HomeSort by relevance Sort by last modified time
    Searched refs:digest (Results 1 - 25 of 1643) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
BCMessageDigest.java 1 package org.bouncycastle.jcajce.provider.digest;
5 import org.bouncycastle.crypto.Digest;
10 protected Digest digest; field in class:BCMessageDigest
13 Digest digest)
15 super(digest.getAlgorithmName());
17 this.digest = digest;
22 digest.reset()
    [all...]
  /external/libchrome/base/metrics/
metrics_hashes.cc 16 inline uint64_t DigestToUInt64(const base::MD5Digest& digest) {
18 DCHECK_GE(sizeof(digest.a), sizeof(value));
19 memcpy(&value, digest.a, sizeof(value));
26 base::MD5Digest digest; local
27 base::MD5Sum(name.data(), name.size(), &digest);
28 return DigestToUInt64(digest);
  /external/curl/lib/vauth/
cram.c 100 unsigned char digest[MD5_DIGEST_LEN]; local
106 /* Compute the digest using the password as the key */
113 /* Update the digest with the given challenge */
118 /* Finalise the digest */
119 Curl_HMAC_final(ctxt, digest);
124 userp, digest[0], digest[1], digest[2], digest[3], digest[4]
    [all...]
digest.c 21 * RFC2831 DIGEST-MD5 authentication
22 * RFC7616 DIGEST-SHA256, DIGEST-SHA512-256 authentication
33 #include "vauth/digest.h"
61 It converts digest text to ASCII so the MD5 will be correct for
250 * This is used internally to decode an already encoded DIGEST-MD5 challenge
323 * This is used to evaluate if DIGEST is supported.
327 * Returns TRUE as DIGEST as handled by libcurl.
337 * This is used to generate an already encoded DIGEST-MD5 response message
364 unsigned char digest[MD5_DIGEST_LEN] local
    [all...]
  /external/boringssl/src/decrepit/evp/
dss1.c 15 #include <openssl/digest.h>
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/
RawContentVerifier.java 5 * verified using the digest of the calculated data.
10 * Verify that the expected signature value was derived from the passed in digest.
12 * @param digest digest calculated from the content.
14 * @return true if the expected signature is derived from the digest, false otherwise.
16 boolean verify(byte[] digest, byte[] expected);
  /libcore/ojluni/src/main/java/java/security/
DigestInputStream.java 36 * A transparent stream that updates the associated message digest using
39 * <p>To complete the message digest computation, call one of the
40 * {@code digest} methods on the associated message
41 * digest after your calls to one of this digest input stream's
47 * results in an update on the message digest. But when it is off,
48 * the message digest is not updated. The default is for the stream
51 * <p>Note that digest objects can compute only one digest (see
54 * retain a handle onto the digest object, and clone it for eac
74 protected MessageDigest digest; field in class:DigestInputStream
    [all...]
DigestOutputStream.java 36 * A transparent stream that updates the associated message digest using
39 * <p>To complete the message digest computation, call one of the
40 * {@code digest} methods on the associated message
41 * digest after your calls to one of this digest output stream's
47 * an update on the message digest. But when it is off, the message
48 * digest is not updated. The default is for the stream to be on.
60 * The message digest associated with this stream.
62 protected MessageDigest digest; field in class:DigestOutputStream
65 * Creates a digest output stream, using the specified output strea
    [all...]
  /external/syslinux/gpxe/src/crypto/
hmac.c 35 * @v digest Digest algorithm to use
36 * @v digest_ctx Digest context
40 static void hmac_reduce_key ( struct digest_algorithm *digest,
42 uint8_t digest_ctx[digest->ctxsize];
44 digest_init ( digest, digest_ctx );
45 digest_update ( digest, digest_ctx, key, *key_len );
46 digest_final ( digest, digest_ctx, key );
47 *key_len = digest->digestsize;
53 * @v digest Digest algorithm to us
    [all...]
chap.c 39 * @v digest Digest algorithm to use
47 struct digest_algorithm *digest ) {
51 assert ( chap->digest == NULL );
55 DBG ( "CHAP %p initialising with %s digest\n", chap, digest->name );
57 state_len = ( digest->ctxsize + digest->digestsize );
65 chap->digest = digest;
    [all...]
  /external/selinux/libselinux/src/
label_support.c 116 void hidden digest_gen_hash(struct selabel_digest *digest)
121 if (!digest)
125 Sha1Update(&context, digest->hashbuf, digest->hashbuf_size);
126 Sha1Finalise(&context, (SHA1_HASH *)digest->digest);
127 free(digest->hashbuf);
128 digest->hashbuf = NULL;
135 * @digest: pointer to the selabel_digest struct
144 int hidden digest_add_specfile(struct selabel_digest *digest, FILE *fp
    [all...]
  /libcore/benchmarks/src/benchmarks/regression/
MessageDigestBenchmark.java 66 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
68 digest.update(DATA, 0, DATA_SIZE);
69 digest.digest();
75 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
77 digest.update(LARGE_DATA, 0, LARGE_DATA_SIZE);
78 digest.digest();
84 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
86 digest.update(LARGE_DATA, LARGE_DATA_SIZE / 2, DATA_SIZE)
93 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
104 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
115 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
126 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
137 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
148 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/
HMac.java 6 import org.bouncycastle.crypto.Digest;
24 private Digest digest; field in class:HMac
65 Digest digest)
67 if (digest instanceof ExtendedDigest)
69 return ((ExtendedDigest)digest).getByteLength();
72 Integer b = (Integer)blockLengths.get(digest.getAlgorithmName());
76 throw new IllegalArgumentException("unknown digest passed: " + digest.getAlgorithmName())
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/
DigestOutputStream.java 6 import org.bouncycastle.crypto.Digest;
11 protected Digest digest; field in class:DigestOutputStream
14 Digest Digest)
16 this.digest = Digest;
22 digest.update((byte)b);
31 digest.update(b, off, len);
36 byte[] res = new byte[digest.getDigestSize()]
    [all...]
DigestInputStream.java 7 import org.bouncycastle.crypto.Digest;
12 protected Digest digest; field in class:DigestInputStream
16 Digest digest)
19 this.digest = digest;
29 digest.update((byte)b);
43 digest.update(b, off, n);
48 public Digest getDigest(
    [all...]
  /external/syslinux/gpxe/src/include/gpxe/
hmac.h 16 * @v digest Digest algorithm to use
17 * @v digest_ctx Digest context
21 static inline void hmac_update ( struct digest_algorithm *digest,
24 digest_update ( digest, digest_ctx, data, len );
27 extern void hmac_init ( struct digest_algorithm *digest, void *digest_ctx,
29 extern void hmac_final ( struct digest_algorithm *digest, void *digest_ctx,
  /system/nvram/core/
crypto_boringssl.cpp 31 uint8_t* digest,
34 // |digest_size| might be less, so store the digest in a local buffer.
38 // Copy the result to |digest|.
40 memcpy(digest, buffer, digest_size);
42 memcpy(digest, buffer, sizeof(buffer));
43 memset(digest + sizeof(buffer), 0, digest_size - sizeof(buffer));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
PKCS5S1ParametersGenerator.java 4 import org.bouncycastle.crypto.Digest;
12 * digest used to drive it.
21 private Digest digest; field in class:PKCS5S1ParametersGenerator
26 * @param digest the digest to be used as the source of derived keys.
29 Digest digest)
31 this.digest = digest;
    [all...]
  /external/webrtc/webrtc/base/
messagedigest.cc 40 MessageDigest* digest = new OpenSSLDigest(alg); local
41 if (digest->Size() == 0) { // invalid algorithm
42 delete digest;
43 digest = NULL;
45 return digest;
47 MessageDigest* digest = NULL;
49 digest = new Md5Digest();
51 digest = new Sha1Digest();
53 return digest;
70 size_t ComputeDigest(MessageDigest* digest, const void* input, size_t in_len
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/
RSA.java 246 String digest,
250 String mainName = digest + "WITHRSA";
251 String jdk11Variation1 = digest + "withRSA";
252 String jdk11Variation2 = digest + "WithRSA";
253 String alias = digest + "/" + "RSA";
254 String longName = digest + "WITHRSAENCRYPTION";
255 String longJdk11Variation1 = digest + "withRSAEncryption";
256 String longJdk11Variation2 = digest + "WithRSAEncryption";
275 String digest,
278 provider.addAlgorithm("Alg.Alias.Signature." + digest + "withRSA/ISO9796-2", digest + "WITHRSA/ISO9796-2")
    [all...]
  /external/vboot_reference/tests/
vb2_sha_tests.c 6 /* FIPS 180-2 Tests for message digest functions. */
19 uint8_t *digest,
33 return vb2_digest_finalize(&dc, digest, digest_size);
38 uint8_t digest[VB2_SHA1_DIGEST_SIZE]; local
49 VB2_HASH_SHA1, digest, sizeof(digest)),
51 TEST_EQ(memcmp(digest, sha1_results[i], sizeof(digest)),
52 0, "SHA1 digest");
56 VB2_HASH_SHA1, digest, sizeof(digest) - 1)
62 uint8_t digest[VB2_SHA256_DIGEST_SIZE]; local
86 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local
111 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local
    [all...]
  /frameworks/base/core/java/android/security/net/config/
Pin.java 24 public final byte[] digest; field in class:Pin
28 public Pin(String digestAlgorithm, byte[] digest) {
30 this.digest = digest;
31 mHashCode = Arrays.hashCode(digest) ^ digestAlgorithm.hashCode();
50 throw new IllegalArgumentException("Unsupported digest algorithm: " + algorithm);
70 if (!Arrays.equals(digest, other.digest)) {
  /external/python/cpython3/Modules/
sha512module.c 41 /* The SHA block size and message digest sizes, in bytes */
50 SHA_INT64 digest[8]; /* Message digest */ member in struct:__anon33495
91 memcpy(dest->digest, src->digest, sizeof(src->digest));
149 S[i] = sha_info->digest[i];
244 sha_info->digest[i] = sha_info->digest[i] + S[i];
251 /* initialize the SHA digest */
503 unsigned char digest[SHA_DIGESTSIZE]; local
521 unsigned char digest[SHA_DIGESTSIZE]; local
    [all...]
  /external/libchrome/base/
md5.h 16 // MD5 stands for Message Digest algorithm 5.
34 // MD5Digest digest; // the result of the computation
35 // MD5Final(&digest, &ctx);
37 // You can call MD5DigestToBase16() to generate a string of the digest.
57 // Finalizes the MD5 operation and fills the buffer with the digest.
58 BASE_EXPORT void MD5Final(MD5Digest* digest, MD5Context* context);
60 // MD5IntermediateFinal() generates a digest without finalizing the MD5
62 // without affecting the digest generated for the entire input.
63 BASE_EXPORT void MD5IntermediateFinal(MD5Digest* digest,
66 // Converts a digest into human-readable hexadecimal
    [all...]
  /external/ppp/pppd/
chap-new.h 45 * CHAP digest codes.
66 /* Return the digest alg. ID for the most preferred digest type. */
73 /* Return the bit flag (lsb set) for our most preferred digest type. */
76 /* Return the bit flag for a given digest algorithm ID. */
77 #define CHAP_MDTYPE_D(digest) \
78 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \
79 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \
80 ((digest) == CHAP_MD5)? MDTYPE_MD5: \
83 /* Can we do the requested digest? *
    [all...]

Completed in 391 milliseconds

1 2 3 4 5 6 7 8 91011>>