/external/openssl/crypto/evp/ |
bio_ok.c | 90 with it's length and suffixed with it's digest. So you need only 92 it's digest. 96 1) the digest of the block is computed over the whole stream 103 *) digest is initialized with random seed instead of 107 of the digest is also written to output. 110 and then compare the digest output. 439 *ppmd=ctx->md.digest; 487 if(ctx->buf_len+ 2* md->digest->md_size > OK_BLOCK_SIZE) return 1; 489 if (!EVP_DigestInit_ex(md, md->digest, NULL)) 494 RAND_pseudo_bytes(md->md_data, md->digest->md_size) [all...] |
/external/pdfium/core/src/fdrm/crypto/ |
fx_crypt_sha.cpp | 27 static void SHATransform(unsigned int * digest, unsigned int * block)
39 a = digest[0];
40 b = digest[1];
41 c = digest[2];
42 d = digest[3];
43 e = digest[4];
79 digest[0] += a;
80 digest[1] += b;
81 digest[2] += c;
82 digest[3] += d; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
SHA1.java | 1 package org.bouncycastle.jcajce.provider.digest; 31 static public class Digest 35 public Digest() 43 Digest d = (Digest)super.clone(); 44 d.digest = new SHA1Digest((SHA1Digest)digest); 138 int digest = SHA1; local 141 CipherParameters param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 143 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param) [all...] |
/external/chromium_org/third_party/eyesfree/src/android/java/src/com/googlecode/eyesfree/braille/selfbraille/ |
SelfBrailleClient.java | 169 MessageDigest digest; local 171 digest = MessageDigest.getInstance("SHA-1"); 178 digest.update(signature.toByteArray()); 179 if (MessageDigest.isEqual(EYES_FREE_CERT_SHA1, digest.digest())) { 182 digest.reset();
|
/external/chromium_org/crypto/third_party/nss/ |
chromium-blapi.h | 54 extern void SHA256_End(SHA256Context *cx, unsigned char *digest, 72 extern void SHA512_End(SHA512Context *cx, unsigned char *digest, 90 extern void SHA384_End(SHA384Context *cx, unsigned char *digest,
|
/external/chromium_org/google_apis/gcm/engine/ |
gservices_settings_unittest.cc | 78 // Verifies default values of the G-services settings and settings digest. 81 EXPECT_EQ(kDefaultSettingsDigest, settings().digest()); 86 // Verifies digest calculation for the sample provided by protocol owners. 109 EXPECT_EQ(kDefaultSettingsDigest, settings().digest()); 112 // Verifies that settings are not when digest value does not match. 120 EXPECT_EQ(kDefaultSettingsDigest, settings().digest()); 146 settings().digest()); 163 settings().digest()); 188 settings().digest()); 214 settings().digest()); 305 std::string digest = GServicesSettings::CalculateDigest(full_settings); local [all...] |
/external/openssl/crypto/cms/ |
cms_dd.c | 123 if (mdlen != (unsigned int)dd->digest->length) 130 if (memcmp(md, dd->digest->data, mdlen)) 138 if (!ASN1_STRING_set(dd->digest, md, mdlen))
|
/external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/ |
Socks5ClientForInitiator.java | 50 * @param digest identifying the SOCKS5 Bytestream
55 public Socks5ClientForInitiator(StreamHost streamHost, String digest, Connection connection,
57 super(streamHost, digest);
70 socket = socks5Server.getSocket(this.digest);
|
/external/chromium_org/net/quic/crypto/ |
channel_id_openssl.cc | 83 unsigned char digest[SHA256_DIGEST_LENGTH]; local 84 SHA256_Final(digest, &sha256); 86 return ECDSA_do_verify(digest, sizeof(digest), &sig, ecdsa_key.get()) == 1;
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
p_hmac_asn1.c | 59 #include <openssl/digest.h>
|
/external/chromium_org/third_party/webrtc/base/ |
sslfingerprint.h | 45 rtc::Buffer digest; member in struct:rtc::SSLFingerprint
|
/external/glide/library/src/main/java/com/bumptech/glide/load/resource/gif/ |
GifResourceDecoder.java | 48 MessageDigest digest = MessageDigest.getInstance("SHA-1"); local 49 digest.update(data); 50 return Util.sha256BytesToHex(digest.digest());
|
/external/guava/guava-tests/test/com/google/common/hash/ |
MessageDigestHashFunctionTest.java | 31 MessageDigest.getInstance(algorithmName).digest(input),
|
/external/lzma/CS/7zip/Common/ |
CRC.cs | 50 static bool VerifyDigest(uint digest, byte[] data, uint offset, uint size)
52 return (CalculateDigest(data, offset, size) == digest);
|
/external/openssl/android.testssl/ |
testssl.sh | 29 digest='-sha1' 31 x509cmd="adb shell /system/bin/openssl x509 $digest"
|
/external/openssl/patches/ |
testssl.sh | 29 digest='-sha1' 31 x509cmd="adb shell /system/bin/openssl x509 $digest"
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
hmac.py | 63 _warnings.warn('No block_size attribute on given digest object; ' 69 key = self.digest_cons(key).digest() 100 To be used only internally with digest() and hexdigest(). 103 h.update(self.inner.digest()) 106 def digest(self): member in class:HMAC 114 return h.digest() 117 """Like digest(), but returns a string of hexadecimal digits instead. 130 method, and can ask for the hash value at any time by calling its digest()
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
hmac.py | 63 _warnings.warn('No block_size attribute on given digest object; ' 69 key = self.digest_cons(key).digest() 100 To be used only internally with digest() and hexdigest(). 103 h.update(self.inner.digest()) 106 def digest(self): member in class:HMAC 114 return h.digest() 117 """Like digest(), but returns a string of hexadecimal digits instead. 130 method, and can ask for the hash value at any time by calling its digest()
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_hmac.py | 12 def md5test(key, data, digest): 14 self.assertEqual(h.hexdigest().upper(), digest.upper()) 46 def shatest(key, data, digest): 48 self.assertEqual(h.hexdigest().upper(), digest.upper()) 211 def digest(self): member in class:TestVectorsTestCase.test_legacy_block_size_warnings.MockCrazyHash 212 return self._x.digest() 245 # Constructor call with text and digest module. 265 dig = h.digest() 278 "digest constructors don't match.") 300 self.assertTrue(h1.digest() == h2.digest() [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_hmac.py | 12 def md5test(key, data, digest): 14 self.assertEqual(h.hexdigest().upper(), digest.upper()) 46 def shatest(key, data, digest): 48 self.assertEqual(h.hexdigest().upper(), digest.upper()) 211 def digest(self): member in class:TestVectorsTestCase.test_legacy_block_size_warnings.MockCrazyHash 212 return self._x.digest() 245 # Constructor call with text and digest module. 265 dig = h.digest() 278 "digest constructors don't match.") 300 self.assertTrue(h1.digest() == h2.digest() [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
DSAParametersGenerator.java | 6 import org.bouncycastle.crypto.Digest; 22 private Digest digest; field in class:DSAParametersGenerator 41 public DSAParametersGenerator(Digest digest) 43 this.digest = digest; 101 if (digest.getDigestSize() * 8 < N) 103 throw new IllegalStateException("Digest output size too small for value of N"); 130 if (!(digest.getAlgorithmName().equals("SHA-1")) [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
e_rc4.c | 184 uint8_t digest[MD5_DIGEST_LENGTH]; local 245 MD5_Final(digest, &md); 248 MD5_Update(&md, digest, sizeof(digest)); 252 MD5_Final(digest, &md); 253 memcpy(out + in_len, digest, rc4_ctx->tag_len); 280 uint8_t digest[MD5_DIGEST_LENGTH]; local 317 /* Decrypt the initial portion of the ciphertext and digest the plaintext 322 /* Decrypt and digest the next |blocks| blocks of ciphertext with the 344 MD5_Final(digest, &md) [all...] |
/external/pdfium/core/src/fpdfapi/fpdf_parser/ |
fpdf_parser_encrypt.cpp | 39 FX_BYTE digest[16];
local 40 CRYPT_MD5Finish(md5, digest);
42 if (copy_len > sizeof(digest)) {
43 copy_len = sizeof(digest);
47 CRYPT_MD5Generate(digest, copy_len, digest);
51 FXSYS_memcpy32(key, digest, copy_len);
229 FX_BYTE digest[32];
local 230 CRYPT_SHA256Finish(sha, digest);
232 FX_LPBYTE input = digest;
305 FX_BYTE digest[32]; local 569 FX_BYTE digest[32]; local 599 FX_BYTE digest[20]; local [all...] |
/external/chromium_org/chrome/browser/safe_browsing/incident_reporting/ |
blacklist_load_incident_handlers_unittest.cc | 36 uint32_t digest = safe_browsing::GetBlacklistLoadIncidentDigest(*incident); local 37 ASSERT_EQ(digest,
|
/external/chromium_org/crypto/ |
hmac_openssl.cc | 52 unsigned char* digest, 56 ScopedOpenSSLSafeSizeBuffer<EVP_MAX_MD_SIZE> result(digest, digest_length);
|