/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
BCMessageDigest.java | 1 package org.bouncycastle.jcajce.provider.digest; 5 import org.bouncycastle.crypto.Digest; 10 protected Digest digest; field in class:BCMessageDigest 13 Digest digest) 15 super(digest.getAlgorithmName()); 17 this.digest = digest; 22 digest.reset() [all...] |
/external/libchrome/base/metrics/ |
metrics_hashes.cc | 16 inline uint64_t DigestToUInt64(const base::MD5Digest& digest) { 18 DCHECK_GE(sizeof(digest.a), sizeof(value)); 19 memcpy(&value, digest.a, sizeof(value)); 26 base::MD5Digest digest; local 27 base::MD5Sum(name.data(), name.size(), &digest); 28 return DigestToUInt64(digest);
|
/external/curl/lib/vauth/ |
cram.c | 100 unsigned char digest[MD5_DIGEST_LEN]; local 106 /* Compute the digest using the password as the key */ 113 /* Update the digest with the given challenge */ 118 /* Finalise the digest */ 119 Curl_HMAC_final(ctxt, digest); 124 userp, digest[0], digest[1], digest[2], digest[3], digest[4] [all...] |
digest.c | 21 * RFC2831 DIGEST-MD5 authentication 22 * RFC7616 DIGEST-SHA256, DIGEST-SHA512-256 authentication 33 #include "vauth/digest.h" 61 It converts digest text to ASCII so the MD5 will be correct for 250 * This is used internally to decode an already encoded DIGEST-MD5 challenge 323 * This is used to evaluate if DIGEST is supported. 327 * Returns TRUE as DIGEST as handled by libcurl. 337 * This is used to generate an already encoded DIGEST-MD5 response message 364 unsigned char digest[MD5_DIGEST_LEN] local [all...] |
/external/boringssl/src/decrepit/evp/ |
dss1.c | 15 #include <openssl/digest.h>
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/ |
RawContentVerifier.java | 5 * verified using the digest of the calculated data. 10 * Verify that the expected signature value was derived from the passed in digest. 12 * @param digest digest calculated from the content. 14 * @return true if the expected signature is derived from the digest, false otherwise. 16 boolean verify(byte[] digest, byte[] expected);
|
/libcore/ojluni/src/main/java/java/security/ |
DigestInputStream.java | 36 * A transparent stream that updates the associated message digest using 39 * <p>To complete the message digest computation, call one of the 40 * {@code digest} methods on the associated message 41 * digest after your calls to one of this digest input stream's 47 * results in an update on the message digest. But when it is off, 48 * the message digest is not updated. The default is for the stream 51 * <p>Note that digest objects can compute only one digest (see 54 * retain a handle onto the digest object, and clone it for eac 74 protected MessageDigest digest; field in class:DigestInputStream [all...] |
DigestOutputStream.java | 36 * A transparent stream that updates the associated message digest using 39 * <p>To complete the message digest computation, call one of the 40 * {@code digest} methods on the associated message 41 * digest after your calls to one of this digest output stream's 47 * an update on the message digest. But when it is off, the message 48 * digest is not updated. The default is for the stream to be on. 60 * The message digest associated with this stream. 62 protected MessageDigest digest; field in class:DigestOutputStream 65 * Creates a digest output stream, using the specified output strea [all...] |
/external/syslinux/gpxe/src/crypto/ |
hmac.c | 35 * @v digest Digest algorithm to use 36 * @v digest_ctx Digest context 40 static void hmac_reduce_key ( struct digest_algorithm *digest, 42 uint8_t digest_ctx[digest->ctxsize]; 44 digest_init ( digest, digest_ctx ); 45 digest_update ( digest, digest_ctx, key, *key_len ); 46 digest_final ( digest, digest_ctx, key ); 47 *key_len = digest->digestsize; 53 * @v digest Digest algorithm to us [all...] |
chap.c | 39 * @v digest Digest algorithm to use 47 struct digest_algorithm *digest ) { 51 assert ( chap->digest == NULL ); 55 DBG ( "CHAP %p initialising with %s digest\n", chap, digest->name ); 57 state_len = ( digest->ctxsize + digest->digestsize ); 65 chap->digest = digest; [all...] |
/external/selinux/libselinux/src/ |
label_support.c | 116 void hidden digest_gen_hash(struct selabel_digest *digest) 121 if (!digest) 125 Sha1Update(&context, digest->hashbuf, digest->hashbuf_size); 126 Sha1Finalise(&context, (SHA1_HASH *)digest->digest); 127 free(digest->hashbuf); 128 digest->hashbuf = NULL; 135 * @digest: pointer to the selabel_digest struct 144 int hidden digest_add_specfile(struct selabel_digest *digest, FILE *fp [all...] |
/libcore/benchmarks/src/benchmarks/regression/ |
MessageDigestBenchmark.java | 66 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local 68 digest.update(DATA, 0, DATA_SIZE); 69 digest.digest(); 75 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local 77 digest.update(LARGE_DATA, 0, LARGE_DATA_SIZE); 78 digest.digest(); 84 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local 86 digest.update(LARGE_DATA, LARGE_DATA_SIZE / 2, DATA_SIZE) 93 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local 104 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local 115 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local 126 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local 137 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local 148 MessageDigest digest = MessageDigest.getInstance(algorithm.toString(), local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
HMac.java | 6 import org.bouncycastle.crypto.Digest; 24 private Digest digest; field in class:HMac 65 Digest digest) 67 if (digest instanceof ExtendedDigest) 69 return ((ExtendedDigest)digest).getByteLength(); 72 Integer b = (Integer)blockLengths.get(digest.getAlgorithmName()); 76 throw new IllegalArgumentException("unknown digest passed: " + digest.getAlgorithmName()) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
DigestOutputStream.java | 6 import org.bouncycastle.crypto.Digest; 11 protected Digest digest; field in class:DigestOutputStream 14 Digest Digest) 16 this.digest = Digest; 22 digest.update((byte)b); 31 digest.update(b, off, len); 36 byte[] res = new byte[digest.getDigestSize()] [all...] |
DigestInputStream.java | 7 import org.bouncycastle.crypto.Digest; 12 protected Digest digest; field in class:DigestInputStream 16 Digest digest) 19 this.digest = digest; 29 digest.update((byte)b); 43 digest.update(b, off, n); 48 public Digest getDigest( [all...] |
/external/syslinux/gpxe/src/include/gpxe/ |
hmac.h | 16 * @v digest Digest algorithm to use 17 * @v digest_ctx Digest context 21 static inline void hmac_update ( struct digest_algorithm *digest, 24 digest_update ( digest, digest_ctx, data, len ); 27 extern void hmac_init ( struct digest_algorithm *digest, void *digest_ctx, 29 extern void hmac_final ( struct digest_algorithm *digest, void *digest_ctx,
|
/system/nvram/core/ |
crypto_boringssl.cpp | 31 uint8_t* digest, 34 // |digest_size| might be less, so store the digest in a local buffer. 38 // Copy the result to |digest|. 40 memcpy(digest, buffer, digest_size); 42 memcpy(digest, buffer, sizeof(buffer)); 43 memset(digest + sizeof(buffer), 0, digest_size - sizeof(buffer));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS5S1ParametersGenerator.java | 4 import org.bouncycastle.crypto.Digest; 12 * digest used to drive it. 21 private Digest digest; field in class:PKCS5S1ParametersGenerator 26 * @param digest the digest to be used as the source of derived keys. 29 Digest digest) 31 this.digest = digest; [all...] |
/external/webrtc/webrtc/base/ |
messagedigest.cc | 40 MessageDigest* digest = new OpenSSLDigest(alg); local 41 if (digest->Size() == 0) { // invalid algorithm 42 delete digest; 43 digest = NULL; 45 return digest; 47 MessageDigest* digest = NULL; 49 digest = new Md5Digest(); 51 digest = new Sha1Digest(); 53 return digest; 70 size_t ComputeDigest(MessageDigest* digest, const void* input, size_t in_len [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
RSA.java | 246 String digest, 250 String mainName = digest + "WITHRSA"; 251 String jdk11Variation1 = digest + "withRSA"; 252 String jdk11Variation2 = digest + "WithRSA"; 253 String alias = digest + "/" + "RSA"; 254 String longName = digest + "WITHRSAENCRYPTION"; 255 String longJdk11Variation1 = digest + "withRSAEncryption"; 256 String longJdk11Variation2 = digest + "WithRSAEncryption"; 275 String digest, 278 provider.addAlgorithm("Alg.Alias.Signature." + digest + "withRSA/ISO9796-2", digest + "WITHRSA/ISO9796-2") [all...] |
/external/vboot_reference/tests/ |
vb2_sha_tests.c | 6 /* FIPS 180-2 Tests for message digest functions. */ 19 uint8_t *digest, 33 return vb2_digest_finalize(&dc, digest, digest_size); 38 uint8_t digest[VB2_SHA1_DIGEST_SIZE]; local 49 VB2_HASH_SHA1, digest, sizeof(digest)), 51 TEST_EQ(memcmp(digest, sha1_results[i], sizeof(digest)), 52 0, "SHA1 digest"); 56 VB2_HASH_SHA1, digest, sizeof(digest) - 1) 62 uint8_t digest[VB2_SHA256_DIGEST_SIZE]; local 86 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local 111 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local [all...] |
/frameworks/base/core/java/android/security/net/config/ |
Pin.java | 24 public final byte[] digest; field in class:Pin 28 public Pin(String digestAlgorithm, byte[] digest) { 30 this.digest = digest; 31 mHashCode = Arrays.hashCode(digest) ^ digestAlgorithm.hashCode(); 50 throw new IllegalArgumentException("Unsupported digest algorithm: " + algorithm); 70 if (!Arrays.equals(digest, other.digest)) {
|
/external/python/cpython3/Modules/ |
sha512module.c | 41 /* The SHA block size and message digest sizes, in bytes */ 50 SHA_INT64 digest[8]; /* Message digest */ member in struct:__anon33495 91 memcpy(dest->digest, src->digest, sizeof(src->digest)); 149 S[i] = sha_info->digest[i]; 244 sha_info->digest[i] = sha_info->digest[i] + S[i]; 251 /* initialize the SHA digest */ 503 unsigned char digest[SHA_DIGESTSIZE]; local 521 unsigned char digest[SHA_DIGESTSIZE]; local [all...] |
/external/libchrome/base/ |
md5.h | 16 // MD5 stands for Message Digest algorithm 5. 34 // MD5Digest digest; // the result of the computation 35 // MD5Final(&digest, &ctx); 37 // You can call MD5DigestToBase16() to generate a string of the digest. 57 // Finalizes the MD5 operation and fills the buffer with the digest. 58 BASE_EXPORT void MD5Final(MD5Digest* digest, MD5Context* context); 60 // MD5IntermediateFinal() generates a digest without finalizing the MD5 62 // without affecting the digest generated for the entire input. 63 BASE_EXPORT void MD5IntermediateFinal(MD5Digest* digest, 66 // Converts a digest into human-readable hexadecimal [all...] |
/external/ppp/pppd/ |
chap-new.h | 45 * CHAP digest codes. 66 /* Return the digest alg. ID for the most preferred digest type. */ 73 /* Return the bit flag (lsb set) for our most preferred digest type. */ 76 /* Return the bit flag for a given digest algorithm ID. */ 77 #define CHAP_MDTYPE_D(digest) \ 78 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 79 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 80 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 83 /* Can we do the requested digest? * [all...] |