Searched defs:digest (Results 26 - 50 of 284) sorted by relevance

1234567891011>>

/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/
H A DPBESecretKeyFactory.java18 private int digest; field in class:PBESecretKeyFactory
27 int digest,
35 this.digest = digest;
51 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null);
56 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize);
60 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize);
63 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param);
22 PBESecretKeyFactory( String algorithm, ASN1ObjectIdentifier oid, boolean forCipher, int scheme, int digest, int keySize, int ivSize) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/util/
H A DAsymmetricAlgorithmProvider.java11 String digest,
16 String mainName = digest + "WITH" + algorithm;
17 String jdk11Variation1 = digest + "with" + algorithm;
18 String jdk11Variation2 = digest + "With" + algorithm;
19 String alias = digest + "/" + algorithm;
9 addSignatureAlgorithm( ConfigurableProvider provider, String digest, String algorithm, String className, ASN1ObjectIdentifier oid) argument
/external/chromium_org/chrome/browser/resources/cryptotoken/
H A Dsha256.js11 // byte[32] digest();
153 SHA256.prototype.digest = function(var_args) {
157 var digest = new Array(32);
177 digest[n++] = (this._chain[i] >> j) & 255;
179 return digest;
/external/chromium_org/content/child/webcrypto/openssl/
H A Drsa_ssa_openssl.cc20 // Extracts the OpenSSL key and digest from a WebCrypto key. The returned
24 const EVP_MD** digest) {
27 *digest = GetDigest(key.algorithm().rsaHashedParams()->hash().id());
28 if (!*digest)
67 const EVP_MD* digest = NULL; variable
68 Status status = GetPKeyAndDigest(key, &private_key, &digest);
77 !EVP_DigestSignInit(ctx.get(), NULL, digest, NULL, private_key) ||
103 const EVP_MD* digest = NULL; variable
104 Status status = GetPKeyAndDigest(key, &public_key, &digest);
108 if (!EVP_DigestVerifyInit(ctx.get(), NULL, digest, NUL
22 GetPKeyAndDigest(const blink::WebCryptoKey& key, EVP_PKEY** pkey, const EVP_MD** digest) argument
[all...]
H A Drsa_oaep_openssl.cc47 const EVP_MD* digest = local
49 if (!digest)
56 1 != EVP_PKEY_CTX_set_rsa_oaep_md(ctx.get(), digest) ||
57 1 != EVP_PKEY_CTX_set_rsa_mgf1_md(ctx.get(), digest)) {
/external/chromium_org/crypto/
H A Dhmac_openssl.cc52 unsigned char* digest,
56 ScopedOpenSSLSafeSizeBuffer<EVP_MAX_MD_SIZE> result(digest, digest_length);
51 Sign(const base::StringPiece& data, unsigned char* digest, size_t digest_length) const argument
H A Dhkdf.cc56 uint8 digest[kSHA256HashLength]; local
69 result = hmac.Sign(base::StringPiece(buf.get(), j), digest, sizeof(digest));
72 memcpy(&output_[i*sizeof(digest)], digest, sizeof(digest));
73 previous = base::StringPiece(reinterpret_cast<char*>(digest),
74 sizeof(digest));
/external/chromium_org/net/quic/crypto/
H A Dchannel_id_openssl.cc83 unsigned char digest[SHA256_DIGEST_LENGTH]; local
84 SHA256_Final(digest, &sha256);
86 return ECDSA_do_verify(digest, sizeof(digest), &sig, ecdsa_key.get()) == 1;
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Ddigest.h88 * such digest is known. */
92 * if no such digest is known. */
98 * An EVP_MD_CTX represents the state of a specific digest operation in
137 /* EVP_MAX_MD_SIZE is the largest digest size supported. Functions that output
138 * a digest generally require the buffer have at least this much space. */
141 /* EVP_DigestFinal_ex finishes the digest in |ctx| and writes the output to
156 * |len| bytes from |data| and writes the digest to |md_out|. At most
180 /* EVP_MD_size returns the digest size of |md|, in bytes. */
186 /* EVP_MD_FLAG_PKEY_DIGEST indicates the the digest function is used with a
192 * DigestAlgorithmIdentifier representing this digest functio
244 const EVP_MD *digest; member in struct:env_md_ctx_st
[all...]
/external/chromium_org/third_party/skia/src/utils/
H A DSkBitmapHasher.cpp46 SkMD5::Digest digest; local
47 out.finish(digest);
48 *result = first_8_bytes_as_uint64(digest.data);
/external/chromium_org/third_party/skia/tests/
H A DMD5Test.cpp27 SkMD5::Digest digest; local
28 context.finish(digest);
30 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest));
41 SkMD5::Digest digest; local
42 context.finish(digest);
44 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest));
50 SkMD5::Digest digest; member in struct:MD5Test
56 { "message digest", {{ 0xf9, 0x6b, 0x69, 0x7d, 0x7c, 0xb7, 0x93, 0x8d, 0x52, 0x5a, 0x2f, 0x31, 0xaa, 0xf1, 0x61, 0xd0 }} },
64 md5_test(md5_tests[i].message, md5_tests[i].digest, reporter);
H A DSHA1Test.cpp23 const SkSHA1::Digest digest; member in struct:SHA1Test
43 SkSHA1::Digest digest; local
44 context.finish(digest);
46 REPORTER_ASSERT(reporter, digests_equal(test.digest, digest));
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/dbgfmts/codeview/
H A Dcv-dbgfmt.h35 unsigned char digest[16]; /* MD5 digest of source file */ member in struct:__anon16316
/external/lzma/CS/7zip/Common/
H A DCRC.cs50 static bool VerifyDigest(uint digest, byte[] data, uint offset, uint size) argument
52 return (CalculateDigest(data, offset, size) == digest);
/external/openssl/crypto/hmac/
H A Dhmactest.c88 unsigned char *digest; member in struct:test_st
150 if (strcmp(p,(char *)test[i].digest) != 0)
153 printf("got %s instead of %s\n",p,test[i].digest);
/external/skia/src/utils/
H A DSkBitmapHasher.cpp46 SkMD5::Digest digest; local
47 out.finish(digest);
48 *result = first_8_bytes_as_uint64(digest.data);
/external/skia/tests/
H A DMD5Test.cpp27 SkMD5::Digest digest; local
28 context.finish(digest);
30 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest));
41 SkMD5::Digest digest; local
42 context.finish(digest);
44 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest));
50 SkMD5::Digest digest; member in struct:MD5Test
56 { "message digest", {{ 0xf9, 0x6b, 0x69, 0x7d, 0x7c, 0xb7, 0x93, 0x8d, 0x52, 0x5a, 0x2f, 0x31, 0xaa, 0xf1, 0x61, 0xd0 }} },
64 md5_test(md5_tests[i].message, md5_tests[i].digest, reporter);
H A DSHA1Test.cpp23 const SkSHA1::Digest digest; member in struct:SHA1Test
43 SkSHA1::Digest digest; local
44 context.finish(digest);
46 REPORTER_ASSERT(reporter, digests_equal(test.digest, digest));
/external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/
H A DSocks5Client.java44 /* SHA-1 digest identifying the SOCKS5 stream */
45 protected String digest; field in class:Socks5Client
51 * @param digest identifying the SOCKS5 Bytestream
53 public Socks5Client(StreamHost streamHost, String digest) { argument
55 this.digest = digest;
123 * requesting a stream for the given digest. Currently only the no-authentication method is
161 // request SOCKS5 connection with given address/digest
182 * type "domain" and the digest as address.
189 byte addr[] = this.digest
[all...]
H A DSocks5ClientForInitiator.java50 * @param digest identifying the SOCKS5 Bytestream
55 public Socks5ClientForInitiator(StreamHost streamHost, String digest, Connection connection, argument
57 super(streamHost, digest);
70 socket = socks5Server.getSocket(this.digest);
/external/smack/src/org/jivesoftware/smackx/pubsub/
H A DSubscribeOptionFields.java39 digest, enum constant in enum:SubscribeOptionFields
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DDigestInputStream2Test.java33 MessageDigest digest; field in class:DigestInputStream2Test
42 DigestInputStream dis = new DigestInputStream(inStream, digest);
52 DigestInputStream dis = new DigestInputStream(inStream, digest);
53 assertEquals("getMessageDigest returned a bogus result", digest, dis
62 MessageDigest originalDigest = (MessageDigest) (digest.clone());
63 MessageDigest noChangeDigest = (MessageDigest) (digest.clone());
71 // make sure the digest for the part where it was off has not
74 MessageDigest.isEqual(noChangeDigest.digest(), originalDigest
75 .digest()));
76 MessageDigest changeDigest = (MessageDigest) (digest
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
H A DPKCS5S2ParametersGenerator.java38 public PKCS5S2ParametersGenerator(Digest digest) argument
40 hMac = new HMac(digest);
/external/chromium_org/base/
H A Dmd5_unittest.cc16 MD5Digest digest; local
26 digest.a[i] = data[i] & 0xff;
28 std::string actual = MD5DigestToBase16(digest);
35 MD5Digest digest; local
38 MD5Sum(data, strlen(data), &digest);
48 EXPECT_EQ(expected[i], digest.a[i] & 0xFF);
52 MD5Digest digest; local
55 MD5Sum(data, strlen(data), &digest);
65 EXPECT_EQ(expected[i], digest.a[i] & 0xFF);
75 MD5Digest digest; local
93 MD5Digest digest; local
130 MD5Digest digest; local
198 MD5Digest digest; local
241 MD5Digest digest; local
[all...]
/external/chromium_org/components/visitedlink/common/
H A Dvisitedlink_common.cc90 base::MD5Digest digest; local
91 base::MD5Final(&digest, &ctx);
93 // This is the same as "return *(Fingerprint*)&digest.a;" but if we do that
99 *reinterpret_cast<uint8(*)[8]>(&digest.a));

Completed in 1800 milliseconds

1234567891011>>