HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 226 - 250 of 721) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/openssl/crypto/engine/
eng_openssl.c 117 static int openssl_digests(ENGINE *e, const EVP_MD **digest,
345 static int openssl_digests(ENGINE *e, const EVP_MD **digest,
348 if(!digest)
354 /* We are being asked for a specific digest */
356 *digest = &test_sha_md;
363 *digest = NULL;
  /dalvik/libdex/
sha1.cpp 239 /* Add padding and return the message digest. */
241 void SHA1Final(unsigned char digest[HASHSIZE], SHA1_CTX*
260 digest[i] = (unsigned char)
279 it in the 20-byte array digest. If fname is NULL, stdin is
282 void sha1file(char *fname, unsigned char* digest)
295 memset(digest, 0, HASHSIZE);
309 SHA1Final(digest, &context);
333 unsigned char digest[HASHSIZE]; local
368 sha1file(s, digest);
373 err |= digest[k]
423 unsigned char digest[HASHSIZE]; local
    [all...]
  /external/chromium_org/net/android/
keystore.cc 92 const base::StringPiece& digest,
99 reinterpret_cast<const uint8*>(digest.data()),
100 digest.length());
  /external/chromium_org/third_party/WebKit/Source/core/frame/
SubresourceIntegrity.cpp 87 DigestValue digest; local
88 bool digestSuccess = computeDigest(algorithm, normalizedSource.data(), normalizedSource.length(), digest);
93 if (DigestsEqual(digest, convertedHashVector)) {
  /external/chromium_org/third_party/boringssl/src/crypto/bn/
random.c 251 uint8_t digest[SHA512_DIGEST_LENGTH]; local
298 SHA512_Final(digest, &sha);
304 memcpy(k_bytes + done, digest, todo);
  /external/chromium_org/third_party/sfntly/cpp/src/sfntly/
font.h 152 void SetDigest(ByteVector* digest);
237 // Gets a copy of the fonts digest that was created when the font was read. If
238 // no digest was set at creation time then the return result will be null.
239 ByteVector* digest() { return &digest_; } function in class:sfntly::Font
300 // @param digest the computed digest for the font; null if digest was not
302 // Note: Current C++ port does not support SHA digest validation.
303 Font(int32_t sfnt_version, ByteVector* digest);
  /external/chromium_org/third_party/smhasher/src/
sha1.cpp 208 /* Add padding and return the message digest. */
209 void SHA1_Final(SHA1_CTX* context, uint8_t digest[SHA1_DIGEST_SIZE])
224 digest[i] = (uint8_t)
242 uint8_t digest[20]; local
246 SHA1_Final(&context, digest);
248 memcpy(out,&digest[0],4);
268 void digest_to_hex(const uint8_t digest[SHA1_DIGEST_SIZE], char *output)
275 sprintf(c,"%02X", digest[i*4+j]);
288 uint8_t digest[20]; local
296 SHA1_Final(&context, digest);
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
MessageDigestAlgorithm.java 21 * to produce the digest and a checksum.
34 * @return a digest response as defined in rfc2617
55 // digest as specified by rfc2617
95 * to produce the digest and a checksum.
111 * @return a digest response as defined in rfc2617
132 // digest as specified by rfc2617
181 MessageDigest digest = MessageDigest.getInstance("MD5"); local
183 return toHexString(digest.digest(data.getBytes()));
  /external/openssl/crypto/evp/
bio_md.c 65 /* BIO_put and BIO_get both add to the digest,
66 * BIO_gets returns the digest */
79 BIO_TYPE_MD,"message digest",
186 ret = EVP_DigestInit_ex(ctx,ctx->digest, NULL);
196 *ppmd=ctx->digest;
259 if (size < ctx->digest->md_size)
  /external/openssl/crypto/pkcs12/
p12_mutl.c 125 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length)
126 || memcmp (mac, p12->mac->dinfo->digest->data, maclen)) return 0;
148 if (!(M_ASN1_OCTET_STRING_set (p12->mac->dinfo->digest, mac, maclen))) {
  /external/sfntly/cpp/src/sfntly/
font.h 152 void SetDigest(ByteVector* digest);
237 // Gets a copy of the fonts digest that was created when the font was read. If
238 // no digest was set at creation time then the return result will be null.
239 ByteVector* digest() { return &digest_; } function in class:sfntly::Font
300 // @param digest the computed digest for the font; null if digest was not
302 // Note: Current C++ port does not support SHA digest validation.
303 Font(int32_t sfnt_version, ByteVector* digest);
  /external/smack/src/org/xbill/DNS/
TSIG.java 57 private String digest; field in class:TSIG
64 digest = "md5";
67 digest = "sha-1";
70 digest = "sha-224";
73 digest = "sha-256";
76 digest = "sha-512";
79 digest = "sha-384";
220 hmac = new HMAC(digest, digestBlockLength, key);
235 /* Digest the message */
315 HMAC hmac = new HMAC(digest, digestBlockLength, key)
    [all...]
  /system/core/libmincrypt/
sha.c 149 const uint8_t* SHA_hash(const void* data, int len, uint8_t* digest) {
153 memcpy(digest, SHA_final(&ctx), SHA_DIGEST_SIZE);
154 return digest;
  /external/chromium_org/net/tools/testserver/
minica.py 49 digest = hashlib.sha256(message).digest()
52 em = ['\xff'] * (self.modlen - 1 - len(prefix) - len(digest))
55 em += "\x00" + prefix + digest
252 hashlib.sha1(asn1.ToDER(Name(cn = issuer_cn))).digest())
255 hashlib.sha1(asn1.ToDER(issuer_key)).digest())
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
PKCS5S2ParametersGenerator.java 4 import org.bouncycastle.crypto.Digest;
38 public PKCS5S2ParametersGenerator(Digest digest)
40 hMac = new HMac(digest);
  /external/chromium_org/content/child/webcrypto/nss/
sha_nss.cc 35 // Not a digest algorithm.
42 // computing a SHA-* digest (as opposed to ShaImplementation, which computes
89 unsigned char* digest = vector_as_array(result); local
91 return FinishInternal(digest, &digest_size);
134 virtual Status Digest(const blink::WebCryptoAlgorithm& algorithm,
140 // digest, so none of the subsequent errors are spec compliant.
  /external/chromium_org/media/base/
video_frame_unittest.cc 117 base::MD5Digest digest; local
118 base::MD5Final(&digest, &context);
119 EXPECT_EQ(MD5DigestToBase16(digest), expected_hash);
141 base::MD5Digest digest; local
145 base::MD5Final(&digest, &context);
146 EXPECT_EQ(MD5DigestToBase16(digest), "9065c841d9fca49186ef8b4ef547e79b");
154 base::MD5Final(&digest, &context);
155 EXPECT_EQ(MD5DigestToBase16(digest), "911991d51438ad2e1a40ed5f6fc7c796");
  /external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/coverage/
misc.py 116 def digest(self): member in class:Hasher
117 """Retrieve the digest of the hash."""
118 return self.md5.digest()
  /external/chromium_org/third_party/boringssl/src/include/openssl/
digest.h 67 /* Digest functions.
88 * such digest is known. */
92 * if no such digest is known. */
96 /* Digest contexts.
98 * An EVP_MD_CTX represents the state of a specific digest operation in
120 /* Digest operations. */
137 /* EVP_MAX_MD_SIZE is the largest digest size supported. Functions that output
138 * a digest generally require the buffer have at least this much space. */
141 /* EVP_DigestFinal_ex finishes the digest in |ctx| and writes the output to
156 * |len| bytes from |data| and writes the digest to |md_out|. At mos
244 const EVP_MD *digest; member in struct:env_md_ctx_st
    [all...]
  /external/chromium_org/third_party/webrtc/base/
fakesslidentity.h 24 // SHA-1 is the default digest algorithm because it is available in all build
55 unsigned char* digest,
59 digest, size);
  /external/nist-sip/java/gov/nist/javax/sip/
Utils.java 139 byte cid[] = digester.digest(date.getBytes());
175 byte bid[] = digester.digest(Long.toString(num).getBytes());
  /hardware/samsung_slsi/exynos5/libkeymaster/
tlTeeKeymaster_Api.h 144 uint32_t digest; /**< Digest algorithm */ member in struct:__anon42780
158 uint32_t digest; /**< Digest algorithm */ member in struct:__anon42781
tlcTeeKeymaster_if.h 79 TEE_RSA_SHA_ISO9796 = 1, /**< 20-byte SHA-1 digest, padded according to the ISO 9796-2 scheme as specified in EMV '96 and EMV 2000, encrypted using RSA. */
80 TEE_RSA_SHA_ISO9796_MR = 2, /**< 20-byte SHA-1 digest, padded according to the ISO9796-2 specification and encrypted using RSA. */
81 TEE_RSA_SHA_PKCS1 = 3, /**< 20-byte SHA-1 digest, padded according to the PKCS#1 (v1.5) scheme, and encrypted using RSA. */
82 TEE_RSA_SHA256_PSS = 4, /**< SHA-256 digest and PSS padding */
83 TEE_RSA_SHA1_PSS = 5, /**< SHA-256 digest and PSS padding */
84 TEE_RSA_NODIGEST_NOPADDING = 6, /**< No digest and padding */
88 /* Digest types */
230 * @param digest [in] Digest type
239 teeDigest_t digest);
    [all...]
  /bootable/recovery/applypatch/
applypatch.h 49 int ParseSha1(const char* str, uint8_t* digest);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/digests/
OpenSSLDigest.java 25 * Implements the BouncyCastle Digest interface using OpenSSL's EVP API. This
68 return delegate.digest(out, outOff, out.length - outOff);

Completed in 499 milliseconds

1 2 3 4 5 6 7 8 91011>>