/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
BCMessageDigest.java | 1 package org.bouncycastle.jcajce.provider.digest; 5 import org.bouncycastle.crypto.Digest; 10 protected Digest digest; field in class:BCMessageDigest 13 Digest digest) 15 super(digest.getAlgorithmName()); 17 this.digest = digest; 22 digest.reset() [all...] |
/libcore/luni/src/main/java/java/security/ |
DigestInputStream.java | 26 * associated message digest. 31 * The message digest for this stream. 33 protected MessageDigest digest; field in class:DigestInputStream 35 // Indicates whether digest functionality is on or off 40 * given {@code stream} and the {@code digest}. 47 * @param digest 48 * the message digest. 50 public DigestInputStream(InputStream stream, MessageDigest digest) { 52 this.digest = digest; [all...] |
DigestOutputStream.java | 26 * associated message digest. 31 * The message digest for this stream. 33 protected MessageDigest digest; field in class:DigestOutputStream 35 // Indicates whether digest functionality is on or off 40 * given {@code stream} and the {@code digest}. 44 * @param digest 45 * the message digest. 47 public DigestOutputStream(OutputStream stream, MessageDigest digest) { 49 this.digest = digest; [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/ |
RawContentVerifier.java | 5 * verified using the digest of the calculated data. 10 * Verify that the expected signature value was derived from the passed in digest. 12 * @param digest digest calculated from the content. 14 * @return true if the expected signature is derived from the digest, false otherwise. 16 boolean verify(byte[] digest, byte[] expected);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
HMac.java | 6 import org.bouncycastle.crypto.Digest; 24 private Digest digest; field in class:HMac 67 Digest digest) 69 if (digest instanceof ExtendedDigest) 71 return ((ExtendedDigest)digest).getByteLength(); 74 Integer b = (Integer)blockLengths.get(digest.getAlgorithmName()); 78 throw new IllegalArgumentException("unknown digest passed: " + digest.getAlgorithmName()) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
DigestOutputStream.java | 6 import org.bouncycastle.crypto.Digest; 11 protected Digest digest; field in class:DigestOutputStream 14 Digest Digest) 16 this.digest = Digest; 22 digest.update((byte)b); 31 digest.update(b, off, len); 36 byte[] res = new byte[digest.getDigestSize()] [all...] |
DigestInputStream.java | 7 import org.bouncycastle.crypto.Digest; 12 protected Digest digest; field in class:DigestInputStream 16 Digest digest) 19 this.digest = digest; 29 digest.update((byte)b); 43 digest.update(b, off, n); 48 public Digest getDigest( [all...] |
/external/smack/src/org/xbill/DNS/utils/ |
HMAC.java | 16 private MessageDigest digest; field in class:HMAC 29 key = digest.digest(key); 30 digest.reset(); 42 digest.update(ipad); 47 * @param digest The message digest object. 48 * @param blockLength The block length of the message digest. 52 HMAC(MessageDigest digest, int blockLength, byte [] key) { 53 digest.reset() [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
stringdigest.cc | 39 unsigned char digest[16]; local 40 MD5Final(digest, &ctx); 43 hex_digest += hex_encode(digest[i] >> 4); 44 hex_digest += hex_encode(digest[i] & 0xf);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS5S1ParametersGenerator.java | 4 import org.bouncycastle.crypto.Digest; 12 * digest used to drive it. 21 private Digest digest; field in class:PKCS5S1ParametersGenerator 26 * @param digest the digest to be used as the source of derived keys. 29 Digest digest) 31 this.digest = digest; [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
messagedigest.cc | 56 MessageDigest* digest = new OpenSSLDigest(alg); local 57 if (digest->Size() == 0) { // invalid algorithm 58 delete digest; 59 digest = NULL; 61 return digest; 63 MessageDigest* digest = NULL; 65 digest = new Md5Digest(); 67 digest = new Sha1Digest(); 69 return digest; 73 size_t ComputeDigest(MessageDigest* digest, const void* input, size_t in_len [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/digest/ |
Digest.java | 5 package ch.ethz.ssh2.crypto.digest; 8 * Digest. 13 public interface Digest 25 public void digest(byte[] out); method in interface:Digest 27 public void digest(byte[] out, int off); method in interface:Digest
|
/external/chromium_org/crypto/ |
hmac.cc | 37 const base::StringPiece& digest) const { 38 if (digest.size() != DigestLength()) 40 return VerifyTruncated(data, digest); 44 const base::StringPiece& digest) const { 45 if (digest.empty()) 53 return SecureMemEqual(digest.data(), computed_digest.get(), 54 std::min(digest.size(), digest_length));
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
DigestInputStream2Test.java | 33 MessageDigest digest; field in class:DigestInputStream2Test 42 DigestInputStream dis = new DigestInputStream(inStream, digest); 52 DigestInputStream dis = new DigestInputStream(inStream, digest); 53 assertEquals("getMessageDigest returned a bogus result", digest, dis 62 MessageDigest originalDigest = (MessageDigest) (digest.clone()); 63 MessageDigest noChangeDigest = (MessageDigest) (digest.clone()); 71 // make sure the digest for the part where it was off has not 74 MessageDigest.isEqual(noChangeDigest.digest(), originalDigest 75 .digest())); 76 MessageDigest changeDigest = (MessageDigest) (digest.clone()) [all...] |
/cts/tools/tradefed-host/tests/src/com/android/cts/tradefed/testtype/ |
TestPackageDefTest.java | 31 * digest is generated for fixed data. 37 return new ByteArrayInputStream("test data for digest".getBytes()); 40 String digest = def.generateDigest(new File("unused"), "alsounused"); local 41 assertNotNull(digest); 42 assertEquals("58c222b5f5f81b4b58891ec59924b9b2f530452e", digest);
|
/external/chromium_org/base/ |
md5.h | 13 // MD5 stands for Message Digest algorithm 5. 31 // MD5Digest digest; // the result of the computation 32 // MD5Final(&digest, &ctx); 34 // You can call MD5DigestToBase16() to generate a string of the digest. 46 // The given 'digest' structure will be filled with the result data. 47 BASE_EXPORT void MD5Sum(const void* data, size_t length, MD5Digest* digest); 58 // Finalizes the MD5 operation and fills the buffer with the digest. 59 BASE_EXPORT void MD5Final(MD5Digest* digest, MD5Context* context); 61 // Converts a digest into human-readable hexadecimal. 62 BASE_EXPORT std::string MD5DigestToBase16(const MD5Digest& digest); [all...] |
/external/chromium_org/third_party/libaddressinput/chromium/cpp/src/util/ |
md5.h | 16 // MD5 stands for Message Digest algorithm 5. 34 // MD5Digest digest; // the result of the computation 35 // MD5Final(&digest, &ctx); 37 // You can call MD5DigestToBase16() to generate a string of the digest. 49 // The given 'digest' structure will be filled with the result data. 50 void MD5Sum(const void* data, size_t length, MD5Digest* digest); 61 // Finalizes the MD5 operation and fills the buffer with the digest. 62 void MD5Final(MD5Digest* digest, MD5Context* context); 64 // Converts a digest into human-readable hexadecimal. 65 std::string MD5DigestToBase16(const MD5Digest& digest); [all...] |
/external/ppp/pppd/ |
chap-new.h | 45 * CHAP digest codes. 66 /* Return the digest alg. ID for the most preferred digest type. */ 73 /* Return the bit flag (lsb set) for our most preferred digest type. */ 76 /* Return the bit flag for a given digest algorithm ID. */ 77 #define CHAP_MDTYPE_D(digest) \ 78 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 79 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 80 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 83 /* Can we do the requested digest? * [all...] |
/external/smack/src/org/xbill/DNS/ |
DLVRecord.java | 20 public static final int SHA1_DIGEST_ID = DSRecord.Digest.SHA1; 21 public static final int SHA256_DIGEST_ID = DSRecord.Digest.SHA1; 28 private byte [] digest; field in class:DLVRecord 41 * @param digestid The digest id code. 42 * @param digest A hash of the original key. 46 int digestid, byte [] digest) 52 this.digest = digest; 60 digest = in.readByteArray(); 68 digest = st.getHex() [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
PBESecretKeyFactory.java | 18 private int digest; field in class:PBESecretKeyFactory 27 int digest, 35 this.digest = digest; 51 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 56 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 60 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 63 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
DigestInputStream2Test.java | 33 MessageDigest digest; field in class:DigestInputStream2Test 42 DigestInputStream dis = new DigestInputStream(inStream, digest); 52 DigestInputStream dis = new DigestInputStream(inStream, digest); 53 assertEquals("getMessageDigest returned a bogus result", digest, dis 62 MessageDigest originalDigest = (MessageDigest) (digest.clone()); 63 MessageDigest noChangeDigest = (MessageDigest) (digest.clone()); 71 // make sure the digest for the part where it was off has not 74 MessageDigest.isEqual(noChangeDigest.digest(), originalDigest 75 .digest())); 76 MessageDigest changeDigest = (MessageDigest) (digest.clone()) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
DSABase.java | 11 import org.bouncycastle.crypto.Digest; 17 protected Digest digest; field in class:DSABase 22 Digest digest, 26 this.digest = digest; 35 digest.update(b); 44 digest.update(b, off, len); 50 byte[] hash = new byte[digest.getDigestSize()] [all...] |
/external/smack/src/org/jivesoftware/smack/packet/ |
Authentication.java | 33 private String digest = null; field in class:Authentication 86 * Returns the password digest or <tt>null</tt> if the digest hasn't 88 * authentication compared to plain text. The digest is the hex-encoded 90 * digest and password are set, digest authentication will be used. If 93 * @return the digest of the user's password. 96 return digest; 100 * Sets the digest value using a connection ID and password. Password 102 * plain text. The digest is the hex-encoded SHA-1 hash of the connection I [all...] |
/libcore/support/src/test/java/tests/security/ |
MessageDigestTest.java | 33 private MessageDigest digest; field in class:MessageDigestTest 42 this.digest = getMessageDigest(); 63 digest = null; 75 fail("failed to get digest instance: " + e); 82 assertNotNull("digest source data not found: " + digestAlgorithmName, sourceStream); 89 byte[] checkDigest = new byte[digest.getDigestLength()]; 98 fail("failed to read digest golden data: " + digestAlgorithmName); 108 digest.update(buf, 0, read); 112 fail("failed to read digest data"); 115 byte[] computedDigest = digest.digest() [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
DigestInfo.java | 19 * digest OCTET STRING } 25 private byte[] digest; field in class:DigestInfo 52 byte[] digest) 54 this.digest = digest; 64 digest = ASN1OctetString.getInstance(e.nextElement()).getOctets(); 74 return digest; 82 v.add(new DEROctetString(digest));
|