/external/wpa_supplicant_8/src/crypto/ |
md4-internal.c | 26 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx); 49 * This code implements the MD4 message-digest algorithm. 60 * To compute the message digest of a chunk of bytes, declare an 63 * will fill a supplied 16-byte array with the digest. 166 * Final wrapup--call MD4Pad, fill in digest and zero out ctx. 168 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) 173 if (digest != NULL) { 175 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
|
/frameworks/base/packages/PrintSpooler/src/com/android/printspooler/model/ |
CustomPrinterIconCache.java | 75 sb.append(String.format("%#040x", new java.math.BigInteger(1, md.digest())));
|
/frameworks/base/packages/StatementService/src/com/android/statementservice/retriever/ |
Utils.java | 122 return byteArrayToHexString(digester.digest());
|
/frameworks/base/services/core/java/com/android/server/pm/ |
ProcessLoggingHandler.java | 110 return md.digest();
|
/hardware/qcom/msm8996/original-kernel-headers/linux/ |
qcedev.h | 75 * @QCEDEV_ALG_SHA1: Digest returned: 20 bytes (160 bits) 76 * @QCEDEV_ALG_SHA256: Digest returned: 32 bytes (256 bit) 204 * @digest (IN/OUT): Returns the hashed data information 205 * @diglen (OUT): Size of the hashed/digest data 214 uint8_t digest[QCEDEV_MAX_SHA_DIGEST]; member in struct:qcedev_sha_op_req
|
/hardware/qcom/msm8x84/kernel-headers/linux/ |
qseecom.h | 120 char digest[SHA256_DIGEST_LENGTH]; member in struct:qseecom_save_partition_hash_req
|
/hardware/qcom/msm8x84/original-kernel-headers/linux/ |
qseecom.h | 155 * @hash[SHA256_DIGEST_LENGTH] - sha256 digest. 159 char digest[SHA256_DIGEST_LENGTH]; /* in */ member in struct:qseecom_save_partition_hash_req
|
/packages/apps/Gallery2/gallerycommon/src/com/android/gallery3d/common/ |
Fingerprint.java | 28 * MD5-based digest Wrapper. 31 // Instance of the MessageDigest using our specified digest algorithm. 35 * Name of the digest algorithm we use in {@link java.security.MessageDigest} 61 // md5 digest bytes. 77 * Note that this will close() stream after calculating the digest. 98 return new Fingerprint(in.getMessageDigest().digest());
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
key_agreement.go | 110 // hashForServerKeyExchange hashes the given slices and returns their digest 126 digest := h.Sum(nil) 127 return digest, hashFunc, nil 231 digest, hashFunc, err := hashForServerKeyExchange(sigAndHash, ka.version, clientHello.random, hello.random, serverECDHParams) 255 sig, err = priv.Sign(config.rand(), digest, hashFunc) 349 digest, hashFunc, err := hashForServerKeyExchange(sigAndHash, ka.version, clientHello.random, serverHello.random, serverECDHParams) 366 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S) { 374 if err := rsa.VerifyPKCS1v15(pubKey, hashFunc, digest, sig); err != nil {
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
key_agreement.go | 110 // hashForServerKeyExchange hashes the given slices and returns their digest 126 digest := h.Sum(nil) 127 return digest, hashFunc, nil 231 digest, hashFunc, err := hashForServerKeyExchange(sigAndHash, ka.version, clientHello.random, hello.random, serverECDHParams) 255 sig, err = priv.Sign(config.rand(), digest, hashFunc) 349 digest, hashFunc, err := hashForServerKeyExchange(sigAndHash, ka.version, clientHello.random, serverHello.random, serverECDHParams) 366 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S) { 374 if err := rsa.VerifyPKCS1v15(pubKey, hashFunc, digest, sig); err != nil {
|
/system/keymaster/ |
keymaster1_engine.h | 107 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
|
operation.h | 82 keymaster_digest_t* digest, keymaster_error_t* error) const;
|
/external/tpm2/ |
CryptUtil.c | 145 // This function starts a hash and return the size, in bytes, of the digest. 149 // >0 the digest size of the algorithm 173 // Start a hash stack for a sequence object and return the size, in bytes, of the digest. This call uses the 178 // >0 the digest size of the algorithm 201 // This function starts an HMAC sequence and returns the size of the digest that will be produced. 207 // >0 the digest size of the algorithm 237 // This function starts an HMAC sequence and returns the size of the digest that will be produced. 244 // >0 the digest size of the algorithm 269 // This function starts an HMAC and returns the size of the digest that will be produced. 279 // >0 the digest size of the algorith [all...] |
/prebuilts/devtools/tools/lib/ |
bcprov-jdk15on-1.48.jar | |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/ |
bcprov-jdk15on-1.48.jar | |
/prebuilts/tools/common/offline-m2/org/bouncycastle/bcprov-jdk15on/1.48/ |
bcprov-jdk15on-1.48.jar | |
/prebuilts/tools/common/m2/repository/commons-codec/commons-codec/1.10/ |
commons-codec-1.10.jar | |
/prebuilts/tools/common/offline-m2/commons-codec/commons-codec/1.10/ |
commons-codec-1.10.jar | |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
SecretKeyFactoryTest.java | 96 String digest = TestUtils.getHmacAlgorithmDigest(algorithm); local 97 digests = new String[] {digest};
|
/external/antlr/antlr-3.4/runtime/Python/ |
ez_setup.py | 49 digest = md5(data).hexdigest() 50 if digest != md5_data[egg_name]:
|
/external/autotest/client/deps/glbench/src/ |
testbase.cc | 109 void ComputeMD5(unsigned char digest[16], const int width, const int height) { 116 MD5Final(digest, &ctx);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSSignedHelper.java | 45 private static void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption) 47 digestAlgs.put(alias.getId(), digest); local 129 * Return the digest encryption algorithm using one of the standard
|
CMSUtils.java | 302 DigestCalculator digest = (DigestCalculator)it.next(); local 303 result = new TeeInputStream(result, digest.getOutputStream());
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
JcaContentVerifierProviderBuilder.java | 264 public boolean verify(byte[] digest, byte[] expected) 268 rawSignature.update(digest);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
PBE.java | 128 throw new IllegalStateException("unknown digest scheme for PBE PKCS5S2 encryption."); 169 throw new IllegalStateException("unknown digest scheme for PBE encryption."); 187 int digest, 200 PBEParametersGenerator generator = makePBEGenerator(scheme, digest);
|