HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 51 - 75 of 714) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/chromium_org/third_party/libjingle/source/talk/base/
sslfingerprint.cc 87 digest.SetData(digest_in, digest_len);
91 : algorithm(from.algorithm), digest(from.digest) {}
95 digest == other.digest;
101 digest.data(), digest.length(), ':');
  /external/chromium_org/third_party/webrtc/base/
sslfingerprint.cc 69 digest.SetData(digest_in, digest_len);
73 : algorithm(from.algorithm), digest(from.digest) {}
77 digest == other.digest;
83 digest.data(), digest.length(), ':');
  /external/chromium_org/third_party/libaddressinput/chromium/cpp/test/util/
md5_unittest.cc 26 MD5Digest digest; local
36 digest.a[i] = data[i] & 0xff;
38 std::string actual = MD5DigestToBase16(digest);
45 MD5Digest digest; local
48 MD5Sum(data, strlen(data), &digest);
58 EXPECT_EQ(expected[i], digest.a[i] & 0xFF);
62 MD5Digest digest; local
65 MD5Sum(data, strlen(data), &digest);
75 EXPECT_EQ(expected[i], digest.a[i] & 0xFF);
85 MD5Digest digest; local
103 MD5Digest digest; local
140 MD5Digest digest; local
208 MD5Digest digest; local
    [all...]
  /external/chromium_org/third_party/libaddressinput/src/cpp/test/util/
md5_unittest.cc 27 MD5Digest digest; local
37 digest.a[i] = data[i] & 0xff;
39 std::string actual = MD5DigestToBase16(digest);
46 MD5Digest digest; local
49 MD5Sum(data, strlen(data), &digest);
59 EXPECT_EQ(expected[i], digest.a[i] & 0xFF);
63 MD5Digest digest; local
66 MD5Sum(data, strlen(data), &digest);
76 EXPECT_EQ(expected[i], digest.a[i] & 0xFF);
86 MD5Digest digest; local
104 MD5Digest digest; local
141 MD5Digest digest; local
209 MD5Digest digest; local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
PKCS12ParametersGenerator.java 4 import org.bouncycastle.crypto.Digest;
24 private Digest digest; field in class:PKCS12ParametersGenerator
31 * accept any digest which also implements ExtendedDigest.
33 * @param digest the digest to be used as the source of derived keys.
34 * @exception IllegalArgumentException if an unknown digest is passed in.
37 Digest digest)
39 this.digest = digest
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_pep247.py 29 h1 = module.new(key, 'string').digest()
32 h2 = obj3.digest()
37 h1 = module.new('string').digest()
40 h2 = obj3.digest()
52 self.assertEqual(obj1.digest(), obj_copy.digest())
55 digest, hexdigest = obj1.digest(), obj1.hexdigest()
57 for byte in digest:
test_sha.py 17 def check(self, data, digest):
18 # Check digest matches the expected value
21 self.assertTrue(computed == digest)
24 # digest operations.
28 # Check hexdigest() output matches digest()'s output
29 digest = obj.digest()
31 for c in digest:
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_pep247.py 29 h1 = module.new(key, 'string').digest()
32 h2 = obj3.digest()
37 h1 = module.new('string').digest()
40 h2 = obj3.digest()
52 self.assertEqual(obj1.digest(), obj_copy.digest())
55 digest, hexdigest = obj1.digest(), obj1.hexdigest()
57 for byte in digest:
test_sha.py 17 def check(self, data, digest):
18 # Check digest matches the expected value
21 self.assertTrue(computed == digest)
24 # digest operations.
28 # Check hexdigest() output matches digest()'s output
29 digest = obj.digest()
31 for c in digest:
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/util/
AsymmetricAlgorithmProvider.java 11 String digest,
16 String mainName = digest + "WITH" + algorithm;
17 String jdk11Variation1 = digest + "with" + algorithm;
18 String jdk11Variation2 = digest + "With" + algorithm;
19 String alias = digest + "/" + algorithm;
  /external/chromium_org/content/public/browser/
media_device_id.cc 22 std::vector<uint8> digest(digest_length);
25 hmac.Sign(raw_unique_id + salt, &digest[0], digest.size());
27 return StringToLowerASCII(base::HexEncode(&digest[0], digest.size()));
  /frameworks/base/core/tests/coretests/src/android/content/pm/
ManifestDigestTest.java 53 new ManifestDigest(MessageDigest.getInstance("SHA-256").digest(MESSAGE_1));
65 ManifestDigest digest = ManifestDigest.fromInputStream(is); local
68 digest.writeToParcel(p, 0);
74 + digest.toString() + " and " + fromParcel.toString(), digest,
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
MessageDigest2Test.java 80 + digestAlgs[i], MessageDigest.isEqual(d1.digest(), d2
81 .digest()));
153 byte[] hash = sha.digest(data);
203 byte[] hash = sha.digest(data);
212 * @tests java.security.MessageDigest#digest()
223 byte[] digest = sha.digest();
224 assertTrue("bug in SHA", MessageDigest.isEqual(digest, MESSAGE_DIGEST));
231 digest = sha.digest();
263 MessageDigest digest = MessageDigest.getInstance(digestAlgs[i], local
281 MessageDigest digest = MessageDigest.getInstance(digestAlgs[i], local
297 MessageDigest.getInstance("SHA").digest(new byte[] { }, Integer.MAX_VALUE, 755); method
    [all...]
  /external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
sctp_sha1.c 37 /* A SHA-1 Digest is 160 bits, or 20 bytes */
54 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx)
58 PK11_DigestFinal(ctx->pk11_ctx, digest, &output_len, SHA_DIGEST_LENGTH);
77 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx)
79 SHA1_Final(digest, &ctx->sha_ctx);
225 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx)
229 * the digest to the pointer. At the last block some special rules
300 /* transfer the digest back to the user */
301 digest[3] = (ctx->H0 & 0xff);
302 digest[2] = ((ctx->H0 >> 8) & 0xff)
    [all...]
  /external/chromium_org/crypto/
hmac.h 34 // Returns the length of digest that this HMAC will create.
64 // returned in |digest|, which has |digest_length| bytes of storage available.
65 bool Sign(const base::StringPiece& data, unsigned char* digest,
69 // in |digest|, using the algorithm supplied to the constructor and the key
73 // undermine the cryptographic integrity. |digest| must be exactly
76 const base::StringPiece& digest) const WARN_UNUSED_RESULT;
79 // that |digest| is allowed to be smaller than |DigestLength()|.
82 const base::StringPiece& digest) const WARN_UNUSED_RESULT;
hkdf.cc 53 uint8 digest[kSHA256HashLength]; local
66 result = hmac.Sign(base::StringPiece(buf.get(), j), digest, sizeof(digest));
69 memcpy(&output_[i*sizeof(digest)], digest, sizeof(digest));
70 previous = base::StringPiece(reinterpret_cast<char*>(digest),
71 sizeof(digest));
  /external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/
p12_p8e.c 84 M_ASN1_OCTET_STRING_free(p8->digest);
85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO),
87 if(!p8->digest) {
  /external/openssl/crypto/pkcs12/
p12_p8e.c 84 M_ASN1_OCTET_STRING_free(p8->digest);
85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO),
87 if(!p8->digest) {
  /external/chromium_org/third_party/openssl/openssl/crypto/evp/
p_sign.c 95 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE)
104 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0)
117 v=ctx->digest->required_pkey_type[i];
131 if (ctx->digest->sign == NULL)
136 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
  /external/openssl/crypto/evp/
p_sign.c 95 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE)
104 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0)
117 v=ctx->digest->required_pkey_type[i];
131 if (ctx->digest->sign == NULL)
136 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
RSA.java 190 String digest,
194 String mainName = digest + "WITHRSA";
195 String jdk11Variation1 = digest + "withRSA";
196 String jdk11Variation2 = digest + "WithRSA";
197 String alias = digest + "/" + "RSA";
198 String longName = digest + "WITHRSAENCRYPTION";
199 String longJdk11Variation1 = digest + "withRSAEncryption";
200 String longJdk11Variation2 = digest + "WithRSAEncryption";
  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
x_sig.c 66 ASN1_SIMPLE(X509_SIG, digest, ASN1_OCTET_STRING)
  /external/chromium_org/third_party/skia/tests/
MD5Test.cpp 11 static bool digests_equal(const SkMD5::Digest& expectedDigest, const SkMD5::Digest& computedDigest) {
20 static void md5_test(const char* string, const SkMD5::Digest& expectedDigest, skiatest::Reporter* reporter) {
27 SkMD5::Digest digest; local
28 context.finish(digest);
30 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest));
41 SkMD5::Digest digest; local
42 context.finish(digest);
50 SkMD5::Digest digest; member in struct:MD5Test
    [all...]
  /external/openssl/crypto/asn1/
x_sig.c 66 ASN1_SIMPLE(X509_SIG, digest, ASN1_OCTET_STRING)
  /external/skia/tests/
MD5Test.cpp 11 static bool digests_equal(const SkMD5::Digest& expectedDigest, const SkMD5::Digest& computedDigest) {
20 static void md5_test(const char* string, const SkMD5::Digest& expectedDigest, skiatest::Reporter* reporter) {
27 SkMD5::Digest digest; local
28 context.finish(digest);
30 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest));
41 SkMD5::Digest digest; local
42 context.finish(digest);
50 SkMD5::Digest digest; member in struct:MD5Test
    [all...]

Completed in 2280 milliseconds

1 23 4 5 6 7 8 91011>>