HomeSort by relevance Sort by last modified time
    Searched defs:digest (Results 76 - 100 of 166) sorted by null

1 2 34 5 6 7

  /bootable/bootloader/legacy/usbloader/
usbloader.c 454 unsigned char digest[DIGEST_SIZE]; local
455 compute_digest((void*) kernel_addr, kernel_size, digest);
456 if (is_signature_okay(digest, signature, key_engineering)) {
  /dalvik/libdex/
sha1.cpp 239 /* Add padding and return the message digest. */
241 void SHA1Final(unsigned char digest[HASHSIZE], SHA1_CTX*
260 digest[i] = (unsigned char)
279 it in the 20-byte array digest. If fname is NULL, stdin is
282 void sha1file(char *fname, unsigned char* digest)
295 memset(digest, 0, HASHSIZE);
309 SHA1Final(digest, &context);
333 unsigned char digest[HASHSIZE]; local
368 sha1file(s, digest);
373 err |= digest[k]
423 unsigned char digest[HASHSIZE]; local
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
DigestOutputStreamTest.java 42 * Message digest algorithm name used during testing
58 * Test message for digest computations
103 MessageDigest digest = new MyMessageDigest1(); local
107 DigestOutputStream dos = new DigestOutputStream(out, digest);
108 assertSame(digest, dos.getMessageDigest());
121 MessageDigest digest = new MyMessageDigest1(); local
127 dos.setMessageDigest(digest);
128 assertSame(digest, dos.getMessageDigest());
141 * Assertion: updates associated digest<br>
156 // check that associated digest has been updated properl
    [all...]
MessageDigest1Test.java 121 * @tests java.security.MessageDigest#digest()
125 assertEquals("incorrect result", 0, md.digest().length);
130 * @tests java.security.MessageDigest#digest(byte[])
135 assertEquals("incorrect result", 0, md.digest(b).length);
140 * @tests java.security.MessageDigest#digest(byte[], int, int)
145 assertEquals("incorrect result", 0, md.digest(b, 2, 3));
146 assertTrue("digest failed", md.runEngineDigest);
153 md.digest(null, 0, 1);
159 md.digest(bytes, 0, bytes.length + 1);
165 md.digest(bytes, Integer.MAX_VALUE, 1)
    [all...]
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/
SHA1_MessageDigestTest.java 150 byte digest[]; // implementation variables
160 digest = md.digest();
161 digestClone = clone.digest();
163 assertEquals("digest.length != digestClone.length :: " + digestClone.length,
164 digest.length, digestClone.length);
165 for (int i = 0; i < digest.length; i++) {
166 assertEquals("digest[i] != digestClone[i] : i=" + i, digest[i], digestClone[i]);
172 * test against the "byte[] digest()" method
    [all...]
  /external/apache-http/src/org/apache/http/impl/auth/
DigestScheme.java 53 * Digest authentication scheme as defined in RFC 2617.
63 * Since the digest username is included as clear text in the generated
85 * Hexa values used when creating 32 character long digest in HTTP DigestScheme
95 /** Whether the digest authentication process is complete */
108 * Default constructor for the digest authetication scheme.
116 * Processes the Digest challenge.
162 * Tests if the Digest authentication process has been completed.
164 * @return <tt>true</tt> if Digest authorization has been processed,
177 * Returns textual designation of the digest authentication scheme.
179 * @return <code>digest</code
238 String digest = createDigest(credentials); local
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
JCERSACipher.java 27 import org.bouncycastle.crypto.Digest;
79 Digest digest = JCEDigestUtil.getDigest(mgfParams.getDigestAlgorithm()); local
81 if (digest == null)
83 throw new NoSuchPaddingException("no match on OAEP constructor for digest algorithm: "+ mgfParams.getDigestAlgorithm());
86 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue());
291 Digest digest = JCEDigestUtil.getDigest(spec.getDigestAlgorithm()); local
293 if (digest == null)
295 throw new InvalidAlgorithmParameterException("no match on digest algorithm: "+ spec.getDigestAlgorithm())
    [all...]
JCESecretKeyFactory.java 110 private int digest; field in class:JCESecretKeyFactory.PBEKeyFactory
119 int digest,
127 this.digest = digest;
143 return new JCEPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null);
148 param = Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize);
152 param = Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize);
155 return new JCEPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
167 private int digest; field in class:JCESecretKeyFactory.DESPBEKeyFactory
176 int digest,
598 int digest = SHA1; local
    [all...]
  /external/chromium/chrome/browser/bookmarks/
bookmark_codec.cc 336 MD5Digest digest; local
337 MD5Final(&digest, &md5_context_);
338 computed_checksum_ = MD5DigestToBase16(digest);
  /external/chromium/chrome/browser/safe_browsing/
prefix_set.cc 189 // The file looks valid, start building the digest.
268 MD5Digest digest; local
269 MD5Final(&digest, &context);
270 written = fwrite(&digest, sizeof(digest), 1, file.get());
  /external/chromium/net/websockets/
websocket_handshake.cc 265 MD5Digest digest; local
266 MD5Sum(challenge, kExpectedResponseSize, &digest);
267 memcpy(expected, digest.a, kExpectedResponseSize);
websocket_handshake_handler.cc 346 MD5Digest digest; local
347 MD5Sum(challenge.data(), challenge.size(), &digest);
349 const char* digest_data = reinterpret_cast<char*>(digest.a);
350 response_message.append(digest_data, sizeof(digest.a));
385 MD5Digest digest; local
386 MD5Sum(challenge.data(), challenge.size(), &digest);
388 const char* digest_data = reinterpret_cast<char*>(digest.a);
389 response_message.append(digest_data, sizeof(digest.a));
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/
PEMDecoder.java 17 import ch.ethz.ssh2.crypto.digest.MD5;
93 md5.digest(tmp, 0);
  /external/grub/stage2/
md5.c 215 unsigned char *digest; local
241 digest = md5_final ();
242 memcpy (alt_result, digest, 16);
254 digest = md5_final ();
258 memcpy (alt_result, digest, 16);
277 digest = md5_final ();
284 digest[i == 4 ? 5 : 12+i] | (digest[6+i] << 8) | (digest[i] << 16);
301 unsigned int w = digest[11]
339 unsigned char* digest = md5 (buffer); local
    [all...]
  /external/openssh/
auth2-jpake.c 142 u_char *digest; local
174 &digest, &digest_len) != 0)
180 memcpy(rawsalt, digest, len);
181 bzero(digest, digest_len);
182 xfree(digest);
cipher.c 304 u_char digest[16]; local
308 MD5_Final(digest, &md);
310 cipher_init(cc, cipher, digest, 16, NULL, 0, do_encrypt);
312 memset(digest, 0, sizeof(digest));
schnorr.c 68 u_char *digest; local
92 &digest, &digest_len) != 0) {
96 if (BN_bin2bn(digest, (int)digest_len, h) == NULL) {
104 bzero(digest, digest_len);
105 xfree(digest);
448 * with digest via 'digestp' (caller to free) and length via 'lenp'.
455 u_char digest[EVP_MAX_MD_SIZE]; local
470 if (EVP_DigestFinal_ex(&evp_md_ctx, digest, &digest_len) != 1) {
476 memcpy(*digestp, digest, *lenp);
480 bzero(digest, sizeof(digest))
    [all...]
  /external/openssl/apps/
crl.c 119 const EVP_MD *md_alg,*digest=EVP_sha1(); local
215 digest=md_alg;
330 if (!X509_CRL_digest(x,digest,md,&n))
336 OBJ_nid2sn(EVP_MD_type(digest)));
  /external/openssl/crypto/ecdsa/
ecdsatest.c 185 unsigned char digest[20]; local
193 /* get the message digest */
196 EVP_DigestFinal(&md_ctx, digest, &dgst_len);
207 signature = ECDSA_do_sign(digest, 20, key);
223 if (ECDSA_do_verify(digest, 20, signature, key) != 1)
291 unsigned char digest[20], wrong_digest[20]; local
299 /* fill digest values with some random data */
300 if (!RAND_pseudo_bytes(digest, 20) ||
390 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey))
398 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1
    [all...]
  /external/ppp/pppd/
chap-new.c 53 struct chap_digest_type *digest,
83 struct chap_digest_type *digest; member in struct:chap_client_state
84 unsigned char priv[64]; /* private area for digest's use */
98 struct chap_digest_type *digest; member in struct:chap_server_state
123 struct chap_digest_type *digest,
135 /* List of digest types that we know about */
157 * Add a new digest type to the list.
212 fatal("CHAP digest 0x%x requested but not available",
215 ss->digest = dp;
242 fatal("CHAP digest 0x%x requested but not available"
    [all...]
  /external/quake/quake/src/QW/client/
md4.c 44 License to copy and use this software is granted provided that it is identified as the ?RSA Data Security, Inc. MD4 Message-Digest Algorithm? in all material mentioning or referencing this software or this function.
45 License is also granted to make and use derivative works provided that such works are identified as ?derived from the RSA Data Security, Inc. MD4 Message-Digest Algorithm? in all material mentioning or referencing the derived work.
63 /* MD4C.C - RSA Data Security, Inc., MD4 message-digest algorithm */
67 RSA Data Security, Inc. MD4 Message-Digest Algorithm
70 derived from the RSA Data Security, Inc. MD4 Message-Digest Algorithm
128 /* MD4 block update operation. Continues an MD4 message-digest operation, processing another message block, and updating the context. */
163 /* MD4 finalization. Ends an MD4 message-digest operation, writing the the message digest and zeroizing the context. */
164 void MD4Final (unsigned char digest[16], MD4_CTX *context)
180 /* Store state in digest */
286 int digest[4]; local
    [all...]
  /external/webkit/Source/WebKit/qt/WebCoreSupport/
InspectorServerQt.cpp 55 Vector<uint8_t, 16> digest; local
56 md5.checksum(digest);
57 memcpy(response, digest.data(), 16);
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.c 394 u8 digest[SHA1_MAC_LEN]; local
407 if (sha1_vector(4, addr, len, digest))
412 os_memcpy(session_key, digest, session_key_len);
  /frameworks/compile/libbcc/helper/
sha1.c 238 /* Add padding and return the message digest. */
240 void SHA1Final(unsigned char digest[HASHSIZE], SHA1_CTX*
259 digest[i] = (unsigned char)
278 it in the 20-byte array digest. If fname is NULL, stdin is
281 void sha1file(char *fname, unsigned char* digest)
294 memset(digest, 0, HASHSIZE);
308 SHA1Final(digest, &context);
332 unsigned char digest[HASHSIZE]; local
367 sha1file(s, digest);
372 err |= digest[k]
422 unsigned char digest[HASHSIZE]; local
    [all...]
  /cts/tools/tradefed-host/src/com/android/cts/tradefed/result/
TestPackageResult.java 48 private static final String DIGEST_ATTR = "digest";
78 public void setDigest(String digest) {
79 mDigest = digest;
210 String digest = metrics.get(CtsTest.PACKAGE_DIGEST_METRIC); local
211 if (digest != null) {
212 setDigest(digest);

Completed in 1764 milliseconds

1 2 34 5 6 7