/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
BCMessageDigest.java | 1 package org.bouncycastle.jcajce.provider.digest; 5 import org.bouncycastle.crypto.Digest; 10 protected Digest digest; field in class:BCMessageDigest 13 Digest digest) 15 super(digest.getAlgorithmName()); 17 this.digest = digest; 22 digest.reset() [all...] |
/external/libchrome/base/metrics/ |
metrics_hashes.cc | 16 inline uint64_t DigestToUInt64(const base::MD5Digest& digest) { 18 DCHECK_GE(sizeof(digest.a), sizeof(value)); 19 memcpy(&value, digest.a, sizeof(value)); 26 base::MD5Digest digest; local 27 base::MD5Sum(name.c_str(), name.size(), &digest); 28 return DigestToUInt64(digest);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/ |
RawContentVerifier.java | 5 * verified using the digest of the calculated data. 10 * Verify that the expected signature value was derived from the passed in digest. 12 * @param digest digest calculated from the content. 14 * @return true if the expected signature is derived from the digest, false otherwise. 16 boolean verify(byte[] digest, byte[] expected);
|
/libcore/ojluni/src/main/java/java/security/ |
DigestInputStream.java | 36 * A transparent stream that updates the associated message digest using 39 * <p>To complete the message digest computation, call one of the 40 * <code>digest</code> methods on the associated message 41 * digest after your calls to one of this digest input stream's 47 * results in an update on the message digest. But when it is off, 48 * the message digest is not updated. The default is for the stream 51 * <p>Note that digest objects can compute only one digest (see 54 * retain a handle onto the digest object, and clone it for eac 74 protected MessageDigest digest; field in class:DigestInputStream [all...] |
DigestOutputStream.java | 36 * A transparent stream that updates the associated message digest using 39 * <p>To complete the message digest computation, call one of the 40 * <code>digest</code> methods on the associated message 41 * digest after your calls to one of this digest ouput stream's 47 * an update on the message digest. But when it is off, the message 48 * digest is not updated. The default is for the stream to be on. 60 * The message digest associated with this stream. 62 protected MessageDigest digest; field in class:DigestOutputStream 65 * Creates a digest output stream, using the specified output strea [all...] |
/external/selinux/libselinux/src/ |
label_support.c | 101 void hidden digest_gen_hash(struct selabel_digest *digest) 106 if (!digest) 110 Sha1Update(&context, digest->hashbuf, digest->hashbuf_size); 111 Sha1Finalise(&context, (SHA1_HASH *)digest->digest); 112 free(digest->hashbuf); 113 digest->hashbuf = NULL; 120 * @digest: pointer to the selabel_digest struct 129 int hidden digest_add_specfile(struct selabel_digest *digest, FILE *fp [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
HMac.java | 6 import org.bouncycastle.crypto.Digest; 24 private Digest digest; field in class:HMac 65 Digest digest) 67 if (digest instanceof ExtendedDigest) 69 return ((ExtendedDigest)digest).getByteLength(); 72 Integer b = (Integer)blockLengths.get(digest.getAlgorithmName()); 76 throw new IllegalArgumentException("unknown digest passed: " + digest.getAlgorithmName()) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
DigestOutputStream.java | 6 import org.bouncycastle.crypto.Digest; 11 protected Digest digest; field in class:DigestOutputStream 14 Digest Digest) 16 this.digest = Digest; 22 digest.update((byte)b); 31 digest.update(b, off, len); 36 byte[] res = new byte[digest.getDigestSize()] [all...] |
DigestInputStream.java | 7 import org.bouncycastle.crypto.Digest; 12 protected Digest digest; field in class:DigestInputStream 16 Digest digest) 19 this.digest = digest; 29 digest.update((byte)b); 43 digest.update(b, off, n); 48 public Digest getDigest( [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS5S1ParametersGenerator.java | 4 import org.bouncycastle.crypto.Digest; 12 * digest used to drive it. 21 private Digest digest; field in class:PKCS5S1ParametersGenerator 26 * @param digest the digest to be used as the source of derived keys. 29 Digest digest) 31 this.digest = digest; [all...] |
/external/webrtc/webrtc/base/ |
messagedigest.cc | 40 MessageDigest* digest = new OpenSSLDigest(alg); local 41 if (digest->Size() == 0) { // invalid algorithm 42 delete digest; 43 digest = NULL; 45 return digest; 47 MessageDigest* digest = NULL; 49 digest = new Md5Digest(); 51 digest = new Sha1Digest(); 53 return digest; 70 size_t ComputeDigest(MessageDigest* digest, const void* input, size_t in_len [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
RSA.java | 212 String digest, 216 String mainName = digest + "WITHRSA"; 217 String jdk11Variation1 = digest + "withRSA"; 218 String jdk11Variation2 = digest + "WithRSA"; 219 String alias = digest + "/" + "RSA"; 220 String longName = digest + "WITHRSAENCRYPTION"; 221 String longJdk11Variation1 = digest + "withRSAEncryption"; 222 String longJdk11Variation2 = digest + "WithRSAEncryption"; 241 String digest, 244 provider.addAlgorithm("Alg.Alias.Signature." + digest + "withRSA/ISO9796-2", digest + "WITHRSA/ISO9796-2") [all...] |
/external/vboot_reference/tests/ |
vb2_sha_tests.c | 6 /* FIPS 180-2 Tests for message digest functions. */ 19 uint8_t *digest, 33 return vb2_digest_finalize(&dc, digest, digest_size); 38 uint8_t digest[VB2_SHA1_DIGEST_SIZE]; local 49 VB2_HASH_SHA1, digest, sizeof(digest)), 51 TEST_EQ(memcmp(digest, sha1_results[i], sizeof(digest)), 52 0, "SHA1 digest"); 56 VB2_HASH_SHA1, digest, sizeof(digest) - 1) 62 uint8_t digest[VB2_SHA256_DIGEST_SIZE]; local 86 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local 111 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local [all...] |
/external/libchrome/crypto/ |
hmac.cc | 39 const base::StringPiece& digest) const { 40 if (digest.size() != DigestLength()) 42 return VerifyTruncated(data, digest); 46 const base::StringPiece& digest) const { 47 if (digest.empty()) 55 return SecureMemEqual(digest.data(), computed_digest.get(), 56 std::min(digest.size(), digest_length));
|
/frameworks/base/core/java/android/security/net/config/ |
Pin.java | 24 public final byte[] digest; field in class:Pin 28 public Pin(String digestAlgorithm, byte[] digest) { 30 this.digest = digest; 31 mHashCode = Arrays.hashCode(digest) ^ digestAlgorithm.hashCode(); 50 throw new IllegalArgumentException("Unsupported digest algorithm: " + algorithm); 70 if (!Arrays.equals(digest, other.digest)) {
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
DigestInputStream2Test.java | 33 MessageDigest digest; field in class:DigestInputStream2Test 42 DigestInputStream dis = new DigestInputStream(inStream, digest); 52 DigestInputStream dis = new DigestInputStream(inStream, digest); 53 assertEquals("getMessageDigest returned a bogus result", digest, dis 62 MessageDigest originalDigest = (MessageDigest) (digest.clone()); 63 MessageDigest noChangeDigest = (MessageDigest) (digest.clone()); 71 // make sure the digest for the part where it was off has not 74 MessageDigest.isEqual(noChangeDigest.digest(), originalDigest 75 .digest())); 76 MessageDigest changeDigest = (MessageDigest) (digest.clone()) [all...] |
/cts/tools/tradefed-host/tests/src/com/android/cts/tradefed/testtype/ |
TestPackageDefTest.java | 31 * digest is generated for fixed data. 37 return new ByteArrayInputStream("test data for digest".getBytes()); 40 String digest = def.generateDigest(new File("unused"), "alsounused"); local 41 assertNotNull(digest); 42 assertEquals("58c222b5f5f81b4b58891ec59924b9b2f530452e", digest);
|
/external/libchrome/base/ |
md5.h | 16 // MD5 stands for Message Digest algorithm 5. 34 // MD5Digest digest; // the result of the computation 35 // MD5Final(&digest, &ctx); 37 // You can call MD5DigestToBase16() to generate a string of the digest. 57 // Finalizes the MD5 operation and fills the buffer with the digest. 58 BASE_EXPORT void MD5Final(MD5Digest* digest, MD5Context* context); 60 // MD5IntermediateFinal() generates a digest without finalizing the MD5 62 // without affecting the digest generated for the entire input. 63 BASE_EXPORT void MD5IntermediateFinal(MD5Digest* digest, 66 // Converts a digest into human-readable hexadecimal [all...] |
/libcore/benchmarks/src/benchmarks/regression/ |
MessageDigestBenchmark.java | 42 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local 44 digest.update(DATA, 0, DATA_SIZE); 45 digest.digest();
|
/system/core/metricsd/uploader/ |
metrics_hashes.cc | 44 base::MD5Digest digest; local 45 base::MD5Final(&digest, &context); 47 std::string hash_str(reinterpret_cast<char*>(digest.a), arraysize(digest.a));
|
/system/keymaster/ |
hmac.h | 29 // DigestLength returns the length, in bytes, of the resulting digest. 38 // method. At most |digest_len| bytes of the resulting digest are written 39 // to |digest|. 40 bool Sign(const Buffer& data, uint8_t* digest, size_t digest_len) const; 41 bool Sign(const uint8_t* data, size_t data_len, uint8_t* digest, size_t digest_len) const; 43 // Verify returns true if |digest| is a valid HMAC of |data| using the key 44 // supplied to Init. |digest| must be exactly |DigestLength()| bytes long. 49 bool Verify(const Buffer& data, const Buffer& digest) const; 50 bool Verify(const uint8_t* data, size_t data_len, const uint8_t* digest,
|
/external/ppp/pppd/ |
chap-new.h | 45 * CHAP digest codes. 66 /* Return the digest alg. ID for the most preferred digest type. */ 73 /* Return the bit flag (lsb set) for our most preferred digest type. */ 76 /* Return the bit flag for a given digest algorithm ID. */ 77 #define CHAP_MDTYPE_D(digest) \ 78 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 79 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 80 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 83 /* Can we do the requested digest? * [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
PBESecretKeyFactory.java | 18 private int digest; field in class:PBESecretKeyFactory 27 int digest, 35 this.digest = digest; 51 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 56 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 60 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 63 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
|
/external/mmc-utils/3rdparty/hmac_sha/ |
sha2.h | 82 void sha224_final(sha224_ctx *ctx, unsigned char *digest); 84 unsigned char *digest); 89 void sha256_final(sha256_ctx *ctx, unsigned char *digest); 91 unsigned char *digest); 96 void sha384_final(sha384_ctx *ctx, unsigned char *digest); 98 unsigned char *digest); 103 void sha512_final(sha512_ctx *ctx, unsigned char *digest); 105 unsigned char *digest);
|
/external/vboot_reference/utility/ |
pad_digest_utility.c | 22 uint8_t* digest = NULL; local 37 digest = BufferFromFile(argv[2], &len); 38 if (!digest) { 43 padded_digest = PrependDigestInfo(algorithm, digest); 53 free(digest);
|