/external/chromium_org/third_party/sfntly/cpp/src/sfntly/ |
H A D | font.cc | 80 Font::Font(int32_t sfnt_version, ByteVector* digest) argument 84 digest_ = *digest; 268 void Font::Builder::SetDigest(ByteVector* digest) { argument 270 digest_ = *digest;
|
H A D | font.h | 152 void SetDigest(ByteVector* digest); 237 // Gets a copy of the fonts digest that was created when the font was read. If 238 // no digest was set at creation time then the return result will be null. 239 ByteVector* digest() { return &digest_; } function in class:sfntly::Font 300 // @param digest the computed digest for the font; null if digest was not 302 // Note: Current C++ port does not support SHA digest validation. 303 Font(int32_t sfnt_version, ByteVector* digest);
|
/external/chromium_org/third_party/skia/src/utils/ |
H A D | SkMD5.cpp | 63 void SkMD5::finish(Digest& digest) { argument 82 // Write out digest. 83 encode(digest.data, this->state);
|
/external/chromium_org/third_party/skia/tools/ |
H A D | skimage_main.cpp | 153 // Name the file <digest>.png 257 * @param digest GmResultDigest, computed from the decoded bitmap, to compare to 276 static bool compare_to_expectations_if_necessary(const skiagm::GmResultDigest& digest, argument 286 if (!digest.isValid()) { 307 if (jsExpectation.match(digest)) { 326 * Writes the image to a PNG file named according to the digest hash, as described in 333 * digest is ignored. 339 * @param bitmapAndDigestFromDecodeSubset SkBitmap (with digest) created by 432 * @param digest GmResultDigest computed from decoding the stream the first time. 433 * Decoding the length-less stream is expected to result in a matching digest 435 test_stream_without_length(const char srcPath[], SkImageDecoder* codec, const skiagm::GmResultDigest& digest) argument [all...] |
/external/chromium_org/third_party/webrtc/base/ |
H A D | opensslstreamadapter.cc | 211 LOG(LS_WARNING) << "Unknown digest algorithm: " << digest_alg; 791 // the digest. 800 unsigned char digest[EVP_MAX_MD_SIZE]; local 805 digest, sizeof(digest), 807 LOG(LS_WARNING) << "Failed to compute peer cert digest."; 811 Buffer computed_digest(digest, digest_length); 813 LOG(LS_WARNING) << "Rejected peer certificate due to mismatched digest."; 816 // Ignore any verification error if the digest matches, since there is no
|
H A D | nssstreamadapter.cc | 792 // provided certificate or digest. 809 LOG(LS_INFO) << "Checking against specified digest"; 810 // The peer certificate digest was specified 811 unsigned char digest[64]; // Maximum size local 816 digest, sizeof(digest), &digest_length)) { 819 Buffer computed_digest(digest, digest_length);
|
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
H A D | sha2.c | 328 * digest to a readable hexadecimal character string: 566 void SHA256_Final(sha2_byte digest[], SHA256_CTX* context) { argument 567 sha2_word32 *d = (sha2_word32*)digest; 573 /* If no digest buffer is passed, we don't bother doing this: */ 574 if (digest != (sha2_byte*)0) { 630 sha2_byte digest[SHA256_DIGEST_LENGTH], *d = digest; local 637 SHA256_Final(digest, context); 648 bzero(digest, SHA256_DIGEST_LENGTH); 652 char* SHA256_Data(const sha2_byte* data, size_t len, char digest[SHA256_DIGEST_STRING_LENGT argument 929 SHA512_Final(sha2_byte digest[], SHA512_CTX* context) argument 959 sha2_byte digest[SHA512_DIGEST_LENGTH], *d = digest; local 981 SHA512_Data(const sha2_byte* data, size_t len, char digest[SHA512_DIGEST_STRING_LENGTH]) argument 1004 SHA384_Final(sha2_byte digest[], SHA384_CTX* context) argument 1034 sha2_byte digest[SHA384_DIGEST_LENGTH], *d = digest; local 1056 SHA384_Data(const sha2_byte* data, size_t len, char digest[SHA384_DIGEST_STRING_LENGTH]) argument [all...] |
/external/lzma/C/ |
H A D | XzDec.c | 752 Byte digest[XZ_CHECK_SIZE_MAX];
local 755 if (XzCheck_Final(&p->check, digest) && memcmp(digest, p->buf, checkSize) != 0)
795 Byte digest[SHA256_DIGEST_SIZE];
local 799 Sha256_Final(&p->sha, digest);
800 if (memcmp(digest, p->shaDigest, SHA256_DIGEST_SIZE) != 0)
|
/external/pdfium/core/src/fdrm/crypto/ |
H A D | fx_crypt_sha.cpp | 27 static void SHATransform(unsigned int * digest, unsigned int * block)
argument 39 a = digest[0];
40 b = digest[1];
41 c = digest[2];
42 d = digest[3];
43 e = digest[4];
79 digest[0] += a;
80 digest[1] += b;
81 digest[2] += c;
82 digest[ 124 CRYPT_SHA1Finish(FX_LPVOID context, FX_BYTE digest[20]) argument 157 CRYPT_SHA1Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[20]) argument 380 CRYPT_SHA256Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[32]) argument 658 CRYPT_SHA384Finish(FX_LPVOID context, FX_BYTE digest[48]) argument 681 CRYPT_SHA384Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[64]) argument 708 CRYPT_SHA512Finish(FX_LPVOID context, FX_BYTE digest[64]) argument 733 CRYPT_SHA512Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[64]) argument [all...] |
/external/pdfium/core/src/fpdfapi/fpdf_page/ |
H A D | fpdf_page_doc.cpp | 568 FX_BYTE digest[20];
local 570 CRYPT_SHA1Generate(stream.GetData(), stream.GetSize(), digest);
571 if (m_HashProfileMap.Lookup(CFX_ByteStringC(digest, 20), (void*&)pCopiedStream)) {
588 m_HashProfileMap.SetAt(CFX_ByteStringC(digest, 20), pIccProfileStream);
|
/external/ppp/pppd/plugins/radius/ |
H A D | radius.c | 76 struct chap_digest_type *digest, 85 struct chap_digest_type *digest, 321 * digest -- points to the structure representing the digest type 333 struct chap_digest_type *digest, 361 if ((digest->code != CHAP_MD5) 363 && (digest->code != CHAP_MICROSOFT) 364 && (digest->code != CHAP_MICROSOFT_V2) 367 error("RADIUS: Challenge type %u unsupported", digest->code); 395 switch (digest 332 radius_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 542 radius_setparams(VALUE_PAIR *vp, char *msg, REQUEST_INFO *req_info, struct chap_digest_type *digest, unsigned char *challenge, char *message, int message_space) argument [all...] |
/external/ppp/pppd/plugins/ |
H A D | winbind.c | 99 struct chap_digest_type *digest, 518 struct chap_digest_type *digest, 551 switch (digest->code) { 668 error("WINBIND: Challenge type %u unsupported", digest->code); 517 winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
|
/external/sfntly/cpp/src/sfntly/ |
H A D | font.cc | 80 Font::Font(int32_t sfnt_version, ByteVector* digest) argument 84 digest_ = *digest; 268 void Font::Builder::SetDigest(ByteVector* digest) { argument 270 digest_ = *digest;
|
H A D | font.h | 152 void SetDigest(ByteVector* digest); 237 // Gets a copy of the fonts digest that was created when the font was read. If 238 // no digest was set at creation time then the return result will be null. 239 ByteVector* digest() { return &digest_; } function in class:sfntly::Font 300 // @param digest the computed digest for the font; null if digest was not 302 // Note: Current C++ port does not support SHA digest validation. 303 Font(int32_t sfnt_version, ByteVector* digest);
|
/external/skia/src/utils/ |
H A D | SkMD5.cpp | 63 void SkMD5::finish(Digest& digest) { argument 82 // Write out digest. 83 encode(digest.data, this->state);
|
/external/skia/tools/ |
H A D | skimage_main.cpp | 153 // Name the file <digest>.png 257 * @param digest GmResultDigest, computed from the decoded bitmap, to compare to 276 static bool compare_to_expectations_if_necessary(const skiagm::GmResultDigest& digest, argument 286 if (!digest.isValid()) { 307 if (jsExpectation.match(digest)) { 326 * Writes the image to a PNG file named according to the digest hash, as described in 333 * digest is ignored. 339 * @param bitmapAndDigestFromDecodeSubset SkBitmap (with digest) created by 432 * @param digest GmResultDigest computed from decoding the stream the first time. 433 * Decoding the length-less stream is expected to result in a matching digest 435 test_stream_without_length(const char srcPath[], SkImageDecoder* codec, const skiagm::GmResultDigest& digest) argument [all...] |
/external/chromium_org/chrome/browser/profile_resetter/ |
H A D | jtl_interpreter.cc | 743 uint8 digest[3] = {}; local 744 crypto::SHA256HashString(program_, digest, arraysize(digest)); 745 return static_cast<uint32>(digest[0]) << 16 | 746 static_cast<uint32>(digest[1]) << 8 | 747 static_cast<uint32>(digest[2]);
|
/external/chromium_org/components/gcm_driver/ |
H A D | gcm_client_impl_unittest.cc | 233 const std::string& digest, 391 const std::string& digest, 399 if (!digest.empty()) { 400 response.set_digest(digest); 388 CompleteCheckin( uint64 android_id, uint64 security_token, const std::string& digest, const std::map<std::string, std::string>& settings) argument
|
/external/chromium_org/content/shell/renderer/ |
H A D | webkit_test_runner.cc | 674 base::MD5Digest digest; local 675 base::MD5Sum(snapshot.getPixels(), snapshot.getSize(), &digest); 676 std::string actual_pixel_hash = base::MD5DigestToBase16(digest);
|
/external/chromium_org/google_apis/gcm/engine/ |
H A D | gcm_store_impl.cc | 65 // Key for digest of the last G-services settings update. 163 const std::string& digest, 181 std::string* digest); 564 // Update the settings digest. 768 std::string* digest) { 788 // Load the settings digest. It's ok if it is empty. 789 db_->Get(read_options, MakeSlice(kGServiceSettingsDigestKey), digest); 1005 const std::string& digest, 1012 digest, 766 LoadGServicesSettings( std::map<std::string, std::string>* settings, std::string* digest) argument 1003 SetGServicesSettings( const std::map<std::string, std::string>& settings, const std::string& digest, const UpdateCallback& callback) argument
|
/external/chromium_org/third_party/WebKit/Source/core/frame/csp/ |
H A D | ContentSecurityPolicy.cpp | 376 DigestValue digest; local 378 bool digestSuccess = computeDigest(kAlgorithmMap[i].algorithm, normalizedSource.data(), normalizedSource.length(), digest); 379 if (digestSuccess && isAllowedByAllWithHash<allowed>(policies, CSPHashValue(kAlgorithmMap[i].cspHashAlgorithm, digest)))
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_clnt.c | 956 /* Don't digest cached records if no sigalgs: we may need them for 1673 s->cert->pkeys[i].digest = NULL; 2277 uint8_t digest[EVP_MAX_MD_SIZE]; local 2291 /* Write out the digest type if needbe. */ 2294 md = s->cert->key->digest; 2304 /* Compute the digest. */ 2305 if (!ssl3_cert_verify_hash(s, digest, &digest_length, &md, pkey)) 2312 /* Sign the digest. */ 2321 digest, digest_length)) 2334 digest, digest_lengt [all...] |
H A D | s3_srvr.c | 767 * the message into the Finished digest again. */ 2226 uint8_t digest[EVP_MAX_MD_SIZE]; local 2263 /* Determine the digest type if needbe. */ 2270 /* Compute the digest. */ 2271 if (!ssl3_cert_verify_hash(s, digest, &digest_length, &md, pkey)) 2295 digest, digest_length)) 2444 /* No client certificate so digest cached records */
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | fakesession.h | 123 virtual bool SetRemoteFingerprint(const std::string& alg, const uint8* digest, argument 125 dtls_fingerprint_ = rtc::SSLFingerprint(alg, digest, digest_len);
|
H A D | stun.cc | 920 char digest[rtc::MessageDigest::kMaxSize]; local 923 digest, sizeof(digest)); 928 *hash = std::string(digest, size);
|