HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 51 - 75 of 721) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/chromium_org/chrome/browser/prefs/
pref_hash_calculator.cc 23 std::vector<uint8> digest(hmac.DigestLength());
24 if (!hmac.Init(key) || !hmac.Sign(message, &digest[0], digest.size())) {
28 return base::HexEncode(&digest[0], digest.size());
37 std::vector<uint8> digest; local
38 return base::HexStringToBytes(digest_string, &digest) &&
41 base::StringPiece(reinterpret_cast<char*>(&digest[0]),
42 digest.size()));
  /external/chromium_org/content/child/webcrypto/openssl/
rsa_ssa_openssl.cc 20 // Extracts the OpenSSL key and digest from a WebCrypto key. The returned
24 const EVP_MD** digest) {
27 *digest = GetDigest(key.algorithm().rsaHashedParams()->hash().id());
28 if (!*digest)
67 const EVP_MD* digest = NULL; variable
68 Status status = GetPKeyAndDigest(key, &private_key, &digest);
77 !EVP_DigestSignInit(ctx.get(), NULL, digest, NULL, private_key) ||
103 const EVP_MD* digest = NULL; variable
104 Status status = GetPKeyAndDigest(key, &public_key, &digest);
108 if (!EVP_DigestVerifyInit(ctx.get(), NULL, digest, NULL, public_key)
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/
test_pep247.py 29 h1 = module.new(key, 'string').digest()
32 h2 = obj3.digest()
37 h1 = module.new('string').digest()
40 h2 = obj3.digest()
52 self.assertEqual(obj1.digest(), obj_copy.digest())
55 digest, hexdigest = obj1.digest(), obj1.hexdigest()
57 for byte in digest:
test_sha.py 17 def check(self, data, digest):
18 # Check digest matches the expected value
21 self.assertTrue(computed == digest)
24 # digest operations.
28 # Check hexdigest() output matches digest()'s output
29 digest = obj.digest()
31 for c in digest:
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/
test_pep247.py 29 h1 = module.new(key, 'string').digest()
32 h2 = obj3.digest()
37 h1 = module.new('string').digest()
40 h2 = obj3.digest()
52 self.assertEqual(obj1.digest(), obj_copy.digest())
55 digest, hexdigest = obj1.digest(), obj1.hexdigest()
57 for byte in digest:
test_sha.py 17 def check(self, data, digest):
18 # Check digest matches the expected value
21 self.assertTrue(computed == digest)
24 # digest operations.
28 # Check hexdigest() output matches digest()'s output
29 digest = obj.digest()
31 for c in digest:
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/util/
AsymmetricAlgorithmProvider.java 11 String digest,
16 String mainName = digest + "WITH" + algorithm;
17 String jdk11Variation1 = digest + "with" + algorithm;
18 String jdk11Variation2 = digest + "With" + algorithm;
19 String alias = digest + "/" + algorithm;
  /external/chromium_org/content/public/browser/
media_device_id.cc 22 std::vector<uint8> digest(digest_length);
25 hmac.Sign(raw_unique_id + salt, &digest[0], digest.size());
27 return base::StringToLowerASCII(base::HexEncode(&digest[0], digest.size()));
  /frameworks/base/core/tests/coretests/src/android/content/pm/
ManifestDigestTest.java 53 new ManifestDigest(MessageDigest.getInstance("SHA-256").digest(MESSAGE_1));
65 ManifestDigest digest = ManifestDigest.fromInputStream(is); local
68 digest.writeToParcel(p, 0);
74 + digest.toString() + " and " + fromParcel.toString(), digest,
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
MessageDigest2Test.java 80 + digestAlgs[i], MessageDigest.isEqual(d1.digest(), d2
81 .digest()));
153 byte[] hash = sha.digest(data);
203 byte[] hash = sha.digest(data);
212 * @tests java.security.MessageDigest#digest()
223 byte[] digest = sha.digest();
224 assertTrue("bug in SHA", MessageDigest.isEqual(digest, MESSAGE_DIGEST));
231 digest = sha.digest();
263 MessageDigest digest = MessageDigest.getInstance(digestAlgs[i], local
281 MessageDigest digest = MessageDigest.getInstance(digestAlgs[i], local
297 MessageDigest.getInstance("SHA").digest(new byte[] { }, Integer.MAX_VALUE, 755); method
    [all...]
  /external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
sctp_sha1.c 37 /* A SHA-1 Digest is 160 bits, or 20 bytes */
54 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx)
58 PK11_DigestFinal(ctx->pk11_ctx, digest, &output_len, SHA_DIGEST_LENGTH);
77 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx)
79 SHA1_Final(digest, &ctx->sha_ctx);
225 sctp_sha1_final(unsigned char *digest, struct sctp_sha1_context *ctx)
229 * the digest to the pointer. At the last block some special rules
300 /* transfer the digest back to the user */
301 digest[3] = (ctx->H0 & 0xff);
302 digest[2] = ((ctx->H0 >> 8) & 0xff)
    [all...]
  /external/chromium_org/crypto/
hmac.h 34 // Returns the length of digest that this HMAC will create.
64 // returned in |digest|, which has |digest_length| bytes of storage available.
65 bool Sign(const base::StringPiece& data, unsigned char* digest,
69 // in |digest|, using the algorithm supplied to the constructor and the key
73 // undermine the cryptographic integrity. |digest| must be exactly
76 const base::StringPiece& digest) const WARN_UNUSED_RESULT;
79 // that |digest| is allowed to be smaller than |DigestLength()|.
82 const base::StringPiece& digest) const WARN_UNUSED_RESULT;
signature_verifier_openssl.cc 58 const EVP_MD* digest; local
60 digest = EVP_sha1();
62 digest = EVP_sha256();
66 digest = EVP_get_digestbyobj(algorithm.get()->algorithm);
68 if (!digest)
71 return CommonInit(digest, signature, signature_len, public_key_info,
83 const EVP_MD* const digest = ToOpenSSLDigest(hash_alg); local
84 DCHECK(digest);
85 if (!digest) {
90 if (!CommonInit(digest, signature, signature_len, public_key_info
    [all...]
hkdf.cc 56 uint8 digest[kSHA256HashLength]; local
69 result = hmac.Sign(base::StringPiece(buf.get(), j), digest, sizeof(digest));
72 memcpy(&output_[i*sizeof(digest)], digest, sizeof(digest));
73 previous = base::StringPiece(reinterpret_cast<char*>(digest),
74 sizeof(digest));
  /external/openssl/crypto/pkcs12/
p12_p8e.c 84 M_ASN1_OCTET_STRING_free(p8->digest);
85 p8->digest = PKCS12_item_i2d_encrypt(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO),
87 if(!p8->digest) {
  /external/chromium_org/third_party/boringssl/src/include/openssl/
ecdsa.h 71 /* ECDSA_sign signs |digest_len| bytes from |digest| with |key| and writes the
76 OPENSSL_EXPORT int ECDSA_sign(int type, const uint8_t *digest,
81 * signature by |key| of |digest|. (The |type| argument should be zero.) It
84 OPENSSL_EXPORT int ECDSA_verify(int type, const uint8_t *digest,
109 /* ECDSA_sign signs |digest_len| bytes from |digest| with |key| and returns the
113 OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign(const uint8_t *digest,
117 * |digest|. It returns one on success or zero if the signature is invalid or
121 OPENSSL_EXPORT int ECDSA_do_verify(const uint8_t *digest, size_t digest_len,
140 OPENSSL_EXPORT ECDSA_SIG *ECDSA_do_sign_ex(const uint8_t *digest,
147 OPENSSL_EXPORT int ECDSA_sign_ex(int type, const uint8_t *digest,
    [all...]
  /external/openssl/crypto/evp/
p_sign.c 95 if (ctx->digest->flags & EVP_MD_FLAG_PKEY_METHOD_SIGNATURE)
104 if (EVP_PKEY_CTX_set_signature_md(pkctx, ctx->digest) <= 0)
117 v=ctx->digest->required_pkey_type[i];
131 if (ctx->digest->sign == NULL)
136 return(ctx->digest->sign(ctx->digest->type,m,m_len,sigret,siglen,
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
RSA.java 190 String digest,
194 String mainName = digest + "WITHRSA";
195 String jdk11Variation1 = digest + "withRSA";
196 String jdk11Variation2 = digest + "WithRSA";
197 String alias = digest + "/" + "RSA";
198 String longName = digest + "WITHRSAENCRYPTION";
199 String longJdk11Variation1 = digest + "withRSAEncryption";
200 String longJdk11Variation2 = digest + "WithRSAEncryption";
  /external/chromium_org/third_party/boringssl/src/crypto/x509/
x_sig.c 66 ASN1_SIMPLE(X509_SIG, digest, ASN1_OCTET_STRING)
  /external/chromium_org/third_party/skia/tests/
MD5Test.cpp 11 static bool digests_equal(const SkMD5::Digest& expectedDigest, const SkMD5::Digest& computedDigest) {
20 static void md5_test(const char* string, const SkMD5::Digest& expectedDigest, skiatest::Reporter* reporter) {
27 SkMD5::Digest digest; local
28 context.finish(digest);
30 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest));
41 SkMD5::Digest digest; local
42 context.finish(digest);
50 SkMD5::Digest digest; member in struct:MD5Test
    [all...]
  /external/openssl/crypto/asn1/
x_sig.c 66 ASN1_SIMPLE(X509_SIG, digest, ASN1_OCTET_STRING)
  /external/skia/tests/
MD5Test.cpp 11 static bool digests_equal(const SkMD5::Digest& expectedDigest, const SkMD5::Digest& computedDigest) {
20 static void md5_test(const char* string, const SkMD5::Digest& expectedDigest, skiatest::Reporter* reporter) {
27 SkMD5::Digest digest; local
28 context.finish(digest);
30 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest));
41 SkMD5::Digest digest; local
42 context.finish(digest);
50 SkMD5::Digest digest; member in struct:MD5Test
    [all...]
  /external/chromium_org/chrome/browser/safe_browsing/incident_reporting/
binary_integrity_incident_handlers_unittest.cc 53 uint32_t digest = GetBinaryIntegrityIncidentDigest(*incident); local
54 ASSERT_EQ(digest, GetBinaryIntegrityIncidentDigest(*MakeIncident()));
60 uint32_t digest = GetBinaryIntegrityIncidentDigest(*incident); local
65 ASSERT_NE(digest, GetBinaryIntegrityIncidentDigest(*incident2));
tracked_preference_incident_handlers_unittest.cc 41 uint32_t digest = local
43 ASSERT_EQ(digest,
52 uint32_t digest = local
61 ASSERT_NE(digest,
  /external/chromium_org/rlz/lib/
machine_id.cc 59 // Note that digest can have embedded nulls.
60 std::string digest(base::SHA1HashString(sid_string_buffer));
61 VERIFY(digest.size() == base::kSHA1Length);
62 std::copy(digest.begin(), digest.end(), id_binary.begin());

Completed in 1830 milliseconds

1 23 4 5 6 7 8 91011>>