HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 26 - 50 of 1173) sorted by null

12 3 4 5 6 7 8 91011>>

  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
DigestInputStream2Test.java 33 MessageDigest digest; field in class:DigestInputStream2Test
42 DigestInputStream dis = new DigestInputStream(inStream, digest);
52 DigestInputStream dis = new DigestInputStream(inStream, digest);
53 assertEquals("getMessageDigest returned a bogus result", digest, dis
62 MessageDigest originalDigest = (MessageDigest) (digest.clone());
63 MessageDigest noChangeDigest = (MessageDigest) (digest.clone());
71 // make sure the digest for the part where it was off has not
74 MessageDigest.isEqual(noChangeDigest.digest(), originalDigest
75 .digest()));
76 MessageDigest changeDigest = (MessageDigest) (digest.clone())
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/
DSABase.java 11 import org.bouncycastle.crypto.Digest;
17 protected Digest digest; field in class:DSABase
22 Digest digest,
26 this.digest = digest;
35 digest.update(b);
44 digest.update(b, off, len);
50 byte[] hash = new byte[digest.getDigestSize()]
    [all...]
  /external/pdfium/core/include/fdrm/
fx_crypt.h 36 void CRYPT_MD5Generate(const uint8_t* data, FX_DWORD size, uint8_t digest[16]);
39 void CRYPT_MD5Finish(void* context, uint8_t digest[16]);
40 void CRYPT_SHA1Generate(const uint8_t* data, FX_DWORD size, uint8_t digest[20]);
43 void CRYPT_SHA1Finish(void* context, uint8_t digest[20]);
46 uint8_t digest[32]);
49 void CRYPT_SHA256Finish(void* context, uint8_t digest[32]);
52 void CRYPT_SHA384Finish(void* context, uint8_t digest[48]);
55 uint8_t digest[48]);
58 void CRYPT_SHA512Finish(void* context, uint8_t digest[64]);
61 uint8_t digest[64])
    [all...]
  /external/vboot_reference/firmware/lib/cryptolib/
sha_utility.c 5 * Utility functions for message digest functions.
55 uint8_t* digest = NULL; local
59 digest = (uint8_t*) VbExMalloc(SHA1_DIGEST_SIZE);
60 Memcpy(digest, SHA1_final(ctx->sha1_ctx), SHA1_DIGEST_SIZE);
65 digest = (uint8_t*) VbExMalloc(SHA256_DIGEST_SIZE);
66 Memcpy(digest, SHA256_final(ctx->sha256_ctx), SHA256_DIGEST_SIZE);
71 digest = (uint8_t*) VbExMalloc(SHA512_DIGEST_SIZE);
72 Memcpy(digest, SHA512_final(ctx->sha512_ctx), SHA512_DIGEST_SIZE);
77 return digest;
81 /* Allocate enough space for the largest digest */
82 uint8_t* digest = (uint8_t*) VbExMalloc(SHA512_DIGEST_SIZE); local
    [all...]
  /libcore/support/src/test/java/tests/security/
MessageDigestTest.java 33 private MessageDigest digest; field in class:MessageDigestTest
42 this.digest = MessageDigest.getInstance(digestAlgorithmName);
63 digest = null;
73 assertNotNull("digest source data not found: " + digestAlgorithmName, sourceStream);
80 byte[] checkDigest = new byte[digest.getDigestLength()];
94 digest.update(buf, 0, read);
98 byte[] computedDigest = digest.digest();
100 assertNotNull("computed digest is is null", computedDigest);
101 assertEquals("digest length mismatch", checkDigest.length, computedDigest.length)
    [all...]
  /external/chromium-trace/catapult/telemetry/third_party/webpagereplay/third_party/dns/rdtypes/
dsbase.py 28 @ivar digest_type: the digest type
30 @ivar digest: the digest
31 @type digest: int
34 __slots__ = ['key_tag', 'algorithm', 'digest_type', 'digest']
37 digest):
42 self.digest = digest
47 dns.rdata._hexify(self.digest,
62 digest = ''.join(chunks
    [all...]
  /external/curl/lib/
http_digest.c 39 WWW-Authenticate: Digest realm="testrealm", nonce="1053604598"
40 Proxy-Authenticate: Digest realm="testrealm", nonce="1053604598"
52 struct digestdata *digest; local
55 digest = &data->state.proxydigest;
58 digest = &data->state.digest;
61 if(!checkprefix("Digest", header))
64 header += strlen("Digest");
68 return Curl_sasl_decode_digest_http_message(header, digest);
93 struct digestdata *digest; local
    [all...]
  /external/jetty/src/java/org/eclipse/jetty/util/security/
Credential.java 36 * a Password itself is a Credential, a UnixCrypt or MD5 digest of a a password
39 * This class includes an implementation for unix Crypt an MD5 digest.
131 MD5(String digest)
133 digest = digest.startsWith(__TYPE) ? digest.substring(__TYPE.length()) : digest;
134 _digest = TypeUtil.parseBytes(digest, 16);
149 byte[] digest = null;
160 digest = __md.digest()
195 public static String digest(String password) method in class:Credential.MD5
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
DigestInfo.java 19 * digest OCTET STRING }
25 private byte[] digest; field in class:DigestInfo
52 byte[] digest)
54 this.digest = digest;
64 digest = ASN1OctetString.getInstance(e.nextElement()).getOctets();
74 return digest;
82 v.add(new DEROctetString(digest));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
OpenSSLPBEParametersGenerator.java 4 import org.bouncycastle.crypto.Digest;
23 private Digest digest = AndroidDigestFactory.getMD5(); field in class:OpenSSLPBEParametersGenerator
52 byte[] buf = new byte[digest.getDigestSize()];
58 digest.update(password, 0, password.length);
59 digest.update(salt, 0, salt.length);
61 digest.doFinal(buf, 0);
75 digest.reset();
76 digest.update(buf, 0, buf.length);
  /external/guava/guava/src/com/google/common/hash/
MessageDigestHashFunction.java 115 * Hasher that updates a message digest.
119 private final MessageDigest digest; field in class:MessageDigestHashFunction.MessageDigestHasher
123 private MessageDigestHasher(MessageDigest digest, int bytes) {
124 this.digest = digest;
131 digest.update(b);
137 digest.update(b);
143 digest.update(b, off, len);
154 return (bytes == digest.getDigestLength())
155 ? HashCode.fromBytesNoCopy(digest.digest()
    [all...]
  /external/libchrome/base/
md5_unittest.cc 15 MD5Digest digest; local
25 digest.a[i] = data[i] & 0xff;
27 std::string actual = MD5DigestToBase16(digest);
34 MD5Digest digest; local
37 MD5Sum(data, strlen(data), &digest);
47 EXPECT_EQ(expected[i], digest.a[i] & 0xFF);
51 MD5Digest digest; local
54 MD5Sum(data, strlen(data), &digest);
64 EXPECT_EQ(expected[i], digest.a[i] & 0xFF);
74 MD5Digest digest; local
92 MD5Digest digest; local
129 MD5Digest digest; local
197 MD5Digest digest; local
240 MD5Digest digest; local
    [all...]
  /dalvik/libdex/
sha1.h 18 void SHA1Final(unsigned char digest[HASHSIZE], SHA1_CTX* context);
  /external/tpm2/
_TPM_Hash_End.c 19 TPM2B_DIGEST digest; local
62 digest.t.size = CryptGetHashDigestSize(hash);
63 CryptCompleteHash2B(&hashObject->state.hashState[i], &digest.b);
65 PcrDrtm(pcrHandle, hash, &digest);
Sign.c 49 if( in->validation.digest.t.size != 0
55 &in->digest, &ticket);
57 if(!Memory2BEqual(&in->validation.digest.b, &ticket.digest.b))
61 // If we don't have a ticket, at least verify that the provided 'digest'
62 // is the size of the scheme hashAlg digest.
63 // NOTE: this does not guarantee that the 'digest' is actually produced using
66 if( in->digest.t.size
74 result = CryptSign(in->keyHandle, &in->inScheme, &in->digest, &out->signature);
  /libcore/luni/src/test/java/tests/targets/security/
MessageDigestTestMD2.java 28 MessageDigest digest = MessageDigest.getInstance("MD2"); local
35 MessageDigest digest = MessageDigest.getInstance( local
49 MessageDigest digest = MessageDigest.getInstance("MD2"); local
51 digest = MessageDigest.getInstance("1.2.840.113549.2.2");
  /packages/inputmethods/LatinIME/java/src/com/android/inputmethod/dictionarypack/
MD5Calculator.java 39 final byte[] digest = digester.digest();
41 for (int i = 0; i < digest.length; ++i) {
42 s.append(String.format("%1$02x", digest[i]));
  /system/keymaster/
ecdsa_operation.h 31 EcdsaOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key)
32 : Operation(purpose), digest_(digest), ecdsa_key_(key) {
52 EcdsaSignOperation(keymaster_digest_t digest, EVP_PKEY* key)
53 : EcdsaOperation(KM_PURPOSE_SIGN, digest, key) {}
66 EcdsaVerifyOperation(keymaster_digest_t digest, EVP_PKEY* key)
67 : EcdsaOperation(KM_PURPOSE_VERIFY, digest, key) {}
86 virtual Operation* InstantiateOperation(keymaster_digest_t digest, EVP_PKEY* key) = 0;
92 Operation* InstantiateOperation(keymaster_digest_t digest, EVP_PKEY* key) {
93 return new (std::nothrow) EcdsaSignOperation(digest, key);
100 Operation* InstantiateOperation(keymaster_digest_t digest, EVP_PKEY* key)
    [all...]
hmac.cpp 59 uint8_t* digest = tmp; local
61 digest = out_digest;
63 if (nullptr == ::HMAC(EVP_sha256(), key_.get(), key_len_, data, data_len, digest, nullptr)) {
72 bool HmacSha256::Verify(const Buffer& data, const Buffer& digest) const {
73 return Verify(data.peek_read(), data.available_read(), digest.peek_read(),
74 digest.available_read());
77 bool HmacSha256::Verify(const uint8_t* data, size_t data_len, const uint8_t* digest,
86 return 0 == CRYPTO_memcmp(digest, computed_digest, SHA256_DIGEST_LENGTH);
  /external/boringssl/src/crypto/evp/
algorithm.c 70 const EVP_MD *digest; local
74 digest = EVP_MD_CTX_md(ctx);
76 if (!digest || !pkey) {
97 if (!OBJ_find_sigid_by_algs(&sign_nid, EVP_MD_type(digest),
118 const EVP_MD *digest; local
120 /* Convert signature OID into digest and public key OIDs */
144 /* Otherwise, initialize with the digest from the OID. */
145 digest = EVP_get_digestbynid(digest_nid);
146 if (digest == NULL) {
151 return EVP_DigestVerifyInit(ctx, NULL, digest, NULL, pkey)
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/md5/
md5.go 33 // digest represents the partial evaluation of a checksum.
34 type digest struct { type
41 func (d *digest) Reset() {
52 d := new(digest)
57 func (d *digest) Size() int { return Size }
59 func (d *digest) BlockSize() int { return BlockSize }
61 func (d *digest) Write(p []byte) (nn int, err error) {
90 func (d0 *digest) Sum(in []byte) []byte {
97 func (d *digest) checkSum() [Size]byte {
119 var digest [Size]byt
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/sha1/
sha1.go 32 // digest represents the partial evaluation of a checksum.
33 type digest struct { type
40 func (d *digest) Reset() {
52 d := new(digest)
57 func (d *digest) Size() int { return Size }
59 func (d *digest) BlockSize() int { return BlockSize }
61 func (d *digest) Write(p []byte) (nn int, err error) {
84 func (d0 *digest) Sum(in []byte) []byte {
91 func (d *digest) checkSum() [Size]byte {
113 var digest [Size]byt
    [all...]
  /prebuilts/go/linux-x86/src/crypto/md5/
md5.go 33 // digest represents the partial evaluation of a checksum.
34 type digest struct { type
41 func (d *digest) Reset() {
52 d := new(digest)
57 func (d *digest) Size() int { return Size }
59 func (d *digest) BlockSize() int { return BlockSize }
61 func (d *digest) Write(p []byte) (nn int, err error) {
90 func (d0 *digest) Sum(in []byte) []byte {
97 func (d *digest) checkSum() [Size]byte {
119 var digest [Size]byt
    [all...]
  /prebuilts/go/linux-x86/src/crypto/sha1/
sha1.go 32 // digest represents the partial evaluation of a checksum.
33 type digest struct { type
40 func (d *digest) Reset() {
52 d := new(digest)
57 func (d *digest) Size() int { return Size }
59 func (d *digest) BlockSize() int { return BlockSize }
61 func (d *digest) Write(p []byte) (nn int, err error) {
84 func (d0 *digest) Sum(in []byte) []byte {
91 func (d *digest) checkSum() [Size]byte {
113 var digest [Size]byt
    [all...]
  /external/boringssl/src/crypto/digest/
digest.c 57 #include <openssl/digest.h>
91 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data) {
92 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size);
118 if (in == NULL || in->digest == NULL) {
119 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_INPUT_NOT_INITIALIZED);
123 if (out->digest == in->digest) {
133 out->digest = in->digest;
    [all...]

Completed in 1133 milliseconds

12 3 4 5 6 7 8 91011>>