/bootable/bootloader/legacy/usbloader/ |
usbloader.c | 454 unsigned char digest[DIGEST_SIZE]; local 455 compute_digest((void*) kernel_addr, kernel_size, digest); 456 if (is_signature_okay(digest, signature, key_engineering)) {
|
/dalvik/libdex/ |
sha1.cpp | 239 /* Add padding and return the message digest. */ 241 void SHA1Final(unsigned char digest[HASHSIZE], SHA1_CTX* 260 digest[i] = (unsigned char) 279 it in the 20-byte array digest. If fname is NULL, stdin is 282 void sha1file(char *fname, unsigned char* digest) 295 memset(digest, 0, HASHSIZE); 309 SHA1Final(digest, &context); 333 unsigned char digest[HASHSIZE]; local 368 sha1file(s, digest); 373 err |= digest[k] 423 unsigned char digest[HASHSIZE]; local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
DigestOutputStreamTest.java | 42 * Message digest algorithm name used during testing 58 * Test message for digest computations 103 MessageDigest digest = new MyMessageDigest1(); local 107 DigestOutputStream dos = new DigestOutputStream(out, digest); 108 assertSame(digest, dos.getMessageDigest()); 121 MessageDigest digest = new MyMessageDigest1(); local 127 dos.setMessageDigest(digest); 128 assertSame(digest, dos.getMessageDigest()); 141 * Assertion: updates associated digest<br> 156 // check that associated digest has been updated properl [all...] |
MessageDigest1Test.java | 121 * @tests java.security.MessageDigest#digest() 125 assertEquals("incorrect result", 0, md.digest().length); 130 * @tests java.security.MessageDigest#digest(byte[]) 135 assertEquals("incorrect result", 0, md.digest(b).length); 140 * @tests java.security.MessageDigest#digest(byte[], int, int) 145 assertEquals("incorrect result", 0, md.digest(b, 2, 3)); 146 assertTrue("digest failed", md.runEngineDigest); 153 md.digest(null, 0, 1); 159 md.digest(bytes, 0, bytes.length + 1); 165 md.digest(bytes, Integer.MAX_VALUE, 1) [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/ |
SHA1_MessageDigestTest.java | 150 byte digest[]; // implementation variables 160 digest = md.digest(); 161 digestClone = clone.digest(); 163 assertEquals("digest.length != digestClone.length :: " + digestClone.length, 164 digest.length, digestClone.length); 165 for (int i = 0; i < digest.length; i++) { 166 assertEquals("digest[i] != digestClone[i] : i=" + i, digest[i], digestClone[i]); 172 * test against the "byte[] digest()" method [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 53 * Digest authentication scheme as defined in RFC 2617. 63 * Since the digest username is included as clear text in the generated 85 * Hexa values used when creating 32 character long digest in HTTP DigestScheme 95 /** Whether the digest authentication process is complete */ 108 * Default constructor for the digest authetication scheme. 116 * Processes the Digest challenge. 162 * Tests if the Digest authentication process has been completed. 164 * @return <tt>true</tt> if Digest authorization has been processed, 177 * Returns textual designation of the digest authentication scheme. 179 * @return <code>digest</code 238 String digest = createDigest(credentials); local [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JCERSACipher.java | 27 import org.bouncycastle.crypto.Digest; 79 Digest digest = JCEDigestUtil.getDigest(mgfParams.getDigestAlgorithm()); local 81 if (digest == null) 83 throw new NoSuchPaddingException("no match on OAEP constructor for digest algorithm: "+ mgfParams.getDigestAlgorithm()); 86 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue()); 291 Digest digest = JCEDigestUtil.getDigest(spec.getDigestAlgorithm()); local 293 if (digest == null) 295 throw new InvalidAlgorithmParameterException("no match on digest algorithm: "+ spec.getDigestAlgorithm()) [all...] |
JCESecretKeyFactory.java | 110 private int digest; field in class:JCESecretKeyFactory.PBEKeyFactory 119 int digest, 127 this.digest = digest; 143 return new JCEPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 148 param = Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 152 param = Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 155 return new JCEPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param); 167 private int digest; field in class:JCESecretKeyFactory.DESPBEKeyFactory 176 int digest, 598 int digest = SHA1; local [all...] |
/external/chromium/chrome/browser/bookmarks/ |
bookmark_codec.cc | 336 MD5Digest digest; local 337 MD5Final(&digest, &md5_context_); 338 computed_checksum_ = MD5DigestToBase16(digest);
|
/external/chromium/chrome/browser/safe_browsing/ |
prefix_set.cc | 189 // The file looks valid, start building the digest. 268 MD5Digest digest; local 269 MD5Final(&digest, &context); 270 written = fwrite(&digest, sizeof(digest), 1, file.get());
|
/external/chromium/net/websockets/ |
websocket_handshake.cc | 265 MD5Digest digest; local 266 MD5Sum(challenge, kExpectedResponseSize, &digest); 267 memcpy(expected, digest.a, kExpectedResponseSize);
|
websocket_handshake_handler.cc | 346 MD5Digest digest; local 347 MD5Sum(challenge.data(), challenge.size(), &digest); 349 const char* digest_data = reinterpret_cast<char*>(digest.a); 350 response_message.append(digest_data, sizeof(digest.a)); 385 MD5Digest digest; local 386 MD5Sum(challenge.data(), challenge.size(), &digest); 388 const char* digest_data = reinterpret_cast<char*>(digest.a); 389 response_message.append(digest_data, sizeof(digest.a));
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/ |
PEMDecoder.java | 17 import ch.ethz.ssh2.crypto.digest.MD5; 93 md5.digest(tmp, 0);
|
/external/grub/stage2/ |
md5.c | 215 unsigned char *digest; local 241 digest = md5_final (); 242 memcpy (alt_result, digest, 16); 254 digest = md5_final (); 258 memcpy (alt_result, digest, 16); 277 digest = md5_final (); 284 digest[i == 4 ? 5 : 12+i] | (digest[6+i] << 8) | (digest[i] << 16); 301 unsigned int w = digest[11] 339 unsigned char* digest = md5 (buffer); local [all...] |
/external/openssh/ |
auth2-jpake.c | 142 u_char *digest; local 174 &digest, &digest_len) != 0) 180 memcpy(rawsalt, digest, len); 181 bzero(digest, digest_len); 182 xfree(digest);
|
cipher.c | 304 u_char digest[16]; local 308 MD5_Final(digest, &md); 310 cipher_init(cc, cipher, digest, 16, NULL, 0, do_encrypt); 312 memset(digest, 0, sizeof(digest));
|
schnorr.c | 68 u_char *digest; local 92 &digest, &digest_len) != 0) { 96 if (BN_bin2bn(digest, (int)digest_len, h) == NULL) { 104 bzero(digest, digest_len); 105 xfree(digest); 448 * with digest via 'digestp' (caller to free) and length via 'lenp'. 455 u_char digest[EVP_MAX_MD_SIZE]; local 470 if (EVP_DigestFinal_ex(&evp_md_ctx, digest, &digest_len) != 1) { 476 memcpy(*digestp, digest, *lenp); 480 bzero(digest, sizeof(digest)) [all...] |
/external/openssl/apps/ |
crl.c | 119 const EVP_MD *md_alg,*digest=EVP_sha1(); local 215 digest=md_alg; 330 if (!X509_CRL_digest(x,digest,md,&n)) 336 OBJ_nid2sn(EVP_MD_type(digest)));
|
/external/openssl/crypto/ecdsa/ |
ecdsatest.c | 185 unsigned char digest[20]; local 193 /* get the message digest */ 196 EVP_DigestFinal(&md_ctx, digest, &dgst_len); 207 signature = ECDSA_do_sign(digest, 20, key); 223 if (ECDSA_do_verify(digest, 20, signature, key) != 1) 291 unsigned char digest[20], wrong_digest[20]; local 299 /* fill digest values with some random data */ 300 if (!RAND_pseudo_bytes(digest, 20) || 390 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) 398 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1 [all...] |
/external/ppp/pppd/ |
chap-new.c | 53 struct chap_digest_type *digest, 83 struct chap_digest_type *digest; member in struct:chap_client_state 84 unsigned char priv[64]; /* private area for digest's use */ 98 struct chap_digest_type *digest; member in struct:chap_server_state 123 struct chap_digest_type *digest, 135 /* List of digest types that we know about */ 157 * Add a new digest type to the list. 212 fatal("CHAP digest 0x%x requested but not available", 215 ss->digest = dp; 242 fatal("CHAP digest 0x%x requested but not available" [all...] |
/external/quake/quake/src/QW/client/ |
md4.c | 44 License to copy and use this software is granted provided that it is identified as the ?RSA Data Security, Inc. MD4 Message-Digest Algorithm? in all material mentioning or referencing this software or this function. 45 License is also granted to make and use derivative works provided that such works are identified as ?derived from the RSA Data Security, Inc. MD4 Message-Digest Algorithm? in all material mentioning or referencing the derived work. 63 /* MD4C.C - RSA Data Security, Inc., MD4 message-digest algorithm */ 67 RSA Data Security, Inc. MD4 Message-Digest Algorithm 70 derived from the RSA Data Security, Inc. MD4 Message-Digest Algorithm 128 /* MD4 block update operation. Continues an MD4 message-digest operation, processing another message block, and updating the context. */ 163 /* MD4 finalization. Ends an MD4 message-digest operation, writing the the message digest and zeroizing the context. */ 164 void MD4Final (unsigned char digest[16], MD4_CTX *context) 180 /* Store state in digest */ 286 int digest[4]; local [all...] |
/external/webkit/Source/WebKit/qt/WebCoreSupport/ |
InspectorServerQt.cpp | 55 Vector<uint8_t, 16> digest; local 56 md5.checksum(digest); 57 memcpy(response, digest.data(), 16);
|
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.c | 394 u8 digest[SHA1_MAC_LEN]; local 407 if (sha1_vector(4, addr, len, digest)) 412 os_memcpy(session_key, digest, session_key_len);
|
/frameworks/compile/libbcc/helper/ |
sha1.c | 238 /* Add padding and return the message digest. */ 240 void SHA1Final(unsigned char digest[HASHSIZE], SHA1_CTX* 259 digest[i] = (unsigned char) 278 it in the 20-byte array digest. If fname is NULL, stdin is 281 void sha1file(char *fname, unsigned char* digest) 294 memset(digest, 0, HASHSIZE); 308 SHA1Final(digest, &context); 332 unsigned char digest[HASHSIZE]; local 367 sha1file(s, digest); 372 err |= digest[k] 422 unsigned char digest[HASHSIZE]; local [all...] |
/cts/tools/tradefed-host/src/com/android/cts/tradefed/result/ |
TestPackageResult.java | 48 private static final String DIGEST_ATTR = "digest"; 78 public void setDigest(String digest) { 79 mDigest = digest; 210 String digest = metrics.get(CtsTest.PACKAGE_DIGEST_METRIC); local 211 if (digest != null) { 212 setDigest(digest);
|