HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 126 - 150 of 596) sorted by null

1 2 3 4 56 7 8 91011>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
SHA512.java 1 package org.bouncycastle.jcajce.provider.digest;
25 static public class Digest
29 public Digest()
37 Digest d = (Digest)super.clone();
38 d.digest = new SHA512Digest((SHA512Digest)digest);
58 // d.digest = new SHA512tDigest((SHA512tDigest)digest);
167 provider.addAlgorithm("MessageDigest.SHA-512", PREFIX + "$Digest");
    [all...]
SHA1.java 1 package org.bouncycastle.jcajce.provider.digest;
31 static public class Digest
35 public Digest()
43 Digest d = (Digest)super.clone();
44 d.digest = new SHA1Digest((SHA1Digest)digest);
138 int digest = SHA1; local
141 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize);
143 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param)
    [all...]
  /external/chromium/chrome/common/
visitedlink_common.cc 87 MD5Digest digest; local
88 MD5Final(&digest, &ctx);
90 // This is the same as "return *(Fingerprint*)&digest.a;" but if we do that
96 *reinterpret_cast<uint8(*)[8]>(&digest.a));
  /external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/util/
HashUtil.java 46 byte[] digest = m.digest(digestText.getBytes());
47 return encodeHex(digest);
49 Log.e(TAG, "Unable to find digest algorithm " + algorithm);
  /external/chromium_org/components/visitedlink/common/
visitedlink_common.cc 90 base::MD5Digest digest; local
91 base::MD5Final(&digest, &ctx);
93 // This is the same as "return *(Fingerprint*)&digest.a;" but if we do that
99 *reinterpret_cast<uint8(*)[8]>(&digest.a));
  /external/chromium_org/third_party/skia/src/utils/
SkBitmapHasher.cpp 46 SkMD5::Digest digest; local
47 out.finish(digest);
48 *result = first_8_bytes_as_uint64(digest.data);
  /external/chromium_org/third_party/tlslite/tlslite/
mathtls.py 36 A = hmac.HMAC(secret, A, hashModule).digest()
37 output = hmac.HMAC(secret, A+seed, hashModule).digest()
67 input = secretStr + sha.sha(A + secretStr + seedStr).digest()
68 output = md5.md5(input).digest()
82 .digest()).digest())
101 return stringToNumber(sha.sha(PAD(N, A) + PAD(N, B)).digest())
104 return stringToNumber(sha.sha(numberToString(N) + PAD(N, g)).digest())
165 def digest(self): member in class:MAC_SSL
173 h.update(self.inner.digest())
    [all...]
  /external/skia/src/utils/
SkBitmapHasher.cpp 46 SkMD5::Digest digest; local
47 out.finish(digest);
48 *result = first_8_bytes_as_uint64(digest.data);
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
MessageDigest1Test.java 124 * java.security.MessageDigest#digest()
128 assertEquals("incorrect result", 0, md.digest().length);
133 * java.security.MessageDigest#digest(byte[])
138 assertEquals("incorrect result", 0, md.digest(b).length);
143 * java.security.MessageDigest#digest(byte[], int, int)
148 assertEquals("incorrect result", 0, md.digest(b, 2, 3));
149 assertTrue("digest failed", md.runEngineDigest);
156 md.digest(null, 0, 1);
162 md.digest(bytes, 0, bytes.length + 1);
168 md.digest(bytes, Integer.MAX_VALUE, 1)
188 MessageDigest digest = MessageDigest.getInstance("TestDigest", new TestProvider()); local
    [all...]
  /sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/utils/
FingerprintUtils.java 38 MessageDigest digest = MessageDigest.getInstance(hashAlgorithm); local
39 return toHexadecimalString(digest.digest(cert.getEncoded()));
  /external/chromium_org/net/quic/
quic_crypto_server_stream.cc 107 uint8 digest[32]; local
108 hash->Finish(digest, sizeof(digest));
111 reinterpret_cast<const char*>(digest), sizeof(digest)), output);
  /external/skia/tests/
SHA1Test.cpp 10 static bool digests_equal(const SkSHA1::Digest& expectedDigest, const SkSHA1::Digest& computedDigest) {
22 const SkSHA1::Digest digest; member in struct:SHA1Test
42 SkSHA1::Digest digest; local
43 context.finish(digest);
45 REPORTER_ASSERT(reporter, digests_equal(test.digest, digest));
  /external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/
Socks5Client.java 44 /* SHA-1 digest identifying the SOCKS5 stream */
45 protected String digest; field in class:Socks5Client
51 * @param digest identifying the SOCKS5 Bytestream
53 public Socks5Client(StreamHost streamHost, String digest) {
55 this.digest = digest;
123 * requesting a stream for the given digest. Currently only the no-authentication method is
161 // request SOCKS5 connection with given address/digest
182 * type "domain" and the digest as address.
189 byte addr[] = this.digest.getBytes();
    [all...]
  /frameworks/base/core/java/android/content/pm/
ManifestDigest.java 34 * Represents the manifest digest for a package. This is suitable for comparison
42 /** The digest of the manifest in our preferred order. */
48 /** Digest algorithm to use. */
51 ManifestDigest(byte[] digest) {
52 mDigest = digest;
84 final byte[] digest = md.digest();
85 return new ManifestDigest(digest);
  /frameworks/base/obex/javax/obex/
ObexSession.java 70 * the authentication challenge and it represents the challenge digest
148 * 0x00 and is the response digest. The first optional tag is 0x01 and
163 byte[] digest = new byte[challenge.length + password.length + 1];
164 System.arraycopy(challenge, 0, digest, 0, challenge.length);
166 digest[challenge.length] = (byte)0x3A;
167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length);
169 // Add the Response Digest
173 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16);
  /libcore/luni/src/main/java/org/apache/harmony/security/provider/crypto/
SHA1_MessageDigestImpl.java 38 // - 82-86 - frame for current message digest
69 * digest - byte array
71 * offset - offset in digest
73 private void processDigest(byte[] digest, int offset) {
122 digest[j ] = (byte) ( k >>>24 ); // getting first byte from left
123 digest[j+1] = (byte) ( k >>>16 ); // getting second byte from left
124 digest[j+2] = (byte) ( k >>> 8 ); // getting third byte from left
125 digest[j+3] = (byte) ( k ); // getting fourth byte from left
151 * Computes a message digest value. <BR>
158 * byte array containing message digest valu
    [all...]
  /external/chromium_org/crypto/
hmac_unittest.cc 24 const char *digest; member in struct:__anon10567
92 const char *digest; member in struct:__anon10568
150 unsigned char digest[kSHA1DigestSize]; local
151 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize));
152 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize));
245 unsigned char digest[kSHA1DigestSize]; local
246 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize));
247 EXPECT_EQ(0, memcmp(kSimpleHmacCases[i].digest, digest, kSHA1DigestSize))
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/rsa/
rsa_sign.c 79 ASN1_OCTET_STRING digest; local
118 sig.digest= &digest;
119 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */
120 sig.digest->length=m_len;
277 if (md && (EVP_MD_size(md) != sig->digest->length))
282 memcpy(rm, sig->digest->data,
283 sig->digest->length);
284 *prm_len = sig->digest->length;
288 else if (((unsigned int)sig->digest->length != m_len) |
    [all...]
  /external/openssl/crypto/rsa/
rsa_sign.c 79 ASN1_OCTET_STRING digest; local
118 sig.digest= &digest;
119 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */
120 sig.digest->length=m_len;
277 if (md && (EVP_MD_size(md) != sig->digest->length))
282 memcpy(rm, sig->digest->data,
283 sig->digest->length);
284 *prm_len = sig->digest->length;
288 else if (((unsigned int)sig->digest->length != m_len) |
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
bio_ok.c 90 with it's length and suffixed with it's digest. So you need only
92 it's digest.
96 1) the digest of the block is computed over the whole stream
103 *) digest is initialized with random seed instead of
107 of the digest is also written to output.
110 and then compare the digest output.
439 *ppmd=ctx->md.digest;
487 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return 1;
489 if (!EVP_DigestInit_ex(md, md->digest, NULL))
494 RAND_pseudo_bytes(md->md_data, md->digest->md_size)
    [all...]
  /external/openssl/crypto/evp/
bio_ok.c 90 with it's length and suffixed with it's digest. So you need only
92 it's digest.
96 1) the digest of the block is computed over the whole stream
103 *) digest is initialized with random seed instead of
107 of the digest is also written to output.
110 and then compare the digest output.
439 *ppmd=ctx->md.digest;
487 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return 1;
489 if (!EVP_DigestInit_ex(md, md->digest, NULL))
494 RAND_pseudo_bytes(md->md_data, md->digest->md_size)
    [all...]
  /external/chromium/crypto/
hmac_unittest.cc 70 const char *digest; member in struct:__anon5297
128 unsigned char digest[kSHA1DigestSize]; local
129 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize));
130 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize));
217 const char *digest; member in struct:__anon5298
232 unsigned char digest[kSHA1DigestSize]; local
233 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize));
234 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize))
    [all...]
  /external/openssh/
ssh-rsa.c 45 u_char digest[EVP_MAX_MD_SIZE], *sig; local
62 EVP_DigestFinal(&md, digest, &dlen);
67 ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa);
68 memset(digest, 'd', sizeof(digest));
114 u_char digest[EVP_MAX_MD_SIZE], *sigblob; local
169 EVP_DigestFinal(&md, digest, &dlen);
171 ret = openssh_RSA_verify(nid, digest, dlen, sigblob, len, key->rsa);
172 memset(digest, 'd', sizeof(digest));
    [all...]
  /external/chromium_org/third_party/eyesfree/src/android/java/src/com/googlecode/eyesfree/braille/selfbraille/
SelfBrailleClient.java 169 MessageDigest digest; local
171 digest = MessageDigest.getInstance("SHA-1");
178 digest.update(signature.toByteArray());
179 if (MessageDigest.isEqual(EYES_FREE_CERT_SHA1, digest.digest())) {
182 digest.reset();
  /libcore/crypto/src/main/java/org/conscrypt/
PRF.java 61 "Could not initialize the Digest Algorithms."));
77 byte[] digest;
85 md5.update(sha.digest());
86 digest = md5.digest(); // length == 16
88 System.arraycopy(digest, 0, out, pos, out.length - pos);
91 System.arraycopy(digest, 0, out, pos, 16);

Completed in 4685 milliseconds

1 2 3 4 56 7 8 91011>>