Searched defs:digest (Results 151 - 175 of 284) sorted by relevance

1234567891011>>

/external/chromium_org/third_party/boringssl/src/crypto/ecdsa/
H A Decdsa.c63 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, argument
66 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey);
69 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL,
73 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, argument
79 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey);
86 ret = ECDSA_do_verify(digest, digest_len, s, eckey);
95 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian
98 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, argument
103 /* Need to truncate digest if it is too long: first truncate whole
108 if (!BN_bin2bn(digest, digest_le
123 ECDSA_do_sign(const uint8_t *digest, size_t digest_len, EC_KEY *key) argument
128 ECDSA_do_verify(const uint8_t *digest, size_t digest_len, const ECDSA_SIG *sig, EC_KEY *eckey) argument
226 ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument
358 ECDSA_do_sign_ex(const uint8_t *digest, size_t digest_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey) argument
462 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument
[all...]
/external/chromium_org/third_party/boringssl/src/crypto/md5/
H A Dmd5.c65 static uint8_t digest[MD5_DIGEST_LENGTH]; local
69 out = digest;
119 #include "../digest/md32_common.h"
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Drawtransportchannel.h162 const uint8* digest,
160 SetRemoteFingerprint( const std::string& digest_alg, const uint8* digest, size_t digest_len) argument
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/
H A Dsecuretunnelsessionclient.cc382 unsigned char digest[rtc::MessageDigest::kMaxSize]; local
384 peer_cert->ComputeDigest(algorithm, digest, ARRAY_SIZE(digest), &digest_len);
385 ssl_stream->SetPeerCertificateDigest(algorithm, digest, digest_len);
/external/chromium_org/third_party/webrtc/base/
H A Dopensslidentity.cc222 unsigned char* digest,
225 return ComputeDigest(x509_, algorithm, digest, size, length);
230 unsigned char* digest,
242 X509_digest(x509, md, digest, &n);
221 ComputeDigest(const std::string& algorithm, unsigned char* digest, size_t size, size_t* length) const argument
228 ComputeDigest(const X509* x509, const std::string& algorithm, unsigned char* digest, size_t size, size_t* length) argument
H A Dssladapter_unittest.cc195 // Set a bogus peer certificate digest.
196 unsigned char digest[20]; local
197 size_t digest_len = sizeof(digest);
198 ssl_stream_adapter_->SetPeerCertificateDigest(rtc::DIGEST_SHA_1, digest,
/external/fio/crc/
H A Dtest.c55 uint32_t digest[4]; local
56 struct fio_md5_ctx ctx = { .hash = digest };
/external/iputils/ninfod/
H A Dninfod_name.c265 unsigned char digest[16]; local
272 MD5_Final(digest, &ctxt);
284 memcpy(&nigroup->s6_addr[12], digest, 4);
/external/openssl/apps/
H A Dcrl.c125 const EVP_MD *md_alg,*digest=EVP_sha1(); local
225 digest=md_alg;
348 if (!X509_CRL_digest(x,digest,md,&n))
354 OBJ_nid2sn(EVP_MD_type(digest)));
/external/openssl/crypto/cms/
H A Dcms_lib.c359 /* Create a digest BIO from an X509_ALGOR structure */
365 const EVP_MD *digest; local
367 digest = EVP_get_digestbyobj(digestoid);
368 if (!digest)
375 if (!mdbio || !BIO_set_md(mdbio, digest))
388 /* Locate a message digest content from a BIO chain based on SignerInfo */
397 /* Look for digest type to match signature */
411 * algorithm OID instead of digest.
/external/openssl/crypto/ecdsa/
H A Decdsatest.c185 unsigned char digest[20]; local
193 /* get the message digest */
196 EVP_DigestFinal(&md_ctx, digest, &dgst_len);
207 signature = ECDSA_do_sign(digest, 20, key);
223 if (ECDSA_do_verify(digest, 20, signature, key) != 1)
291 unsigned char digest[20], wrong_digest[20]; local
299 /* fill digest values with some random data */
300 if (!RAND_pseudo_bytes(digest, 20) ||
390 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey))
398 if (ECDSA_verify(0, digest, 2
[all...]
/external/openssl/crypto/engine/
H A Deng_openssl.c117 static int openssl_digests(ENGINE *e, const EVP_MD **digest,
345 static int openssl_digests(ENGINE *e, const EVP_MD **digest, argument
348 if(!digest)
354 /* We are being asked for a specific digest */
356 *digest = &test_sha_md;
363 *digest = NULL;
/external/openssl/crypto/evp/
H A Devp_test.c261 static int test_digest(const char *digest, argument
270 d=EVP_get_digestbyname(digest);
274 printf("Testing digest %s\n",EVP_MD_name(d));
359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
H A Dp5_crpt2.c82 const EVP_MD *digest,
90 mdlen = EVP_MD_size(digest);
101 if (!HMAC_Init_ex(&hctx_tpl, pass, passlen, digest, NULL))
80 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
/external/openssl/crypto/srp/
H A Dsrp_lib.c86 unsigned char digest[SHA_DIGEST_LENGTH]; local
110 EVP_DigestFinal_ex(&ctxt, digest, NULL);
112 return BN_bin2bn(digest, sizeof(digest), NULL);
/external/pdfium/core/src/fdrm/crypto/
H A Dfx_crypt.cpp229 void CRYPT_MD5Finish(FX_LPVOID pctx, FX_BYTE digest[16] )
240 PUT_FX_DWORD( ctx->state[0], digest, 0 );
241 PUT_FX_DWORD( ctx->state[1], digest, 4 );
242 PUT_FX_DWORD( ctx->state[2], digest, 8 );
243 PUT_FX_DWORD( ctx->state[3], digest, 12 );
245 void CRYPT_MD5Generate(FX_LPCBYTE input, FX_DWORD length, FX_BYTE digest[16]) argument
250 CRYPT_MD5Finish(&ctx, digest);
/external/skia/tools/
H A Dimage_expectations.cpp57 SkFAIL("unable to compute image digest");
71 // result digest is always of type kJsonValue_Image_ChecksumAlgorithm_Bitmap64bitMD5 .
138 const ImageDigest &digest, const int *tileNumber) {
151 Json::Value actualChecksumAlgorithm = digest.getHashType().c_str();
152 Json::Value actualChecksumValue = Json::UInt64(digest.getHashValue());
181 const ImageDigest &digest,
197 Json::Value actualChecksumAlgorithm = digest.getHashType().c_str();
198 Json::Value actualChecksumValue = Json::UInt64(digest.getHashValue());
137 add(const char *sourceName, const char *fileName, const ImageDigest &digest, const int *tileNumber) argument
180 matchesExpectation(const char *sourceName, const ImageDigest &digest, const int *tileNumber) argument
/external/smack/src/org/xbill/DNS/
H A DTSIG.java57 private String digest; field in class:TSIG
64 digest = "md5";
67 digest = "sha-1";
70 digest = "sha-224";
73 digest = "sha-256";
76 digest = "sha-512";
79 digest = "sha-384";
220 hmac = new HMAC(digest, digestBlockLength, key);
315 HMAC hmac = new HMAC(digest, digestBlockLength, key);
367 HMAC hmac = new HMAC(digest, digestBlockLengt
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pwd_common.c32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument
35 crypto_hash_finish(hash, digest, &len);
44 u8 digest[SHA256_MAC_LEN]; local
59 crypto_hash_update(hash, digest, SHA256_MAC_LEN);
64 if (crypto_hash_finish(hash, digest, &mdlen) < 0)
67 os_memcpy(result + len, digest, resultbytelen - len);
69 os_memcpy(result + len, digest, mdlen);
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pwd_common.c32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument
35 crypto_hash_finish(hash, digest, &len);
44 u8 digest[SHA256_MAC_LEN]; local
59 crypto_hash_update(hash, digest, SHA256_MAC_LEN);
64 if (crypto_hash_finish(hash, digest, &mdlen) < 0)
67 os_memcpy(result + len, digest, resultbytelen - len);
69 os_memcpy(result + len, digest, mdlen);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pwd_common.c32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument
35 crypto_hash_finish(hash, digest, &len);
44 u8 digest[SHA256_MAC_LEN]; local
59 crypto_hash_update(hash, digest, SHA256_MAC_LEN);
64 if (crypto_hash_finish(hash, digest, &mdlen) < 0)
67 os_memcpy(result + len, digest, resultbytelen - len);
69 os_memcpy(result + len, digest, mdlen);
/external/chromium_org/chrome/browser/safe_browsing/
H A Dprefix_set.cc177 // The file looks valid, start building the digest.
333 base::MD5Digest digest; local
334 base::MD5Final(&digest, &context);
335 written = fwrite(&digest, sizeof(digest), 1, file.get());
/external/chromium_org/chrome/browser/ui/libgtk2ui/
H A Dapp_indicator_icon.cc163 base::MD5Digest digest; local
164 base::MD5Sum(png_data->front_as<char>(), png_data->size(), &digest);
166 base::MD5DigestToBase16(digest).c_str());
/external/chromium_org/chrome/browser/web_applications/
H A Dweb_app_win.cc38 void GetImageCheckSum(const gfx::ImageFamily& image, base::MD5Digest* digest) { argument
39 DCHECK(digest);
53 base::MD5Final(digest, &md5_context);
62 base::MD5Digest digest;
63 GetImageCheckSum(image, &digest);
67 reinterpret_cast<const char*>(&digest),
68 sizeof(digest)) == sizeof(digest);
/external/chromium_org/content/common/gpu/media/
H A Dvaapi_h264_decoder_unittest.cc190 base::MD5Digest digest; local
191 base::MD5Final(&digest, &md5_context_);
192 return MD5DigestToBase16(digest);

Completed in 3078 milliseconds

1234567891011>>