/external/chromium_org/third_party/boringssl/src/crypto/ecdsa/ |
ecdsa_test.c | 70 unsigned char digest[20], wrong_digest[20]; local 78 /* fill digest values with some random data */ 79 if (!RAND_pseudo_bytes(digest, 20) || !RAND_pseudo_bytes(wrong_digest, 20)) { 158 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) { 165 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) { 172 if (ECDSA_verify(0, digest, 20, signature, sig_len, wrong_eckey) == 1) { 178 /* wrong digest */ 186 if (ECDSA_verify(0, digest, 20, signature, sig_len - 1, eckey) == 1) { 233 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) == 1) { 246 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1) [all...] |
/external/chromium_org/net/quic/test_tools/ |
crypto_test_utils_openssl.cc | 117 // hostname is hashed with SHA-256 and the resulting digest is treated as a 126 unsigned char digest[SHA256_DIGEST_LENGTH]; local 127 SHA256_Final(digest, &sha256); 129 // Ensure that the digest is less than the order of the P-256 group by 131 digest[0] &= 0x7f; 134 CHECK(BN_bin2bn(digest, sizeof(digest), k.get()) != NULL);
|
/libcore/luni/src/main/java/java/security/ |
MessageDigest.java | 26 * <i>message</i>, and the fixed-length byte sequence is the <i>digest</i> or 27 * <i>message digest</i>. 30 * <p>The basic pattern to digest an {@link java.io.InputStream} looks like this: 38 * byte[] digest = digester.digest(); 42 * call {@link #update(byte[],int,int)} for each block of input data, and then call {@link #digest} 43 * to get the final digest. Note that calling {@code digest} resets the {@code MessageDigest}. 45 * calling {@code digest}. 228 * After the digest is computed the receiver is reset 233 public byte[] digest() { method in class:MessageDigest 255 public int digest(byte[] buf, int offset, int len) throws DigestException { method in class:MessageDigest 276 public byte[] digest(byte[] input) { method in class:MessageDigest [all...] |
/external/chromium_org/net/http/ |
http_auth_handler_digest_unittest.cc | 22 "Digest realm=\"Oblivion\", nonce=\"nonce-value\""; 102 "Digest nonce=\"xyz\", realm=\"Thunder Bluff\"", 114 "Digest nonce=\"xyz\", realm=ThunderBluff", 127 "Digest nonce=\"xyz\"", 139 "Digest realm=\"\", nonce=\"xyz\"", 153 "Digest nonce=\"xyz\", realm=\"foo-\xE5\"", 165 "Digest realm=\"Thunder Bluff\"", 178 "Digest nonce=xyz, realm=\"Thunder Bluff\"", 190 "Digest nonce=\"xyz\", realm=\"Thunder Bluff\", foo=\"bar\"", 202 "Digest nonce=\"xyz\", algorithm=\"awezum\", realm=\"Thunder\"" 369 HttpAuthHandlerDigest* digest = local 529 HttpAuthHandlerDigest* digest = local [all...] |
/external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/ |
Socks5Proxy.java | 83 /* assigns a connection to a digest */
261 * Returns the socket for the given digest. A socket will be returned if the given digest has
265 * @param digest identifying the connection
266 * @return socket or null if there is no socket for the given digest
268 protected Socket getSocket(String digest) {
269 return this.connectionMap.get(digest);
273 * Add the given digest to the list of allowed transfers. Only connections for allowed transfers
275 * the local SOCKS5 proxy that don't contain an allowed digest are discarded.
277 * @param digest to be added to the list of allowed transfers [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
DigestScheme.java | 53 * Digest authentication scheme as defined in RFC 2617. 63 * Since the digest username is included as clear text in the generated 90 * Hexa values used when creating 32 character long digest in HTTP DigestScheme 100 /** Whether the digest authentication process is complete */ 113 * Default constructor for the digest authetication scheme. 121 * Processes the Digest challenge. 167 * Tests if the Digest authentication process has been completed. 169 * @return <tt>true</tt> if Digest authorization has been processed, 182 * Returns textual designation of the digest authentication scheme. 184 * @return <code>digest</code 243 String digest = createDigest(credentials); local [all...] |
/libcore/luni/src/main/java/java/util/jar/ |
JarVerifier.java | 53 * List of accepted digest algorithms. This list is in order from most 78 * Stores and a hash and a message digest and verifies that massage digest 85 private final MessageDigest digest; field in class:JarVerifier.VerifierEntry 93 VerifierEntry(String name, MessageDigest digest, byte[] hash, 96 this.digest = digest; 103 * Updates a digest with one byte. 107 digest.update((byte) value); 111 * Updates a digest with byte array [all...] |
/packages/apps/PackageInstaller/src/com/android/packageinstaller/ |
InstallFlowAnalytics.java | 460 byte[] digest = null; 462 digest = getPackageContentsDigest(); 466 String digestHex = (digest != null) 467 ? IntegralToString.bytesToHexString(digest, false) 572 * Gets the digest of the contents of the package being installed. 580 * Gets the SHA-256 digest of the contents of the specified file. 583 MessageDigest digest; local 585 digest = MessageDigest.getInstance("SHA-256"); 596 digest.update(buf, 0, chunkSize); 601 return digest.digest() [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
DigestInputStreamTest.java | 42 * Message digest algorithm name used during testing 58 * Test message for digest computations 117 * Assertion: updates associated digest<br> 130 // check that associated digest has been updated properly 133 dis.getMessageDigest().digest(), 149 * Assertion: must not update digest if EOS had been 166 // check that 3 previous read() calls did not update digest 168 Arrays.equals(dis.getMessageDigest().digest(), 182 * Assertion: <code>read()</code> must not update digest if it is off<br> 183 * Assertion: <code>on(boolean)</code> turns digest functionality o [all...] |
/external/chromium_org/chrome/browser/spellchecker/ |
spellcheck_host_metrics.cc | 61 base::MD5Digest digest; local 63 word.size() * sizeof(base::char16), &digest); local 64 checked_word_hashes_.insert(base::MD5DigestToBase16(digest));
|
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
pbkdf.c | 63 const EVP_MD *digest, size_t key_len, uint8_t *out_key) { 70 mdlen = EVP_MD_size(digest); 81 if (!HMAC_Init_ex(&hctx_tpl, password, password_len, digest, NULL)) {
|
/external/openssl/crypto/ecdsa/ |
ecdsatest.c | 185 unsigned char digest[20]; local 193 /* get the message digest */ 196 EVP_DigestFinal(&md_ctx, digest, &dgst_len); 207 signature = ECDSA_do_sign(digest, 20, key); 223 if (ECDSA_do_verify(digest, 20, signature, key) != 1) 291 unsigned char digest[20], wrong_digest[20]; local 299 /* fill digest values with some random data */ 300 if (!RAND_pseudo_bytes(digest, 20) || 390 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) 398 if (ECDSA_verify(0, digest, 20, signature, sig_len, eckey) != 1 [all...] |
/external/openssl/crypto/hmac/ |
hmactest.c | 88 unsigned char *digest; member in struct:test_st 150 if (strcmp(p,(char *)test[i].digest) != 0) 153 printf("got %s instead of %s\n",p,test[i].digest);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
DigestInputStreamTest.java | 44 * Message digest algorithm name used during testing 60 * Test message for digest computations 110 * Assertion: updates associated digest<br> 123 // check that associated digest has been updated properly 126 dis.getMessageDigest().digest(), 142 * Assertion: must not update digest if EOS had been 159 // check that 3 previous read() calls did not update digest 161 Arrays.equals(dis.getMessageDigest().digest(), 175 * Assertion: <code>read()</code> must not update digest if it is off<br> 176 * Assertion: <code>on(boolean)</code> turns digest functionality o [all...] |
/external/ppp/pppd/ |
chap-new.c | 53 struct chap_digest_type *digest, 83 struct chap_digest_type *digest; member in struct:chap_client_state 84 unsigned char priv[64]; /* private area for digest's use */ 98 struct chap_digest_type *digest; member in struct:chap_server_state 123 struct chap_digest_type *digest, 135 /* List of digest types that we know about */ 157 * Add a new digest type to the list. 212 fatal("CHAP digest 0x%x requested but not available", 215 ss->digest = dp; 242 fatal("CHAP digest 0x%x requested but not available" [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest_Impl2Test.java | 115 assertEquals("incorrect result", "MESSAGE DIGEST ABC", md.toString()); 129 assertEquals("incorrect digest result", 0, md1.digest().length); 130 assertEquals("getProvider() failed", 0, md1.digest(b, 2, 3)); 131 assertTrue("digest failed", ((MyMessageDigest1) md1).runEngineDigest); 154 assertEquals("incorrect digest result", 0, md2.digest().length); 155 assertEquals("getProvider() failed", 0, md2.digest(b, 2, 3)); 156 assertTrue("digest failed", MyMessageDigest2.runEngineDigest);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
DigestAlgorithmProvider.java | 1 package org.bouncycastle.jcajce.provider.digest;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
CertBlacklist.java | 32 import org.bouncycastle.crypto.Digest; 212 Digest digest = AndroidDigestFactory.getSHA1(); local 213 digest.update(encoded, 0, encoded.length); 214 byte[] out = new byte[digest.getDigestSize()]; 215 digest.doFinal(out, 0);
|
/external/chromium_org/content/child/webcrypto/openssl/ |
rsa_oaep_openssl.cc | 47 const EVP_MD* digest = local 49 if (!digest) 56 1 != EVP_PKEY_CTX_set_rsa_oaep_md(ctx.get(), digest) || 57 1 != EVP_PKEY_CTX_set_rsa_mgf1_md(ctx.get(), digest)) {
|
/external/chromium_org/google_apis/gcm/engine/ |
gservices_settings.h | 32 // Calculates digest of provided settings. 48 std::string digest() const { return digest_; } function in class:gcm::GServicesSettings 66 // Digest (hash) of the settings, used to check whether settings need update.
|
/external/chromium_org/printing/ |
image.cc | 56 base::MD5Digest digest; local 57 base::MD5Sum(&data_[0], data_.size(), &digest); 58 return base::HexEncode(&digest, sizeof(digest));
|
/external/chromium_org/third_party/boringssl/src/crypto/md5/ |
md5_test.c | 59 #include <openssl/digest.h> 64 "", "a", "abc", "message digest", "abcdefghijklmnopqrstuvwxyz",
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
a_digest.c | 60 #include <openssl/digest.h>
|
/external/glide/library/src/main/java/com/bumptech/glide/load/engine/cache/ |
SafeKeyGenerator.java | 23 safeKey = Util.sha256BytesToHex(messageDigest.digest());
|
/system/keymaster/ |
asymmetric_key.h | 56 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, 68 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, 94 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, 122 virtual Operation* CreateOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,
|