/external/chromium_org/third_party/boringssl/src/crypto/ecdsa/ |
H A D | ecdsa.c | 63 int ECDSA_sign(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, argument 66 return eckey->ecdsa_meth->sign(digest, digest_len, sig, sig_len, eckey); 69 return ECDSA_sign_ex(type, digest, digest_len, sig, sig_len, NULL, NULL, 73 int ECDSA_verify(int type, const uint8_t *digest, size_t digest_len, argument 79 return eckey->ecdsa_meth->verify(digest, digest_len, sig, sig_len, eckey); 86 ret = ECDSA_do_verify(digest, digest_len, s, eckey); 95 /* digest_to_bn interprets |digest_len| bytes from |digest| as a big-endian 98 static int digest_to_bn(BIGNUM *out, const uint8_t *digest, size_t digest_len, argument 103 /* Need to truncate digest if it is too long: first truncate whole 108 if (!BN_bin2bn(digest, digest_le 123 ECDSA_do_sign(const uint8_t *digest, size_t digest_len, EC_KEY *key) argument 128 ECDSA_do_verify(const uint8_t *digest, size_t digest_len, const ECDSA_SIG *sig, EC_KEY *eckey) argument 226 ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument 358 ECDSA_do_sign_ex(const uint8_t *digest, size_t digest_len, const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *eckey) argument 462 ECDSA_sign_ex(int type, const uint8_t *digest, size_t digest_len, uint8_t *sig, unsigned int *sig_len, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/md5/ |
H A D | md5.c | 65 static uint8_t digest[MD5_DIGEST_LENGTH]; local 69 out = digest; 119 #include "../digest/md32_common.h"
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | rawtransportchannel.h | 162 const uint8* digest, 160 SetRemoteFingerprint( const std::string& digest_alg, const uint8* digest, size_t digest_len) argument
|
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/ |
H A D | securetunnelsessionclient.cc | 382 unsigned char digest[rtc::MessageDigest::kMaxSize]; local 384 peer_cert->ComputeDigest(algorithm, digest, ARRAY_SIZE(digest), &digest_len); 385 ssl_stream->SetPeerCertificateDigest(algorithm, digest, digest_len);
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | opensslidentity.cc | 222 unsigned char* digest, 225 return ComputeDigest(x509_, algorithm, digest, size, length); 230 unsigned char* digest, 242 X509_digest(x509, md, digest, &n); 221 ComputeDigest(const std::string& algorithm, unsigned char* digest, size_t size, size_t* length) const argument 228 ComputeDigest(const X509* x509, const std::string& algorithm, unsigned char* digest, size_t size, size_t* length) argument
|
H A D | ssladapter_unittest.cc | 195 // Set a bogus peer certificate digest. 196 unsigned char digest[20]; local 197 size_t digest_len = sizeof(digest); 198 ssl_stream_adapter_->SetPeerCertificateDigest(rtc::DIGEST_SHA_1, digest,
|
/external/fio/crc/ |
H A D | test.c | 55 uint32_t digest[4]; local 56 struct fio_md5_ctx ctx = { .hash = digest };
|
/external/iputils/ninfod/ |
H A D | ninfod_name.c | 265 unsigned char digest[16]; local 272 MD5_Final(digest, &ctxt); 284 memcpy(&nigroup->s6_addr[12], digest, 4);
|
/external/openssl/apps/ |
H A D | crl.c | 125 const EVP_MD *md_alg,*digest=EVP_sha1(); local 225 digest=md_alg; 348 if (!X509_CRL_digest(x,digest,md,&n)) 354 OBJ_nid2sn(EVP_MD_type(digest)));
|
/external/openssl/crypto/cms/ |
H A D | cms_lib.c | 359 /* Create a digest BIO from an X509_ALGOR structure */ 365 const EVP_MD *digest; local 367 digest = EVP_get_digestbyobj(digestoid); 368 if (!digest) 375 if (!mdbio || !BIO_set_md(mdbio, digest)) 388 /* Locate a message digest content from a BIO chain based on SignerInfo */ 397 /* Look for digest type to match signature */ 411 * algorithm OID instead of digest.
|
/external/openssl/crypto/ecdsa/ |
H A D | ecdsatest.c | 185 unsigned char digest[20]; local 193 /* get the message digest */ 196 EVP_DigestFinal(&md_ctx, digest, &dgst_len); 207 signature = ECDSA_do_sign(digest, 20, key); 223 if (ECDSA_do_verify(digest, 20, signature, key) != 1) 291 unsigned char digest[20], wrong_digest[20]; local 299 /* fill digest values with some random data */ 300 if (!RAND_pseudo_bytes(digest, 20) || 390 if (!ECDSA_sign(0, digest, 20, signature, &sig_len, eckey)) 398 if (ECDSA_verify(0, digest, 2 [all...] |
/external/openssl/crypto/engine/ |
H A D | eng_openssl.c | 117 static int openssl_digests(ENGINE *e, const EVP_MD **digest, 345 static int openssl_digests(ENGINE *e, const EVP_MD **digest, argument 348 if(!digest) 354 /* We are being asked for a specific digest */ 356 *digest = &test_sha_md; 363 *digest = NULL;
|
/external/openssl/crypto/evp/ |
H A D | evp_test.c | 261 static int test_digest(const char *digest, argument 270 d=EVP_get_digestbyname(digest); 274 printf("Testing digest %s\n",EVP_MD_name(d)); 359 * It'll prevent ENGINEs being ENGINE_init()ialised for cipher/digest use if
|
H A D | p5_crpt2.c | 82 const EVP_MD *digest, 90 mdlen = EVP_MD_size(digest); 101 if (!HMAC_Init_ex(&hctx_tpl, pass, passlen, digest, NULL)) 80 PKCS5_PBKDF2_HMAC(const char *pass, int passlen, const unsigned char *salt, int saltlen, int iter, const EVP_MD *digest, int keylen, unsigned char *out) argument
|
/external/openssl/crypto/srp/ |
H A D | srp_lib.c | 86 unsigned char digest[SHA_DIGEST_LENGTH]; local 110 EVP_DigestFinal_ex(&ctxt, digest, NULL); 112 return BN_bin2bn(digest, sizeof(digest), NULL);
|
/external/pdfium/core/src/fdrm/crypto/ |
H A D | fx_crypt.cpp | 229 void CRYPT_MD5Finish(FX_LPVOID pctx, FX_BYTE digest[16] )
240 PUT_FX_DWORD( ctx->state[0], digest, 0 );
241 PUT_FX_DWORD( ctx->state[1], digest, 4 );
242 PUT_FX_DWORD( ctx->state[2], digest, 8 );
243 PUT_FX_DWORD( ctx->state[3], digest, 12 );
245 void CRYPT_MD5Generate(FX_LPCBYTE input, FX_DWORD length, FX_BYTE digest[16])
argument 250 CRYPT_MD5Finish(&ctx, digest);
|
/external/skia/tools/ |
H A D | image_expectations.cpp | 57 SkFAIL("unable to compute image digest"); 71 // result digest is always of type kJsonValue_Image_ChecksumAlgorithm_Bitmap64bitMD5 . 138 const ImageDigest &digest, const int *tileNumber) { 151 Json::Value actualChecksumAlgorithm = digest.getHashType().c_str(); 152 Json::Value actualChecksumValue = Json::UInt64(digest.getHashValue()); 181 const ImageDigest &digest, 197 Json::Value actualChecksumAlgorithm = digest.getHashType().c_str(); 198 Json::Value actualChecksumValue = Json::UInt64(digest.getHashValue()); 137 add(const char *sourceName, const char *fileName, const ImageDigest &digest, const int *tileNumber) argument 180 matchesExpectation(const char *sourceName, const ImageDigest &digest, const int *tileNumber) argument
|
/external/smack/src/org/xbill/DNS/ |
H A D | TSIG.java | 57 private String digest; field in class:TSIG 64 digest = "md5"; 67 digest = "sha-1"; 70 digest = "sha-224"; 73 digest = "sha-256"; 76 digest = "sha-512"; 79 digest = "sha-384"; 220 hmac = new HMAC(digest, digestBlockLength, key); 315 HMAC hmac = new HMAC(digest, digestBlockLength, key); 367 HMAC hmac = new HMAC(digest, digestBlockLengt [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.c | 32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument 35 crypto_hash_finish(hash, digest, &len); 44 u8 digest[SHA256_MAC_LEN]; local 59 crypto_hash_update(hash, digest, SHA256_MAC_LEN); 64 if (crypto_hash_finish(hash, digest, &mdlen) < 0) 67 os_memcpy(result + len, digest, resultbytelen - len); 69 os_memcpy(result + len, digest, mdlen);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.c | 32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument 35 crypto_hash_finish(hash, digest, &len); 44 u8 digest[SHA256_MAC_LEN]; local 59 crypto_hash_update(hash, digest, SHA256_MAC_LEN); 64 if (crypto_hash_finish(hash, digest, &mdlen) < 0) 67 os_memcpy(result + len, digest, resultbytelen - len); 69 os_memcpy(result + len, digest, mdlen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pwd_common.c | 32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument 35 crypto_hash_finish(hash, digest, &len); 44 u8 digest[SHA256_MAC_LEN]; local 59 crypto_hash_update(hash, digest, SHA256_MAC_LEN); 64 if (crypto_hash_finish(hash, digest, &mdlen) < 0) 67 os_memcpy(result + len, digest, resultbytelen - len); 69 os_memcpy(result + len, digest, mdlen);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | prefix_set.cc | 177 // The file looks valid, start building the digest. 333 base::MD5Digest digest; local 334 base::MD5Final(&digest, &context); 335 written = fwrite(&digest, sizeof(digest), 1, file.get());
|
/external/chromium_org/chrome/browser/ui/libgtk2ui/ |
H A D | app_indicator_icon.cc | 163 base::MD5Digest digest; local 164 base::MD5Sum(png_data->front_as<char>(), png_data->size(), &digest); 166 base::MD5DigestToBase16(digest).c_str());
|
/external/chromium_org/chrome/browser/web_applications/ |
H A D | web_app_win.cc | 38 void GetImageCheckSum(const gfx::ImageFamily& image, base::MD5Digest* digest) { argument 39 DCHECK(digest); 53 base::MD5Final(digest, &md5_context); 62 base::MD5Digest digest; 63 GetImageCheckSum(image, &digest); 67 reinterpret_cast<const char*>(&digest), 68 sizeof(digest)) == sizeof(digest);
|
/external/chromium_org/content/common/gpu/media/ |
H A D | vaapi_h264_decoder_unittest.cc | 190 base::MD5Digest digest; local 191 base::MD5Final(&digest, &md5_context_); 192 return MD5DigestToBase16(digest);
|