HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 1 - 25 of 1173) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
BCMessageDigest.java 1 package org.bouncycastle.jcajce.provider.digest;
5 import org.bouncycastle.crypto.Digest;
10 protected Digest digest; field in class:BCMessageDigest
13 Digest digest)
15 super(digest.getAlgorithmName());
17 this.digest = digest;
22 digest.reset()
    [all...]
  /external/libchrome/base/metrics/
metrics_hashes.cc 16 inline uint64_t DigestToUInt64(const base::MD5Digest& digest) {
18 DCHECK_GE(sizeof(digest.a), sizeof(value));
19 memcpy(&value, digest.a, sizeof(value));
26 base::MD5Digest digest; local
27 base::MD5Sum(name.c_str(), name.size(), &digest);
28 return DigestToUInt64(digest);
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/
RawContentVerifier.java 5 * verified using the digest of the calculated data.
10 * Verify that the expected signature value was derived from the passed in digest.
12 * @param digest digest calculated from the content.
14 * @return true if the expected signature is derived from the digest, false otherwise.
16 boolean verify(byte[] digest, byte[] expected);
  /libcore/ojluni/src/main/java/java/security/
DigestInputStream.java 36 * A transparent stream that updates the associated message digest using
39 * <p>To complete the message digest computation, call one of the
40 * <code>digest</code> methods on the associated message
41 * digest after your calls to one of this digest input stream's
47 * results in an update on the message digest. But when it is off,
48 * the message digest is not updated. The default is for the stream
51 * <p>Note that digest objects can compute only one digest (see
54 * retain a handle onto the digest object, and clone it for eac
74 protected MessageDigest digest; field in class:DigestInputStream
    [all...]
DigestOutputStream.java 36 * A transparent stream that updates the associated message digest using
39 * <p>To complete the message digest computation, call one of the
40 * <code>digest</code> methods on the associated message
41 * digest after your calls to one of this digest ouput stream's
47 * an update on the message digest. But when it is off, the message
48 * digest is not updated. The default is for the stream to be on.
60 * The message digest associated with this stream.
62 protected MessageDigest digest; field in class:DigestOutputStream
65 * Creates a digest output stream, using the specified output strea
    [all...]
  /external/selinux/libselinux/src/
label_support.c 101 void hidden digest_gen_hash(struct selabel_digest *digest)
106 if (!digest)
110 Sha1Update(&context, digest->hashbuf, digest->hashbuf_size);
111 Sha1Finalise(&context, (SHA1_HASH *)digest->digest);
112 free(digest->hashbuf);
113 digest->hashbuf = NULL;
120 * @digest: pointer to the selabel_digest struct
129 int hidden digest_add_specfile(struct selabel_digest *digest, FILE *fp
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/
HMac.java 6 import org.bouncycastle.crypto.Digest;
24 private Digest digest; field in class:HMac
65 Digest digest)
67 if (digest instanceof ExtendedDigest)
69 return ((ExtendedDigest)digest).getByteLength();
72 Integer b = (Integer)blockLengths.get(digest.getAlgorithmName());
76 throw new IllegalArgumentException("unknown digest passed: " + digest.getAlgorithmName())
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/
DigestOutputStream.java 6 import org.bouncycastle.crypto.Digest;
11 protected Digest digest; field in class:DigestOutputStream
14 Digest Digest)
16 this.digest = Digest;
22 digest.update((byte)b);
31 digest.update(b, off, len);
36 byte[] res = new byte[digest.getDigestSize()]
    [all...]
DigestInputStream.java 7 import org.bouncycastle.crypto.Digest;
12 protected Digest digest; field in class:DigestInputStream
16 Digest digest)
19 this.digest = digest;
29 digest.update((byte)b);
43 digest.update(b, off, n);
48 public Digest getDigest(
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
PKCS5S1ParametersGenerator.java 4 import org.bouncycastle.crypto.Digest;
12 * digest used to drive it.
21 private Digest digest; field in class:PKCS5S1ParametersGenerator
26 * @param digest the digest to be used as the source of derived keys.
29 Digest digest)
31 this.digest = digest;
    [all...]
  /external/webrtc/webrtc/base/
messagedigest.cc 40 MessageDigest* digest = new OpenSSLDigest(alg); local
41 if (digest->Size() == 0) { // invalid algorithm
42 delete digest;
43 digest = NULL;
45 return digest;
47 MessageDigest* digest = NULL;
49 digest = new Md5Digest();
51 digest = new Sha1Digest();
53 return digest;
70 size_t ComputeDigest(MessageDigest* digest, const void* input, size_t in_len
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
RSA.java 212 String digest,
216 String mainName = digest + "WITHRSA";
217 String jdk11Variation1 = digest + "withRSA";
218 String jdk11Variation2 = digest + "WithRSA";
219 String alias = digest + "/" + "RSA";
220 String longName = digest + "WITHRSAENCRYPTION";
221 String longJdk11Variation1 = digest + "withRSAEncryption";
222 String longJdk11Variation2 = digest + "WithRSAEncryption";
241 String digest,
244 provider.addAlgorithm("Alg.Alias.Signature." + digest + "withRSA/ISO9796-2", digest + "WITHRSA/ISO9796-2")
    [all...]
  /external/vboot_reference/tests/
vb2_sha_tests.c 6 /* FIPS 180-2 Tests for message digest functions. */
19 uint8_t *digest,
33 return vb2_digest_finalize(&dc, digest, digest_size);
38 uint8_t digest[VB2_SHA1_DIGEST_SIZE]; local
49 VB2_HASH_SHA1, digest, sizeof(digest)),
51 TEST_EQ(memcmp(digest, sha1_results[i], sizeof(digest)),
52 0, "SHA1 digest");
56 VB2_HASH_SHA1, digest, sizeof(digest) - 1)
62 uint8_t digest[VB2_SHA256_DIGEST_SIZE]; local
86 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local
111 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local
    [all...]
  /external/libchrome/crypto/
hmac.cc 39 const base::StringPiece& digest) const {
40 if (digest.size() != DigestLength())
42 return VerifyTruncated(data, digest);
46 const base::StringPiece& digest) const {
47 if (digest.empty())
55 return SecureMemEqual(digest.data(), computed_digest.get(),
56 std::min(digest.size(), digest_length));
  /frameworks/base/core/java/android/security/net/config/
Pin.java 24 public final byte[] digest; field in class:Pin
28 public Pin(String digestAlgorithm, byte[] digest) {
30 this.digest = digest;
31 mHashCode = Arrays.hashCode(digest) ^ digestAlgorithm.hashCode();
50 throw new IllegalArgumentException("Unsupported digest algorithm: " + algorithm);
70 if (!Arrays.equals(digest, other.digest)) {
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
DigestInputStream2Test.java 33 MessageDigest digest; field in class:DigestInputStream2Test
42 DigestInputStream dis = new DigestInputStream(inStream, digest);
52 DigestInputStream dis = new DigestInputStream(inStream, digest);
53 assertEquals("getMessageDigest returned a bogus result", digest, dis
62 MessageDigest originalDigest = (MessageDigest) (digest.clone());
63 MessageDigest noChangeDigest = (MessageDigest) (digest.clone());
71 // make sure the digest for the part where it was off has not
74 MessageDigest.isEqual(noChangeDigest.digest(), originalDigest
75 .digest()));
76 MessageDigest changeDigest = (MessageDigest) (digest.clone())
    [all...]
  /cts/tools/tradefed-host/tests/src/com/android/cts/tradefed/testtype/
TestPackageDefTest.java 31 * digest is generated for fixed data.
37 return new ByteArrayInputStream("test data for digest".getBytes());
40 String digest = def.generateDigest(new File("unused"), "alsounused"); local
41 assertNotNull(digest);
42 assertEquals("58c222b5f5f81b4b58891ec59924b9b2f530452e", digest);
  /external/libchrome/base/
md5.h 16 // MD5 stands for Message Digest algorithm 5.
34 // MD5Digest digest; // the result of the computation
35 // MD5Final(&digest, &ctx);
37 // You can call MD5DigestToBase16() to generate a string of the digest.
57 // Finalizes the MD5 operation and fills the buffer with the digest.
58 BASE_EXPORT void MD5Final(MD5Digest* digest, MD5Context* context);
60 // MD5IntermediateFinal() generates a digest without finalizing the MD5
62 // without affecting the digest generated for the entire input.
63 BASE_EXPORT void MD5IntermediateFinal(MD5Digest* digest,
66 // Converts a digest into human-readable hexadecimal
    [all...]
  /libcore/benchmarks/src/benchmarks/regression/
MessageDigestBenchmark.java 42 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
44 digest.update(DATA, 0, DATA_SIZE);
45 digest.digest();
  /system/core/metricsd/uploader/
metrics_hashes.cc 44 base::MD5Digest digest; local
45 base::MD5Final(&digest, &context);
47 std::string hash_str(reinterpret_cast<char*>(digest.a), arraysize(digest.a));
  /system/keymaster/
hmac.h 29 // DigestLength returns the length, in bytes, of the resulting digest.
38 // method. At most |digest_len| bytes of the resulting digest are written
39 // to |digest|.
40 bool Sign(const Buffer& data, uint8_t* digest, size_t digest_len) const;
41 bool Sign(const uint8_t* data, size_t data_len, uint8_t* digest, size_t digest_len) const;
43 // Verify returns true if |digest| is a valid HMAC of |data| using the key
44 // supplied to Init. |digest| must be exactly |DigestLength()| bytes long.
49 bool Verify(const Buffer& data, const Buffer& digest) const;
50 bool Verify(const uint8_t* data, size_t data_len, const uint8_t* digest,
  /external/ppp/pppd/
chap-new.h 45 * CHAP digest codes.
66 /* Return the digest alg. ID for the most preferred digest type. */
73 /* Return the bit flag (lsb set) for our most preferred digest type. */
76 /* Return the bit flag for a given digest algorithm ID. */
77 #define CHAP_MDTYPE_D(digest) \
78 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \
79 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \
80 ((digest) == CHAP_MD5)? MDTYPE_MD5: \
83 /* Can we do the requested digest? *
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/
PBESecretKeyFactory.java 18 private int digest; field in class:PBESecretKeyFactory
27 int digest,
35 this.digest = digest;
51 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null);
56 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize);
60 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize);
63 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
  /external/mmc-utils/3rdparty/hmac_sha/
sha2.h 82 void sha224_final(sha224_ctx *ctx, unsigned char *digest);
84 unsigned char *digest);
89 void sha256_final(sha256_ctx *ctx, unsigned char *digest);
91 unsigned char *digest);
96 void sha384_final(sha384_ctx *ctx, unsigned char *digest);
98 unsigned char *digest);
103 void sha512_final(sha512_ctx *ctx, unsigned char *digest);
105 unsigned char *digest);
  /external/vboot_reference/utility/
pad_digest_utility.c 22 uint8_t* digest = NULL; local
37 digest = BufferFromFile(argv[2], &len);
38 if (!digest) {
43 padded_digest = PrependDigestInfo(algorithm, digest);
53 free(digest);

Completed in 532 milliseconds

1 2 3 4 5 6 7 8 91011>>