HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 201 - 225 of 714) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
CertBlacklist.java 32 import org.bouncycastle.crypto.Digest;
212 Digest digest = AndroidDigestFactory.getSHA1(); local
213 digest.update(encoded, 0, encoded.length);
214 byte[] out = new byte[digest.getDigestSize()];
215 digest.doFinal(out, 0);
  /external/chromium_org/google_apis/gcm/engine/
gservices_settings.h 32 // Calculates digest of provided settings.
48 std::string digest() const { return digest_; } function in class:gcm::GServicesSettings
66 // Digest (hash) of the settings, used to check whether settings need update.
gservices_settings.cc 36 // Settings digest starts with verison number followed by '-'.
197 std::string digest = local
199 digest = StringToLowerASCII(digest);
200 return digest;
257 std::string digest = CalculateDigest(load_result.gservices_settings);
258 if (digest != load_result.gservices_digest) {
259 DVLOG(1) << "G-services settings digest mismatch. "
260 << "Expected digest: " << load_result.gservices_digest
261 << ". Calculated digest is: " << digest
    [all...]
  /external/chromium_org/net/android/
keystore.h 80 // |digest| is the input digest.
86 const base::StringPiece& digest,
  /external/chromium_org/printing/
image.cc 56 base::MD5Digest digest; local
57 base::MD5Sum(&data_[0], data_.size(), &digest);
58 return base::HexEncode(&digest, sizeof(digest));
  /external/glide/library/src/main/java/com/bumptech/glide/load/engine/cache/
SafeKeyGenerator.java 23 safeKey = Util.sha256BytesToHex(messageDigest.digest());
  /system/keymaster/
asymmetric_key.h 56 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,
68 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,
94 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,
122 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,
  /external/chromium_org/base/
md5.cc 8 * This code implements the MD5 message-digest algorithm.
18 * To compute the message digest of a chunk of bytes, declare an
21 * will fill a supplied 16-byte array with the digest.
222 void MD5Final(MD5Digest* digest, MD5Context* context) {
263 memcpy(digest->a, ctx->buf, 16);
267 void MD5IntermediateFinal(MD5Digest* digest, const MD5Context* context) {
272 MD5Final(digest, &context_copy);
275 std::string MD5DigestToBase16(const MD5Digest& digest) {
283 int a = digest.a[i];
290 void MD5Sum(const void* data, size_t length, MD5Digest* digest) {
299 MD5Digest digest; local
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_hashlib.py 136 self.assertTrue(hexstr(h.digest()) == h.hexdigest())
152 self.assertEqual(m1.digest(), m2.digest(), name+' update problem.')
155 self.assertEqual(m1.digest(), m3.digest(), name+' new problem.')
157 def check(self, name, data, digest):
164 computed, digest,
168 computed, len(data), digest))
170 def check_update(self, name, data, digest):
179 computed, digest,
    [all...]
time_hashlib.py 18 x = localCF(longStr).digest()
34 x = creatorFunc().digest()
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_hashlib.py 136 self.assertTrue(hexstr(h.digest()) == h.hexdigest())
152 self.assertEqual(m1.digest(), m2.digest(), name+' update problem.')
155 self.assertEqual(m1.digest(), m3.digest(), name+' new problem.')
157 def check(self, name, data, digest):
164 computed, digest,
168 computed, len(data), digest))
170 def check_update(self, name, data, digest):
179 computed, digest,
    [all...]
time_hashlib.py 18 x = localCF(longStr).digest()
34 x = creatorFunc().digest()
  /external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
DigitalSignatureTest.java 71 sha.digest(sha_hash, 0, sha_hash.length);
72 md5.digest(md5_hash, 0, md5_hash.length);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/
DES.java 298 private int digest; field in class:DES.DESPBEKeyFactory
307 int digest,
315 this.digest = digest;
331 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null);
336 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize);
340 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize);
355 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
  /external/chromium_org/crypto/
hmac_nss.cc 77 unsigned char* digest,
109 digest, &len, digest_length) != SECSuccess) {
  /external/chromium_org/third_party/libjingle/source/talk/base/
fakesslidentity.h 41 // SHA-1 is the default digest algorithm because it is available in all build
72 unsigned char* digest,
76 digest, size);
opensslidentity.h 96 // Compute the digest of the certificate given algorithm
98 unsigned char* digest,
102 // Compute the digest of a certificate as an X509 *
105 unsigned char* digest,
  /external/chromium_org/third_party/webrtc/base/
fakesslidentity.h 24 // SHA-1 is the default digest algorithm because it is available in all build
55 unsigned char* digest,
59 digest, size);
opensslidentity.h 79 // Compute the digest of the certificate given algorithm
81 unsigned char* digest,
85 // Compute the digest of a certificate as an X509 *
88 unsigned char* digest,
  /external/antlr/antlr-3.4/runtime/Perl5/tools/
port.pl 8 use Digest;
51 my $sha1 = Digest->new('SHA-1');
53 my $digest = $sha1->hexdigest;
55 return $digest;
126 my $digest = sha1sum($path);
128 'sha1' => $digest,
146 my $digest = sha1sum($path);
148 if ($digest ne $fstatus->{sha1}) {
  /external/chromium_org/third_party/skia/tools/
image_expectations.cpp 57 SkFAIL("unable to compute image digest");
71 // result digest is always of type kJsonValue_Image_ChecksumAlgorithm_Bitmap64bitMD5 .
138 const ImageDigest &digest, const int *tileNumber) {
151 Json::Value actualChecksumAlgorithm = digest.getHashType().c_str();
152 Json::Value actualChecksumValue = Json::UInt64(digest.getHashValue());
181 const ImageDigest &digest,
197 Json::Value actualChecksumAlgorithm = digest.getHashType().c_str();
198 Json::Value actualChecksumValue = Json::UInt64(digest.getHashValue());
  /external/skia/tools/
image_expectations.cpp 57 SkFAIL("unable to compute image digest");
71 // result digest is always of type kJsonValue_Image_ChecksumAlgorithm_Bitmap64bitMD5 .
138 const ImageDigest &digest, const int *tileNumber) {
151 Json::Value actualChecksumAlgorithm = digest.getHashType().c_str();
152 Json::Value actualChecksumValue = Json::UInt64(digest.getHashValue());
181 const ImageDigest &digest,
197 Json::Value actualChecksumAlgorithm = digest.getHashType().c_str();
198 Json::Value actualChecksumValue = Json::UInt64(digest.getHashValue());
  /external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
sctp_auth.c 931 uint8_t *digest)
935 SCTP_SHA1_FINAL(digest, &ctx->sha1);
939 SCTP_SHA256_FINAL(digest, &ctx->sha256);
952 * Compute the HMAC digest using the desired hash key, text, and HMAC
953 * algorithm. Resulting digest is placed in 'digest' and digest length
957 * resultant digest.
961 uint8_t *text, uint32_t textlen, uint8_t *digest)
972 (textlen == 0) || (digest == NULL))
1676 uint8_t digest[SCTP_AUTH_DIGEST_LEN_MAX]; local
2113 uint8_t *digest; local
    [all...]
  /frameworks/compile/libbcc/lib/Support/
sha1.c 237 /* Add padding and return the message digest. */
239 void SHA1Final(uint8_t digest[HASHSIZE], SHA1_CTX*
258 digest[i] = (uint8_t)
277 it in the 20-byte array digest. If fname is NULL, stdin is
280 void sha1file(char *fname, uint8_t* digest)
293 memset(digest, 0, HASHSIZE);
307 SHA1Final(digest, &context);
331 uint8_t digest[HASHSIZE]; local
366 sha1file(s, digest);
371 err |= digest[k]
421 uint8_t digest[HASHSIZE]; local
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_pwd_common.c 32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest)
35 crypto_hash_finish(hash, digest, &len);
44 u8 digest[SHA256_MAC_LEN]; local
59 crypto_hash_update(hash, digest, SHA256_MAC_LEN);
64 if (crypto_hash_finish(hash, digest, &mdlen) < 0)
67 os_memcpy(result + len, digest, resultbytelen - len);
69 os_memcpy(result + len, digest, mdlen);

Completed in 1087 milliseconds

1 2 3 4 5 6 7 891011>>