/prebuilts/python/linux-x86/2.7.5/lib/python2.7/multiprocessing/ |
connection.py | 409 digest = hmac.new(authkey, message).digest() 411 if response == digest: 415 raise AuthenticationError('digest received was wrong') 423 digest = hmac.new(authkey, message).digest() 424 connection.send_bytes(digest) 427 raise AuthenticationError('digest sent was rejected')
|
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
DOMPatchSupport.cpp | 59 struct DOMPatchSupport::Digest { 60 explicit Digest(Node* node) : m_node(node) { } 65 Vector<OwnPtr<Digest> > m_children; 103 OwnPtr<Digest> oldInfo = createDigest(m_document.documentElement(), 0); 104 OwnPtr<Digest> newInfo = createDigest(newDocument->documentElement(), &m_unusedNodesMap); 139 Vector<OwnPtr<Digest> > oldList; 145 Vector<OwnPtr<Digest> > newList; 166 bool DOMPatchSupport::innerPatchNode(Digest* oldDigest, Digest* newDigest, ExceptionState& exceptionState) 215 DOMPatchSupport::diff(const Vector<OwnPtr<Digest> >& oldList, const Vector<OwnPtr<Digest> >& newList 411 Digest* digest = new Digest(node); local [all...] |
/bootable/recovery/applypatch/ |
main.c | 57 uint8_t digest[SHA_DIGEST_SIZE]; local 67 if (ParseSha1(argv[i], digest) != 0) {
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
DefaultCMSSignatureAlgorithmNameGenerator.java | 25 private void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption) 27 digestAlgs.put(alias, digest); 102 * Return the digest algorithm using one of the standard JCA string 119 * Return the digest encryption algorithm using one of the standard 149 * Set the mapping for the digest algorithm to use in conjunction with a SignedData generation
|
/external/chromium_org/chrome/browser/web_applications/ |
web_app_win.cc | 38 void GetImageCheckSum(const gfx::ImageFamily& image, base::MD5Digest* digest) { 39 DCHECK(digest); 53 base::MD5Final(digest, &md5_context); 62 base::MD5Digest digest; 63 GetImageCheckSum(image, &digest); 67 reinterpret_cast<const char*>(&digest), 68 sizeof(digest)) == sizeof(digest);
|
/external/chromium_org/net/android/ |
keystore_unittest.cc | 245 const unsigned char* digest = local 253 0, digest, digest_len, sigbuf, siglen, pub_key.get()); 292 const unsigned char* digest = local 300 0, digest, digest_len, sigbuf, siglen, pub_key.get()); 316 const unsigned char* digest = local 338 NID_md5_sha1, digest, digest_len, p, &p_len, rsa.get()); 360 int ret = DSA_sign(0, digest, digest_len, p, &p_len, dsa.get()); 383 0, digest, digest_len, p, &p_len, ecdsa.get());
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
dtlstransport.h | 241 digest.data()), 242 remote_fingerprint_->digest.length())) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
p12_npas.c | 162 ASN1_OCTET_STRING_free(p12->mac->dinfo->digest); 163 p12->mac->dinfo->digest = macnew;
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
pk7_lib.c | 142 if (p7->d.digest->contents != NULL) 143 PKCS7_free(p7->d.digest->contents); 144 p7->d.digest->contents=p7_data; 215 if ((p7->d.digest=PKCS7_DIGEST_new()) 217 if (!ASN1_INTEGER_set(p7->d.digest->version,0)) 261 /* If the digest is not currently listed, add it */ 446 if(!(p7->d.digest->md->parameter = ASN1_TYPE_new())) 451 p7->d.digest->md->parameter->type = V_ASN1_NULL; 452 p7->d.digest->md->algorithm = OBJ_nid2obj(EVP_MD_nid(md));
|
/external/chromium_org/tools/crx_id/ |
crx_id.py | 133 pub_key_hash = hashlib.sha256(pub_key).digest() 138 pub_key_hash = hashlib.sha256(pub_key).digest()
|
/external/openssl/crypto/pkcs12/ |
p12_npas.c | 162 ASN1_OCTET_STRING_free(p12->mac->dinfo->digest); 163 p12->mac->dinfo->digest = macnew;
|
/external/openssl/crypto/pkcs7/ |
pk7_lib.c | 142 if (p7->d.digest->contents != NULL) 143 PKCS7_free(p7->d.digest->contents); 144 p7->d.digest->contents=p7_data; 215 if ((p7->d.digest=PKCS7_DIGEST_new()) 217 if (!ASN1_INTEGER_set(p7->d.digest->version,0)) 261 /* If the digest is not currently listed, add it */ 446 if(!(p7->d.digest->md->parameter = ASN1_TYPE_new())) 451 p7->d.digest->md->parameter->type = V_ASN1_NULL; 452 p7->d.digest->md->algorithm = OBJ_nid2obj(EVP_MD_nid(md));
|
/external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/ |
Socks5BytestreamRequest.java | 200 String digest = Socks5Utils.createDigest(this.bytestreamRequest.getSessionID(),
local 223 final Socks5Client socks5Client = new Socks5Client(streamHost, digest);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
JcaDigestCalculatorProviderBuilder.java | 111 return dig.digest();
|
/external/chromium_org/chrome/test/mini_installer/ |
variable_expander.py | 52 md5_digest = hashlib.md5(user_sid_string).digest()
|
/external/chromium_org/remoting/host/setup/ |
daemon_controller_delegate_linux.cc | 54 base::MD5Digest digest; local 55 base::MD5Final(&digest, &ctx); 56 return StringToLowerASCII(base::HexEncode(digest.a, sizeof(digest.a)));
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
nssidentity.h | 87 unsigned char* digest, 100 // Helper function to get the length of a digest
|
opensslidentity.cc | 239 unsigned char* digest, 242 return ComputeDigest(x509_, algorithm, digest, size, length); 247 unsigned char* digest, 259 X509_digest(x509, md, digest, &n);
|
sslidentity.h | 79 // Gets the name of the digest algorithm that was used to compute this 83 // Compute the digest of the certificate given algorithm 85 unsigned char* digest,
|
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/ |
securetunnelsessionclient.cc | 382 unsigned char digest[talk_base::MessageDigest::kMaxSize]; local 384 peer_cert->ComputeDigest(algorithm, digest, ARRAY_SIZE(digest), &digest_len); 385 ssl_stream->SetPeerCertificateDigest(algorithm, digest, digest_len);
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
crl.c | 119 const EVP_MD *md_alg,*digest=EVP_sha1(); local 215 digest=md_alg; 330 if (!X509_CRL_digest(x,digest,md,&n)) 336 OBJ_nid2sn(EVP_MD_type(digest)));
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
n_pkey.c | 154 enckey->enckey->digest->length = pkeylen; 193 enckey->enckey->digest->data = zz; 221 zz = enckey->enckey->digest->data; 275 if ((ret=d2i_RSA_NET_2(a, enckey->enckey->digest,cb, sgckey)) == NULL) goto err;
|
/external/chromium_org/third_party/openssl/openssl/crypto/rand/ |
rand_lcl.h | 128 #error No message digest algorithm available
|
/external/chromium_org/third_party/openssl/openssl/crypto/srp/ |
srp_lib.c | 82 unsigned char digest[SHA_DIGEST_LENGTH]; local 103 EVP_DigestFinal_ex(&ctxt, digest, NULL); 105 return BN_bin2bn(digest, sizeof(digest), NULL);
|
/external/chromium_org/third_party/tlslite/tlslite/utils/ |
cryptomath.py | 70 return bytearray(hashlib.md5(compat26Str(b)).digest()) 73 return bytearray(hashlib.sha1(compat26Str(b)).digest()) 78 return bytearray(hmac.new(k, b, hashlib.md5).digest()) 83 return bytearray(hmac.new(k, b, hashlib.sha1).digest())
|