/external/chromium_org/third_party/webrtc/base/ |
nssidentity.h | 70 unsigned char* digest, 83 // Helper function to get the length of a digest
|
opensslidentity.cc | 222 unsigned char* digest, 225 return ComputeDigest(x509_, algorithm, digest, size, length); 230 unsigned char* digest, 242 X509_digest(x509, md, digest, &n);
|
sslidentity.h | 62 // Gets the name of the digest algorithm that was used to compute this 66 // Compute the digest of the certificate given algorithm 68 unsigned char* digest,
|
/external/chromium_org/tools/telemetry/telemetry/core/backends/chrome/ |
websocket_unittest.py | 22 hashed = base64.encodestring(hashlib.sha1(value).digest()).strip().lower()
|
/external/openssl/apps/ |
crl.c | 125 const EVP_MD *md_alg,*digest=EVP_sha1(); local 225 digest=md_alg; 348 if (!X509_CRL_digest(x,digest,md,&n)) 354 OBJ_nid2sn(EVP_MD_type(digest)));
|
x509.c | 144 " -md2/-md5/-sha1/-mdc2 - digest to use\n", 157 static int sign (X509 *x, EVP_PKEY *pkey,int days,int clrext, const EVP_MD *digest, 159 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest, 204 const EVP_MD *md_alg,*digest=NULL; local 479 digest=md_alg; 934 const EVP_MD *fdig = digest; 967 if (!sign(x,Upkey,days,clrext,digest, 983 if (!x509_certify(ctx,CAfile,digest,x,xca, 1009 rq=X509_to_X509_REQ(x,pk,digest); 1147 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, [all...] |
/external/openssl/crypto/asn1/ |
n_pkey.c | 154 enckey->enckey->digest->length = pkeylen; 193 enckey->enckey->digest->data = zz; 221 zz = enckey->enckey->digest->data; 275 if ((ret=d2i_RSA_NET_2(a, enckey->enckey->digest,cb, sgckey)) == NULL) goto err;
|
/external/openssl/crypto/rand/ |
rand_lcl.h | 128 #error No message digest algorithm available
|
/external/smack/asmack-master/static-src/novell-openldap-jldap/com/novell/sasl/client/ |
DigestMD5SaslClient.java | 450 hash = md.digest(); 459 hash = md.digest(); 478 * the digest-response as documented in RFC 2831 487 * @param clientResponseFlag request-digest or response-digest 489 * @return Response-value of the response directive of the digest-response 501 boolean clientResponseFlag) /* request-digest or response-digest */ 521 HA2 = md.digest(); 539 respHash = md.digest(); [all...] |
/external/smack/src/com/novell/sasl/client/ |
DigestMD5SaslClient.java | 450 hash = md.digest(); 459 hash = md.digest(); 478 * the digest-response as documented in RFC 2831 487 * @param clientResponseFlag request-digest or response-digest 489 * @return Response-value of the response directive of the digest-response 501 boolean clientResponseFlag) /* request-digest or response-digest */ 521 HA2 = md.digest(); 539 respHash = md.digest(); [all...] |
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
Util.java | 62 return toHexString(algorithm.digest(), "");
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/ |
SHA1ImplTest.java | 82 byte[] dgst = md.digest(); 109 byte[] dgst = md.digest(); 147 byte[] dgst = md.digest();
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
DESedeWrapEngine.java | 6 import org.bouncycastle.crypto.Digest; 55 // checksum digest 58 Digest sha1 = AndroidDigestFactory.getSHA1(); 60 byte[] digest = new byte[20]; field in class:DESedeWrapEngine 323 sha1.doFinal(digest, 0); 325 System.arraycopy(digest, 0, result, 0, 8);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
malware_details_cache.cc | 182 base::MD5Digest digest; local 183 base::MD5Sum(data.c_str(), data.size(), &digest); 184 pb_response->set_bodydigest(base::MD5DigestToBase16(digest));
|
/external/chromium_org/components/metrics/ |
persisted_logs.cc | 282 base::MD5Digest digest; local 283 base::MD5Final(&digest, &ctx); 291 if (recovered_md5 != base::MD5DigestToBase16(digest)) {
|
/external/chromium_org/crypto/ |
hmac_win.cc | 170 unsigned char* digest, 177 data.size(), digest, digest_length); 206 return !!CryptGetHashParam(hash, HP_HASHVAL, digest, &sha1_size, 0);
|
/external/chromium_org/third_party/harfbuzz-ng/src/ |
hb-ot-layout-private.hh | 123 digest.init (); 124 lookup.add_coverage (&digest); 132 hb_set_digest_t digest; member in struct:hb_ot_layout_lookup_accelerator_t
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
x509.c | 144 " -md2/-md5/-sha1/-mdc2 - digest to use\n", 157 static int sign (X509 *x, EVP_PKEY *pkey,int days,int clrext, const EVP_MD *digest, 159 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest, 204 const EVP_MD *md_alg,*digest=NULL; local 479 digest=md_alg; 934 const EVP_MD *fdig = digest; 967 if (!sign(x,Upkey,days,clrext,digest, 983 if (!x509_certify(ctx,CAfile,digest,x,xca, 1009 rq=X509_to_X509_REQ(x,pk,digest); 1147 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, [all...] |
/external/chromium_org/third_party/tlslite/tlslite/ |
mathtls.py | 142 def digest(self): member in class:MAC_SSL 144 ohash2.update(self.ihash.digest()) 145 return bytearray(ohash2.digest())
|
/external/harfbuzz_ng/src/ |
hb-ot-layout-private.hh | 125 digest.init (); 126 lookup.add_coverage (&digest); 134 hb_set_digest_t digest; member in struct:hb_ot_layout_lookup_accelerator_t
|
/external/iputils/ninfod/ |
ninfod_name.c | 265 unsigned char digest[16]; local 272 MD5_Final(digest, &ctxt); 284 memcpy(&nigroup->s6_addr[12], digest, 4);
|
/external/javassist/src/main/javassist/ |
SerialVersionUID.java | 187 MessageDigest digest = MessageDigest.getInstance("SHA"); local 188 byte[] digested = digest.digest(bout.toByteArray());
|
/external/openssl/crypto/bn/ |
bn_rand.c | 322 unsigned char digest[SHA512_DIGEST_LENGTH]; local 355 SHA512_Final(digest, &sha); 360 memcpy(k_bytes + done, digest, todo);
|
/external/openssl/crypto/evp/ |
p5_crpt2.c | 82 const EVP_MD *digest, 90 mdlen = EVP_MD_size(digest); 101 if (!HMAC_Init_ex(&hctx_tpl, pass, passlen, digest, NULL))
|
/external/ppp/pppd/plugins/radius/ |
radius.c | 76 struct chap_digest_type *digest, 85 struct chap_digest_type *digest, 321 * digest -- points to the structure representing the digest type 333 struct chap_digest_type *digest, 361 if ((digest->code != CHAP_MD5) 363 && (digest->code != CHAP_MICROSOFT) 364 && (digest->code != CHAP_MICROSOFT_V2) 367 error("RADIUS: Challenge type %u unsupported", digest->code); 395 switch (digest->code) [all...] |