HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 126 - 150 of 250) sorted by null

1 2 3 4 56 7 8 910

  /external/webkit/Source/JavaScriptCore/wtf/
MD5.cpp 33 * This code implements the MD5 message-digest algorithm.
43 * To compute the message digest of a chunk of bytes, construct an
46 * with the digest.
71 Vector<uint8_t, 16> digest;
72 md5.checksum(digest);
76 snprintf(buf, 3, "%02x", digest.at(i));
92 expectMD5("message digest", "f96b697d7cb7938d525a2f31aaf161d0");
262 void MD5::checksum(Vector<uint8_t, 16>& digest)
299 if (!digest.isEmpty())
300 digest.clear()
    [all...]
  /libcore/luni/src/main/java/org/apache/harmony/security/provider/crypto/
SHA1withDSA_SignatureImpl.java 192 // BigInteger for message digest
217 digestBI = new BigInteger(1, msgDigest.digest());
326 byte[] digest;
347 digest = msgDigest.digest();
372 u1 = (new BigInteger(1, digest)).multiply(w).mod(q);
  /dalvik/libdex/
DexFile.cpp 115 * Format an SHA-1 digest for printing. tmpBuf must be able to hold at
118 const char* dvmSHA1DigestToStr(const unsigned char digest[], char* tmpBuf);
121 * Compute a SHA-1 digest on a range of bytes.
124 unsigned char digest[])
129 SHA1Final(digest, &context);
133 * Format the SHA-1 digest into the buffer, which must be able to hold at
136 static const char* dexSHA1DigestToStr(const unsigned char digest[],char* tmpBuf)
144 *cp++ = hexDigit[digest[i] >> 4];
145 *cp++ = hexDigit[digest[i] & 0x0f];
374 * Verify the SHA-1 digest. (Normally we don't want to do this -
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
JCERSACipher.java 27 import org.bouncycastle.crypto.Digest;
79 Digest digest = JCEDigestUtil.getDigest(mgfParams.getDigestAlgorithm()); local
81 if (digest == null)
83 throw new NoSuchPaddingException("no match on OAEP constructor for digest algorithm: "+ mgfParams.getDigestAlgorithm());
86 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue());
291 Digest digest = JCEDigestUtil.getDigest(spec.getDigestAlgorithm()); local
293 if (digest == null)
295 throw new InvalidAlgorithmParameterException("no match on digest algorithm: "+ spec.getDigestAlgorithm())
    [all...]
  /external/chromium/chrome/common/
metrics_helpers.cc 182 MD5Digest digest; local
183 MD5Final(&digest, &ctx);
190 DCHECK(arraysize(digest.a) >= sizeof(reverse_uint64));
192 reverse[i] = digest.a[sizeof(reverse_uint64) - i - 1];
201 return std::string(reinterpret_cast<char*>(digest.a), arraysize(digest.a));
  /external/openssl/crypto/pkcs12/
p12_npas.c 162 ASN1_OCTET_STRING_free(p12->mac->dinfo->digest);
163 p12->mac->dinfo->digest = macnew;
  /external/openssl/crypto/pkcs7/
pk7_lib.c 142 if (p7->d.digest->contents != NULL)
143 PKCS7_free(p7->d.digest->contents);
144 p7->d.digest->contents=p7_data;
215 if ((p7->d.digest=PKCS7_DIGEST_new())
217 if (!ASN1_INTEGER_set(p7->d.digest->version,0))
261 /* If the digest is not currently listed, add it */
446 if(!(p7->d.digest->md->parameter = ASN1_TYPE_new()))
451 p7->d.digest->md->parameter->type = V_ASN1_NULL;
452 p7->d.digest->md->algorithm = OBJ_nid2obj(EVP_MD_nid(md));
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
DigitalSignature.java 169 md5.digest(md5_hash, 0, md5_hash.length);
180 sha.digest(sha_hash, 0, sha_hash.length);
  /bootable/bootloader/legacy/include/boot/
boot.h 138 int is_signature_okay(void *digest, void *signature, void *pubkey);
  /external/chromium/chrome/browser/safe_browsing/
prefix_set.cc 189 // The file looks valid, start building the digest.
268 MD5Digest digest; local
269 MD5Final(&digest, &context);
270 written = fwrite(&digest, sizeof(digest), 1, file.get());
  /external/chromium/net/base/
dnssec_chain_verifier.h 79 bool DigestKey(base::StringPiece* digest,
  /external/openssl/apps/
crl.c 119 const EVP_MD *md_alg,*digest=EVP_sha1(); local
215 digest=md_alg;
330 if (!X509_CRL_digest(x,digest,md,&n))
336 OBJ_nid2sn(EVP_MD_type(digest)));
x509.c 144 " -md2/-md5/-sha1/-mdc2 - digest to use\n",
157 static int sign (X509 *x, EVP_PKEY *pkey,int days,int clrext, const EVP_MD *digest,
159 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest,
202 const EVP_MD *md_alg,*digest=NULL; local
468 digest=md_alg;
923 const EVP_MD *fdig = digest;
956 if (!sign(x,Upkey,days,clrext,digest,
972 if (!x509_certify(ctx,CAfile,digest,x,xca,
997 rq=X509_to_X509_REQ(x,pk,digest);
1133 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
    [all...]
  /external/openssl/crypto/asn1/
n_pkey.c 153 enckey->enckey->digest->length = pkeylen;
192 enckey->enckey->digest->data = zz;
218 zz = enckey->enckey->digest->data;
270 if ((ret=d2i_RSA_NET_2(a, enckey->enckey->digest,cb, sgckey)) == NULL) goto err;
  /external/openssl/crypto/rand/
rand_lcl.h 128 #error No message digest algorithm available
  /external/webkit/Tools/wx/build/
waf_extensions.py 96 return m.digest()
  /packages/apps/CertInstaller/src/com/android/certinstaller/
Util.java 62 return toHexString(algorithm.digest(), "");
  /sdk/sdkmanager/libs/sdklib/src/com/android/sdklib/internal/repository/
SamplePackage.java 425 * using the SHA-1 digest.
426 * Returns null if the digest algorithm is not available.
488 * Returns a digest as an hex string.
491 // Create an hex string from the digest
492 byte[] digest = digester.digest();
493 int n = digest.length;
497 int b = digest[i] & 0x0FF;
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/
SHA1ImplTest.java 82 byte[] dgst = md.digest();
111 byte[] dgst = md.digest();
149 byte[] dgst = md.digest();
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/
DESedeWrapEngine.java 6 import org.bouncycastle.crypto.Digest;
53 // checksum digest
55 Digest sha1 = new SHA1Digest();
56 byte[] digest = new byte[20]; field in class:DESedeWrapEngine
319 sha1.doFinal(digest, 0);
321 System.arraycopy(digest, 0, result, 0, 8);
  /external/javassist/src/main/javassist/
SerialVersionUID.java 187 MessageDigest digest = MessageDigest.getInstance("SHA"); local
188 byte[] digested = digest.digest(bout.toByteArray());
  /external/ppp/pppd/plugins/radius/
radius.c 76 struct chap_digest_type *digest,
85 struct chap_digest_type *digest,
321 * digest -- points to the structure representing the digest type
333 struct chap_digest_type *digest,
361 if ((digest->code != CHAP_MD5)
363 && (digest->code != CHAP_MICROSOFT)
364 && (digest->code != CHAP_MICROSOFT_V2)
367 error("RADIUS: Challenge type %u unsupported", digest->code);
395 switch (digest->code)
    [all...]
  /external/dropbear/libtomcrypt/src/hashes/
md4.c 196 Terminate the hash to get the digest
260 unsigned char digest[16];
271 { "message digest",
286 unsigned char digest[16];
291 md4_done(&md, digest);
292 if (XMEMCMP(digest, cases[i].digest, 16) != 0) {
  /external/llvm/include/llvm/ADT/
ImmutableSet.h 233 uint32_t digest; member in class:llvm::ImutAVLTree
247 value(v), digest(0), refCount(0)
261 /// hasCachedDigest - Returns true if the digest for this tree is cached.
298 uint32_t digest = 0; local
301 digest += L->computeDigest();
303 // Compute digest of stored data.
306 digest += ID.ComputeHash();
309 digest += R->computeDigest();
311 return digest;
315 // Check the lowest bit to determine if digest has actually bee
612 unsigned digest = TNew->computeDigest(); local
    [all...]
  /external/openssl/crypto/engine/
eng_cryptodev.c 105 static int cryptodev_engine_digests(ENGINE *e, const EVP_MD **digest,
641 /* convert digest type to cryptodev */
670 int digest; local
672 if ((digest = digest_nid_to_cryptodev(ctx->digest->type)) == NID_undef){
673 printf("cryptodev_digest_init: Can't get digest \n");
685 sess->mackeylen = digest_key_length(ctx->digest->type);
686 sess->mac = digest;
738 printf("cryptodev_digest_update: digest failed\n");
770 printf("cryptodev_digest_final: digest failed\n")
    [all...]

Completed in 3244 milliseconds

1 2 3 4 56 7 8 910