HomeSort by relevance Sort by last modified time
    Searched refs:DIGEST (Results 1 - 25 of 82) sorted by null

1 2 3 4

  /external/apache-http/src/org/apache/http/client/params/
AuthPolicy.java 54 * Digest authentication scheme as defined in RFC2617.
56 public static final String DIGEST = "Digest";
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
CMSAttributeTableGenerator.java 13 String DIGEST = "digest";
DefaultSignedAttributeTableGenerator.java 92 CMSAttributeTableGenerator.DIGEST);
CMSSignedGenerator.java 103 param.put(CMSAttributeTableGenerator.DIGEST, Arrays.clone(hash));
SignerInfoGenerator.java 176 * The result of the message digest calculation process depends on
178 * the result is just the message digest of the content as described
181 * digest of the complete DER encoding of the SignedAttrs value
269 param.put(CMSAttributeTableGenerator.DIGEST, Arrays.clone(hash));
  /external/apache-http/android/src/android/net/http/
HttpAuthHeader.java 30 public final static String DIGEST_TOKEN = "Digest";
42 * HttpAuthHeader.DIGEST - digest (algorithm=MD5, QOP="auth").
48 public static final int DIGEST = 2;
81 * implementations compliant with this version of the Digest scheme.
90 * A string indicating a pair of algorithms used to produce the digest
172 * @return True iff this is the DIGEST-authentication request.
175 return mScheme == DIGEST;
182 * HttpAuthHeader.DIGEST - digest (algorithm=MD5, QOP="auth")
    [all...]
  /external/boringssl/src/crypto/digest_extra/
digest_extra.c 57 #include <openssl/digest.h>
167 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_DECODE_ERROR);
173 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_UNKNOWN_HASH);
186 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_DECODE_ERROR);
198 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE);
207 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE);
216 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_UNKNOWN_HASH);
222 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE);
  /external/boringssl/src/crypto/fipsmodule/digest/
digest.c 57 #include <openssl/digest.h>
119 if (in == NULL || in->digest == NULL) {
120 OPENSSL_PUT_ERROR(DIGEST, DIGEST_R_INPUT_NOT_INITIALIZED);
129 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE);
135 if (out->digest != in->digest) {
136 assert(in->digest->ctx_size != 0);
137 tmp_buf = OPENSSL_malloc(in->digest->ctx_size);
142 OPENSSL_PUT_ERROR(DIGEST, ERR_R_MALLOC_FAILURE);
154 out->digest = in->digest
    [all...]
  /external/nist-sip/java/gov/nist/javax/sip/header/
ParameterNames.java 62 public static final String DIGEST = "Digest";
AuthenticationHeader.java 89 this.scheme = ParameterNames.DIGEST;
163 * AuthenticationHeaderHeader. For example, Digest.
  /system/security/keystore/
key_proto_handler.cpp 48 case Tag::DIGEST:
operation_proto_handler.cpp 96 case Tag::DIGEST:
  /frameworks/base/keystore/tests/src/android/security/
ParcelableKeyGenParameterSpecTest.java 51 static final String DIGEST = KeyProperties.DIGEST_SHA256;
69 .setDigests(DIGEST)
95 assertThat(spec.getDigests(), is(new String[] {DIGEST}));
  /frameworks/av/media/libstagefright/rtsp/
ARTSPConnection.h 72 DIGEST
MyTransmitter.h 277 CHECK(!strncmp(value.c_str(), "Digest", 6));
278 mAuthType = DIGEST;
303 CHECK_EQ((int)mAuthType, (int)DIGEST);
328 AString digest; local
329 H(tmp, &digest);
331 request->append("Authorization: Digest ");
340 request->append(digest);
833 DIGEST
  /hardware/interfaces/keymaster/4.0/support/
key_param_output.cpp 59 case Tag::DIGEST:
60 return os << param.f.digest;
  /hardware/interfaces/keymaster/3.0/vts/functional/
key_param_output.cpp 42 ::std::ostream& operator<<(::std::ostream& os, Digest value) {
87 case Tag::DIGEST:
88 return os << param.f.digest;
  /external/nos/host/generic/nugget/proto/nugget/app/keymaster/
keymaster_defs.proto 45 DIGEST = 0x20005; // (TagType:ENUM_REP | 5)
128 enum Digest {
  /external/nos/host/android/hals/keymaster/
import_wrapped_key.cpp 37 using ::android::hardware::keymaster::V4_0::Digest;
137 case Tag::DIGEST:
138 kp.f.digest = (Digest)val;
308 * digest [5] EXPLICIT SET OF INTEGER OPTIONAL,
416 {Tag::DIGEST, parse_asn1_set},
  /hardware/interfaces/keymaster/3.0/
types.hal 45 DIGEST = TagType:ENUM_REP | 5, /** Digest. */
204 enum Digest : uint32_t {
382 Digest digest;
  /hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/
keymaster_tags.h 122 DECLARE_TYPED_TAG(DIGEST);
213 MAKE_TAG_ENUM_VALUE_ACCESSOR(TAG_DIGEST, f.digest)
410 case Tag::DIGEST:
411 return a.f.digest == b.f.digest;
  /hardware/interfaces/keymaster/4.0/
types.hal 111 * Tag::DIGEST specifies the digest algorithms that may be used with the key to perform signing
113 * values are defined by the Digest enum.
116 * the caller must specify a digest in the additionalParams argument of begin(). If the digest
117 * is missing or the specified digest is not in the digests associated with the key, the
122 DIGEST = TagType:ENUM_REP | 5,
    [all...]
  /external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
MultipartBuilder.java 49 * semantics are different. In particular, in a digest, the default {@code
53 public static final MediaType DIGEST = MediaType.parse("multipart/digest");
97 * default), {@link #ALTERNATIVE}, {@link #DIGEST}, {@link #PARALLEL} and
  /external/apache-http/src/org/apache/http/impl/client/
DefaultHttpClient.java 257 AuthPolicy.DIGEST,
  /external/boringssl/src/crypto/cipher_extra/test/
make_legacy_aead_tests.go 112 digest []byte
170 var digest []byte
175 digest = ssl30MAC(hash, macKey, input, adFull)
180 digest = h.Sum(nil)
209 sealed = make([]byte, 0, len(input)+len(digest)+cbc.BlockSize())
215 sealed = append(sealed, digest...)
269 digest: digest,
284 fmt.Printf("# DIGEST: %s\n", hex.EncodeToString(t.digest))
    [all...]

Completed in 515 milliseconds

1 2 3 4