/external/chromium_org/chrome/browser/prefs/ |
pref_hash_calculator.cc | 23 std::vector<uint8> digest(hmac.DigestLength()); 24 if (!hmac.Init(key) || !hmac.Sign(message, &digest[0], digest.size())) { 28 return base::HexEncode(&digest[0], digest.size()); 37 std::vector<uint8> digest; local 38 return base::HexStringToBytes(digest_string, &digest) && 41 base::StringPiece(reinterpret_cast<char*>(&digest[0]), 42 digest.size()));
|
/external/chromium_org/content/child/webcrypto/openssl/ |
rsa_ssa_openssl.cc | 20 // Extracts the OpenSSL key and digest from a WebCrypto key. The returned 24 const EVP_MD** digest) { 27 *digest = GetDigest(key.algorithm().rsaHashedParams()->hash().id()); 28 if (!*digest) 67 const EVP_MD* digest = NULL; variable 68 Status status = GetPKeyAndDigest(key, &private_key, &digest); 77 !EVP_DigestSignInit(ctx.get(), NULL, digest, NULL, private_key) || 103 const EVP_MD* digest = NULL; variable 104 Status status = GetPKeyAndDigest(key, &public_key, &digest); 108 if (!EVP_DigestVerifyInit(ctx.get(), NULL, digest, NULL, public_key) [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_pep247.py | 29 h1 = module.new(key, 'string').digest() 32 h2 = obj3.digest() 37 h1 = module.new('string').digest() 40 h2 = obj3.digest() 52 self.assertEqual(obj1.digest(), obj_copy.digest()) 55 digest, hexdigest = obj1.digest(), obj1.hexdigest() 57 for byte in digest:
|
test_sha.py | 17 def check(self, data, digest): 18 # Check digest matches the expected value 21 self.assertTrue(computed == digest) 24 # digest operations. 28 # Check hexdigest() output matches digest()'s output 29 digest = obj.digest() 31 for c in digest:
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_pep247.py | 29 h1 = module.new(key, 'string').digest() 32 h2 = obj3.digest() 37 h1 = module.new('string').digest() 40 h2 = obj3.digest() 52 self.assertEqual(obj1.digest(), obj_copy.digest()) 55 digest, hexdigest = obj1.digest(), obj1.hexdigest() 57 for byte in digest:
|
test_sha.py | 17 def check(self, data, digest): 18 # Check digest matches the expected value 21 self.assertTrue(computed == digest) 24 # digest operations. 28 # Check hexdigest() output matches digest()'s output 29 digest = obj.digest() 31 for c in digest:
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/util/ |
AsymmetricAlgorithmProvider.java | 11 String digest, 16 String mainName = digest + "WITH" + algorithm; 17 String jdk11Variation1 = digest + "with" + algorithm; 18 String jdk11Variation2 = digest + "With" + algorithm; 19 String alias = digest + "/" + algorithm;
|
/external/chromium_org/content/public/browser/ |
media_device_id.cc | 22 std::vector<uint8> digest(digest_length); 25 hmac.Sign(raw_unique_id + salt, &digest[0], digest.size()); 27 return base::StringToLowerASCII(base::HexEncode(&digest[0], digest.size()));
|
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
ManifestDigestTest.java | 53 new ManifestDigest(MessageDigest.getInstance("SHA-256").digest(MESSAGE_1)); 65 ManifestDigest digest = ManifestDigest.fromInputStream(is); local 68 digest.writeToParcel(p, 0); 74 + digest.toString() + " and " + fromParcel.toString(), digest,
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest2Test.java | 80 + digestAlgs[i], MessageDigest.isEqual(d1.digest(), d2 81 .digest())); 153 byte[] hash = sha.digest(data); 203 byte[] hash = sha.digest(data); 212 * @tests java.security.MessageDigest#digest() 223 byte[] digest = sha.digest(); 224 assertTrue("bug in SHA", MessageDigest.isEqual(digest, MESSAGE_DIGEST)); 231 digest = sha.digest(); 263 MessageDigest digest = MessageDigest.getInstance(digestAlgs[i], local 281 MessageDigest digest = MessageDigest.getInstance(digestAlgs[i], local 297 MessageDigest.getInstance("SHA").digest(new byte[] { }, Integer.MAX_VALUE, 755); method [all...] |
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
sctp_sha1.c | 37 /* A SHA-1 Digest is 160 bits, or 20 bytes */ 54 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) 58 PK11_DigestFinal(ctx->pk11_ctx, digest, &output_len, SHA_DIGEST_LENGTH); 77 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) 79 SHA1_Final(digest, &ctx->sha_ctx); 225 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx) 229 * the digest to the pointer. At the last block some special rules 300 /* transfer the digest back to the user */ 301 digest[3] = (ctx->H0 & 0xff); 302 digest[2] = ((ctx->H0 >> 8) & 0xff) [all...] |
/external/chromium_org/crypto/ |
hmac.h | 34 // Returns the length of digest that this HMAC will create. 64 // returned in |digest|, which has |digest_length| bytes of storage available. 65 bool Sign(const base::StringPiece& data, unsigned char* digest, 69 // in |digest|, using the algorithm supplied to the constructor and the key 73 // undermine the cryptographic integrity. |digest| must be exactly 76 const base::StringPiece& digest) const WARN_UNUSED_RESULT; 79 // that |digest| is allowed to be smaller than |DigestLength()|. 82 const base::StringPiece& digest) const WARN_UNUSED_RESULT;
|
signature_verifier_openssl.cc | 58 const EVP_MD* digest; local 60 digest = EVP_sha1(); 62 digest = EVP_sha256(); 66 digest = EVP_get_digestbyobj(algorithm.get()->algorithm); 68 if (!digest) 71 return CommonInit(digest, signature, signature_len, public_key_info, 83 const EVP_MD* const digest = ToOpenSSLDigest(hash_alg); local 84 DCHECK(digest); 85 if (!digest) { 90 if (!CommonInit(digest, signature, signature_len, public_key_info [all...] |
hkdf.cc | 56 uint8 digest[kSHA256HashLength]; local 69 result = hmac.Sign(base::StringPiece(buf.get(), j), digest, sizeof(digest)); 72 memcpy(&output_[i*sizeof(digest)], digest, sizeof(digest)); 73 previous = base::StringPiece(reinterpret_cast<char*>(digest), 74 sizeof(digest));
|
/external/openssl/crypto/pkcs12/ |
p12_p8e.c | 84 M_ASN1_OCTET_STRING_free(p8->digest); 85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), 87 if(!p8->digest) {
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
ecdsa.h | 71 /* ECDSA_sign signs |digest_len| bytes from |digest| with |key| and writes the 76 OPENSSL_EXPORT int ECDSA_sign(int type, const uint8_t *digest, 81 * signature by |key| of |digest|. (The |type| argument should be zero.) It 84 OPENSSL_EXPORT int ECDSA_verify(int type, const uint8_t *digest, 109 /* ECDSA_sign signs |digest_len| bytes from |digest| with |key| and returns the 113 OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest, 117 * |digest|. It returns one on success or zero if the signature is invalid or 121 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len, 140 OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign_ex(const uint8_t *digest, 147 OPENSSL_EXPORT int ECDSA_sign_ex(int type, const uint8_t *digest, [all...] |
/external/openssl/crypto/evp/ |
p_sign.c | 95 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE) 104 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0) 117 v=ctx->digest->required_pkey_type[i]; 131 if (ctx->digest->sign == NULL) 136 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
RSA.java | 190 String digest, 194 String mainName = digest + "WITHRSA"; 195 String jdk11Variation1 = digest + "withRSA"; 196 String jdk11Variation2 = digest + "WithRSA"; 197 String alias = digest + "/" + "RSA"; 198 String longName = digest + "WITHRSAENCRYPTION"; 199 String longJdk11Variation1 = digest + "withRSAEncryption"; 200 String longJdk11Variation2 = digest + "WithRSAEncryption";
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
x_sig.c | 66 ASN1_SIMPLE(X509_SIG, digest, ASN1_OCTET_STRING)
|
/external/chromium_org/third_party/skia/tests/ |
MD5Test.cpp | 11 static bool digests_equal(const SkMD5::Digest& expectedDigest, const SkMD5::Digest& computedDigest) { 20 static void md5_test(const char* string, const SkMD5::Digest& expectedDigest, skiatest::Reporter* reporter) { 27 SkMD5::Digest digest; local 28 context.finish(digest); 30 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest)); 41 SkMD5::Digest digest; local 42 context.finish(digest); 50 SkMD5::Digest digest; member in struct:MD5Test [all...] |
/external/openssl/crypto/asn1/ |
x_sig.c | 66 ASN1_SIMPLE(X509_SIG, digest, ASN1_OCTET_STRING)
|
/external/skia/tests/ |
MD5Test.cpp | 11 static bool digests_equal(const SkMD5::Digest& expectedDigest, const SkMD5::Digest& computedDigest) { 20 static void md5_test(const char* string, const SkMD5::Digest& expectedDigest, skiatest::Reporter* reporter) { 27 SkMD5::Digest digest; local 28 context.finish(digest); 30 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest)); 41 SkMD5::Digest digest; local 42 context.finish(digest); 50 SkMD5::Digest digest; member in struct:MD5Test [all...] |
/external/chromium_org/chrome/browser/safe_browsing/incident_reporting/ |
binary_integrity_incident_handlers_unittest.cc | 53 uint32_t digest = GetBinaryIntegrityIncidentDigest(*incident); local 54 ASSERT_EQ(digest, GetBinaryIntegrityIncidentDigest(*MakeIncident())); 60 uint32_t digest = GetBinaryIntegrityIncidentDigest(*incident); local 65 ASSERT_NE(digest, GetBinaryIntegrityIncidentDigest(*incident2));
|
tracked_preference_incident_handlers_unittest.cc | 41 uint32_t digest = local 43 ASSERT_EQ(digest, 52 uint32_t digest = local 61 ASSERT_NE(digest,
|
/external/chromium_org/rlz/lib/ |
machine_id.cc | 59 // Note that digest can have embedded nulls. 60 std::string digest(base::SHA1HashString(sid_string_buffer)); 61 VERIFY(digest.size() == base::kSHA1Length); 62 std::copy(digest.begin(), digest.end(), id_binary.begin());
|