HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 251 - 275 of 714) sorted by null

<<11121314151617181920>>

  /external/nist-sip/java/gov/nist/javax/sip/
Utils.java 139 byte cid[] = digester.digest(date.getBytes());
175 byte bid[] = digester.digest(Long.toString(num).getBytes());
  /hardware/samsung_slsi/exynos5/libkeymaster/
tlTeeKeymaster_Api.h 144 uint32_t digest; /**< Digest algorithm */ member in struct:__anon41858
158 uint32_t digest; /**< Digest algorithm */ member in struct:__anon41859
tlcTeeKeymaster_if.h 79 TEE_RSA_SHA_ISO9796 = 1, /**< 20-byte SHA-1 digest, padded according to the ISO 9796-2 scheme as specified in EMV '96 and EMV 2000, encrypted using RSA. */
80 TEE_RSA_SHA_ISO9796_MR = 2, /**< 20-byte SHA-1 digest, padded according to the ISO9796-2 specification and encrypted using RSA. */
81 TEE_RSA_SHA_PKCS1 = 3, /**< 20-byte SHA-1 digest, padded according to the PKCS#1 (v1.5) scheme, and encrypted using RSA. */
82 TEE_RSA_SHA256_PSS = 4, /**< SHA-256 digest and PSS padding */
83 TEE_RSA_SHA1_PSS = 5, /**< SHA-256 digest and PSS padding */
84 TEE_RSA_NODIGEST_NOPADDING = 6, /**< No digest and padding */
88 /* Digest types */
230 * @param digest [in] Digest type
239 teeDigest_t digest);
    [all...]
  /bootable/recovery/applypatch/
applypatch.h 49 int ParseSha1(const char* str, uint8_t* digest);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/digests/
OpenSSLDigest.java 25 * Implements the BouncyCastle Digest interface using OpenSSL's EVP API. This
68 return delegate.digest(out, outOff, out.length - outOff);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/
SignatureSpi.java 17 import org.bouncycastle.crypto.Digest;
43 SignatureSpi(Digest digest, DSA signer, DSAEncoder encoder)
45 super(digest, signer, encoder);
53 digest.reset();
63 digest.reset();
  /external/chromium_org/chrome/common/extensions/docs/server2/
docs_server_utils.py 30 return b64encode(sha1(string).digest())
  /external/chromium_org/content/renderer/media/webrtc/
media_stream_track_metrics.cc 317 base::MD5Digest digest; local
318 base::MD5Final(&digest, &ctx);
320 COMPILE_ASSERT(sizeof(digest.a) > sizeof(uint64), NeedBiggerDigest);
321 return *reinterpret_cast<uint64*>(digest.a);
  /external/chromium_org/crypto/
signature_verifier.h 113 bool CommonInit(const EVP_MD* digest,
  /external/chromium_org/third_party/WebKit/Source/modules/crypto/
SubtleCrypto.h 58 ScriptPromise digest(ScriptState*, const Dictionary&, const ArrayPiece& data);
SubtleCrypto.idl 55 [CallWith=ScriptState] Promise digest(Dictionary algorithm, ArrayBuffer data);
56 [CallWith=ScriptState] Promise digest(Dictionary algorithm, ArrayBufferView data);
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
transportchannelimpl.h 106 const uint8* digest,
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
p5_crpt2.c 82 const EVP_MD *digest,
90 mdlen = EVP_MD_size(digest);
114 if (!HMAC_Init_ex(&hctx, pass, passlen, digest, NULL)
125 HMAC(digest, pass, passlen,
  /external/wpa_supplicant_8/src/eap_common/
eap_pwd_common.h 65 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest);
  /libcore/luni/src/test/java/libcore/java/security/
MessageDigestTest.java 46 assertEquals(Arrays.toString(sha_456), Arrays.toString(sha.digest()));
217 actual = md.digest();
223 actual = md.digest();
266 md.digest();
  /external/chromium_org/chrome/browser/resources/cryptotoken/
sha256.js 10 // byte[32] digest();
152 SHA256.prototype.digest = function(var_args) {
156 var digest = new Array(32);
176 digest[n++] = (this._chain[i] >> j) & 255;
178 return digest;
  /cts/tools/tradefed-host/src/com/android/cts/tradefed/result/
TestPackageResult.java 50 private static final String DIGEST_ATTR = "digest";
106 public void setDigest(String digest) {
107 mDigest = digest;
243 String digest = metrics.get(CtsTest.PACKAGE_DIGEST_METRIC); local
244 if (digest != null) {
245 setDigest(digest);
  /external/lzma/C/
Sha256.c 176 void Sha256_Final(CSha256 *p, Byte *digest)
198 *digest++ = (Byte)(p->state[i] >> 24);
199 *digest++ = (Byte)(p->state[i] >> 16);
200 *digest++ = (Byte)(p->state[i] >> 8);
201 *digest++ = (Byte)(p->state[i]);
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
poplib.py 55 APOP name digest apop(name, digest)
286 digest = hashlib.md5(m.group(1)+secret).digest()
287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest))
288 return self._shortcmd('APOP %s %s' % (user, digest))
301 """Return message digest (unique id) list.
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
poplib.py 55 APOP name digest apop(name, digest)
286 digest = hashlib.md5(m.group(1)+secret).digest()
287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest))
288 return self._shortcmd('APOP %s %s' % (user, digest))
301 """Return message digest (unique id) list.
  /external/chromium_org/third_party/openssl/openssl/crypto/engine/
eng_cryptodev.c 103 static int cryptodev_engine_digests(ENGINE *e, const EVP_MD **digest,
650 /* convert digest type to cryptodev */
679 int digest; local
681 if ((digest = digest_nid_to_cryptodev(ctx->digest->type)) == NID_undef){
682 printf("cryptodev_digest_init: Can't get digest \n");
694 sess->mackeylen = digest_key_length(ctx->digest->type);
695 sess->mac = digest;
747 printf("cryptodev_digest_update: digest failed\n");
777 printf("cryptodev_digest_final: digest failed\n")
827 int digest; local
    [all...]
  /external/openssl/crypto/engine/
eng_cryptodev.c 103 static int cryptodev_engine_digests(ENGINE *e, const EVP_MD **digest,
650 /* convert digest type to cryptodev */
679 int digest; local
681 if ((digest = digest_nid_to_cryptodev(ctx->digest->type)) == NID_undef){
682 printf("cryptodev_digest_init: Can't get digest \n");
694 sess->mackeylen = digest_key_length(ctx->digest->type);
695 sess->mac = digest;
747 printf("cryptodev_digest_update: digest failed\n");
777 printf("cryptodev_digest_final: digest failed\n")
827 int digest; local
    [all...]
  /dalvik/libdex/
DexFile.cpp 115 * Format an SHA-1 digest for printing. tmpBuf must be able to hold at
118 const char* dvmSHA1DigestToStr(const unsigned char digest[], char* tmpBuf);
121 * Compute a SHA-1 digest on a range of bytes.
124 unsigned char digest[])
129 SHA1Final(digest, &context);
133 * Format the SHA-1 digest into the buffer, which must be able to hold at
136 static const char* dexSHA1DigestToStr(const unsigned char digest[],char* tmpBuf)
144 *cp++ = hexDigit[digest[i] >> 4];
145 *cp++ = hexDigit[digest[i] & 0x0f];
374 * Verify the SHA-1 digest. (Normally we don't want to do this -
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
CipherSpi.java 27 import org.bouncycastle.crypto.Digest;
85 Digest digest = DigestFactory.getDigest(mgfParams.getDigestAlgorithm()); local
87 if (digest == null)
89 throw new NoSuchPaddingException("no match on OAEP constructor for digest algorithm: "+ mgfParams.getDigestAlgorithm());
92 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue());
294 Digest digest = DigestFactory.getDigest(spec.getDigestAlgorithm()); local
296 if (digest == null)
298 throw new InvalidAlgorithmParameterException("no match on digest algorithm: "+ spec.getDigestAlgorithm())
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/
connection.py 409 digest = hmac.new(authkey, message).digest()
411 if response == digest:
415 raise AuthenticationError('digest received was wrong')
423 digest = hmac.new(authkey, message).digest()
424 connection.send_bytes(digest)
427 raise AuthenticationError('digest sent was rejected')

Completed in 922 milliseconds

<<11121314151617181920>>