Searched refs:Digest (Results 76 - 88 of 88) sorted by relevance

1234

/external/smack/src/org/xbill/DNS/
H A DDNSSEC.java1004 case DSRecord.Digest.SHA1:
1007 case DSRecord.Digest.SHA256:
1010 case DSRecord.Digest.SHA384:
/external/chromium_org/third_party/skia/src/utils/
H A DSkMD5.cpp63 void SkMD5::finish(Digest& digest) {
H A DSkSHA1.cpp61 void SkSHA1::finish(Digest& digest) {
/external/skia/src/utils/
H A DSkMD5.cpp63 void SkMD5::finish(Digest& digest) {
H A DSkSHA1.cpp61 void SkSHA1::finish(Digest& digest) {
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
H A DBcKeyStoreSpi.java40 import org.bouncycastle.crypto.Digest;
993 Digest dig = new SHA1Digest();
/external/clang/tools/scan-build/
H A Dscan-build18 use Digest::MD5;
247 DieDiag("Cannot read $FName to compute Digest.\n") if (! -r $FName);
249 # Use Digest::MD5. We don't have to be cryptographically secure. We're
251 # We use Digest::MD5 because it is a standard Perl module that should
253 open(FILE, $FName) or DieDiag("Cannot open $FName when computing Digest.\n");
255 my $Result = Digest::MD5->new->addfile(*FILE)->hexdigest;
/external/chromium_org/content/child/webcrypto/
H A Dwebcrypto_impl.cc394 state->status = webcrypto::Digest(
/external/chromium_org/third_party/WebKit/Tools/Scripts/
H A Dwebkitdirs.pm35 use Digest::MD5 qw(md5_hex);
/external/chromium_org/third_party/lcov/bin/
H A Dgeninfo57 use Digest::MD5 qw(md5_base64);
H A Dgenhtml70 use Digest::MD5 qw(md5_base64);
/external/google-tv-pairing-protocol/java/jar/
H A Dbcprov-jdk15-143.jarMETA-INF/MANIFEST.MF META-INF/BCKEY.SF META-INF/BCKEY.DSA META ...
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.mortbay.jetty.server_6.1.23.v201004211559.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...

Completed in 423 milliseconds

1234