/external/chromium_org/third_party/libjingle/source/talk/base/ |
sslstreamadapter_unittest.cc | 266 unsigned char digest[20]; local 270 LOG(LS_INFO) << "Setting peer identities by digest"; 273 digest, 20, 277 LOG(LS_INFO) << "Setting bogus digest for server cert"; 278 digest[0]++; 280 rv = client_ssl_->SetPeerCertificateDigest(talk_base::DIGEST_SHA_1, digest, 286 digest, 20, &digest_len); 289 LOG(LS_INFO) << "Setting bogus digest for client cert"; 290 digest[0]++; 292 rv = server_ssl_->SetPeerCertificateDigest(talk_base::DIGEST_SHA_1, digest, [all...] |
nssstreamadapter.cc | 808 // provided certificate or digest. 825 LOG(LS_INFO) << "Checking against specified digest"; 826 // The peer certificate digest was specified 827 unsigned char digest[64]; // Maximum size local 832 digest, sizeof(digest), &digest_length)) { 833 LOG(LS_ERROR) << "Digest computation failed"; 835 Buffer computed_digest(digest, digest_length);
|
opensslstreamadapter.cc | 228 LOG(LS_WARNING) << "Unknown digest algorithm: " << digest_alg; 785 // the digest. 794 unsigned char digest[EVP_MAX_MD_SIZE]; local 799 digest, sizeof(digest), 801 LOG(LS_WARNING) << "Failed to compute peer cert digest."; 805 Buffer computed_digest(digest, digest_length); 807 LOG(LS_WARNING) << "Rejected peer certificate due to mismatched digest."; 810 // Ignore any verification error if the digest matches, since there is no
|
/external/chromium_org/third_party/webrtc/base/ |
sslstreamadapter_unittest.cc | 248 unsigned char digest[20]; local 252 LOG(LS_INFO) << "Setting peer identities by digest"; 255 digest, 20, 259 LOG(LS_INFO) << "Setting bogus digest for server cert"; 260 digest[0]++; 262 rv = client_ssl_->SetPeerCertificateDigest(rtc::DIGEST_SHA_1, digest, 268 digest, 20, &digest_len); 271 LOG(LS_INFO) << "Setting bogus digest for client cert"; 272 digest[0]++; 274 rv = server_ssl_->SetPeerCertificateDigest(rtc::DIGEST_SHA_1, digest, [all...] |
nssstreamadapter.cc | 790 // provided certificate or digest. 807 LOG(LS_INFO) << "Checking against specified digest"; 808 // The peer certificate digest was specified 809 unsigned char digest[64]; // Maximum size local 814 digest, sizeof(digest), &digest_length)) { 815 LOG(LS_ERROR) << "Digest computation failed"; 817 Buffer computed_digest(digest, digest_length);
|
opensslstreamadapter.cc | 211 LOG(LS_WARNING) << "Unknown digest algorithm: " << digest_alg; 768 // the digest. 777 unsigned char digest[EVP_MAX_MD_SIZE]; local 782 digest, sizeof(digest), 784 LOG(LS_WARNING) << "Failed to compute peer cert digest."; 788 Buffer computed_digest(digest, digest_length); 790 LOG(LS_WARNING) << "Rejected peer certificate due to mismatched digest."; 793 // Ignore any verification error if the digest matches, since there is no
|
/external/chromium_org/chrome/browser/drive/ |
drive_api_util.cc | 431 base::MD5Digest digest; local 432 base::MD5Final(&digest, &context); 433 return MD5DigestToBase16(digest);
|
/external/chromium_org/google_apis/gaia/ |
oauth_request_signer.cc | 205 unsigned char digest[kHmacDigestLength]; local 207 hmac.Sign(text, digest, kHmacDigestLength); 210 std::string(reinterpret_cast<const char*>(digest), kHmacDigestLength),
|
/external/chromium_org/net/server/ |
web_socket.cc | 66 base::MD5Digest digest; variable 67 base::MD5Sum(data, 16, &digest); 81 connection_->Send(reinterpret_cast<char*>(digest.a), 16);
|
/external/chromium_org/third_party/WebKit/Source/modules/websockets/ |
WebSocketHandshake.cpp | 116 DigestValue digest; local 117 bool digestSuccess = computeDigest(HashAlgorithmSha1, digestableCString.data(), digestableCString.length(), digest); 120 return base64Encode(reinterpret_cast<const char*>(digest.data()), sha1HashSize);
|
/external/valgrind/main/none/tests/ |
sha1_test.c | 66 void SHA1Final(unsigned char digest[20], SHA1_CTX* context); 200 /* Add padding and return the message digest. */ 202 void SHA1Final(unsigned char digest[20], SHA1_CTX* context) 238 digest[i] = (unsigned char)
|
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.c | 397 u8 digest[SHA1_MAC_LEN]; local 410 if (sha1_vector(4, addr, len, digest)) 415 os_memcpy(session_key, digest, session_key_len);
|
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 272 byte[] digest = md.digest(bytes); 273 return fingerprint(digest);
|
/build/tools/ |
generate-notice-files.py | 66 and return hex digest as a string. 77 return hexify(sum.digest())
|
merge-event-log-tags.py | 147 d = hashlib.md5(str).digest()[:4]
|
/cts/tests/tests/security/src/android/security/cts/ |
CertificateTest.java | 163 byte[] sha1 = messageDigest.digest();
|
/cts/tools/cfassembler/src/dxconvext/ |
ClassFileAssembler.java | 140 int amt = md.digest(bytes, 12, 20); 142 throw new RuntimeException("unexpected digest write: " + amt +
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
evp_lib.c | 285 return ctx->digest;
|
m_sigver.c | 166 int s = EVP_MD_size(ctx->digest);
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
ssl_cert.c | 165 /* Set digest values to defaults */ 167 cert->pkeys[SSL_PKEY_DSA_SIGN].digest = EVP_sha1(); 170 cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1(); 171 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1(); 174 cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1();
|
/external/chromium_org/third_party/sfntly/cpp/src/sfntly/ |
font.cc | 80 Font::Font(int32_t sfnt_version, ByteVector* digest) 84 digest_ = *digest; 268 void Font::Builder::SetDigest(ByteVector* digest) { 270 digest_ = *digest;
|
/external/conscrypt/src/test/java/org/conscrypt/ |
CertPinManagerTest.java | 51 byte[] fingerprint = dgst.digest(encoded);
|
/external/nanohttpd/websocket/src/main/java/fi/iki/elonen/ |
WebSocketResponseHandler.java | 78 byte[] sha1hash = md.digest();
|
/external/okhttp/okio/src/main/java/okio/ |
ByteString.java | 206 ByteString.of(MessageDigest.getInstance("MD5").digest(data)).hex());
|
/external/openssl/crypto/evp/ |
evp_lib.c | 285 return ctx->digest;
|