HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 451 - 475 of 1173) sorted by null

<<11121314151617181920>>

  /external/wpa_supplicant_8/src/crypto/
md4-internal.c 26 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx);
49 * This code implements the MD4 message-digest algorithm.
60 * To compute the message digest of a chunk of bytes, declare an
63 * will fill a supplied 16-byte array with the digest.
166 * Final wrapup--call MD4Pad, fill in digest and zero out ctx.
168 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx)
173 if (digest != NULL) {
175 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
  /frameworks/base/packages/PrintSpooler/src/com/android/printspooler/model/
CustomPrinterIconCache.java 75 sb.append(String.format("%#040x", new java.math.BigInteger(1, md.digest())));
  /frameworks/base/packages/StatementService/src/com/android/statementservice/retriever/
Utils.java 122 return byteArrayToHexString(digester.digest());
  /frameworks/base/services/core/java/com/android/server/pm/
ProcessLoggingHandler.java 110 return md.digest();
  /hardware/qcom/msm8996/original-kernel-headers/linux/
qcedev.h 75 * @QCEDEV_ALG_SHA1: Digest returned: 20 bytes (160 bits)
76 * @QCEDEV_ALG_SHA256: Digest returned: 32 bytes (256 bit)
204 * @digest (IN/OUT): Returns the hashed data information
205 * @diglen (OUT): Size of the hashed/digest data
214 uint8_t digest[QCEDEV_MAX_SHA_DIGEST]; member in struct:qcedev_sha_op_req
  /hardware/qcom/msm8x84/kernel-headers/linux/
qseecom.h 120 char digest[SHA256_DIGEST_LENGTH]; member in struct:qseecom_save_partition_hash_req
  /hardware/qcom/msm8x84/original-kernel-headers/linux/
qseecom.h 155 * @hash[SHA256_DIGEST_LENGTH] - sha256 digest.
159 char digest[SHA256_DIGEST_LENGTH]; /* in */ member in struct:qseecom_save_partition_hash_req
  /packages/apps/Gallery2/gallerycommon/src/com/android/gallery3d/common/
Fingerprint.java 28 * MD5-based digest Wrapper.
31 // Instance of the MessageDigest using our specified digest algorithm.
35 * Name of the digest algorithm we use in {@link java.security.MessageDigest}
61 // md5 digest bytes.
77 * Note that this will close() stream after calculating the digest.
98 return new Fingerprint(in.getMessageDigest().digest());
  /prebuilts/go/darwin-x86/src/crypto/tls/
key_agreement.go 110 // hashForServerKeyExchange hashes the given slices and returns their digest
126 digest := h.Sum(nil)
127 return digest, hashFunc, nil
231 digest, hashFunc, err := hashForServerKeyExchange(sigAndHash, ka.version, clientHello.random, hello.random, serverECDHParams)
255 sig, err = priv.Sign(config.rand(), digest, hashFunc)
349 digest, hashFunc, err := hashForServerKeyExchange(sigAndHash, ka.version, clientHello.random, serverHello.random, serverECDHParams)
366 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S) {
374 if err := rsa.VerifyPKCS1v15(pubKey, hashFunc, digest, sig); err != nil {
  /prebuilts/go/linux-x86/src/crypto/tls/
key_agreement.go 110 // hashForServerKeyExchange hashes the given slices and returns their digest
126 digest := h.Sum(nil)
127 return digest, hashFunc, nil
231 digest, hashFunc, err := hashForServerKeyExchange(sigAndHash, ka.version, clientHello.random, hello.random, serverECDHParams)
255 sig, err = priv.Sign(config.rand(), digest, hashFunc)
349 digest, hashFunc, err := hashForServerKeyExchange(sigAndHash, ka.version, clientHello.random, serverHello.random, serverECDHParams)
366 if !ecdsa.Verify(pubKey, digest, ecdsaSig.R, ecdsaSig.S) {
374 if err := rsa.VerifyPKCS1v15(pubKey, hashFunc, digest, sig); err != nil {
  /system/keymaster/
keymaster1_engine.h 107 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
operation.h 82 keymaster_digest_t* digest, keymaster_error_t* error) const;
  /external/tpm2/
CryptUtil.c 145 // This function starts a hash and return the size, in bytes, of the digest.
149 // >0 the digest size of the algorithm
173 // Start a hash stack for a sequence object and return the size, in bytes, of the digest. This call uses the
178 // >0 the digest size of the algorithm
201 // This function starts an HMAC sequence and returns the size of the digest that will be produced.
207 // >0 the digest size of the algorithm
237 // This function starts an HMAC sequence and returns the size of the digest that will be produced.
244 // >0 the digest size of the algorithm
269 // This function starts an HMAC and returns the size of the digest that will be produced.
279 // >0 the digest size of the algorith
    [all...]
  /prebuilts/devtools/tools/lib/
bcprov-jdk15on-1.48.jar 
  /prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/
bcprov-jdk15on-1.48.jar 
  /prebuilts/tools/common/offline-m2/org/bouncycastle/bcprov-jdk15on/1.48/
bcprov-jdk15on-1.48.jar 
  /prebuilts/tools/common/m2/repository/commons-codec/commons-codec/1.10/
commons-codec-1.10.jar 
  /prebuilts/tools/common/offline-m2/commons-codec/commons-codec/1.10/
commons-codec-1.10.jar 
  /cts/tests/tests/keystore/src/android/keystore/cts/
SecretKeyFactoryTest.java 96 String digest = TestUtils.getHmacAlgorithmDigest(algorithm); local
97 digests = new String[] {digest};
  /external/antlr/antlr-3.4/runtime/Python/
ez_setup.py 49 digest = md5(data).hexdigest()
50 if digest != md5_data[egg_name]:
  /external/autotest/client/deps/glbench/src/
testbase.cc 109 void ComputeMD5(unsigned char digest[16], const int width, const int height) {
116 MD5Final(digest, &ctx);
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSSignedHelper.java 45 private static void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption)
47 digestAlgs.put(alias.getId(), digest); local
129 * Return the digest encryption algorithm using one of the standard
CMSUtils.java 302 DigestCalculator digest = (DigestCalculator)it.next(); local
303 result = new TeeInputStream(result, digest.getOutputStream());
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
JcaContentVerifierProviderBuilder.java 264 public boolean verify(byte[] digest, byte[] expected)
268 rawSignature.update(digest);
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/
PBE.java 128 throw new IllegalStateException("unknown digest scheme for PBE PKCS5S2 encryption.");
169 throw new IllegalStateException("unknown digest scheme for PBE encryption.");
187 int digest,
200 PBEParametersGenerator generator = makePBEGenerator(scheme, digest);

Completed in 1045 milliseconds

<<11121314151617181920>>