/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
DigestInputStream2Test.java | 33 MessageDigest digest; field in class:DigestInputStream2Test 42 DigestInputStream dis = new DigestInputStream(inStream, digest); 52 DigestInputStream dis = new DigestInputStream(inStream, digest); 53 assertEquals("getMessageDigest returned a bogus result", digest, dis 62 MessageDigest originalDigest = (MessageDigest) (digest.clone()); 63 MessageDigest noChangeDigest = (MessageDigest) (digest.clone()); 71 // make sure the digest for the part where it was off has not 74 MessageDigest.isEqual(noChangeDigest.digest(), originalDigest 75 .digest())); 76 MessageDigest changeDigest = (MessageDigest) (digest.clone()) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
DSABase.java | 11 import org.bouncycastle.crypto.Digest; 17 protected Digest digest; field in class:DSABase 22 Digest digest, 26 this.digest = digest; 35 digest.update(b); 44 digest.update(b, off, len); 50 byte[] hash = new byte[digest.getDigestSize()] [all...] |
/external/pdfium/core/include/fdrm/ |
fx_crypt.h | 36 void CRYPT_MD5Generate(const uint8_t* data, FX_DWORD size, uint8_t digest[16]); 39 void CRYPT_MD5Finish(void* context, uint8_t digest[16]); 40 void CRYPT_SHA1Generate(const uint8_t* data, FX_DWORD size, uint8_t digest[20]); 43 void CRYPT_SHA1Finish(void* context, uint8_t digest[20]); 46 uint8_t digest[32]); 49 void CRYPT_SHA256Finish(void* context, uint8_t digest[32]); 52 void CRYPT_SHA384Finish(void* context, uint8_t digest[48]); 55 uint8_t digest[48]); 58 void CRYPT_SHA512Finish(void* context, uint8_t digest[64]); 61 uint8_t digest[64]) [all...] |
/external/vboot_reference/firmware/lib/cryptolib/ |
sha_utility.c | 5 * Utility functions for message digest functions. 55 uint8_t* digest = NULL; local 59 digest = (uint8_t*) VbExMalloc(SHA1_DIGEST_SIZE); 60 Memcpy(digest, SHA1_final(ctx->sha1_ctx), SHA1_DIGEST_SIZE); 65 digest = (uint8_t*) VbExMalloc(SHA256_DIGEST_SIZE); 66 Memcpy(digest, SHA256_final(ctx->sha256_ctx), SHA256_DIGEST_SIZE); 71 digest = (uint8_t*) VbExMalloc(SHA512_DIGEST_SIZE); 72 Memcpy(digest, SHA512_final(ctx->sha512_ctx), SHA512_DIGEST_SIZE); 77 return digest; 81 /* Allocate enough space for the largest digest */ 82 uint8_t* digest = (uint8_t*) VbExMalloc(SHA512_DIGEST_SIZE); local [all...] |
/libcore/support/src/test/java/tests/security/ |
MessageDigestTest.java | 33 private MessageDigest digest; field in class:MessageDigestTest 42 this.digest = MessageDigest.getInstance(digestAlgorithmName); 63 digest = null; 73 assertNotNull("digest source data not found: " + digestAlgorithmName, sourceStream); 80 byte[] checkDigest = new byte[digest.getDigestLength()]; 94 digest.update(buf, 0, read); 98 byte[] computedDigest = digest.digest(); 100 assertNotNull("computed digest is is null", computedDigest); 101 assertEquals("digest length mismatch", checkDigest.length, computedDigest.length) [all...] |
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/third_party/dns/rdtypes/ |
dsbase.py | 28 @ivar digest_type: the digest type 30 @ivar digest: the digest 31 @type digest: int 34 __slots__ = ['key_tag', 'algorithm', 'digest_type', 'digest'] 37 digest): 42 self.digest = digest 47 dns.rdata._hexify(self.digest, 62 digest = ''.join(chunks [all...] |
/external/curl/lib/ |
http_digest.c | 39 WWW-Authenticate: Digest realm="testrealm", nonce="1053604598" 40 Proxy-Authenticate: Digest realm="testrealm", nonce="1053604598" 52 struct digestdata *digest; local 55 digest = &data->state.proxydigest; 58 digest = &data->state.digest; 61 if(!checkprefix("Digest", header)) 64 header += strlen("Digest"); 68 return Curl_sasl_decode_digest_http_message(header, digest); 93 struct digestdata *digest; local [all...] |
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
Credential.java | 36 * a Password itself is a Credential, a UnixCrypt or MD5 digest of a a password 39 * This class includes an implementation for unix Crypt an MD5 digest. 131 MD5(String digest) 133 digest = digest.startsWith(__TYPE) ? digest.substring(__TYPE.length()) : digest; 134 _digest = TypeUtil.parseBytes(digest, 16); 149 byte[] digest = null; 160 digest = __md.digest() 195 public static String digest(String password) method in class:Credential.MD5 [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
DigestInfo.java | 19 * digest OCTET STRING } 25 private byte[] digest; field in class:DigestInfo 52 byte[] digest) 54 this.digest = digest; 64 digest = ASN1OctetString.getInstance(e.nextElement()).getOctets(); 74 return digest; 82 v.add(new DEROctetString(digest));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
OpenSSLPBEParametersGenerator.java | 4 import org.bouncycastle.crypto.Digest; 23 private Digest digest = AndroidDigestFactory.getMD5(); field in class:OpenSSLPBEParametersGenerator 52 byte[] buf = new byte[digest.getDigestSize()]; 58 digest.update(password, 0, password.length); 59 digest.update(salt, 0, salt.length); 61 digest.doFinal(buf, 0); 75 digest.reset(); 76 digest.update(buf, 0, buf.length);
|
/external/guava/guava/src/com/google/common/hash/ |
MessageDigestHashFunction.java | 115 * Hasher that updates a message digest. 119 private final MessageDigest digest; field in class:MessageDigestHashFunction.MessageDigestHasher 123 private MessageDigestHasher(MessageDigest digest, int bytes) { 124 this.digest = digest; 131 digest.update(b); 137 digest.update(b); 143 digest.update(b, off, len); 154 return (bytes == digest.getDigestLength()) 155 ? HashCode.fromBytesNoCopy(digest.digest() [all...] |
/external/libchrome/base/ |
md5_unittest.cc | 15 MD5Digest digest; local 25 digest.a[i] = data[i] & 0xff; 27 std::string actual = MD5DigestToBase16(digest); 34 MD5Digest digest; local 37 MD5Sum(data, strlen(data), &digest); 47 EXPECT_EQ(expected[i], digest.a[i] & 0xFF); 51 MD5Digest digest; local 54 MD5Sum(data, strlen(data), &digest); 64 EXPECT_EQ(expected[i], digest.a[i] & 0xFF); 74 MD5Digest digest; local 92 MD5Digest digest; local 129 MD5Digest digest; local 197 MD5Digest digest; local 240 MD5Digest digest; local [all...] |
/dalvik/libdex/ |
sha1.h | 18 void SHA1Final(unsigned char digest[HASHSIZE], SHA1_CTX* context);
|
/external/tpm2/ |
_TPM_Hash_End.c | 19 TPM2B_DIGEST digest; local 62 digest.t.size = CryptGetHashDigestSize(hash); 63 CryptCompleteHash2B(&hashObject->state.hashState[i], &digest.b); 65 PcrDrtm(pcrHandle, hash, &digest);
|
Sign.c | 49 if( in->validation.digest.t.size != 0 55 &in->digest, &ticket); 57 if(!Memory2BEqual(&in->validation.digest.b, &ticket.digest.b)) 61 // If we don't have a ticket, at least verify that the provided 'digest' 62 // is the size of the scheme hashAlg digest. 63 // NOTE: this does not guarantee that the 'digest' is actually produced using 66 if( in->digest.t.size 74 result = CryptSign(in->keyHandle, &in->inScheme, &in->digest, &out->signature);
|
/libcore/luni/src/test/java/tests/targets/security/ |
MessageDigestTestMD2.java | 28 MessageDigest digest = MessageDigest.getInstance("MD2"); local 35 MessageDigest digest = MessageDigest.getInstance( local 49 MessageDigest digest = MessageDigest.getInstance("MD2"); local 51 digest = MessageDigest.getInstance("1.2.840.113549.2.2");
|
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/dictionarypack/ |
MD5Calculator.java | 39 final byte[] digest = digester.digest(); 41 for (int i = 0; i < digest.length; ++i) { 42 s.append(String.format("%1$02x", digest[i]));
|
/system/keymaster/ |
ecdsa_operation.h | 31 EcdsaOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) 32 : Operation(purpose), digest_(digest), ecdsa_key_(key) { 52 EcdsaSignOperation(keymaster_digest_t digest, EVP_PKEY* key) 53 : EcdsaOperation(KM_PURPOSE_SIGN, digest, key) {} 66 EcdsaVerifyOperation(keymaster_digest_t digest, EVP_PKEY* key) 67 : EcdsaOperation(KM_PURPOSE_VERIFY, digest, key) {} 86 virtual Operation* InstantiateOperation(keymaster_digest_t digest, EVP_PKEY* key) = 0; 92 Operation* InstantiateOperation(keymaster_digest_t digest, EVP_PKEY* key) { 93 return new (std::nothrow) EcdsaSignOperation(digest, key); 100 Operation* InstantiateOperation(keymaster_digest_t digest, EVP_PKEY* key) [all...] |
hmac.cpp | 59 uint8_t* digest = tmp; local 61 digest = out_digest; 63 if (nullptr == ::HMAC(EVP_sha256(), key_.get(), key_len_, data, data_len, digest, nullptr)) { 72 bool HmacSha256::Verify(const Buffer& data, const Buffer& digest) const { 73 return Verify(data.peek_read(), data.available_read(), digest.peek_read(), 74 digest.available_read()); 77 bool HmacSha256::Verify(const uint8_t* data, size_t data_len, const uint8_t* digest, 86 return 0 == CRYPTO_memcmp(digest, computed_digest, SHA256_DIGEST_LENGTH);
|
/external/boringssl/src/crypto/evp/ |
algorithm.c | 70 const EVP_MD *digest; local 74 digest = EVP_MD_CTX_md(ctx); 76 if (!digest || !pkey) { 97 if (!OBJ_find_sigid_by_algs(&sign_nid, EVP_MD_type(digest), 118 const EVP_MD *digest; local 120 /* Convert signature OID into digest and public key OIDs */ 144 /* Otherwise, initialize with the digest from the OID. */ 145 digest = EVP_get_digestbynid(digest_nid); 146 if (digest == NULL) { 151 return EVP_DigestVerifyInit(ctx, NULL, digest, NULL, pkey) [all...] |
/prebuilts/go/darwin-x86/src/crypto/md5/ |
md5.go | 33 // digest represents the partial evaluation of a checksum. 34 type digest struct { type 41 func (d *digest) Reset() { 52 d := new(digest) 57 func (d *digest) Size() int { return Size } 59 func (d *digest) BlockSize() int { return BlockSize } 61 func (d *digest) Write(p []byte) (nn int, err error) { 90 func (d0 *digest) Sum(in []byte) []byte { 97 func (d *digest) checkSum() [Size]byte { 119 var digest [Size]byt [all...] |
/prebuilts/go/darwin-x86/src/crypto/sha1/ |
sha1.go | 32 // digest represents the partial evaluation of a checksum. 33 type digest struct { type 40 func (d *digest) Reset() { 52 d := new(digest) 57 func (d *digest) Size() int { return Size } 59 func (d *digest) BlockSize() int { return BlockSize } 61 func (d *digest) Write(p []byte) (nn int, err error) { 84 func (d0 *digest) Sum(in []byte) []byte { 91 func (d *digest) checkSum() [Size]byte { 113 var digest [Size]byt [all...] |
/prebuilts/go/linux-x86/src/crypto/md5/ |
md5.go | 33 // digest represents the partial evaluation of a checksum. 34 type digest struct { type 41 func (d *digest) Reset() { 52 d := new(digest) 57 func (d *digest) Size() int { return Size } 59 func (d *digest) BlockSize() int { return BlockSize } 61 func (d *digest) Write(p []byte) (nn int, err error) { 90 func (d0 *digest) Sum(in []byte) []byte { 97 func (d *digest) checkSum() [Size]byte { 119 var digest [Size]byt [all...] |
/prebuilts/go/linux-x86/src/crypto/sha1/ |
sha1.go | 32 // digest represents the partial evaluation of a checksum. 33 type digest struct { type 40 func (d *digest) Reset() { 52 d := new(digest) 57 func (d *digest) Size() int { return Size } 59 func (d *digest) BlockSize() int { return BlockSize } 61 func (d *digest) Write(p []byte) (nn int, err error) { 84 func (d0 *digest) Sum(in []byte) []byte { 91 func (d *digest) checkSum() [Size]byte { 113 var digest [Size]byt [all...] |
/external/boringssl/src/crypto/digest/ |
digest.c | 57 #include <openssl/digest.h> 91 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data) { 92 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size); 118 if (in == NULL || in->digest == NULL) { 119 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_INPUT_NOT_INITIALIZED); 123 if (out->digest == in->digest) { 133 out->digest = in->digest; [all...] |