Searched defs:digest (Results 201 - 225 of 284) sorted by relevance

1234567891011>>

/external/chromium_org/third_party/sfntly/cpp/src/sfntly/
H A Dfont.cc80 Font::Font(int32_t sfnt_version, ByteVector* digest) argument
84 digest_ = *digest;
268 void Font::Builder::SetDigest(ByteVector* digest) { argument
270 digest_ = *digest;
H A Dfont.h152 void SetDigest(ByteVector* digest);
237 // Gets a copy of the fonts digest that was created when the font was read. If
238 // no digest was set at creation time then the return result will be null.
239 ByteVector* digest() { return &digest_; } function in class:sfntly::Font
300 // @param digest the computed digest for the font; null if digest was not
302 // Note: Current C++ port does not support SHA digest validation.
303 Font(int32_t sfnt_version, ByteVector* digest);
/external/chromium_org/third_party/skia/src/utils/
H A DSkMD5.cpp63 void SkMD5::finish(Digest& digest) { argument
82 // Write out digest.
83 encode(digest.data, this->state);
/external/chromium_org/third_party/skia/tools/
H A Dskimage_main.cpp153 // Name the file <digest>.png
257 * @param digest GmResultDigest, computed from the decoded bitmap, to compare to
276 static bool compare_to_expectations_if_necessary(const skiagm::GmResultDigest& digest, argument
286 if (!digest.isValid()) {
307 if (jsExpectation.match(digest)) {
326 * Writes the image to a PNG file named according to the digest hash, as described in
333 * digest is ignored.
339 * @param bitmapAndDigestFromDecodeSubset SkBitmap (with digest) created by
432 * @param digest GmResultDigest computed from decoding the stream the first time.
433 * Decoding the length-less stream is expected to result in a matching digest
435 test_stream_without_length(const char srcPath[], SkImageDecoder* codec, const skiagm::GmResultDigest& digest) argument
[all...]
/external/chromium_org/third_party/webrtc/base/
H A Dopensslstreamadapter.cc211 LOG(LS_WARNING) << "Unknown digest algorithm: " << digest_alg;
791 // the digest.
800 unsigned char digest[EVP_MAX_MD_SIZE]; local
805 digest, sizeof(digest),
807 LOG(LS_WARNING) << "Failed to compute peer cert digest.";
811 Buffer computed_digest(digest, digest_length);
813 LOG(LS_WARNING) << "Rejected peer certificate due to mismatched digest.";
816 // Ignore any verification error if the digest matches, since there is no
H A Dnssstreamadapter.cc792 // provided certificate or digest.
809 LOG(LS_INFO) << "Checking against specified digest";
810 // The peer certificate digest was specified
811 unsigned char digest[64]; // Maximum size local
816 digest, sizeof(digest), &digest_length)) {
819 Buffer computed_digest(digest, digest_length);
/external/ipsec-tools/src/racoon/missing/crypto/sha2/
H A Dsha2.c328 * digest to a readable hexadecimal character string:
566 void SHA256_Final(sha2_byte digest[], SHA256_CTX* context) { argument
567 sha2_word32 *d = (sha2_word32*)digest;
573 /* If no digest buffer is passed, we don't bother doing this: */
574 if (digest != (sha2_byte*)0) {
630 sha2_byte digest[SHA256_DIGEST_LENGTH], *d = digest; local
637 SHA256_Final(digest, context);
648 bzero(digest, SHA256_DIGEST_LENGTH);
652 char* SHA256_Data(const sha2_byte* data, size_t len, char digest[SHA256_DIGEST_STRING_LENGT argument
929 SHA512_Final(sha2_byte digest[], SHA512_CTX* context) argument
959 sha2_byte digest[SHA512_DIGEST_LENGTH], *d = digest; local
981 SHA512_Data(const sha2_byte* data, size_t len, char digest[SHA512_DIGEST_STRING_LENGTH]) argument
1004 SHA384_Final(sha2_byte digest[], SHA384_CTX* context) argument
1034 sha2_byte digest[SHA384_DIGEST_LENGTH], *d = digest; local
1056 SHA384_Data(const sha2_byte* data, size_t len, char digest[SHA384_DIGEST_STRING_LENGTH]) argument
[all...]
/external/lzma/C/
H A DXzDec.c752 Byte digest[XZ_CHECK_SIZE_MAX]; local
755 if (XzCheck_Final(&p->check, digest) && memcmp(digest, p->buf, checkSize) != 0)
795 Byte digest[SHA256_DIGEST_SIZE]; local
799 Sha256_Final(&p->sha, digest);
800 if (memcmp(digest, p->shaDigest, SHA256_DIGEST_SIZE) != 0)
/external/pdfium/core/src/fdrm/crypto/
H A Dfx_crypt_sha.cpp27 static void SHATransform(unsigned int * digest, unsigned int * block) argument
39 a = digest[0];
40 b = digest[1];
41 c = digest[2];
42 d = digest[3];
43 e = digest[4];
79 digest[0] += a;
80 digest[1] += b;
81 digest[2] += c;
82 digest[
124 CRYPT_SHA1Finish(FX_LPVOID context, FX_BYTE digest[20]) argument
157 CRYPT_SHA1Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[20]) argument
380 CRYPT_SHA256Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[32]) argument
658 CRYPT_SHA384Finish(FX_LPVOID context, FX_BYTE digest[48]) argument
681 CRYPT_SHA384Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[64]) argument
708 CRYPT_SHA512Finish(FX_LPVOID context, FX_BYTE digest[64]) argument
733 CRYPT_SHA512Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[64]) argument
[all...]
/external/pdfium/core/src/fpdfapi/fpdf_page/
H A Dfpdf_page_doc.cpp568 FX_BYTE digest[20]; local
570 CRYPT_SHA1Generate(stream.GetData(), stream.GetSize(), digest);
571 if (m_HashProfileMap.Lookup(CFX_ByteStringC(digest, 20), (void*&)pCopiedStream)) {
588 m_HashProfileMap.SetAt(CFX_ByteStringC(digest, 20), pIccProfileStream);
/external/ppp/pppd/plugins/radius/
H A Dradius.c76 struct chap_digest_type *digest,
85 struct chap_digest_type *digest,
321 * digest -- points to the structure representing the digest type
333 struct chap_digest_type *digest,
361 if ((digest->code != CHAP_MD5)
363 && (digest->code != CHAP_MICROSOFT)
364 && (digest->code != CHAP_MICROSOFT_V2)
367 error("RADIUS: Challenge type %u unsupported", digest->code);
395 switch (digest
332 radius_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
542 radius_setparams(VALUE_PAIR *vp, char *msg, REQUEST_INFO *req_info, struct chap_digest_type *digest, unsigned char *challenge, char *message, int message_space) argument
[all...]
/external/ppp/pppd/plugins/
H A Dwinbind.c99 struct chap_digest_type *digest,
518 struct chap_digest_type *digest,
551 switch (digest->code) {
668 error("WINBIND: Challenge type %u unsupported", digest->code);
517 winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
/external/sfntly/cpp/src/sfntly/
H A Dfont.cc80 Font::Font(int32_t sfnt_version, ByteVector* digest) argument
84 digest_ = *digest;
268 void Font::Builder::SetDigest(ByteVector* digest) { argument
270 digest_ = *digest;
H A Dfont.h152 void SetDigest(ByteVector* digest);
237 // Gets a copy of the fonts digest that was created when the font was read. If
238 // no digest was set at creation time then the return result will be null.
239 ByteVector* digest() { return &digest_; } function in class:sfntly::Font
300 // @param digest the computed digest for the font; null if digest was not
302 // Note: Current C++ port does not support SHA digest validation.
303 Font(int32_t sfnt_version, ByteVector* digest);
/external/skia/src/utils/
H A DSkMD5.cpp63 void SkMD5::finish(Digest& digest) { argument
82 // Write out digest.
83 encode(digest.data, this->state);
/external/skia/tools/
H A Dskimage_main.cpp153 // Name the file <digest>.png
257 * @param digest GmResultDigest, computed from the decoded bitmap, to compare to
276 static bool compare_to_expectations_if_necessary(const skiagm::GmResultDigest& digest, argument
286 if (!digest.isValid()) {
307 if (jsExpectation.match(digest)) {
326 * Writes the image to a PNG file named according to the digest hash, as described in
333 * digest is ignored.
339 * @param bitmapAndDigestFromDecodeSubset SkBitmap (with digest) created by
432 * @param digest GmResultDigest computed from decoding the stream the first time.
433 * Decoding the length-less stream is expected to result in a matching digest
435 test_stream_without_length(const char srcPath[], SkImageDecoder* codec, const skiagm::GmResultDigest& digest) argument
[all...]
/external/chromium_org/chrome/browser/profile_resetter/
H A Djtl_interpreter.cc743 uint8 digest[3] = {}; local
744 crypto::SHA256HashString(program_, digest, arraysize(digest));
745 return static_cast<uint32>(digest[0]) << 16 |
746 static_cast<uint32>(digest[1]) << 8 |
747 static_cast<uint32>(digest[2]);
/external/chromium_org/components/gcm_driver/
H A Dgcm_client_impl_unittest.cc233 const std::string& digest,
391 const std::string& digest,
399 if (!digest.empty()) {
400 response.set_digest(digest);
388 CompleteCheckin( uint64 android_id, uint64 security_token, const std::string& digest, const std::map<std::string, std::string>& settings) argument
/external/chromium_org/content/shell/renderer/
H A Dwebkit_test_runner.cc674 base::MD5Digest digest; local
675 base::MD5Sum(snapshot.getPixels(), snapshot.getSize(), &digest);
676 std::string actual_pixel_hash = base::MD5DigestToBase16(digest);
/external/chromium_org/google_apis/gcm/engine/
H A Dgcm_store_impl.cc65 // Key for digest of the last G-services settings update.
163 const std::string& digest,
181 std::string* digest);
564 // Update the settings digest.
768 std::string* digest) {
788 // Load the settings digest. It's ok if it is empty.
789 db_->Get(read_options, MakeSlice(kGServiceSettingsDigestKey), digest);
1005 const std::string& digest,
1012 digest,
766 LoadGServicesSettings( std::map<std::string, std::string>* settings, std::string* digest) argument
1003 SetGServicesSettings( const std::map<std::string, std::string>& settings, const std::string& digest, const UpdateCallback& callback) argument
/external/chromium_org/third_party/WebKit/Source/core/frame/csp/
H A DContentSecurityPolicy.cpp376 DigestValue digest; local
378 bool digestSuccess = computeDigest(kAlgorithmMap[i].algorithm, normalizedSource.data(), normalizedSource.length(), digest);
379 if (digestSuccess && isAllowedByAllWithHash<allowed>(policies, CSPHashValue(kAlgorithmMap[i].cspHashAlgorithm, digest)))
/external/chromium_org/third_party/boringssl/src/ssl/
H A Ds3_clnt.c956 /* Don't digest cached records if no sigalgs: we may need them for
1673 s->cert->pkeys[i].digest = NULL;
2277 uint8_t digest[EVP_MAX_MD_SIZE]; local
2291 /* Write out the digest type if needbe. */
2294 md = s->cert->key->digest;
2304 /* Compute the digest. */
2305 if (!ssl3_cert_verify_hash(s, digest, &digest_length, &md, pkey))
2312 /* Sign the digest. */
2321 digest, digest_length))
2334 digest, digest_lengt
[all...]
H A Ds3_srvr.c767 * the message into the Finished digest again. */
2226 uint8_t digest[EVP_MAX_MD_SIZE]; local
2263 /* Determine the digest type if needbe. */
2270 /* Compute the digest. */
2271 if (!ssl3_cert_verify_hash(s, digest, &digest_length, &md, pkey))
2295 digest, digest_length))
2444 /* No client certificate so digest cached records */
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Dfakesession.h123 virtual bool SetRemoteFingerprint(const std::string& alg, const uint8* digest, argument
125 dtls_fingerprint_ = rtc::SSLFingerprint(alg, digest, digest_len);
H A Dstun.cc920 char digest[rtc::MessageDigest::kMaxSize]; local
923 digest, sizeof(digest));
928 *hash = std::string(digest, size);

Completed in 2338 milliseconds

1234567891011>>