/external/chromium-trace/catapult/third_party/gsutil/third_party/apitools/ |
ez_setup.py | 44 digest = md5(data).hexdigest() 45 if digest != md5_data[egg_name]:
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/protorpc/ |
ez_setup.py | 44 digest = md5(data).hexdigest() 45 if digest != md5_data[egg_name]:
|
/external/dng_sdk/source/ |
dng_negative.h | 256 // If there a valid embedded XMP block, has is its digest? NULL if no valid 745 // MD5 digest of original raw file data block. 820 // Keep a separate digest for the compressed JPEG data, if any. [all...] |
/external/fio/crc/ |
test.c | 54 uint32_t digest[4]; local 55 struct fio_md5_ctx ctx = { .hash = digest };
|
/external/protobuf/python/ |
ez_setup.py | 76 digest = md5(data).hexdigest() 77 if digest != md5_data[egg_name]:
|
/external/selinux/libselinux/src/ |
label_android_property.c | 203 status = digest_add_specfile(rec->digest, fp, NULL, sb.st_size, path); 207 digest_gen_hash(rec->digest);
|
label_db.c | 322 if (digest_add_specfile(rec->digest, filp, NULL, sb.st_size, path) < 0) 325 digest_gen_hash(rec->digest);
|
label_media.c | 139 status = digest_add_specfile(rec->digest, fp, NULL, sb.st_size, path); 143 digest_gen_hash(rec->digest);
|
label_x.c | 166 status = digest_add_specfile(rec->digest, fp, NULL, sb.st_size, path); 170 digest_gen_hash(rec->digest);
|
/external/vboot_reference/tests/futility/ |
test_gbb_utility.sh | 207 # GBB v1.2 adds a sha256 digest field in what was previously padding: 216 # See that the digest is updated properly. 221 ${FUTILITY} gbb_utility -g --digest ${TMP}.blob | grep ${expect} 223 # Garble the digest, see that it's noticed. 226 ${FUTILITY} gbb_utility -g --digest ${TMP}.blob.bad | grep '0000000000' 227 ${FUTILITY} gbb_utility -g --digest ${TMP}.blob.bad | grep 'invalid' 229 # Garble the HWID. The digest is unchanged, but now invalid. 231 ${FUTILITY} gbb_utility -g --digest ${TMP}.blob.bad | grep 'invalid'
|
/prebuilts/go/darwin-x86/src/crypto/md5/ |
md5block.go | 25 func blockGeneric(dig *digest, p []byte) {
|
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
pkcs1v15_test.go | 198 digest := h.Sum(nil) 200 s, err := SignPKCS1v15(nil, rsaPrivateKey, crypto.SHA1, digest) 216 digest := h.Sum(nil) 220 err := VerifyPKCS1v15(&rsaPrivateKey.PublicKey, crypto.SHA1, digest, sig)
|
/prebuilts/go/darwin-x86/src/crypto/sha1/ |
sha1block.go | 16 func blockGeneric(dig *digest, p []byte) {
|
/prebuilts/go/darwin-x86/src/crypto/sha256/ |
sha256block.go | 80 func block(dig *digest, p []byte) {
|
/prebuilts/go/darwin-x86/src/crypto/sha512/ |
sha512block.go | 96 func block(dig *digest, p []byte) {
|
/prebuilts/go/linux-x86/src/crypto/md5/ |
md5block.go | 25 func blockGeneric(dig *digest, p []byte) {
|
/prebuilts/go/linux-x86/src/crypto/rsa/ |
pkcs1v15_test.go | 198 digest := h.Sum(nil) 200 s, err := SignPKCS1v15(nil, rsaPrivateKey, crypto.SHA1, digest) 216 digest := h.Sum(nil) 220 err := VerifyPKCS1v15(&rsaPrivateKey.PublicKey, crypto.SHA1, digest, sig)
|
/prebuilts/go/linux-x86/src/crypto/sha1/ |
sha1block.go | 16 func blockGeneric(dig *digest, p []byte) {
|
/prebuilts/go/linux-x86/src/crypto/sha256/ |
sha256block.go | 80 func block(dig *digest, p []byte) {
|
/prebuilts/go/linux-x86/src/crypto/sha512/ |
sha512block.go | 96 func block(dig *digest, p []byte) {
|
/system/security/keystore/ |
blob.cpp | 109 // encrypted data includes the digest value 119 MD5(mBlob.digested, digestedLength, mBlob.digest); 196 if (memcmp(mBlob.digest, computedDigest, MD5_DIGEST_LENGTH) != 0) {
|
/external/ppp/pppd/ |
md5.c | 6 ** RSA Data Security, Inc. MD5 Message-Digest Algorithm ** 18 ** Digest Algorithm" in all material mentioning or referencing this ** 23 ** Data Security, Inc. MD5 Message-Digest Algorithm" in all ** 41 ** Message-digest routines: ** 42 ** To form the message digest for a message M ** 46 ** The message digest is now in mdContext->digest[0...15] ** 102 /* The routine MD5_Init initializes the message-digest context 118 /* The routine MD5Update updates the message-digest context to 120 in the message whose digest is being computed [all...] |
/external/iputils/ |
ping6.c | 329 static __u8 digest[MD5_DIGEST_LENGTH]; local 338 MD5_Final(digest, &ctxt); 344 memcpy(nonce + sizeof(__u16), digest, NI_NONCE_SIZE - sizeof(__u16)); 347 if (memcmp(nonce + sizeof(__u16), digest, NI_NONCE_SIZE - sizeof(__u16))) 516 __u8 digest[MD5_DIGEST_LENGTH]; local 600 MD5_Final(digest, &ctxt); 603 digest[0], digest[1], digest[2], digest[3] [all...] |
/external/webrtc/webrtc/base/ |
sslstreamadapter_unittest.cc | 329 unsigned char digest[20]; local 333 LOG(LS_INFO) << "Setting peer identities by digest"; 336 digest, 20, 340 LOG(LS_INFO) << "Setting bogus digest for server cert"; 341 digest[0]++; 343 rv = client_ssl_->SetPeerCertificateDigest(rtc::DIGEST_SHA_1, digest, 349 digest, 20, &digest_len); 352 LOG(LS_INFO) << "Setting bogus digest for client cert"; 353 digest[0]++; 355 rv = server_ssl_->SetPeerCertificateDigest(rtc::DIGEST_SHA_1, digest, [all...] |
/bootable/recovery/tests/component/ |
applypatch_test.cpp | 42 uint8_t digest[SHA_DIGEST_LENGTH]; local 46 SHA1((const uint8_t*)data.c_str(), data.size(), digest); 47 return print_sha1(digest);
|