/frameworks/base/core/java/android/content/pm/ |
ManifestDigest.java | 35 * Represents the manifest digest for a package. This is suitable for comparison 44 /** The digest of the manifest in our preferred order. */ 50 /** Digest algorithm to use. */ 53 ManifestDigest(byte[] digest) { 54 mDigest = digest; 86 final byte[] digest = md.digest(); 87 return new ManifestDigest(digest);
|
/frameworks/base/obex/javax/obex/ |
ObexSession.java | 70 * the authentication challenge and it represents the challenge digest 148 * 0x00 and is the response digest. The first optional tag is 0x01 and 163 byte[] digest = new byte[challenge.length + password.length + 1]; 164 System.arraycopy(challenge, 0, digest, 0, challenge.length); 166 digest[challenge.length] = (byte)0x3A; 167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); 169 // Add the Response Digest 173 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16);
|
/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_sign.c | 79 ASN1_OCTET_STRING digest; local 118 sig.digest= &digest; 119 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */ 120 sig.digest->length=m_len; 277 if (md && (EVP_MD_size(md) != sig->digest->length)) 282 memcpy(rm, sig->digest->data, 283 sig->digest->length); 284 *prm_len = sig->digest->length; 288 else if (((unsigned int)sig->digest->length != m_len) | [all...] |
/external/openssl/crypto/rsa/ |
rsa_sign.c | 79 ASN1_OCTET_STRING digest; local 118 sig.digest= &digest; 119 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */ 120 sig.digest->length=m_len; 277 if (md && (EVP_MD_size(md) != sig->digest->length)) 282 memcpy(rm, sig->digest->data, 283 sig->digest->length); 284 *prm_len = sig->digest->length; 288 else if (((unsigned int)sig->digest->length != m_len) | [all...] |
/external/chromium_org/crypto/ |
hmac_unittest.cc | 24 const char *digest; member in struct:__anon12196 92 const char *digest; member in struct:__anon12197 150 unsigned char digest[kSHA1DigestSize]; local 151 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); 152 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize)); 245 unsigned char digest[kSHA1DigestSize]; local 246 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize)); 247 EXPECT_EQ(0, memcmp(kSimpleHmacCases[i].digest, digest, kSHA1DigestSize)) 289 unsigned char digest[kSHA1DigestSize]; local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
bio_ok.c | 90 with it's length and suffixed with it's digest. So you need only 92 it's digest. 96 1) the digest of the block is computed over the whole stream 103 *) digest is initialized with random seed instead of 107 of the digest is also written to output. 110 and then compare the digest output. 439 *ppmd=ctx->md.digest; 487 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return 1; 489 if (!EVP_DigestInit_ex(md, md->digest, NULL)) 494 RAND_pseudo_bytes(md->md_data, md->digest->md_size) [all...] |
/external/openssl/crypto/evp/ |
bio_ok.c | 90 with it's length and suffixed with it's digest. So you need only 92 it's digest. 96 1) the digest of the block is computed over the whole stream 103 *) digest is initialized with random seed instead of 107 of the digest is also written to output. 110 and then compare the digest output. 439 *ppmd=ctx->md.digest; 487 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return 1; 489 if (!EVP_DigestInit_ex(md, md->digest, NULL)) 494 RAND_pseudo_bytes(md->md_data, md->digest->md_size) [all...] |
/external/pdfium/core/src/fdrm/crypto/ |
fx_crypt_sha.cpp | 27 static void SHATransform(unsigned int * digest, unsigned int * block)
39 a = digest[0];
40 b = digest[1];
41 c = digest[2];
42 d = digest[3];
43 e = digest[4];
79 digest[0] += a;
80 digest[1] += b;
81 digest[2] += c;
82 digest[3] += d; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
SHA1.java | 1 package org.bouncycastle.jcajce.provider.digest; 31 static public class Digest 35 public Digest() 43 Digest d = (Digest)super.clone(); 44 d.digest = new SHA1Digest((SHA1Digest)digest); 138 int digest = SHA1; local 141 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 143 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param) [all...] |
/external/chromium_org/third_party/eyesfree/src/android/java/src/com/googlecode/eyesfree/braille/selfbraille/ |
SelfBrailleClient.java | 169 MessageDigest digest; local 171 digest = MessageDigest.getInstance("SHA-1"); 178 digest.update(signature.toByteArray()); 179 if (MessageDigest.isEqual(EYES_FREE_CERT_SHA1, digest.digest())) { 182 digest.reset();
|
/external/chromium_org/crypto/third_party/nss/ |
chromium-blapi.h | 54 extern void SHA256_End(SHA256Context *cx, unsigned char *digest, 72 extern void SHA512_End(SHA512Context *cx, unsigned char *digest, 90 extern void SHA384_End(SHA384Context *cx, unsigned char *digest,
|
/external/chromium_org/google_apis/gcm/engine/ |
gservices_settings_unittest.cc | 78 // Verifies default values of the G-services settings and settings digest. 81 EXPECT_EQ(kDefaultSettingsDigest, settings().digest()); 86 // Verifies digest calculation for the sample provided by protocol owners. 109 EXPECT_EQ(kDefaultSettingsDigest, settings().digest()); 112 // Verifies that settings are not when digest value does not match. 120 EXPECT_EQ(kDefaultSettingsDigest, settings().digest()); 146 settings().digest()); 163 settings().digest()); 188 settings().digest()); 214 settings().digest()); 305 std::string digest = GServicesSettings::CalculateDigest(full_settings); local [all...] |
/external/openssl/crypto/cms/ |
cms_dd.c | 123 if (mdlen != (unsigned int)dd->digest->length) 130 if (memcmp(md, dd->digest->data, mdlen)) 138 if (!ASN1_STRING_set(dd->digest, md, mdlen))
|
/external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/ |
Socks5ClientForInitiator.java | 50 * @param digest identifying the SOCKS5 Bytestream
55 public Socks5ClientForInitiator(StreamHost streamHost, String digest, Connection connection,
57 super(streamHost, digest);
70 socket = socks5Server.getSocket(this.digest);
|
/external/chromium_org/net/quic/crypto/ |
channel_id_openssl.cc | 83 unsigned char digest[SHA256_DIGEST_LENGTH]; local 84 SHA256_Final(digest, &sha256); 86 return ECDSA_do_verify(digest, sizeof(digest), &sig, ecdsa_key.get()) == 1;
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
sslfingerprint.h | 63 talk_base::Buffer digest; member in struct:talk_base::SSLFingerprint
|
/external/chromium_org/third_party/openssl/openssl/android.testssl/ |
testssl.sh | 29 digest='-sha1' 31 x509cmd="adb shell /system/bin/openssl x509 $digest"
|
/external/chromium_org/third_party/openssl/openssl/patches/ |
testssl.sh | 29 digest='-sha1' 31 x509cmd="adb shell /system/bin/openssl x509 $digest"
|
/external/chromium_org/third_party/webrtc/base/ |
sslfingerprint.h | 45 rtc::Buffer digest; member in struct:rtc::SSLFingerprint
|
/external/glide/library/src/main/java/com/bumptech/glide/load/resource/gif/ |
GifResourceDecoder.java | 48 MessageDigest digest = MessageDigest.getInstance("SHA-1"); local 49 digest.update(data); 50 return Util.sha256BytesToHex(digest.digest());
|
/external/guava/guava-tests/test/com/google/common/hash/ |
MessageDigestHashFunctionTest.java | 31 MessageDigest.getInstance(algorithmName).digest(input),
|
/external/lzma/CS/7zip/Common/ |
CRC.cs | 50 static bool VerifyDigest(uint digest, byte[] data, uint offset, uint size)
52 return (CalculateDigest(data, offset, size) == digest);
|
/external/openssl/android.testssl/ |
testssl.sh | 29 digest='-sha1' 31 x509cmd="adb shell /system/bin/openssl x509 $digest"
|
/external/openssl/patches/ |
testssl.sh | 29 digest='-sha1' 31 x509cmd="adb shell /system/bin/openssl x509 $digest"
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
hmac.py | 63 _warnings.warn('No block_size attribute on given digest object; ' 69 key = self.digest_cons(key).digest() 100 To be used only internally with digest() and hexdigest(). 103 h.update(self.inner.digest()) 106 def digest(self): member in class:HMAC 114 return h.digest() 117 """Like digest(), but returns a string of hexadecimal digits instead. 130 method, and can ask for the hash value at any time by calling its digest()
|