HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 301 - 325 of 714) sorted by null

<<11121314151617181920>>

  /external/chromium_org/third_party/webrtc/base/
nssidentity.h 70 unsigned char* digest,
83 // Helper function to get the length of a digest
opensslidentity.cc 222 unsigned char* digest,
225 return ComputeDigest(x509_, algorithm, digest, size, length);
230 unsigned char* digest,
242 X509_digest(x509, md, digest, &n);
sslidentity.h 62 // Gets the name of the digest algorithm that was used to compute this
66 // Compute the digest of the certificate given algorithm
68 unsigned char* digest,
  /external/chromium_org/tools/telemetry/telemetry/core/backends/chrome/
websocket_unittest.py 22 hashed = base64.encodestring(hashlib.sha1(value).digest()).strip().lower()
  /external/openssl/apps/
crl.c 125 const EVP_MD *md_alg,*digest=EVP_sha1(); local
225 digest=md_alg;
348 if (!X509_CRL_digest(x,digest,md,&n))
354 OBJ_nid2sn(EVP_MD_type(digest)));
x509.c 144 " -md2/-md5/-sha1/-mdc2 - digest to use\n",
157 static int sign (X509 *x, EVP_PKEY *pkey,int days,int clrext, const EVP_MD *digest,
159 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest,
204 const EVP_MD *md_alg,*digest=NULL; local
479 digest=md_alg;
934 const EVP_MD *fdig = digest;
967 if (!sign(x,Upkey,days,clrext,digest,
983 if (!x509_certify(ctx,CAfile,digest,x,xca,
1009 rq=X509_to_X509_REQ(x,pk,digest);
1147 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
    [all...]
  /external/openssl/crypto/asn1/
n_pkey.c 154 enckey->enckey->digest->length = pkeylen;
193 enckey->enckey->digest->data = zz;
221 zz = enckey->enckey->digest->data;
275 if ((ret=d2i_RSA_NET_2(a, enckey->enckey->digest,cb, sgckey)) == NULL) goto err;
  /external/openssl/crypto/rand/
rand_lcl.h 128 #error No message digest algorithm available
  /external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/
DigestMD5SaslClient.java 450 hash = md.digest();
459 hash = md.digest();
478 * the digest-response as documented in RFC 2831
487 * @param clientResponseFlag request-digest or response-digest
489 * @return Response-value of the response directive of the digest-response
501 boolean clientResponseFlag) /* request-digest or response-digest */
521 HA2 = md.digest();
539 respHash = md.digest();
    [all...]
  /external/smack/src/com/novell/sasl/client/
DigestMD5SaslClient.java 450 hash = md.digest();
459 hash = md.digest();
478 * the digest-response as documented in RFC 2831
487 * @param clientResponseFlag request-digest or response-digest
489 * @return Response-value of the response directive of the digest-response
501 boolean clientResponseFlag) /* request-digest or response-digest */
521 HA2 = md.digest();
539 respHash = md.digest();
    [all...]
  /packages/apps/CertInstaller/src/com/android/certinstaller/
Util.java 62 return toHexString(algorithm.digest(), "");
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/
SHA1ImplTest.java 82 byte[] dgst = md.digest();
109 byte[] dgst = md.digest();
147 byte[] dgst = md.digest();
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/
DESedeWrapEngine.java 6 import org.bouncycastle.crypto.Digest;
55 // checksum digest
58 Digest sha1 = AndroidDigestFactory.getSHA1();
60 byte[] digest = new byte[20]; field in class:DESedeWrapEngine
323 sha1.doFinal(digest, 0);
325 System.arraycopy(digest, 0, result, 0, 8);
  /external/chromium_org/chrome/browser/safe_browsing/
malware_details_cache.cc 182 base::MD5Digest digest; local
183 base::MD5Sum(data.c_str(), data.size(), &digest);
184 pb_response->set_bodydigest(base::MD5DigestToBase16(digest));
  /external/chromium_org/components/metrics/
persisted_logs.cc 282 base::MD5Digest digest; local
283 base::MD5Final(&digest, &ctx);
291 if (recovered_md5 != base::MD5DigestToBase16(digest)) {
  /external/chromium_org/crypto/
hmac_win.cc 170 unsigned char* digest,
177 data.size(), digest, digest_length);
206 return !!CryptGetHashParam(hash, HP_HASHVAL, digest, &sha1_size, 0);
  /external/chromium_org/third_party/harfbuzz-ng/src/
hb-ot-layout-private.hh 123 digest.init ();
124 lookup.add_coverage (&digest);
132 hb_set_digest_t digest; member in struct:hb_ot_layout_lookup_accelerator_t
  /external/chromium_org/third_party/openssl/openssl/apps/
x509.c 144 " -md2/-md5/-sha1/-mdc2 - digest to use\n",
157 static int sign (X509 *x, EVP_PKEY *pkey,int days,int clrext, const EVP_MD *digest,
159 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest,
204 const EVP_MD *md_alg,*digest=NULL; local
479 digest=md_alg;
934 const EVP_MD *fdig = digest;
967 if (!sign(x,Upkey,days,clrext,digest,
983 if (!x509_certify(ctx,CAfile,digest,x,xca,
1009 rq=X509_to_X509_REQ(x,pk,digest);
1147 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
    [all...]
  /external/chromium_org/third_party/tlslite/tlslite/
mathtls.py 142 def digest(self): member in class:MAC_SSL
144 ohash2.update(self.ihash.digest())
145 return bytearray(ohash2.digest())
  /external/harfbuzz_ng/src/
hb-ot-layout-private.hh 125 digest.init ();
126 lookup.add_coverage (&digest);
134 hb_set_digest_t digest; member in struct:hb_ot_layout_lookup_accelerator_t
  /external/iputils/ninfod/
ninfod_name.c 265 unsigned char digest[16]; local
272 MD5_Final(digest, &ctxt);
284 memcpy(&nigroup->s6_addr[12], digest, 4);
  /external/javassist/src/main/javassist/
SerialVersionUID.java 187 MessageDigest digest = MessageDigest.getInstance("SHA"); local
188 byte[] digested = digest.digest(bout.toByteArray());
  /external/openssl/crypto/bn/
bn_rand.c 322 unsigned char digest[SHA512_DIGEST_LENGTH]; local
355 SHA512_Final(digest, &sha);
360 memcpy(k_bytes + done, digest, todo);
  /external/openssl/crypto/evp/
p5_crpt2.c 82 const EVP_MD *digest,
90 mdlen = EVP_MD_size(digest);
101 if (!HMAC_Init_ex(&hctx_tpl, pass, passlen, digest, NULL))
  /external/ppp/pppd/plugins/radius/
radius.c 76 struct chap_digest_type *digest,
85 struct chap_digest_type *digest,
321 * digest -- points to the structure representing the digest type
333 struct chap_digest_type *digest,
361 if ((digest->code != CHAP_MD5)
363 && (digest->code != CHAP_MICROSOFT)
364 && (digest->code != CHAP_MICROSOFT_V2)
367 error("RADIUS: Challenge type %u unsupported", digest->code);
395 switch (digest->code)
    [all...]

Completed in 1347 milliseconds

<<11121314151617181920>>