/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertBlacklist.java | 32 import org.bouncycastle.crypto.Digest; 212 Digest digest = AndroidDigestFactory.getSHA1(); local 213 digest.update(encoded, 0, encoded.length); 214 byte[] out = new byte[digest.getDigestSize()]; 215 digest.doFinal(out, 0);
|
/external/chromium_org/google_apis/gcm/engine/ |
gservices_settings.h | 32 // Calculates digest of provided settings. 48 std::string digest() const { return digest_; } function in class:gcm::GServicesSettings 66 // Digest (hash) of the settings, used to check whether settings need update.
|
gservices_settings.cc | 36 // Settings digest starts with verison number followed by '-'. 197 std::string digest = local 199 digest = StringToLowerASCII(digest); 200 return digest; 257 std::string digest = CalculateDigest(load_result.gservices_settings); 258 if (digest != load_result.gservices_digest) { 259 DVLOG(1) << "G-services settings digest mismatch. " 260 << "Expected digest: " << load_result.gservices_digest 261 << ". Calculated digest is: " << digest [all...] |
/external/chromium_org/net/android/ |
keystore.h | 80 // |digest| is the input digest. 86 const base::StringPiece& digest,
|
/external/chromium_org/printing/ |
image.cc | 56 base::MD5Digest digest; local 57 base::MD5Sum(&data_[0], data_.size(), &digest); 58 return base::HexEncode(&digest, sizeof(digest));
|
/external/glide/library/src/main/java/com/bumptech/glide/load/engine/cache/ |
SafeKeyGenerator.java | 23 safeKey = Util.sha256BytesToHex(messageDigest.digest());
|
/system/keymaster/ |
asymmetric_key.h | 56 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, 68 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, 94 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, 122 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,
|
/external/chromium_org/base/ |
md5.cc | 8 * This code implements the MD5 message-digest algorithm. 18 * To compute the message digest of a chunk of bytes, declare an 21 * will fill a supplied 16-byte array with the digest. 222 void MD5Final(MD5Digest* digest, MD5Context* context) { 263 memcpy(digest->a, ctx->buf, 16); 267 void MD5IntermediateFinal(MD5Digest* digest, const MD5Context* context) { 272 MD5Final(digest, &context_copy); 275 std::string MD5DigestToBase16(const MD5Digest& digest) { 283 int a = digest.a[i]; 290 void MD5Sum(const void* data, size_t length, MD5Digest* digest) { 299 MD5Digest digest; local [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_hashlib.py | 136 self.assertTrue(hexstr(h.digest()) == h.hexdigest()) 152 self.assertEqual(m1.digest(), m2.digest(), name+' update problem.') 155 self.assertEqual(m1.digest(), m3.digest(), name+' new problem.') 157 def check(self, name, data, digest): 164 computed, digest, 168 computed, len(data), digest)) 170 def check_update(self, name, data, digest): 179 computed, digest, [all...] |
time_hashlib.py | 18 x = localCF(longStr).digest() 34 x = creatorFunc().digest()
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_hashlib.py | 136 self.assertTrue(hexstr(h.digest()) == h.hexdigest()) 152 self.assertEqual(m1.digest(), m2.digest(), name+' update problem.') 155 self.assertEqual(m1.digest(), m3.digest(), name+' new problem.') 157 def check(self, name, data, digest): 164 computed, digest, 168 computed, len(data), digest)) 170 def check_update(self, name, data, digest): 179 computed, digest, [all...] |
time_hashlib.py | 18 x = localCF(longStr).digest() 34 x = creatorFunc().digest()
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
DigitalSignatureTest.java | 71 sha.digest(sha_hash, 0, sha_hash.length); 72 md5.digest(md5_hash, 0, md5_hash.length);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
DES.java | 298 private int digest; field in class:DES.DESPBEKeyFactory 307 int digest, 315 this.digest = digest; 331 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 336 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 340 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 355 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
|
/external/chromium_org/crypto/ |
hmac_nss.cc | 77 unsigned char* digest, 109 digest, &len, digest_length) != SECSuccess) {
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
fakesslidentity.h | 41 // SHA-1 is the default digest algorithm because it is available in all build 72 unsigned char* digest, 76 digest, size);
|
opensslidentity.h | 96 // Compute the digest of the certificate given algorithm 98 unsigned char* digest, 102 // Compute the digest of a certificate as an X509 * 105 unsigned char* digest,
|
/external/chromium_org/third_party/webrtc/base/ |
fakesslidentity.h | 24 // SHA-1 is the default digest algorithm because it is available in all build 55 unsigned char* digest, 59 digest, size);
|
opensslidentity.h | 79 // Compute the digest of the certificate given algorithm 81 unsigned char* digest, 85 // Compute the digest of a certificate as an X509 * 88 unsigned char* digest,
|
/external/antlr/antlr-3.4/runtime/Perl5/tools/ |
port.pl | 8 use Digest; 51 my $sha1 = Digest->new('SHA-1'); 53 my $digest = $sha1->hexdigest; 55 return $digest; 126 my $digest = sha1sum($path); 128 'sha1' => $digest, 146 my $digest = sha1sum($path); 148 if ($digest ne $fstatus->{sha1}) {
|
/external/chromium_org/third_party/skia/tools/ |
image_expectations.cpp | 57 SkFAIL("unable to compute image digest"); 71 // result digest is always of type kJsonValue_Image_ChecksumAlgorithm_Bitmap64bitMD5 . 138 const ImageDigest &digest, const int *tileNumber) { 151 Json::Value actualChecksumAlgorithm = digest.getHashType().c_str(); 152 Json::Value actualChecksumValue = Json::UInt64(digest.getHashValue()); 181 const ImageDigest &digest, 197 Json::Value actualChecksumAlgorithm = digest.getHashType().c_str(); 198 Json::Value actualChecksumValue = Json::UInt64(digest.getHashValue());
|
/external/skia/tools/ |
image_expectations.cpp | 57 SkFAIL("unable to compute image digest"); 71 // result digest is always of type kJsonValue_Image_ChecksumAlgorithm_Bitmap64bitMD5 . 138 const ImageDigest &digest, const int *tileNumber) { 151 Json::Value actualChecksumAlgorithm = digest.getHashType().c_str(); 152 Json::Value actualChecksumValue = Json::UInt64(digest.getHashValue()); 181 const ImageDigest &digest, 197 Json::Value actualChecksumAlgorithm = digest.getHashType().c_str(); 198 Json::Value actualChecksumValue = Json::UInt64(digest.getHashValue());
|
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
sctp_auth.c | 931 uint8_t *digest) 935 SCTP_SHA1_FINAL(digest, &ctx->sha1); 939 SCTP_SHA256_FINAL(digest, &ctx->sha256); 952 * Compute the HMAC digest using the desired hash key, text, and HMAC 953 * algorithm. Resulting digest is placed in 'digest' and digest length 957 * resultant digest. 961 uint8_t *text, uint32_t textlen, uint8_t *digest) 972 (textlen == 0) || (digest == NULL)) 1676 uint8_t digest[SCTP_AUTH_DIGEST_LEN_MAX]; local 2113 uint8_t *digest; local [all...] |
/frameworks/compile/libbcc/lib/Support/ |
sha1.c | 237 /* Add padding and return the message digest. */ 239 void SHA1Final(uint8_t digest[HASHSIZE], SHA1_CTX* 258 digest[i] = (uint8_t) 277 it in the 20-byte array digest. If fname is NULL, stdin is 280 void sha1file(char *fname, uint8_t* digest) 293 memset(digest, 0, HASHSIZE); 307 SHA1Final(digest, &context); 331 uint8_t digest[HASHSIZE]; local 366 sha1file(s, digest); 371 err |= digest[k] 421 uint8_t digest[HASHSIZE]; local [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_pwd_common.c | 32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) 35 crypto_hash_finish(hash, digest, &len); 44 u8 digest[SHA256_MAC_LEN]; local 59 crypto_hash_update(hash, digest, SHA256_MAC_LEN); 64 if (crypto_hash_finish(hash, digest, &mdlen) < 0) 67 os_memcpy(result + len, digest, resultbytelen - len); 69 os_memcpy(result + len, digest, mdlen);
|