/external/openssl/crypto/engine/ |
eng_openssl.c | 117 static int openssl_digests(ENGINE *e, const EVP_MD **digest, 345 static int openssl_digests(ENGINE *e, const EVP_MD **digest, 348 if(!digest) 354 /* We are being asked for a specific digest */ 356 *digest = &test_sha_md; 363 *digest = NULL;
|
/dalvik/libdex/ |
sha1.cpp | 239 /* Add padding and return the message digest. */ 241 void SHA1Final(unsigned char digest[HASHSIZE], SHA1_CTX* 260 digest[i] = (unsigned char) 279 it in the 20-byte array digest. If fname is NULL, stdin is 282 void sha1file(char *fname, unsigned char* digest) 295 memset(digest, 0, HASHSIZE); 309 SHA1Final(digest, &context); 333 unsigned char digest[HASHSIZE]; local 368 sha1file(s, digest); 373 err |= digest[k] 423 unsigned char digest[HASHSIZE]; local [all...] |
/external/chromium_org/net/android/ |
keystore.cc | 92 const base::StringPiece& digest, 99 reinterpret_cast<const uint8*>(digest.data()), 100 digest.length());
|
/external/chromium_org/third_party/WebKit/Source/core/frame/ |
SubresourceIntegrity.cpp | 87 DigestValue digest; local 88 bool digestSuccess = computeDigest(algorithm, normalizedSource.data(), normalizedSource.length(), digest); 93 if (DigestsEqual(digest, convertedHashVector)) {
|
/external/chromium_org/third_party/boringssl/src/crypto/bn/ |
random.c | 251 uint8_t digest[SHA512_DIGEST_LENGTH]; local 298 SHA512_Final(digest, &sha); 304 memcpy(k_bytes + done, digest, todo);
|
/external/chromium_org/third_party/sfntly/cpp/src/sfntly/ |
font.h | 152 void SetDigest(ByteVector* digest); 237 // Gets a copy of the fonts digest that was created when the font was read. If 238 // no digest was set at creation time then the return result will be null. 239 ByteVector* digest() { return &digest_; } function in class:sfntly::Font 300 // @param digest the computed digest for the font; null if digest was not 302 // Note: Current C++ port does not support SHA digest validation. 303 Font(int32_t sfnt_version, ByteVector* digest);
|
/external/chromium_org/third_party/smhasher/src/ |
sha1.cpp | 208 /* Add padding and return the message digest. */ 209 void SHA1_Final(SHA1_CTX* context, uint8_t digest[SHA1_DIGEST_SIZE]) 224 digest[i] = (uint8_t) 242 uint8_t digest[20]; local 246 SHA1_Final(&context, digest); 248 memcpy(out,&digest[0],4); 268 void digest_to_hex(const uint8_t digest[SHA1_DIGEST_SIZE], char *output) 275 sprintf(c,"%02X", digest[i*4+j]); 288 uint8_t digest[20]; local 296 SHA1_Final(&context, digest); [all...] |
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
MessageDigestAlgorithm.java | 21 * to produce the digest and a checksum. 34 * @return a digest response as defined in rfc2617 55 // digest as specified by rfc2617 95 * to produce the digest and a checksum. 111 * @return a digest response as defined in rfc2617 132 // digest as specified by rfc2617 181 MessageDigest digest = MessageDigest.getInstance("MD5"); local 183 return toHexString(digest.digest(data.getBytes()));
|
/external/openssl/crypto/evp/ |
bio_md.c | 65 /* BIO_put and BIO_get both add to the digest, 66 * BIO_gets returns the digest */ 79 BIO_TYPE_MD,"message digest", 186 ret = EVP_DigestInit_ex(ctx,ctx->digest, NULL); 196 *ppmd=ctx->digest; 259 if (size < ctx->digest->md_size)
|
/external/openssl/crypto/pkcs12/ |
p12_mutl.c | 125 if ((maclen != (unsigned int)p12->mac->dinfo->digest->length) 126 || memcmp (mac, p12->mac->dinfo->digest->data, maclen)) return 0; 148 if (!(M_ASN1_OCTET_STRING_set (p12->mac->dinfo->digest, mac, maclen))) {
|
/external/sfntly/cpp/src/sfntly/ |
font.h | 152 void SetDigest(ByteVector* digest); 237 // Gets a copy of the fonts digest that was created when the font was read. If 238 // no digest was set at creation time then the return result will be null. 239 ByteVector* digest() { return &digest_; } function in class:sfntly::Font 300 // @param digest the computed digest for the font; null if digest was not 302 // Note: Current C++ port does not support SHA digest validation. 303 Font(int32_t sfnt_version, ByteVector* digest);
|
/external/smack/src/org/xbill/DNS/ |
TSIG.java | 57 private String digest; field in class:TSIG 64 digest = "md5"; 67 digest = "sha-1"; 70 digest = "sha-224"; 73 digest = "sha-256"; 76 digest = "sha-512"; 79 digest = "sha-384"; 220 hmac = new HMAC(digest, digestBlockLength, key); 235 /* Digest the message */ 315 HMAC hmac = new HMAC(digest, digestBlockLength, key) [all...] |
/system/core/libmincrypt/ |
sha.c | 149 const uint8_t* SHA_hash(const void* data, int len, uint8_t* digest) { 153 memcpy(digest, SHA_final(&ctx), SHA_DIGEST_SIZE); 154 return digest;
|
/external/chromium_org/net/tools/testserver/ |
minica.py | 49 digest = hashlib.sha256(message).digest() 52 em = ['\xff'] * (self.modlen - 1 - len(prefix) - len(digest)) 55 em += "\x00" + prefix + digest 252 hashlib.sha1(asn1.ToDER(Name(cn = issuer_cn))).digest()) 255 hashlib.sha1(asn1.ToDER(issuer_key)).digest())
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS5S2ParametersGenerator.java | 4 import org.bouncycastle.crypto.Digest; 38 public PKCS5S2ParametersGenerator(Digest digest) 40 hMac = new HMac(digest);
|
/external/chromium_org/content/child/webcrypto/nss/ |
sha_nss.cc | 35 // Not a digest algorithm. 42 // computing a SHA-* digest (as opposed to ShaImplementation, which computes 89 unsigned char* digest = vector_as_array(result); local 91 return FinishInternal(digest, &digest_size); 134 virtual Status Digest(const blink::WebCryptoAlgorithm& algorithm, 140 // digest, so none of the subsequent errors are spec compliant.
|
/external/chromium_org/media/base/ |
video_frame_unittest.cc | 117 base::MD5Digest digest; local 118 base::MD5Final(&digest, &context); 119 EXPECT_EQ(MD5DigestToBase16(digest), expected_hash); 141 base::MD5Digest digest; local 145 base::MD5Final(&digest, &context); 146 EXPECT_EQ(MD5DigestToBase16(digest), "9065c841d9fca49186ef8b4ef547e79b"); 154 base::MD5Final(&digest, &context); 155 EXPECT_EQ(MD5DigestToBase16(digest), "911991d51438ad2e1a40ed5f6fc7c796");
|
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/coverage/ |
misc.py | 116 def digest(self): member in class:Hasher 117 """Retrieve the digest of the hash.""" 118 return self.md5.digest()
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
digest.h | 67 /* Digest functions. 88 * such digest is known. */ 92 * if no such digest is known. */ 96 /* Digest contexts. 98 * An EVP_MD_CTX represents the state of a specific digest operation in 120 /* Digest operations. */ 137 /* EVP_MAX_MD_SIZE is the largest digest size supported. Functions that output 138 * a digest generally require the buffer have at least this much space. */ 141 /* EVP_DigestFinal_ex finishes the digest in |ctx| and writes the output to 156 * |len| bytes from |data| and writes the digest to |md_out|. At mos 244 const EVP_MD *digest; member in struct:env_md_ctx_st [all...] |
/external/chromium_org/third_party/webrtc/base/ |
fakesslidentity.h | 24 // SHA-1 is the default digest algorithm because it is available in all build 55 unsigned char* digest, 59 digest, size);
|
/external/nist-sip/java/gov/nist/javax/sip/ |
Utils.java | 139 byte cid[] = digester.digest(date.getBytes()); 175 byte bid[] = digester.digest(Long.toString(num).getBytes());
|
/hardware/samsung_slsi/exynos5/libkeymaster/ |
tlTeeKeymaster_Api.h | 144 uint32_t digest; /**< Digest algorithm */ member in struct:__anon42780 158 uint32_t digest; /**< Digest algorithm */ member in struct:__anon42781
|
tlcTeeKeymaster_if.h | 79 TEE_RSA_SHA_ISO9796 = 1, /**< 20-byte SHA-1 digest, padded according to the ISO 9796-2 scheme as specified in EMV '96 and EMV 2000, encrypted using RSA. */ 80 TEE_RSA_SHA_ISO9796_MR = 2, /**< 20-byte SHA-1 digest, padded according to the ISO9796-2 specification and encrypted using RSA. */ 81 TEE_RSA_SHA_PKCS1 = 3, /**< 20-byte SHA-1 digest, padded according to the PKCS#1 (v1.5) scheme, and encrypted using RSA. */ 82 TEE_RSA_SHA256_PSS = 4, /**< SHA-256 digest and PSS padding */ 83 TEE_RSA_SHA1_PSS = 5, /**< SHA-256 digest and PSS padding */ 84 TEE_RSA_NODIGEST_NOPADDING = 6, /**< No digest and padding */ 88 /* Digest types */ 230 * @param digest [in] Digest type 239 teeDigest_t digest); [all...] |
/bootable/recovery/applypatch/ |
applypatch.h | 49 int ParseSha1(const char* str, uint8_t* digest);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/digests/ |
OpenSSLDigest.java | 25 * Implements the BouncyCastle Digest interface using OpenSSL's EVP API. This 68 return delegate.digest(out, outOff, out.length - outOff);
|