mac->dinfo->digest = macnew;
|
/external/openssl/crypto/pkcs7/ |
pk7_lib.c | 142 if (p7->d.digest->contents != NULL) 143 PKCS7_free(p7->d.digest->contents); 144 p7->d.digest->contents=p7_data; 215 if ((p7->d.digest=PKCS7_DIGEST_new()) 217 if (!ASN1_INTEGER_set(p7->d.digest->version,0)) 261 /* If the digest is not currently listed, add it */ 446 if(!(p7->d.digest->md->parameter = ASN1_TYPE_new())) 451 p7->d.digest->md->parameter->type = V_ASN1_NULL; 452 p7->d.digest->md->algorithm = OBJ_nid2obj(EVP_MD_nid(md));
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
DigitalSignature.java | 169 md5.digest(md5_hash, 0, md5_hash.length); 180 sha.digest(sha_hash, 0, sha_hash.length);
|
/bootable/bootloader/legacy/include/boot/ |
boot.h | 138 int is_signature_okay(void *digest, void *signature, void *pubkey);
|
/external/chromium/chrome/browser/safe_browsing/ |
prefix_set.cc | 189 // The file looks valid, start building the digest. 268 MD5Digest digest; local 269 MD5Final(&digest, &context); 270 written = fwrite(&digest, sizeof(digest), 1, file.get());
|
/external/chromium/net/base/ |
dnssec_chain_verifier.h | 79 bool DigestKey(base::StringPiece* digest,
|
/external/openssl/apps/ |
crl.c | 119 const EVP_MD *md_alg,*digest=EVP_sha1(); local 215 digest=md_alg; 330 if (!X509_CRL_digest(x,digest,md,&n)) 336 OBJ_nid2sn(EVP_MD_type(digest)));
|
x509.c | 144 " -md2/-md5/-sha1/-mdc2 - digest to use\n", 157 static int sign (X509 *x, EVP_PKEY *pkey,int days,int clrext, const EVP_MD *digest, 159 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest, 202 const EVP_MD *md_alg,*digest=NULL; local 468 digest=md_alg; 923 const EVP_MD *fdig = digest; 956 if (!sign(x,Upkey,days,clrext,digest, 972 if (!x509_certify(ctx,CAfile,digest,x,xca, 997 rq=X509_to_X509_REQ(x,pk,digest); 1133 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, [all...] |
/external/openssl/crypto/asn1/ |
n_pkey.c | 153 enckey->enckey->digest->length = pkeylen; 192 enckey->enckey->digest->data = zz; 218 zz = enckey->enckey->digest->data; 270 if ((ret=d2i_RSA_NET_2(a, enckey->enckey->digest,cb, sgckey)) == NULL) goto err;
|
/external/openssl/crypto/rand/ |
rand_lcl.h | 128 #error No message digest algorithm available
|
/external/webkit/Tools/wx/build/ |
waf_extensions.py | 96 return m.digest()
|
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
Util.java | 62 return toHexString(algorithm.digest(), "");
|
/sdk/sdkmanager/libs/sdklib/src/com/android/sdklib/internal/repository/ |
SamplePackage.java | 425 * using the SHA-1 digest.
426 * Returns null if the digest algorithm is not available.
488 * Returns a digest as an hex string.
491 // Create an hex string from the digest
492 byte[] digest = digester.digest();
493 int n = digest.length;
497 int b = digest[i] & 0x0FF;
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/ |
SHA1ImplTest.java | 82 byte[] dgst = md.digest(); 111 byte[] dgst = md.digest(); 149 byte[] dgst = md.digest();
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/ |
DESedeWrapEngine.java | 6 import org.bouncycastle.crypto.Digest; 53 // checksum digest 55 Digest sha1 = new SHA1Digest(); 56 byte[] digest = new byte[20]; field in class:DESedeWrapEngine 319 sha1.doFinal(digest, 0); 321 System.arraycopy(digest, 0, result, 0, 8);
|
/external/javassist/src/main/javassist/ |
SerialVersionUID.java | 187 MessageDigest digest = MessageDigest.getInstance("SHA"); local 188 byte[] digested = digest.digest(bout.toByteArray());
|
/external/ppp/pppd/plugins/radius/ |
radius.c | 76 struct chap_digest_type *digest, 85 struct chap_digest_type *digest, 321 * digest -- points to the structure representing the digest type 333 struct chap_digest_type *digest, 361 if ((digest->code != CHAP_MD5) 363 && (digest->code != CHAP_MICROSOFT) 364 && (digest->code != CHAP_MICROSOFT_V2) 367 error("RADIUS: Challenge type %u unsupported", digest->code); 395 switch (digest->code) [all...] |
/external/dropbear/libtomcrypt/src/hashes/ |
md4.c | 196 Terminate the hash to get the digest 260 unsigned char digest[16]; 271 { "message digest", 286 unsigned char digest[16]; 291 md4_done(&md, digest); 292 if (XMEMCMP(digest, cases[i].digest, 16) != 0) {
|
/external/llvm/include/llvm/ADT/ |
ImmutableSet.h | 233 uint32_t digest; member in class:llvm::ImutAVLTree 247 value(v), digest(0), refCount(0) 261 /// hasCachedDigest - Returns true if the digest for this tree is cached. 298 uint32_t digest = 0; local 301 digest += L->computeDigest(); 303 // Compute digest of stored data. 306 digest += ID.ComputeHash(); 309 digest += R->computeDigest(); 311 return digest; 315 // Check the lowest bit to determine if digest has actually bee 612 unsigned digest = TNew->computeDigest(); local [all...] |
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 105 static int cryptodev_engine_digests(ENGINE *e, const EVP_MD **digest, 641 /* convert digest type to cryptodev */ 670 int digest; local 672 if ((digest = digest_nid_to_cryptodev(ctx->digest->type)) == NID_undef){ 673 printf("cryptodev_digest_init: Can't get digest \n"); 685 sess->mackeylen = digest_key_length(ctx->digest->type); 686 sess->mac = digest; 738 printf("cryptodev_digest_update: digest failed\n"); 770 printf("cryptodev_digest_final: digest failed\n") [all...] |