HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 151 - 175 of 714) sorted by null

1 2 3 4 5 67 8 91011>>

  /frameworks/base/core/java/android/content/pm/
ManifestDigest.java 35 * Represents the manifest digest for a package. This is suitable for comparison
44 /** The digest of the manifest in our preferred order. */
50 /** Digest algorithm to use. */
53 ManifestDigest(byte[] digest) {
54 mDigest = digest;
86 final byte[] digest = md.digest();
87 return new ManifestDigest(digest);
  /frameworks/base/obex/javax/obex/
ObexSession.java 70 * the authentication challenge and it represents the challenge digest
148 * 0x00 and is the response digest. The first optional tag is 0x01 and
163 byte[] digest = new byte[challenge.length + password.length + 1];
164 System.arraycopy(challenge, 0, digest, 0, challenge.length);
166 digest[challenge.length] = (byte)0x3A;
167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length);
169 // Add the Response Digest
173 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16);
  /external/chromium_org/third_party/openssl/openssl/crypto/rsa/
rsa_sign.c 79 ASN1_OCTET_STRING digest; local
118 sig.digest= &digest;
119 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */
120 sig.digest->length=m_len;
277 if (md && (EVP_MD_size(md) != sig->digest->length))
282 memcpy(rm, sig->digest->data,
283 sig->digest->length);
284 *prm_len = sig->digest->length;
288 else if (((unsigned int)sig->digest->length != m_len) |
    [all...]
  /external/openssl/crypto/rsa/
rsa_sign.c 79 ASN1_OCTET_STRING digest; local
118 sig.digest= &digest;
119 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */
120 sig.digest->length=m_len;
277 if (md && (EVP_MD_size(md) != sig->digest->length))
282 memcpy(rm, sig->digest->data,
283 sig->digest->length);
284 *prm_len = sig->digest->length;
288 else if (((unsigned int)sig->digest->length != m_len) |
    [all...]
  /external/chromium_org/crypto/
hmac_unittest.cc 24 const char *digest; member in struct:__anon12196
92 const char *digest; member in struct:__anon12197
150 unsigned char digest[kSHA1DigestSize]; local
151 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize));
152 EXPECT_EQ(0, memcmp(cases[i].digest, digest, kSHA1DigestSize));
245 unsigned char digest[kSHA1DigestSize]; local
246 EXPECT_TRUE(hmac.Sign(data_string, digest, kSHA1DigestSize));
247 EXPECT_EQ(0, memcmp(kSimpleHmacCases[i].digest, digest, kSHA1DigestSize))
289 unsigned char digest[kSHA1DigestSize]; local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
bio_ok.c 90 with it's length and suffixed with it's digest. So you need only
92 it's digest.
96 1) the digest of the block is computed over the whole stream
103 *) digest is initialized with random seed instead of
107 of the digest is also written to output.
110 and then compare the digest output.
439 *ppmd=ctx->md.digest;
487 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return 1;
489 if (!EVP_DigestInit_ex(md, md->digest, NULL))
494 RAND_pseudo_bytes(md->md_data, md->digest->md_size)
    [all...]
  /external/openssl/crypto/evp/
bio_ok.c 90 with it's length and suffixed with it's digest. So you need only
92 it's digest.
96 1) the digest of the block is computed over the whole stream
103 *) digest is initialized with random seed instead of
107 of the digest is also written to output.
110 and then compare the digest output.
439 *ppmd=ctx->md.digest;
487 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return 1;
489 if (!EVP_DigestInit_ex(md, md->digest, NULL))
494 RAND_pseudo_bytes(md->md_data, md->digest->md_size)
    [all...]
  /external/pdfium/core/src/fdrm/crypto/
fx_crypt_sha.cpp 27 static void SHATransform(unsigned int * digest, unsigned int * block)
39 a = digest[0];
40 b = digest[1];
41 c = digest[2];
42 d = digest[3];
43 e = digest[4];
79 digest[0] += a;
80 digest[1] += b;
81 digest[2] += c;
82 digest[3] += d;
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
SHA1.java 1 package org.bouncycastle.jcajce.provider.digest;
31 static public class Digest
35 public Digest()
43 Digest d = (Digest)super.clone();
44 d.digest = new SHA1Digest((SHA1Digest)digest);
138 int digest = SHA1; local
141 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize);
143 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param)
    [all...]
  /external/chromium_org/third_party/eyesfree/src/android/java/src/com/googlecode/eyesfree/braille/selfbraille/
SelfBrailleClient.java 169 MessageDigest digest; local
171 digest = MessageDigest.getInstance("SHA-1");
178 digest.update(signature.toByteArray());
179 if (MessageDigest.isEqual(EYES_FREE_CERT_SHA1, digest.digest())) {
182 digest.reset();
  /external/chromium_org/crypto/third_party/nss/
chromium-blapi.h 54 extern void SHA256_End(SHA256Context *cx, unsigned char *digest,
72 extern void SHA512_End(SHA512Context *cx, unsigned char *digest,
90 extern void SHA384_End(SHA384Context *cx, unsigned char *digest,
  /external/chromium_org/google_apis/gcm/engine/
gservices_settings_unittest.cc 78 // Verifies default values of the G-services settings and settings digest.
81 EXPECT_EQ(kDefaultSettingsDigest, settings().digest());
86 // Verifies digest calculation for the sample provided by protocol owners.
109 EXPECT_EQ(kDefaultSettingsDigest, settings().digest());
112 // Verifies that settings are not when digest value does not match.
120 EXPECT_EQ(kDefaultSettingsDigest, settings().digest());
146 settings().digest());
163 settings().digest());
188 settings().digest());
214 settings().digest());
305 std::string digest = GServicesSettings::CalculateDigest(full_settings); local
    [all...]
  /external/openssl/crypto/cms/
cms_dd.c 123 if (mdlen != (unsigned int)dd->digest->length)
130 if (memcmp(md, dd->digest->data, mdlen))
138 if (!ASN1_STRING_set(dd->digest, md, mdlen))
  /external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/
Socks5ClientForInitiator.java 50 * @param digest identifying the SOCKS5 Bytestream
55 public Socks5ClientForInitiator(StreamHost streamHost, String digest, Connection connection,
57 super(streamHost, digest);
70 socket = socks5Server.getSocket(this.digest);
  /external/chromium_org/net/quic/crypto/
channel_id_openssl.cc 83 unsigned char digest[SHA256_DIGEST_LENGTH]; local
84 SHA256_Final(digest, &sha256);
86 return ECDSA_do_verify(digest, sizeof(digest), &sig, ecdsa_key.get()) == 1;
  /external/chromium_org/third_party/libjingle/source/talk/base/
sslfingerprint.h 63 talk_base::Buffer digest; member in struct:talk_base::SSLFingerprint
  /external/chromium_org/third_party/openssl/openssl/android.testssl/
testssl.sh 29 digest='-sha1'
31 x509cmd="adb shell /system/bin/openssl x509 $digest"
  /external/chromium_org/third_party/openssl/openssl/patches/
testssl.sh 29 digest='-sha1'
31 x509cmd="adb shell /system/bin/openssl x509 $digest"
  /external/chromium_org/third_party/webrtc/base/
sslfingerprint.h 45 rtc::Buffer digest; member in struct:rtc::SSLFingerprint
  /external/glide/library/src/main/java/com/bumptech/glide/load/resource/gif/
GifResourceDecoder.java 48 MessageDigest digest = MessageDigest.getInstance("SHA-1"); local
49 digest.update(data);
50 return Util.sha256BytesToHex(digest.digest());
  /external/guava/guava-tests/test/com/google/common/hash/
MessageDigestHashFunctionTest.java 31 MessageDigest.getInstance(algorithmName).digest(input),
  /external/lzma/CS/7zip/Common/
CRC.cs 50 static bool VerifyDigest(uint digest, byte[] data, uint offset, uint size)
52 return (CalculateDigest(data, offset, size) == digest);
  /external/openssl/android.testssl/
testssl.sh 29 digest='-sha1'
31 x509cmd="adb shell /system/bin/openssl x509 $digest"
  /external/openssl/patches/
testssl.sh 29 digest='-sha1'
31 x509cmd="adb shell /system/bin/openssl x509 $digest"
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
hmac.py 63 _warnings.warn('No block_size attribute on given digest object; '
69 key = self.digest_cons(key).digest()
100 To be used only internally with digest() and hexdigest().
103 h.update(self.inner.digest())
106 def digest(self): member in class:HMAC
114 return h.digest()
117 """Like digest(), but returns a string of hexadecimal digits instead.
130 method, and can ask for the hash value at any time by calling its digest()

Completed in 1374 milliseconds

1 2 3 4 5 67 8 91011>>