/external/apache-http/src/org/apache/http/client/params/ |
AuthPolicy.java | 54 * Digest authentication scheme as defined in RFC2617. 56 public static final String DIGEST = "Digest";
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
CMSAttributeTableGenerator.java | 13 String DIGEST = "digest";
|
DefaultSignedAttributeTableGenerator.java | 92 CMSAttributeTableGenerator.DIGEST);
|
CMSSignedGenerator.java | 103 param.put(CMSAttributeTableGenerator.DIGEST, Arrays.clone(hash));
|
SignerInfoGenerator.java | 176 * The result of the message digest calculation process depends on 178 * the result is just the message digest of the content as described 181 * digest of the complete DER encoding of the SignedAttrs value 269 param.put(CMSAttributeTableGenerator.DIGEST, Arrays.clone(hash));
|
/external/apache-http/android/src/android/net/http/ |
HttpAuthHeader.java | 30 public final static String DIGEST_TOKEN = "Digest"; 42 * HttpAuthHeader.DIGEST - digest (algorithm=MD5, QOP="auth"). 48 public static final int DIGEST = 2; 81 * implementations compliant with this version of the Digest scheme. 90 * A string indicating a pair of algorithms used to produce the digest 172 * @return True iff this is the DIGEST-authentication request. 175 return mScheme == DIGEST; 182 * HttpAuthHeader.DIGEST - digest (algorithm=MD5, QOP="auth") [all...] |
/external/boringssl/src/crypto/digest_extra/ |
digest_extra.c | 57 #include <openssl/digest.h> 167 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_DECODE_ERROR); 173 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_UNKNOWN_HASH); 186 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_DECODE_ERROR); 198 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE); 207 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE); 216 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_UNKNOWN_HASH); 222 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE);
|
/external/boringssl/src/crypto/fipsmodule/digest/ |
digest.c | 57 #include <openssl/digest.h> 119 if (in == NULL || in->digest == NULL) { 120 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_INPUT_NOT_INITIALIZED); 129 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE); 135 if (out->digest != in->digest) { 136 assert(in->digest->ctx_size != 0); 137 tmp_buf = OPENSSL_malloc(in->digest->ctx_size); 142 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE); 154 out->digest = in->digest [all...] |
/external/nist-sip/java/gov/nist/javax/sip/header/ |
ParameterNames.java | 62 public static final String DIGEST = "Digest";
|
AuthenticationHeader.java | 89 this.scheme = ParameterNames.DIGEST; 163 * AuthenticationHeaderHeader. For example, Digest.
|
/system/security/keystore/ |
key_proto_handler.cpp | 48 case Tag::DIGEST:
|
operation_proto_handler.cpp | 96 case Tag::DIGEST:
|
/frameworks/base/keystore/tests/src/android/security/ |
ParcelableKeyGenParameterSpecTest.java | 51 static final String DIGEST = KeyProperties.DIGEST_SHA256; 69 .setDigests(DIGEST) 95 assertThat(spec.getDigests(), is(new String[] {DIGEST}));
|
/frameworks/av/media/libstagefright/rtsp/ |
ARTSPConnection.h | 72 DIGEST
|
MyTransmitter.h | 277 CHECK(!strncmp(value.c_str(), "Digest", 6)); 278 mAuthType = DIGEST; 303 CHECK_EQ((int)mAuthType, (int)DIGEST); 328 AString digest; local 329 H(tmp, &digest); 331 request->append("Authorization: Digest "); 340 request->append(digest); 833 DIGEST
|
/hardware/interfaces/keymaster/4.0/support/ |
key_param_output.cpp | 59 case Tag::DIGEST: 60 return os << param.f.digest;
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
key_param_output.cpp | 42 ::std::ostream& operator<<(::std::ostream& os, Digest value) { 87 case Tag::DIGEST: 88 return os << param.f.digest;
|
/external/nos/host/generic/nugget/proto/nugget/app/keymaster/ |
keymaster_defs.proto | 45 DIGEST = 0x20005; // (TagType:ENUM_REP | 5) 128 enum Digest {
|
/external/nos/host/android/hals/keymaster/ |
import_wrapped_key.cpp | 37 using ::android::hardware::keymaster::V4_0::Digest; 137 case Tag::DIGEST: 138 kp.f.digest = (Digest)val; 308 * digest [5] EXPLICIT SET OF INTEGER OPTIONAL, 416 {Tag::DIGEST, parse_asn1_set},
|
/hardware/interfaces/keymaster/3.0/ |
types.hal | 45 DIGEST = TagType:ENUM_REP | 5, /** Digest. */ 204 enum Digest : uint32_t { 382 Digest digest;
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
keymaster_tags.h | 122 DECLARE_TYPED_TAG(DIGEST); 213 MAKE_TAG_ENUM_VALUE_ACCESSOR(TAG_DIGEST, f.digest) 410 case Tag::DIGEST: 411 return a.f.digest == b.f.digest;
|
/hardware/interfaces/keymaster/4.0/ |
types.hal | 111 * Tag::DIGEST specifies the digest algorithms that may be used with the key to perform signing 113 * values are defined by the Digest enum. 116 * the caller must specify a digest in the additionalParams argument of begin(). If the digest 117 * is missing or the specified digest is not in the digests associated with the key, the 122 DIGEST = TagType:ENUM_REP | 5, [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
MultipartBuilder.java | 49 * semantics are different. In particular, in a digest, the default {@code 53 public static final MediaType DIGEST = MediaType.parse("multipart/digest"); 97 * default), {@link #ALTERNATIVE}, {@link #DIGEST}, {@link #PARALLEL} and
|
/external/apache-http/src/org/apache/http/impl/client/ |
DefaultHttpClient.java | 257 AuthPolicy.DIGEST,
|
/external/boringssl/src/crypto/cipher_extra/test/ |
make_legacy_aead_tests.go | 112 digest []byte 170 var digest []byte 175 digest = ssl30MAC(hash, macKey, input, adFull) 180 digest = h.Sum(nil) 209 sealed = make([]byte, 0, len(input)+len(digest)+cbc.BlockSize()) 215 sealed = append(sealed, digest...) 269 digest: digest, 284 fmt.Printf("# DIGEST: %s\n", hex.EncodeToString(t.digest)) [all...] |