HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 1 - 25 of 1375) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
BCMessageDigest.java 1 package org.bouncycastle.jcajce.provider.digest;
5 import org.bouncycastle.crypto.Digest;
10 protected Digest digest; field in class:BCMessageDigest
13 Digest digest)
15 super(digest.getAlgorithmName());
17 this.digest = digest;
22 digest.reset()
    [all...]
  /external/libchrome/base/metrics/
metrics_hashes.cc 16 inline uint64_t DigestToUInt64(const base::MD5Digest& digest) {
18 DCHECK_GE(sizeof(digest.a), sizeof(value));
19 memcpy(&value, digest.a, sizeof(value));
26 base::MD5Digest digest; local
27 base::MD5Sum(name.data(), name.size(), &digest);
28 return DigestToUInt64(digest);
  /external/curl/lib/vauth/
cram.c 100 unsigned char digest[MD5_DIGEST_LEN]; local
106 /* Compute the digest using the password as the key */
113 /* Update the digest with the given challenge */
118 /* Finalise the digest */
119 Curl_HMAC_final(ctxt, digest);
124 userp, digest[0], digest[1], digest[2], digest[3], digest[4]
    [all...]
  /external/boringssl/src/decrepit/evp/
dss1.c 15 #include <openssl/digest.h>
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/
RawContentVerifier.java 5 * verified using the digest of the calculated data.
10 * Verify that the expected signature value was derived from the passed in digest.
12 * @param digest digest calculated from the content.
14 * @return true if the expected signature is derived from the digest, false otherwise.
16 boolean verify(byte[] digest, byte[] expected);
  /libcore/ojluni/src/main/java/java/security/
DigestInputStream.java 36 * A transparent stream that updates the associated message digest using
39 * <p>To complete the message digest computation, call one of the
40 * {@code digest} methods on the associated message
41 * digest after your calls to one of this digest input stream's
47 * results in an update on the message digest. But when it is off,
48 * the message digest is not updated. The default is for the stream
51 * <p>Note that digest objects can compute only one digest (see
54 * retain a handle onto the digest object, and clone it for eac
74 protected MessageDigest digest; field in class:DigestInputStream
    [all...]
DigestOutputStream.java 36 * A transparent stream that updates the associated message digest using
39 * <p>To complete the message digest computation, call one of the
40 * {@code digest} methods on the associated message
41 * digest after your calls to one of this digest output stream's
47 * an update on the message digest. But when it is off, the message
48 * digest is not updated. The default is for the stream to be on.
60 * The message digest associated with this stream.
62 protected MessageDigest digest; field in class:DigestOutputStream
65 * Creates a digest output stream, using the specified output strea
    [all...]
  /external/syslinux/gpxe/src/crypto/
hmac.c 35 * @v digest Digest algorithm to use
36 * @v digest_ctx Digest context
40 static void hmac_reduce_key ( struct digest_algorithm *digest,
42 uint8_t digest_ctx[digest->ctxsize];
44 digest_init ( digest, digest_ctx );
45 digest_update ( digest, digest_ctx, key, *key_len );
46 digest_final ( digest, digest_ctx, key );
47 *key_len = digest->digestsize;
53 * @v digest Digest algorithm to us
    [all...]
chap.c 39 * @v digest Digest algorithm to use
47 struct digest_algorithm *digest ) {
51 assert ( chap->digest == NULL );
55 DBG ( "CHAP %p initialising with %s digest\n", chap, digest->name );
57 state_len = ( digest->ctxsize + digest->digestsize );
65 chap->digest = digest;
    [all...]
  /external/selinux/libselinux/src/
label_support.c 116 void hidden digest_gen_hash(struct selabel_digest *digest)
121 if (!digest)
125 Sha1Update(&context, digest->hashbuf, digest->hashbuf_size);
126 Sha1Finalise(&context, (SHA1_HASH *)digest->digest);
127 free(digest->hashbuf);
128 digest->hashbuf = NULL;
135 * @digest: pointer to the selabel_digest struct
144 int hidden digest_add_specfile(struct selabel_digest *digest, FILE *fp
    [all...]
  /libcore/benchmarks/src/benchmarks/regression/
MessageDigestBenchmark.java 66 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
68 digest.update(DATA, 0, DATA_SIZE);
69 digest.digest();
75 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
77 digest.update(LARGE_DATA, 0, LARGE_DATA_SIZE);
78 digest.digest();
84 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
86 digest.update(LARGE_DATA, LARGE_DATA_SIZE / 2, DATA_SIZE)
93 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
104 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
115 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
126 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
137 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
148 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/
HMac.java 6 import org.bouncycastle.crypto.Digest;
24 private Digest digest; field in class:HMac
65 Digest digest)
67 if (digest instanceof ExtendedDigest)
69 return ((ExtendedDigest)digest).getByteLength();
72 Integer b = (Integer)blockLengths.get(digest.getAlgorithmName());
76 throw new IllegalArgumentException("unknown digest passed: " + digest.getAlgorithmName())
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/
DigestOutputStream.java 6 import org.bouncycastle.crypto.Digest;
11 protected Digest digest; field in class:DigestOutputStream
14 Digest Digest)
16 this.digest = Digest;
22 digest.update((byte)b);
31 digest.update(b, off, len);
36 byte[] res = new byte[digest.getDigestSize()]
    [all...]
DigestInputStream.java 7 import org.bouncycastle.crypto.Digest;
12 protected Digest digest; field in class:DigestInputStream
16 Digest digest)
19 this.digest = digest;
29 digest.update((byte)b);
43 digest.update(b, off, n);
48 public Digest getDigest(
    [all...]
  /external/syslinux/gpxe/src/include/gpxe/
hmac.h 16 * @v digest Digest algorithm to use
17 * @v digest_ctx Digest context
21 static inline void hmac_update ( struct digest_algorithm *digest,
24 digest_update ( digest, digest_ctx, data, len );
27 extern void hmac_init ( struct digest_algorithm *digest, void *digest_ctx,
29 extern void hmac_final ( struct digest_algorithm *digest, void *digest_ctx,
  /system/nvram/core/
crypto_boringssl.cpp 31 uint8_t* digest,
34 // |digest_size| might be less, so store the digest in a local buffer.
38 // Copy the result to |digest|.
40 memcpy(digest, buffer, digest_size);
42 memcpy(digest, buffer, sizeof(buffer));
43 memset(digest + sizeof(buffer), 0, digest_size - sizeof(buffer));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
PKCS5S1ParametersGenerator.java 4 import org.bouncycastle.crypto.Digest;
12 * digest used to drive it.
21 private Digest digest; field in class:PKCS5S1ParametersGenerator
26 * @param digest the digest to be used as the source of derived keys.
29 Digest digest)
31 this.digest = digest;
    [all...]
  /external/webrtc/webrtc/base/
messagedigest.cc 40 MessageDigest* digest = new OpenSSLDigest(alg); local
41 if (digest->Size() == 0) { // invalid algorithm
42 delete digest;
43 digest = NULL;
45 return digest;
47 MessageDigest* digest = NULL;
49 digest = new Md5Digest();
51 digest = new Sha1Digest();
53 return digest;
70 size_t ComputeDigest(MessageDigest* digest, const void* input, size_t in_len
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
RSA.java 208 String digest,
212 String mainName = digest + "WITHRSA";
213 String jdk11Variation1 = digest + "withRSA";
214 String jdk11Variation2 = digest + "WithRSA";
215 String alias = digest + "/" + "RSA";
216 String longName = digest + "WITHRSAENCRYPTION";
217 String longJdk11Variation1 = digest + "withRSAEncryption";
218 String longJdk11Variation2 = digest + "WithRSAEncryption";
237 String digest,
240 provider.addAlgorithm("Alg.Alias.Signature." + digest + "withRSA/ISO9796-2", digest + "WITHRSA/ISO9796-2")
    [all...]
  /external/vboot_reference/tests/
vb2_sha_tests.c 6 /* FIPS 180-2 Tests for message digest functions. */
19 uint8_t *digest,
33 return vb2_digest_finalize(&dc, digest, digest_size);
38 uint8_t digest[VB2_SHA1_DIGEST_SIZE]; local
49 VB2_HASH_SHA1, digest, sizeof(digest)),
51 TEST_EQ(memcmp(digest, sha1_results[i], sizeof(digest)),
52 0, "SHA1 digest");
56 VB2_HASH_SHA1, digest, sizeof(digest) - 1)
62 uint8_t digest[VB2_SHA256_DIGEST_SIZE]; local
86 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local
111 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local
    [all...]
  /external/libchrome/crypto/
hmac.cc 39 const base::StringPiece& digest) const {
40 if (digest.size() != DigestLength())
42 return VerifyTruncated(data, digest);
46 const base::StringPiece& digest) const {
47 if (digest.empty())
55 return SecureMemEqual(digest.data(), computed_digest.get(),
56 std::min(digest.size(), digest_length));
  /frameworks/base/core/java/android/security/net/config/
Pin.java 24 public final byte[] digest; field in class:Pin
28 public Pin(String digestAlgorithm, byte[] digest) {
30 this.digest = digest;
31 mHashCode = Arrays.hashCode(digest) ^ digestAlgorithm.hashCode();
50 throw new IllegalArgumentException("Unsupported digest algorithm: " + algorithm);
70 if (!Arrays.equals(digest, other.digest)) {
  /external/libchrome/base/
md5.h 16 // MD5 stands for Message Digest algorithm 5.
34 // MD5Digest digest; // the result of the computation
35 // MD5Final(&digest, &ctx);
37 // You can call MD5DigestToBase16() to generate a string of the digest.
57 // Finalizes the MD5 operation and fills the buffer with the digest.
58 BASE_EXPORT void MD5Final(MD5Digest* digest, MD5Context* context);
60 // MD5IntermediateFinal() generates a digest without finalizing the MD5
62 // without affecting the digest generated for the entire input.
63 BASE_EXPORT void MD5IntermediateFinal(MD5Digest* digest,
66 // Converts a digest into human-readable hexadecimal
    [all...]
  /system/keymaster/
hmac.h 29 // DigestLength returns the length, in bytes, of the resulting digest.
38 // method. At most |digest_len| bytes of the resulting digest are written
39 // to |digest|.
40 bool Sign(const Buffer& data, uint8_t* digest, size_t digest_len) const;
41 bool Sign(const uint8_t* data, size_t data_len, uint8_t* digest, size_t digest_len) const;
43 // Verify returns true if |digest| is a valid HMAC of |data| using the key
44 // supplied to Init. |digest| must be exactly |DigestLength()| bytes long.
49 bool Verify(const Buffer& data, const Buffer& digest) const;
50 bool Verify(const uint8_t* data, size_t data_len, const uint8_t* digest,
  /external/ppp/pppd/
chap-new.h 45 * CHAP digest codes.
66 /* Return the digest alg. ID for the most preferred digest type. */
73 /* Return the bit flag (lsb set) for our most preferred digest type. */
76 /* Return the bit flag for a given digest algorithm ID. */
77 #define CHAP_MDTYPE_D(digest) \
78 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \
79 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \
80 ((digest) == CHAP_MD5)? MDTYPE_MD5: \
83 /* Can we do the requested digest? *
    [all...]

Completed in 1230 milliseconds

1 2 3 4 5 6 7 8 91011>>