HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 376 - 400 of 714) sorted by null

<<11121314151617181920>>

  /external/chromium_org/third_party/libjingle/source/talk/base/
sslstreamadapter_unittest.cc 266 unsigned char digest[20]; local
270 LOG(LS_INFO) << "Setting peer identities by digest";
273 digest, 20,
277 LOG(LS_INFO) << "Setting bogus digest for server cert";
278 digest[0]++;
280 rv = client_ssl_->SetPeerCertificateDigest(talk_base::DIGEST_SHA_1, digest,
286 digest, 20, &digest_len);
289 LOG(LS_INFO) << "Setting bogus digest for client cert";
290 digest[0]++;
292 rv = server_ssl_->SetPeerCertificateDigest(talk_base::DIGEST_SHA_1, digest,
    [all...]
nssstreamadapter.cc 808 // provided certificate or digest.
825 LOG(LS_INFO) << "Checking against specified digest";
826 // The peer certificate digest was specified
827 unsigned char digest[64]; // Maximum size local
832 digest, sizeof(digest), &digest_length)) {
833 LOG(LS_ERROR) << "Digest computation failed";
835 Buffer computed_digest(digest, digest_length);
opensslstreamadapter.cc 228 LOG(LS_WARNING) << "Unknown digest algorithm: " << digest_alg;
785 // the digest.
794 unsigned char digest[EVP_MAX_MD_SIZE]; local
799 digest, sizeof(digest),
801 LOG(LS_WARNING) << "Failed to compute peer cert digest.";
805 Buffer computed_digest(digest, digest_length);
807 LOG(LS_WARNING) << "Rejected peer certificate due to mismatched digest.";
810 // Ignore any verification error if the digest matches, since there is no
  /external/chromium_org/third_party/webrtc/base/
sslstreamadapter_unittest.cc 248 unsigned char digest[20]; local
252 LOG(LS_INFO) << "Setting peer identities by digest";
255 digest, 20,
259 LOG(LS_INFO) << "Setting bogus digest for server cert";
260 digest[0]++;
262 rv = client_ssl_->SetPeerCertificateDigest(rtc::DIGEST_SHA_1, digest,
268 digest, 20, &digest_len);
271 LOG(LS_INFO) << "Setting bogus digest for client cert";
272 digest[0]++;
274 rv = server_ssl_->SetPeerCertificateDigest(rtc::DIGEST_SHA_1, digest,
    [all...]
nssstreamadapter.cc 790 // provided certificate or digest.
807 LOG(LS_INFO) << "Checking against specified digest";
808 // The peer certificate digest was specified
809 unsigned char digest[64]; // Maximum size local
814 digest, sizeof(digest), &digest_length)) {
815 LOG(LS_ERROR) << "Digest computation failed";
817 Buffer computed_digest(digest, digest_length);
opensslstreamadapter.cc 211 LOG(LS_WARNING) << "Unknown digest algorithm: " << digest_alg;
768 // the digest.
777 unsigned char digest[EVP_MAX_MD_SIZE]; local
782 digest, sizeof(digest),
784 LOG(LS_WARNING) << "Failed to compute peer cert digest.";
788 Buffer computed_digest(digest, digest_length);
790 LOG(LS_WARNING) << "Rejected peer certificate due to mismatched digest.";
793 // Ignore any verification error if the digest matches, since there is no
  /external/chromium_org/chrome/browser/drive/
drive_api_util.cc 431 base::MD5Digest digest; local
432 base::MD5Final(&digest, &context);
433 return MD5DigestToBase16(digest);
  /external/chromium_org/google_apis/gaia/
oauth_request_signer.cc 205 unsigned char digest[kHmacDigestLength]; local
207 hmac.Sign(text, digest, kHmacDigestLength);
210 std::string(reinterpret_cast<const char*>(digest), kHmacDigestLength),
  /external/chromium_org/net/server/
web_socket.cc 66 base::MD5Digest digest; variable
67 base::MD5Sum(data, 16, &digest);
81 connection_->Send(reinterpret_cast<char*>(digest.a), 16);
  /external/chromium_org/third_party/WebKit/Source/modules/websockets/
WebSocketHandshake.cpp 116 DigestValue digest; local
117 bool digestSuccess = computeDigest(HashAlgorithmSha1, digestableCString.data(), digestableCString.length(), digest);
120 return base64Encode(reinterpret_cast<const char*>(digest.data()), sha1HashSize);
  /external/valgrind/main/none/tests/
sha1_test.c 66 void SHA1Final(unsigned char digest[20], SHA1_CTX* context);
200 /* Add padding and return the message digest. */
202 void SHA1Final(unsigned char digest[20], SHA1_CTX* context)
238 digest[i] = (unsigned char)
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.c 397 u8 digest[SHA1_MAC_LEN]; local
410 if (sha1_vector(4, addr, len, digest))
415 os_memcpy(session_key, digest, session_key_len);
  /frameworks/base/core/java/android/net/http/
SslCertificate.java 272 byte[] digest = md.digest(bytes);
273 return fingerprint(digest);
  /build/tools/
generate-notice-files.py 66 and return hex digest as a string.
77 return hexify(sum.digest())
merge-event-log-tags.py 147 d = hashlib.md5(str).digest()[:4]
  /cts/tests/tests/security/src/android/security/cts/
CertificateTest.java 163 byte[] sha1 = messageDigest.digest();
  /cts/tools/cfassembler/src/dxconvext/
ClassFileAssembler.java 140 int amt = md.digest(bytes, 12, 20);
142 throw new RuntimeException("unexpected digest write: " + amt +
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
evp_lib.c 285 return ctx->digest;
m_sigver.c 166 int s = EVP_MD_size(ctx->digest);
  /external/chromium_org/third_party/openssl/openssl/ssl/
ssl_cert.c 165 /* Set digest values to defaults */
167 cert->pkeys[SSL_PKEY_DSA_SIGN].digest = EVP_sha1();
170 cert->pkeys[SSL_PKEY_RSA_SIGN].digest = EVP_sha1();
171 cert->pkeys[SSL_PKEY_RSA_ENC].digest = EVP_sha1();
174 cert->pkeys[SSL_PKEY_ECC].digest = EVP_sha1();
  /external/chromium_org/third_party/sfntly/cpp/src/sfntly/
font.cc 80 Font::Font(int32_t sfnt_version, ByteVector* digest)
84 digest_ = *digest;
268 void Font::Builder::SetDigest(ByteVector* digest) {
270 digest_ = *digest;
  /external/conscrypt/src/test/java/org/conscrypt/
CertPinManagerTest.java 51 byte[] fingerprint = dgst.digest(encoded);
  /external/nanohttpd/websocket/src/main/java/fi/iki/elonen/
WebSocketResponseHandler.java 78 byte[] sha1hash = md.digest();
  /external/okhttp/okio/src/main/java/okio/
ByteString.java 206 ByteString.of(MessageDigest.getInstance("MD5").digest(data)).hex());
  /external/openssl/crypto/evp/
evp_lib.c 285 return ctx->digest;

Completed in 2575 milliseconds

<<11121314151617181920>>