HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 176 - 200 of 721) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/chromium_org/third_party/boringssl/src/crypto/ecdsa/
ecdsa_test.c 70 unsigned char digest[20], wrong_digest[20]; local
78 /* fill digest values with some random data */
79 if (!RAND_pseudo_bytes(digest, 20) || !RAND_pseudo_bytes(wrong_digest, 20)) {
158 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) {
165 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) {
172 if (ECDSA_verify(0, digest, 20, signature, sig_len, wrong_eckey) == 1) {
178 /* wrong digest */
186 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, eckey) == 1) {
233 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) == 1) {
246 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1)
    [all...]
  /external/chromium_org/net/quic/test_tools/
crypto_test_utils_openssl.cc 117 // hostname is hashed with SHA-256 and the resulting digest is treated as a
126 unsigned char digest[SHA256_DIGEST_LENGTH]; local
127 SHA256_Final(digest, &sha256);
129 // Ensure that the digest is less than the order of the P-256 group by
131 digest[0] &= 0x7f;
134 CHECK(BN_bin2bn(digest, sizeof(digest), k.get()) != NULL);
  /libcore/luni/src/main/java/java/security/
MessageDigest.java 26 * <i>message</i>, and the fixed-length byte sequence is the <i>digest</i> or
27 * <i>message digest</i>.
30 * <p>The basic pattern to digest an {@link java.io.InputStream} looks like this:
38 * byte[] digest = digester.digest();
42 * call {@link #update(byte[],int,int)} for each block of input data, and then call {@link #digest}
43 * to get the final digest. Note that calling {@code digest} resets the {@code MessageDigest}.
45 * calling {@code digest}.
228 * After the digest is computed the receiver is reset
233 public byte[] digest() { method in class:MessageDigest
255 public int digest(byte[] buf, int offset, int len) throws DigestException { method in class:MessageDigest
276 public byte[] digest(byte[] input) { method in class:MessageDigest
    [all...]
  /external/chromium_org/net/http/
http_auth_handler_digest_unittest.cc 22 "Digest realm=\"Oblivion\", nonce=\"nonce-value\"";
102 "Digest nonce=\"xyz\", realm=\"Thunder Bluff\"",
114 "Digest nonce=\"xyz\", realm=ThunderBluff",
127 "Digest nonce=\"xyz\"",
139 "Digest realm=\"\", nonce=\"xyz\"",
153 "Digest nonce=\"xyz\", realm=\"foo-\xE5\"",
165 "Digest realm=\"Thunder Bluff\"",
178 "Digest nonce=xyz, realm=\"Thunder Bluff\"",
190 "Digest nonce=\"xyz\", realm=\"Thunder Bluff\", foo=\"bar\"",
202 "Digest nonce=\"xyz\", algorithm=\"awezum\", realm=\"Thunder\""
369 HttpAuthHandlerDigest* digest = local
529 HttpAuthHandlerDigest* digest = local
    [all...]
  /external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/
Socks5Proxy.java 83 /* assigns a connection to a digest */
261 * Returns the socket for the given digest. A socket will be returned if the given digest has
265 * @param digest identifying the connection
266 * @return socket or null if there is no socket for the given digest
268 protected Socket getSocket(String digest) {
269 return this.connectionMap.get(digest);
273 * Add the given digest to the list of allowed transfers. Only connections for allowed transfers
275 * the local SOCKS5 proxy that don't contain an allowed digest are discarded.
277 * @param digest to be added to the list of allowed transfers
    [all...]
  /external/apache-http/src/org/apache/http/impl/auth/
DigestScheme.java 53 * Digest authentication scheme as defined in RFC 2617.
63 * Since the digest username is included as clear text in the generated
90 * Hexa values used when creating 32 character long digest in HTTP DigestScheme
100 /** Whether the digest authentication process is complete */
113 * Default constructor for the digest authetication scheme.
121 * Processes the Digest challenge.
167 * Tests if the Digest authentication process has been completed.
169 * @return <tt>true</tt> if Digest authorization has been processed,
182 * Returns textual designation of the digest authentication scheme.
184 * @return <code>digest</code
243 String digest = createDigest(credentials); local
    [all...]
  /libcore/luni/src/main/java/java/util/jar/
JarVerifier.java 53 * List of accepted digest algorithms. This list is in order from most
78 * Stores and a hash and a message digest and verifies that massage digest
85 private final MessageDigest digest; field in class:JarVerifier.VerifierEntry
93 VerifierEntry(String name, MessageDigest digest, byte[] hash,
96 this.digest = digest;
103 * Updates a digest with one byte.
107 digest.update((byte) value);
111 * Updates a digest with byte array
    [all...]
  /packages/apps/PackageInstaller/src/com/android/packageinstaller/
InstallFlowAnalytics.java 460 byte[] digest = null;
462 digest = getPackageContentsDigest();
466 String digestHex = (digest != null)
467 ? IntegralToString.bytesToHexString(digest, false)
572 * Gets the digest of the contents of the package being installed.
580 * Gets the SHA-256 digest of the contents of the specified file.
583 MessageDigest digest; local
585 digest = MessageDigest.getInstance("SHA-256");
596 digest.update(buf, 0, chunkSize);
601 return digest.digest()
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
DigestInputStreamTest.java 42 * Message digest algorithm name used during testing
58 * Test message for digest computations
117 * Assertion: updates associated digest<br>
130 // check that associated digest has been updated properly
133 dis.getMessageDigest().digest(),
149 * Assertion: must not update digest if EOS had been
166 // check that 3 previous read() calls did not update digest
168 Arrays.equals(dis.getMessageDigest().digest(),
182 * Assertion: <code>read()</code> must not update digest if it is off<br>
183 * Assertion: <code>on(boolean)</code> turns digest functionality o
    [all...]
  /external/chromium_org/chrome/browser/spellchecker/
spellcheck_host_metrics.cc 61 base::MD5Digest digest; local
63 word.size() * sizeof(base::char16), &digest); local
64 checked_word_hashes_.insert(base::MD5DigestToBase16(digest));
  /external/chromium_org/third_party/boringssl/src/crypto/evp/
pbkdf.c 63 const EVP_MD *digest, size_t key_len, uint8_t *out_key) {
70 mdlen = EVP_MD_size(digest);
81 if (!HMAC_Init_ex(&hctx_tpl, password, password_len, digest, NULL)) {
  /external/openssl/crypto/ecdsa/
ecdsatest.c 185 unsigned char digest[20]; local
193 /* get the message digest */
196 EVP_DigestFinal(&md_ctx, digest, &dgst_len);
207 signature = ECDSA_do_sign(digest, 20, key);
223 if (ECDSA_do_verify(digest, 20, signature, key) != 1)
291 unsigned char digest[20], wrong_digest[20]; local
299 /* fill digest values with some random data */
300 if (!RAND_pseudo_bytes(digest, 20) ||
390 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey))
398 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1
    [all...]
  /external/openssl/crypto/hmac/
hmactest.c 88 unsigned char *digest; member in struct:test_st
150 if (strcmp(p,(char *)test[i].digest) != 0)
153 printf("got %s instead of %s\n",p,test[i].digest);
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
DigestInputStreamTest.java 44 * Message digest algorithm name used during testing
60 * Test message for digest computations
110 * Assertion: updates associated digest<br>
123 // check that associated digest has been updated properly
126 dis.getMessageDigest().digest(),
142 * Assertion: must not update digest if EOS had been
159 // check that 3 previous read() calls did not update digest
161 Arrays.equals(dis.getMessageDigest().digest(),
175 * Assertion: <code>read()</code> must not update digest if it is off<br>
176 * Assertion: <code>on(boolean)</code> turns digest functionality o
    [all...]
  /external/ppp/pppd/
chap-new.c 53 struct chap_digest_type *digest,
83 struct chap_digest_type *digest; member in struct:chap_client_state
84 unsigned char priv[64]; /* private area for digest's use */
98 struct chap_digest_type *digest; member in struct:chap_server_state
123 struct chap_digest_type *digest,
135 /* List of digest types that we know about */
157 * Add a new digest type to the list.
212 fatal("CHAP digest 0x%x requested but not available",
215 ss->digest = dp;
242 fatal("CHAP digest 0x%x requested but not available"
    [all...]
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
MessageDigest_Impl2Test.java 115 assertEquals("incorrect result", "MESSAGE DIGEST ABC", md.toString());
129 assertEquals("incorrect digest result", 0, md1.digest().length);
130 assertEquals("getProvider() failed", 0, md1.digest(b, 2, 3));
131 assertTrue("digest failed", ((MyMessageDigest1) md1).runEngineDigest);
154 assertEquals("incorrect digest result", 0, md2.digest().length);
155 assertEquals("getProvider() failed", 0, md2.digest(b, 2, 3));
156 assertTrue("digest failed", MyMessageDigest2.runEngineDigest);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
DigestAlgorithmProvider.java 1 package org.bouncycastle.jcajce.provider.digest;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
CertBlacklist.java 32 import org.bouncycastle.crypto.Digest;
212 Digest digest = AndroidDigestFactory.getSHA1(); local
213 digest.update(encoded, 0, encoded.length);
214 byte[] out = new byte[digest.getDigestSize()];
215 digest.doFinal(out, 0);
  /external/chromium_org/content/child/webcrypto/openssl/
rsa_oaep_openssl.cc 47 const EVP_MD* digest = local
49 if (!digest)
56 1 != EVP_PKEY_CTX_set_rsa_oaep_md(ctx.get(), digest) ||
57 1 != EVP_PKEY_CTX_set_rsa_mgf1_md(ctx.get(), digest)) {
  /external/chromium_org/google_apis/gcm/engine/
gservices_settings.h 32 // Calculates digest of provided settings.
48 std::string digest() const { return digest_; } function in class:gcm::GServicesSettings
66 // Digest (hash) of the settings, used to check whether settings need update.
  /external/chromium_org/printing/
image.cc 56 base::MD5Digest digest; local
57 base::MD5Sum(&data_[0], data_.size(), &digest);
58 return base::HexEncode(&digest, sizeof(digest));
  /external/chromium_org/third_party/boringssl/src/crypto/md5/
md5_test.c 59 #include <openssl/digest.h>
64 "", "a", "abc", "message digest", "abcdefghijklmnopqrstuvwxyz",
  /external/chromium_org/third_party/boringssl/src/crypto/x509/
a_digest.c 60 #include <openssl/digest.h>
  /external/glide/library/src/main/java/com/bumptech/glide/load/engine/cache/
SafeKeyGenerator.java 23 safeKey = Util.sha256BytesToHex(messageDigest.digest());
  /system/keymaster/
asymmetric_key.h 56 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,
68 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,
94 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,
122 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,

Completed in 368 milliseconds

1 2 3 4 5 6 78 91011>>