/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
SHA512.java | 1 package org.bouncycastle.jcajce.provider.digest; 25 static public class Digest 29 public Digest() 37 Digest d = (Digest)super.clone(); 38 d.digest = new SHA512Digest((SHA512Digest)digest); 58 // d.digest = new SHA512tDigest((SHA512tDigest)digest); 167 provider.addAlgorithm("MessageDigest.SHA-512", PREFIX + "$Digest"); [all...] |
SHA1.java | 1 package org.bouncycastle.jcajce.provider.digest; 31 static public class Digest 35 public Digest() 43 Digest d = (Digest)super.clone(); 44 d.digest = new SHA1Digest((SHA1Digest)digest); 138 int digest = SHA1; local 141 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 143 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param) [all...] |
/external/chromium/chrome/common/ |
visitedlink_common.cc | 87 MD5Digest digest; local 88 MD5Final(&digest, &ctx); 90 // This is the same as "return *(Fingerprint*)&digest.a;" but if we do that 96 *reinterpret_cast<uint8(*)[8]>(&digest.a));
|
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/util/ |
HashUtil.java | 46 byte[] digest = m.digest(digestText.getBytes()); 47 return encodeHex(digest); 49 Log.e(TAG, "Unable to find digest algorithm " + algorithm);
|
/external/chromium_org/components/visitedlink/common/ |
visitedlink_common.cc | 90 base::MD5Digest digest; local 91 base::MD5Final(&digest, &ctx); 93 // This is the same as "return *(Fingerprint*)&digest.a;" but if we do that 99 *reinterpret_cast<uint8(*)[8]>(&digest.a));
|
/external/chromium_org/third_party/skia/src/utils/ |
SkBitmapHasher.cpp | 46 SkMD5::Digest digest; local 47 out.finish(digest); 48 *result = first_8_bytes_as_uint64(digest.data);
|
/external/chromium_org/third_party/tlslite/tlslite/ |
mathtls.py | 36 A = hmac.HMAC(secret, A, hashModule).digest() 37 output = hmac.HMAC(secret, A+seed, hashModule).digest() 67 input = secretStr + sha.sha(A + secretStr + seedStr).digest() 68 output = md5.md5(input).digest() 82 .digest()).digest()) 101 return stringToNumber(sha.sha(PAD(N, A) + PAD(N, B)).digest()) 104 return stringToNumber(sha.sha(numberToString(N) + PAD(N, g)).digest()) 165 def digest(self): member in class:MAC_SSL 173 h.update(self.inner.digest()) [all...] |
/external/skia/src/utils/ |
SkBitmapHasher.cpp | 46 SkMD5::Digest digest; local 47 out.finish(digest); 48 *result = first_8_bytes_as_uint64(digest.data);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest1Test.java | 124 * java.security.MessageDigest#digest() 128 assertEquals("incorrect result", 0, md.digest().length); 133 * java.security.MessageDigest#digest(byte[]) 138 assertEquals("incorrect result", 0, md.digest(b).length); 143 * java.security.MessageDigest#digest(byte[], int, int) 148 assertEquals("incorrect result", 0, md.digest(b, 2, 3)); 149 assertTrue("digest failed", md.runEngineDigest); 156 md.digest(null, 0, 1); 162 md.digest(bytes, 0, bytes.length + 1); 168 md.digest(bytes, Integer.MAX_VALUE, 1) 188 MessageDigest digest = MessageDigest.getInstance("TestDigest", new TestProvider()); local [all...] |
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/utils/ |
FingerprintUtils.java | 38 MessageDigest digest = MessageDigest.getInstance(hashAlgorithm); local 39 return toHexadecimalString(digest.digest(cert.getEncoded()));
|
/external/chromium_org/net/quic/ |
quic_crypto_server_stream.cc | 107 uint8 digest[32]; local 108 hash->Finish(digest, sizeof(digest)); 111 reinterpret_cast<const char*>(digest), sizeof(digest)), output);
|
/external/skia/tests/ |
SHA1Test.cpp | 10 static bool digests_equal(const SkSHA1::Digest& expectedDigest, const SkSHA1::Digest& computedDigest) { 22 const SkSHA1::Digest digest; member in struct:SHA1Test 42 SkSHA1::Digest digest; local 43 context.finish(digest); 45 REPORTER_ASSERT(reporter, digests_equal(test.digest, digest));
|
/external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/ |
Socks5Client.java | 44 /* SHA-1 digest identifying the SOCKS5 stream */
45 protected String digest;
field in class:Socks5Client 51 * @param digest identifying the SOCKS5 Bytestream
53 public Socks5Client(StreamHost streamHost, String digest) {
55 this.digest = digest;
123 * requesting a stream for the given digest. Currently only the no-authentication method is
161 // request SOCKS5 connection with given address/digest
182 * type "domain" and the digest as address.
189 byte addr[] = this.digest.getBytes(); [all...] |
/frameworks/base/core/java/android/content/pm/ |
ManifestDigest.java | 34 * Represents the manifest digest for a package. This is suitable for comparison 42 /** The digest of the manifest in our preferred order. */ 48 /** Digest algorithm to use. */ 51 ManifestDigest(byte[] digest) { 52 mDigest = digest; 84 final byte[] digest = md.digest(); 85 return new ManifestDigest(digest);
|
/frameworks/base/obex/javax/obex/ |
ObexSession.java | 70 * the authentication challenge and it represents the challenge digest 148 * 0x00 and is the response digest. The first optional tag is 0x01 and 163 byte[] digest = new byte[challenge.length + password.length + 1]; 164 System.arraycopy(challenge, 0, digest, 0, challenge.length); 166 digest[challenge.length] = (byte)0x3A; 167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); 169 // Add the Response Digest 173 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16);
|
/libcore/luni/src/main/java/org/apache/harmony/security/provider/crypto/ |
SHA1_MessageDigestImpl.java | 38 // - 82-86 - frame for current message digest 69 * digest - byte array 71 * offset - offset in digest 73 private void processDigest(byte[] digest, int offset) { 122 digest[j ] = (byte) ( k >>>24 ); // getting first byte from left 123 digest[j+1] = (byte) ( k >>>16 ); // getting second byte from left 124 digest[j+2] = (byte) ( k >>> 8 ); // getting third byte from left 125 digest[j+3] = (byte) ( k ); // getting fourth byte from left 151 * Computes a message digest value. <BR> 158 * byte array containing message digest valu [all...] |
/external/chromium_org/crypto/ |
hmac_unittest.cc | 24 const char *digest; member in struct:__anon10567 92 const char *digest; member in struct:__anon10568 150 unsigned char digest[kSHA1DigestSize]; local 151 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); 152 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize)); 245 unsigned char digest[kSHA1DigestSize]; local 246 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); 247 EXPECT_EQ(0, memcmp(kSimpleHmacCases[i].digest, digest, kSHA1DigestSize)) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_sign.c | 79 ASN1_OCTET_STRING digest; local 118 sig.digest= &digest; 119 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */ 120 sig.digest->length=m_len; 277 if (md && (EVP_MD_size(md) != sig->digest->length)) 282 memcpy(rm, sig->digest->data, 283 sig->digest->length); 284 *prm_len = sig->digest->length; 288 else if (((unsigned int)sig->digest->length != m_len) | [all...] |
/external/openssl/crypto/rsa/ |
rsa_sign.c | 79 ASN1_OCTET_STRING digest; local 118 sig.digest= &digest; 119 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */ 120 sig.digest->length=m_len; 277 if (md && (EVP_MD_size(md) != sig->digest->length)) 282 memcpy(rm, sig->digest->data, 283 sig->digest->length); 284 *prm_len = sig->digest->length; 288 else if (((unsigned int)sig->digest->length != m_len) | [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
bio_ok.c | 90 with it's length and suffixed with it's digest. So you need only 92 it's digest. 96 1) the digest of the block is computed over the whole stream 103 *) digest is initialized with random seed instead of 107 of the digest is also written to output. 110 and then compare the digest output. 439 *ppmd=ctx->md.digest; 487 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return 1; 489 if (!EVP_DigestInit_ex(md, md->digest, NULL)) 494 RAND_pseudo_bytes(md->md_data, md->digest->md_size) [all...] |
/external/openssl/crypto/evp/ |
bio_ok.c | 90 with it's length and suffixed with it's digest. So you need only 92 it's digest. 96 1) the digest of the block is computed over the whole stream 103 *) digest is initialized with random seed instead of 107 of the digest is also written to output. 110 and then compare the digest output. 439 *ppmd=ctx->md.digest; 487 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return 1; 489 if (!EVP_DigestInit_ex(md, md->digest, NULL)) 494 RAND_pseudo_bytes(md->md_data, md->digest->md_size) [all...] |
/external/chromium/crypto/ |
hmac_unittest.cc | 70 const char *digest; member in struct:__anon5297 128 unsigned char digest[kSHA1DigestSize]; local 129 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); 130 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize)); 217 const char *digest; member in struct:__anon5298 232 unsigned char digest[kSHA1DigestSize]; local 233 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); 234 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize)) [all...] |
/external/openssh/ |
ssh-rsa.c | 45 u_char digest[EVP_MAX_MD_SIZE], *sig; local 62 EVP_DigestFinal(&md, digest, &dlen); 67 ok = RSA_sign(nid, digest, dlen, sig, &len, key->rsa); 68 memset(digest, 'd', sizeof(digest)); 114 u_char digest[EVP_MAX_MD_SIZE], *sigblob; local 169 EVP_DigestFinal(&md, digest, &dlen); 171 ret = openssh_RSA_verify(nid, digest, dlen, sigblob, len, key->rsa); 172 memset(digest, 'd', sizeof(digest)); [all...] |
/external/chromium_org/third_party/eyesfree/src/android/java/src/com/googlecode/eyesfree/braille/selfbraille/ |
SelfBrailleClient.java | 169 MessageDigest digest; local 171 digest = MessageDigest.getInstance("SHA-1"); 178 digest.update(signature.toByteArray()); 179 if (MessageDigest.isEqual(EYES_FREE_CERT_SHA1, digest.digest())) { 182 digest.reset();
|
/libcore/crypto/src/main/java/org/conscrypt/ |
PRF.java | 61 "Could not initialize the Digest Algorithms.")); 77 byte[] digest; 85 md5.update(sha.digest()); 86 digest = md5.digest(); // length == 16 88 System.arraycopy(digest, 0, out, pos, out.length - pos); 91 System.arraycopy(digest, 0, out, pos, 16);
|