/external/nist-sip/java/gov/nist/javax/sip/ |
Utils.java | 139 byte cid[] = digester.digest(date.getBytes()); 175 byte bid[] = digester.digest(Long.toString(num).getBytes());
|
/hardware/samsung_slsi/exynos5/libkeymaster/ |
tlTeeKeymaster_Api.h | 144 uint32_t digest; /**< Digest algorithm */ member in struct:__anon41858 158 uint32_t digest; /**< Digest algorithm */ member in struct:__anon41859
|
tlcTeeKeymaster_if.h | 79 TEE_RSA_SHA_ISO9796 = 1, /**< 20-byte SHA-1 digest, padded according to the ISO 9796-2 scheme as specified in EMV '96 and EMV 2000, encrypted using RSA. */ 80 TEE_RSA_SHA_ISO9796_MR = 2, /**< 20-byte SHA-1 digest, padded according to the ISO9796-2 specification and encrypted using RSA. */ 81 TEE_RSA_SHA_PKCS1 = 3, /**< 20-byte SHA-1 digest, padded according to the PKCS#1 (v1.5) scheme, and encrypted using RSA. */ 82 TEE_RSA_SHA256_PSS = 4, /**< SHA-256 digest and PSS padding */ 83 TEE_RSA_SHA1_PSS = 5, /**< SHA-256 digest and PSS padding */ 84 TEE_RSA_NODIGEST_NOPADDING = 6, /**< No digest and padding */ 88 /* Digest types */ 230 * @param digest [in] Digest type 239 teeDigest_t digest); [all...] |
/bootable/recovery/applypatch/ |
applypatch.h | 49 int ParseSha1(const char* str, uint8_t* digest);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/digests/ |
OpenSSLDigest.java | 25 * Implements the BouncyCastle Digest interface using OpenSSL's EVP API. This 68 return delegate.digest(out, outOff, out.length - outOff);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
SignatureSpi.java | 17 import org.bouncycastle.crypto.Digest; 43 SignatureSpi(Digest digest, DSA signer, DSAEncoder encoder) 45 super(digest, signer, encoder); 53 digest.reset(); 63 digest.reset();
|
/external/chromium_org/chrome/common/extensions/docs/server2/ |
docs_server_utils.py | 30 return b64encode(sha1(string).digest())
|
/external/chromium_org/content/renderer/media/webrtc/ |
media_stream_track_metrics.cc | 317 base::MD5Digest digest; local 318 base::MD5Final(&digest, &ctx); 320 COMPILE_ASSERT(sizeof(digest.a) > sizeof(uint64), NeedBiggerDigest); 321 return *reinterpret_cast<uint64*>(digest.a);
|
/external/chromium_org/crypto/ |
signature_verifier.h | 113 bool CommonInit(const EVP_MD* digest,
|
/external/chromium_org/third_party/WebKit/Source/modules/crypto/ |
SubtleCrypto.h | 58 ScriptPromise digest(ScriptState*, const Dictionary&, const ArrayPiece& data);
|
SubtleCrypto.idl | 55 [CallWith=ScriptState] Promise digest(Dictionary algorithm, ArrayBuffer data); 56 [CallWith=ScriptState] Promise digest(Dictionary algorithm, ArrayBufferView data);
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
transportchannelimpl.h | 106 const uint8* digest,
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
p5_crpt2.c | 82 const EVP_MD *digest, 90 mdlen = EVP_MD_size(digest); 114 if (!HMAC_Init_ex(&hctx, pass, passlen, digest, NULL) 125 HMAC(digest, pass, passlen,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_pwd_common.h | 65 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest);
|
/libcore/luni/src/test/java/libcore/java/security/ |
MessageDigestTest.java | 46 assertEquals(Arrays.toString(sha_456), Arrays.toString(sha.digest())); 217 actual = md.digest(); 223 actual = md.digest(); 266 md.digest();
|
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
sha256.js | 10 // byte[32] digest(); 152 SHA256.prototype.digest = function(var_args) { 156 var digest = new Array(32); 176 digest[n++] = (this._chain[i] >> j) & 255; 178 return digest;
|
/cts/tools/tradefed-host/src/com/android/cts/tradefed/result/ |
TestPackageResult.java | 50 private static final String DIGEST_ATTR = "digest"; 106 public void setDigest(String digest) { 107 mDigest = digest; 243 String digest = metrics.get(CtsTest.PACKAGE_DIGEST_METRIC); local 244 if (digest != null) { 245 setDigest(digest);
|
/external/lzma/C/ |
Sha256.c | 176 void Sha256_Final(CSha256 *p, Byte *digest)
198 *digest++ = (Byte)(p->state[i] >> 24);
199 *digest++ = (Byte)(p->state[i] >> 16);
200 *digest++ = (Byte)(p->state[i] >> 8);
201 *digest++ = (Byte)(p->state[i]);
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
poplib.py | 55 APOP name digest apop(name, digest) 286 digest = hashlib.md5(m.group(1)+secret).digest() 287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest)) 288 return self._shortcmd('APOP %s %s' % (user, digest)) 301 """Return message digest (unique id) list.
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
poplib.py | 55 APOP name digest apop(name, digest) 286 digest = hashlib.md5(m.group(1)+secret).digest() 287 digest = ''.join(map(lambda x:'%02x'%ord(x), digest)) 288 return self._shortcmd('APOP %s %s' % (user, digest)) 301 """Return message digest (unique id) list.
|
/external/chromium_org/third_party/openssl/openssl/crypto/engine/ |
eng_cryptodev.c | 103 static int cryptodev_engine_digests(ENGINE *e, const EVP_MD **digest, 650 /* convert digest type to cryptodev */ 679 int digest; local 681 if ((digest = digest_nid_to_cryptodev(ctx->digest->type)) == NID_undef){ 682 printf("cryptodev_digest_init: Can't get digest \n"); 694 sess->mackeylen = digest_key_length(ctx->digest->type); 695 sess->mac = digest; 747 printf("cryptodev_digest_update: digest failed\n"); 777 printf("cryptodev_digest_final: digest failed\n") 827 int digest; local [all...] |
/external/openssl/crypto/engine/ |
eng_cryptodev.c | 103 static int cryptodev_engine_digests(ENGINE *e, const EVP_MD **digest, 650 /* convert digest type to cryptodev */ 679 int digest; local 681 if ((digest = digest_nid_to_cryptodev(ctx->digest->type)) == NID_undef){ 682 printf("cryptodev_digest_init: Can't get digest \n"); 694 sess->mackeylen = digest_key_length(ctx->digest->type); 695 sess->mac = digest; 747 printf("cryptodev_digest_update: digest failed\n"); 777 printf("cryptodev_digest_final: digest failed\n") 827 int digest; local [all...] |
/dalvik/libdex/ |
DexFile.cpp | 115 * Format an SHA-1 digest for printing. tmpBuf must be able to hold at 118 const char* dvmSHA1DigestToStr(const unsigned char digest[], char* tmpBuf); 121 * Compute a SHA-1 digest on a range of bytes. 124 unsigned char digest[]) 129 SHA1Final(digest, &context); 133 * Format the SHA-1 digest into the buffer, which must be able to hold at 136 static const char* dexSHA1DigestToStr(const unsigned char digest[],char* tmpBuf) 144 *cp++ = hexDigit[digest[i] >> 4]; 145 *cp++ = hexDigit[digest[i] & 0x0f]; 374 * Verify the SHA-1 digest. (Normally we don't want to do this - [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
CipherSpi.java | 27 import org.bouncycastle.crypto.Digest; 85 Digest digest = DigestFactory.getDigest(mgfParams.getDigestAlgorithm()); local 87 if (digest == null) 89 throw new NoSuchPaddingException("no match on OAEP constructor for digest algorithm: "+ mgfParams.getDigestAlgorithm()); 92 cipher = new OAEPEncoding(new RSABlindedEngine(), digest, ((PSource.PSpecified)pSpec.getPSource()).getValue()); 294 Digest digest = DigestFactory.getDigest(spec.getDigestAlgorithm()); local 296 if (digest == null) 298 throw new InvalidAlgorithmParameterException("no match on digest algorithm: "+ spec.getDigestAlgorithm()) [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/multiprocessing/ |
connection.py | 409 digest = hmac.new(authkey, message).digest() 411 if response == digest: 415 raise AuthenticationError('digest received was wrong') 423 digest = hmac.new(authkey, message).digest() 424 connection.send_bytes(digest) 427 raise AuthenticationError('digest sent was rejected')
|