/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_hashlib.py | 136 self.assertTrue(hexstr(h.digest()) == h.hexdigest()) 152 self.assertEqual(m1.digest(), m2.digest(), name+' update problem.') 155 self.assertEqual(m1.digest(), m3.digest(), name+' new problem.') 157 def check(self, name, data, digest): 164 computed, digest, 168 computed, len(data), digest)) 170 def check_update(self, name, data, digest): 179 computed, digest, [all...] |
time_hashlib.py | 18 x = localCF(longStr).digest() 34 x = creatorFunc().digest()
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_hashlib.py | 136 self.assertTrue(hexstr(h.digest()) == h.hexdigest()) 152 self.assertEqual(m1.digest(), m2.digest(), name+' update problem.') 155 self.assertEqual(m1.digest(), m3.digest(), name+' new problem.') 157 def check(self, name, data, digest): 164 computed, digest, 168 computed, len(data), digest)) 170 def check_update(self, name, data, digest): 179 computed, digest, [all...] |
time_hashlib.py | 18 x = localCF(longStr).digest() 34 x = creatorFunc().digest()
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
DigitalSignatureTest.java | 71 sha.digest(sha_hash, 0, sha_hash.length); 72 md5.digest(md5_hash, 0, md5_hash.length);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
DES.java | 297 private int digest; field in class:DES.DESPBEKeyFactory 306 int digest, 314 this.digest = digest; 330 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 335 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 339 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 354 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
|
/external/libchrome/crypto/ |
hmac_nss.cc | 78 unsigned char* digest, 110 digest, &len, digest_length) != SECSuccess) {
|
/external/tpm2/ |
CpriECC_fp.h | 81 TPM2B *digest, // IN: the digest to sign 93 TPM2B *digest // IN: the digest that was signed
|
/external/vboot_reference/firmware/lib21/ |
common.c | 229 const uint8_t *digest, 248 digest, key_sig_size)) 253 /* RSA-signed digest */ 256 digest, wb); 268 uint8_t *digest; local 277 /* Digest goes at start of work buffer */ 282 digest = vb2_workbuf_alloc(&wblocal, digest_size); 283 if (!digest) 299 rv = vb2_digest_finalize(dc, digest, digest_size); 305 return vb2_verify_digest(key, sig, digest, &wblocal) [all...] |
/external/webrtc/webrtc/base/ |
opensslidentity.h | 74 // Compute the digest of the certificate given algorithm 76 unsigned char* digest, 80 // Compute the digest of a certificate as an X509 * 83 unsigned char* digest,
|
/prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
time_hashlib.py | 18 x = localCF(longStr).digest() 34 x = creatorFunc().digest()
|
/prebuilts/gdb/linux-x86/lib/python2.7/test/ |
time_hashlib.py | 18 x = localCF(longStr).digest() 34 x = creatorFunc().digest()
|
/system/extras/verity/ |
VerityVerifier.java | 55 private MessageDigest digest; field in class:VerityVerifier 73 digest = MessageDigest.getInstance("SHA-256"); 74 hashSize = digest.getDigestLength(); 311 digest.reset(); 312 digest.update(salt); 313 digest.update(data); 314 return Arrays.equals(hash, digest.digest());
|
verify_boot_signature.c | 220 * @param digest Pointer to a buffer where the hash is written 223 unsigned char *digest) 234 if (!aa || !digest) { 287 EVP_DigestFinal(ctx, digest, NULL); 318 unsigned char digest[SHA256_DIGEST_LENGTH]; local 324 if (hash_image(fd, length, bs->authenticatedAttributes, digest) == -1) { 338 if (!RSA_verify(NID_sha256, digest, SHA256_DIGEST_LENGTH,
|
/system/keymaster/ |
keymaster0_engine.h | 75 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, 88 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
|
/external/antlr/antlr-3.4/runtime/Perl5/tools/ |
port.pl | 8 use Digest; 51 my $sha1 = Digest->new('SHA-1'); 53 my $digest = $sha1->hexdigest; 55 return $digest; 126 my $digest = sha1sum($path); 128 'sha1' => $digest, 146 my $digest = sha1sum($path); 148 if ($digest ne $fstatus->{sha1}) {
|
/external/boringssl/src/crypto/evp/ |
pbkdf_test.cc | 20 #include <openssl/digest.h> 36 const EVP_MD *digest, size_t key_len, 46 (const uint8_t *)salt, salt_len, iterations, digest, 99 // Note that each of these test vectors uses SHA-1 as the digest. 162 const EVP_MD *digest = EVP_sha1(); local 169 1 /* iterations */, digest, key_len, key)) { 180 0 /* iterations */, digest, key_len, key)) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
BaseStreamCipher.java | 49 private int digest; field in class:BaseStreamCipher 68 int digest) 73 this.digest = digest; 177 param = PBE.Util.makePBEParameters(k.getEncoded(), PKCS12, digest, keySizeInBits, ivLength * 8, pbeSpec, cipher.getAlgorithmName()); 214 if (digest > 0)
|
/external/jetty/src/java/org/eclipse/jetty/client/security/ |
DigestAuthentication.java | 47 StringBuilder buffer = new StringBuilder().append("Digest"); 80 // calc A1 digest 86 byte[] ha1 = md.digest(); 87 // calc A2 digest 92 byte[] ha2=md.digest(); 105 byte[] digest=md.digest(); 107 // check digest 108 return encode(digest); 121 byte[] b= md.digest(String.valueOf(System.currentTimeMillis()).getBytes(StringUtil.__ISO_8859_1)); [all...] |
/prebuilts/go/darwin-x86/src/compress/gzip/ |
gunzip.go | 72 digest hash.Hash32 88 z.digest = crc32.NewIEEE() 100 if z.digest == nil { 101 z.digest = crc32.NewIEEE() 103 z.digest.Reset() 186 z.digest.Reset() 187 z.digest.Write(z.buf[0:10]) 227 sum := z.digest.Sum32() & 0xFFFF 233 z.digest.Reset() 251 z.digest.Write(p[0:n] [all...] |
/prebuilts/go/linux-x86/src/compress/gzip/ |
gunzip.go | 72 digest hash.Hash32 88 z.digest = crc32.NewIEEE() 100 if z.digest == nil { 101 z.digest = crc32.NewIEEE() 103 z.digest.Reset() 186 z.digest.Reset() 187 z.digest.Write(z.buf[0:10]) 227 sum := z.digest.Sum32() & 0xFFFF 233 z.digest.Reset() 251 z.digest.Write(p[0:n] [all...] |
/external/vboot_reference/firmware/2lib/ |
2sha256.c | 281 void vb2_sha256_finalize(struct vb2_sha256_context *ctx, uint8_t *digest) 304 UNPACK32(ctx->h[i], &digest[i << 2]); 307 UNPACK32(ctx->h[0], &digest[ 0]); 308 UNPACK32(ctx->h[1], &digest[ 4]); 309 UNPACK32(ctx->h[2], &digest[ 8]); 310 UNPACK32(ctx->h[3], &digest[12]); 311 UNPACK32(ctx->h[4], &digest[16]); 312 UNPACK32(ctx->h[5], &digest[20]); 313 UNPACK32(ctx->h[6], &digest[24]); 314 UNPACK32(ctx->h[7], &digest[28]) [all...] |
2sha512.c | 311 void vb2_sha512_finalize(struct vb2_sha512_context *ctx, uint8_t *digest) 334 UNPACK64(ctx->h[0], &digest[ 0]); 335 UNPACK64(ctx->h[1], &digest[ 8]); 336 UNPACK64(ctx->h[2], &digest[16]); 337 UNPACK64(ctx->h[3], &digest[24]); 338 UNPACK64(ctx->h[4], &digest[32]); 339 UNPACK64(ctx->h[5], &digest[40]); 340 UNPACK64(ctx->h[6], &digest[48]); 341 UNPACK64(ctx->h[7], &digest[56]); 344 UNPACK64(ctx->h[i], &digest[i << 3]) [all...] |
/external/chromium-trace/catapult/third_party/Paste/paste/auth/ |
auth_tkt.py | 66 whether to secure the cookie and the digest algorithm (for details 112 # correct specification of digest from hashlib or fail 117 def digest(self): member in class:AuthTicket 123 v = '%s%08x%s!' % (self.digest(), int(self.time), url_quote(self.userid)) 141 far enough to determine what the expected digest should have 158 # correct specification of digest from hashlib or fail 162 digest = ticket[:digest_hexa_size] 183 if expected != digest: 184 raise BadTicket('Digest signature is not correct', 185 expected=(expected, digest)) [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_pwd_common.c | 32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) 35 crypto_hash_finish(hash, digest, &len); 44 u8 digest[SHA256_MAC_LEN]; local 59 crypto_hash_update(hash, digest, SHA256_MAC_LEN); 64 if (crypto_hash_finish(hash, digest, &mdlen) < 0) 67 os_memcpy(result + len, digest, resultbytelen - len); 69 os_memcpy(result + len, digest, mdlen);
|