/external/chromium_org/third_party/libjingle/source/talk/base/ |
sslfingerprint.cc | 87 digest.SetData(digest_in, digest_len); 91 : algorithm(from.algorithm), digest(from.digest) {} 95 digest == other.digest; 101 digest.data(), digest.length(), ':');
|
/external/chromium_org/third_party/webrtc/base/ |
sslfingerprint.cc | 69 digest.SetData(digest_in, digest_len); 73 : algorithm(from.algorithm), digest(from.digest) {} 77 digest == other.digest; 83 digest.data(), digest.length(), ':');
|
/external/chromium_org/third_party/libaddressinput/chromium/cpp/test/util/ |
md5_unittest.cc | 26 MD5Digest digest; local 36 digest.a[i] = data[i] & 0xff; 38 std::string actual = MD5DigestToBase16(digest); 45 MD5Digest digest; local 48 MD5Sum(data, strlen(data), &digest); 58 EXPECT_EQ(expected[i], digest.a[i] & 0xFF); 62 MD5Digest digest; local 65 MD5Sum(data, strlen(data), &digest); 75 EXPECT_EQ(expected[i], digest.a[i] & 0xFF); 85 MD5Digest digest; local 103 MD5Digest digest; local 140 MD5Digest digest; local 208 MD5Digest digest; local [all...] |
/external/chromium_org/third_party/libaddressinput/src/cpp/test/util/ |
md5_unittest.cc | 27 MD5Digest digest; local 37 digest.a[i] = data[i] & 0xff; 39 std::string actual = MD5DigestToBase16(digest); 46 MD5Digest digest; local 49 MD5Sum(data, strlen(data), &digest); 59 EXPECT_EQ(expected[i], digest.a[i] & 0xFF); 63 MD5Digest digest; local 66 MD5Sum(data, strlen(data), &digest); 76 EXPECT_EQ(expected[i], digest.a[i] & 0xFF); 86 MD5Digest digest; local 104 MD5Digest digest; local 141 MD5Digest digest; local 209 MD5Digest digest; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS12ParametersGenerator.java | 4 import org.bouncycastle.crypto.Digest; 24 private Digest digest; field in class:PKCS12ParametersGenerator 31 * accept any digest which also implements ExtendedDigest. 33 * @param digest the digest to be used as the source of derived keys. 34 * @exception IllegalArgumentException if an unknown digest is passed in. 37 Digest digest) 39 this.digest = digest [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_pep247.py | 29 h1 = module.new(key, 'string').digest() 32 h2 = obj3.digest() 37 h1 = module.new('string').digest() 40 h2 = obj3.digest() 52 self.assertEqual(obj1.digest(), obj_copy.digest()) 55 digest, hexdigest = obj1.digest(), obj1.hexdigest() 57 for byte in digest:
|
test_sha.py | 17 def check(self, data, digest): 18 # Check digest matches the expected value 21 self.assertTrue(computed == digest) 24 # digest operations. 28 # Check hexdigest() output matches digest()'s output 29 digest = obj.digest() 31 for c in digest:
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_pep247.py | 29 h1 = module.new(key, 'string').digest() 32 h2 = obj3.digest() 37 h1 = module.new('string').digest() 40 h2 = obj3.digest() 52 self.assertEqual(obj1.digest(), obj_copy.digest()) 55 digest, hexdigest = obj1.digest(), obj1.hexdigest() 57 for byte in digest:
|
test_sha.py | 17 def check(self, data, digest): 18 # Check digest matches the expected value 21 self.assertTrue(computed == digest) 24 # digest operations. 28 # Check hexdigest() output matches digest()'s output 29 digest = obj.digest() 31 for c in digest:
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/util/ |
AsymmetricAlgorithmProvider.java | 11 String digest, 16 String mainName = digest + "WITH" + algorithm; 17 String jdk11Variation1 = digest + "with" + algorithm; 18 String jdk11Variation2 = digest + "With" + algorithm; 19 String alias = digest + "/" + algorithm;
|
/external/chromium_org/content/public/browser/ |
media_device_id.cc | 22 std::vector<uint8> digest(digest_length); 25 hmac.Sign(raw_unique_id + salt, &digest[0], digest.size()); 27 return StringToLowerASCII(base::HexEncode(&digest[0], digest.size()));
|
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
ManifestDigestTest.java | 53 new ManifestDigest(MessageDigest.getInstance("SHA-256").digest(MESSAGE_1)); 65 ManifestDigest digest = ManifestDigest.fromInputStream(is); local 68 digest.writeToParcel(p, 0); 74 + digest.toString() + " and " + fromParcel.toString(), digest,
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest2Test.java | 80 + digestAlgs[i], MessageDigest.isEqual(d1.digest(), d2 81 .digest())); 153 byte[] hash = sha.digest(data); 203 byte[] hash = sha.digest(data); 212 * @tests java.security.MessageDigest#digest() 223 byte[] digest = sha.digest(); 224 assertTrue("bug in SHA", MessageDigest.isEqual(digest, MESSAGE_DIGEST)); 231 digest = sha.digest(); 263 MessageDigest digest = MessageDigest.getInstance(digestAlgs[i], local 281 MessageDigest digest = MessageDigest.getInstance(digestAlgs[i], local 297 MessageDigest.getInstance("SHA").digest(new byte[] { }, Integer.MAX_VALUE, 755); method [all...] |
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
sctp_sha1.c | 37 /* A SHA-1 Digest is 160 bits, or 20 bytes */ 54 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) 58 PK11_DigestFinal(ctx->pk11_ctx, digest, &output_len, SHA_DIGEST_LENGTH); 77 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) 79 SHA1_Final(digest, &ctx->sha_ctx); 225 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) 229 * the digest to the pointer. At the last block some special rules 300 /* transfer the digest back to the user */ 301 digest[3] = (ctx->H0 & 0xff); 302 digest[2] = ((ctx->H0 >> 8) & 0xff) [all...] |
/external/chromium_org/crypto/ |
hmac.h | 34 // Returns the length of digest that this HMAC will create. 64 // returned in |digest|, which has |digest_length| bytes of storage available. 65 bool Sign(const base::StringPiece& data, unsigned char* digest, 69 // in |digest|, using the algorithm supplied to the constructor and the key 73 // undermine the cryptographic integrity. |digest| must be exactly 76 const base::StringPiece& digest) const WARN_UNUSED_RESULT; 79 // that |digest| is allowed to be smaller than |DigestLength()|. 82 const base::StringPiece& digest) const WARN_UNUSED_RESULT;
|
hkdf.cc | 53 uint8 digest[kSHA256HashLength]; local 66 result = hmac.Sign(base::StringPiece(buf.get(), j), digest, sizeof(digest)); 69 memcpy(&output_[i*sizeof(digest)], digest, sizeof(digest)); 70 previous = base::StringPiece(reinterpret_cast<char*>(digest), 71 sizeof(digest));
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
p12_p8e.c | 84 M_ASN1_OCTET_STRING_free(p8->digest); 85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), 87 if(!p8->digest) {
|
/external/openssl/crypto/pkcs12/ |
p12_p8e.c | 84 M_ASN1_OCTET_STRING_free(p8->digest); 85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), 87 if(!p8->digest) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
p_sign.c | 95 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) 104 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0) 117 v=ctx->digest->required_pkey_type[i]; 131 if (ctx->digest->sign == NULL) 136 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
|
/external/openssl/crypto/evp/ |
p_sign.c | 95 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) 104 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0) 117 v=ctx->digest->required_pkey_type[i]; 131 if (ctx->digest->sign == NULL) 136 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
RSA.java | 190 String digest, 194 String mainName = digest + "WITHRSA"; 195 String jdk11Variation1 = digest + "withRSA"; 196 String jdk11Variation2 = digest + "WithRSA"; 197 String alias = digest + "/" + "RSA"; 198 String longName = digest + "WITHRSAENCRYPTION"; 199 String longJdk11Variation1 = digest + "withRSAEncryption"; 200 String longJdk11Variation2 = digest + "WithRSAEncryption";
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
x_sig.c | 66 ASN1_SIMPLE(X509_SIG, digest, ASN1_OCTET_STRING)
|
/external/chromium_org/third_party/skia/tests/ |
MD5Test.cpp | 11 static bool digests_equal(const SkMD5::Digest& expectedDigest, const SkMD5::Digest& computedDigest) { 20 static void md5_test(const char* string, const SkMD5::Digest& expectedDigest, skiatest::Reporter* reporter) { 27 SkMD5::Digest digest; local 28 context.finish(digest); 30 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest)); 41 SkMD5::Digest digest; local 42 context.finish(digest); 50 SkMD5::Digest digest; member in struct:MD5Test [all...] |
/external/openssl/crypto/asn1/ |
x_sig.c | 66 ASN1_SIMPLE(X509_SIG, digest, ASN1_OCTET_STRING)
|
/external/skia/tests/ |
MD5Test.cpp | 11 static bool digests_equal(const SkMD5::Digest& expectedDigest, const SkMD5::Digest& computedDigest) { 20 static void md5_test(const char* string, const SkMD5::Digest& expectedDigest, skiatest::Reporter* reporter) { 27 SkMD5::Digest digest; local 28 context.finish(digest); 30 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest)); 41 SkMD5::Digest digest; local 42 context.finish(digest); 50 SkMD5::Digest digest; member in struct:MD5Test [all...] |