/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
H A D | PBESecretKeyFactory.java | 18 private int digest; field in class:PBESecretKeyFactory 27 int digest, 35 this.digest = digest; 51 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 56 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 60 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 63 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param); 22 PBESecretKeyFactory( String algorithm, ASN1ObjectIdentifier oid, boolean forCipher, int scheme, int digest, int keySize, int ivSize) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/util/ |
H A D | AsymmetricAlgorithmProvider.java | 11 String digest, 16 String mainName = digest + "WITH" + algorithm; 17 String jdk11Variation1 = digest + "with" + algorithm; 18 String jdk11Variation2 = digest + "With" + algorithm; 19 String alias = digest + "/" + algorithm; 9 addSignatureAlgorithm( ConfigurableProvider provider, String digest, String algorithm, String className, ASN1ObjectIdentifier oid) argument
|
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
H A D | sha256.js | 11 // byte[32] digest(); 153 SHA256.prototype.digest = function(var_args) { 157 var digest = new Array(32); 177 digest[n++] = (this._chain[i] >> j) & 255; 179 return digest;
|
/external/chromium_org/content/child/webcrypto/openssl/ |
H A D | rsa_ssa_openssl.cc | 20 // Extracts the OpenSSL key and digest from a WebCrypto key. The returned 24 const EVP_MD** digest) { 27 *digest = GetDigest(key.algorithm().rsaHashedParams()->hash().id()); 28 if (!*digest) 67 const EVP_MD* digest = NULL; variable 68 Status status = GetPKeyAndDigest(key, &private_key, &digest); 77 !EVP_DigestSignInit(ctx.get(), NULL, digest, NULL, private_key) || 103 const EVP_MD* digest = NULL; variable 104 Status status = GetPKeyAndDigest(key, &public_key, &digest); 108 if (!EVP_DigestVerifyInit(ctx.get(), NULL, digest, NUL 22 GetPKeyAndDigest(const blink::WebCryptoKey& key, EVP_PKEY** pkey, const EVP_MD** digest) argument [all...] |
H A D | rsa_oaep_openssl.cc | 47 const EVP_MD* digest = local 49 if (!digest) 56 1 != EVP_PKEY_CTX_set_rsa_oaep_md(ctx.get(), digest) || 57 1 != EVP_PKEY_CTX_set_rsa_mgf1_md(ctx.get(), digest)) {
|
/external/chromium_org/crypto/ |
H A D | hmac_openssl.cc | 52 unsigned char* digest, 56 ScopedOpenSSLSafeSizeBuffer<EVP_MAX_MD_SIZE> result(digest, digest_length); 51 Sign(const base::StringPiece& data, unsigned char* digest, size_t digest_length) const argument
|
H A D | hkdf.cc | 56 uint8 digest[kSHA256HashLength]; local 69 result = hmac.Sign(base::StringPiece(buf.get(), j), digest, sizeof(digest)); 72 memcpy(&output_[i*sizeof(digest)], digest, sizeof(digest)); 73 previous = base::StringPiece(reinterpret_cast<char*>(digest), 74 sizeof(digest));
|
/external/chromium_org/net/quic/crypto/ |
H A D | channel_id_openssl.cc | 83 unsigned char digest[SHA256_DIGEST_LENGTH]; local 84 SHA256_Final(digest, &sha256); 86 return ECDSA_do_verify(digest, sizeof(digest), &sig, ecdsa_key.get()) == 1;
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | digest.h | 88 * such digest is known. */ 92 * if no such digest is known. */ 98 * An EVP_MD_CTX represents the state of a specific digest operation in 137 /* EVP_MAX_MD_SIZE is the largest digest size supported. Functions that output 138 * a digest generally require the buffer have at least this much space. */ 141 /* EVP_DigestFinal_ex finishes the digest in |ctx| and writes the output to 156 * |len| bytes from |data| and writes the digest to |md_out|. At most 180 /* EVP_MD_size returns the digest size of |md|, in bytes. */ 186 /* EVP_MD_FLAG_PKEY_DIGEST indicates the the digest function is used with a 192 * DigestAlgorithmIdentifier representing this digest functio 244 const EVP_MD *digest; member in struct:env_md_ctx_st [all...] |
/external/chromium_org/third_party/skia/src/utils/ |
H A D | SkBitmapHasher.cpp | 46 SkMD5::Digest digest; local 47 out.finish(digest); 48 *result = first_8_bytes_as_uint64(digest.data);
|
/external/chromium_org/third_party/skia/tests/ |
H A D | MD5Test.cpp | 27 SkMD5::Digest digest; local 28 context.finish(digest); 30 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest)); 41 SkMD5::Digest digest; local 42 context.finish(digest); 44 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest)); 50 SkMD5::Digest digest; member in struct:MD5Test 56 { "message digest", {{ 0xf9, 0x6b, 0x69, 0x7d, 0x7c, 0xb7, 0x93, 0x8d, 0x52, 0x5a, 0x2f, 0x31, 0xaa, 0xf1, 0x61, 0xd0 }} }, 64 md5_test(md5_tests[i].message, md5_tests[i].digest, reporter);
|
H A D | SHA1Test.cpp | 23 const SkSHA1::Digest digest; member in struct:SHA1Test 43 SkSHA1::Digest digest; local 44 context.finish(digest); 46 REPORTER_ASSERT(reporter, digests_equal(test.digest, digest));
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/dbgfmts/codeview/ |
H A D | cv-dbgfmt.h | 35 unsigned char digest[16]; /* MD5 digest of source file */ member in struct:__anon16316
|
/external/lzma/CS/7zip/Common/ |
H A D | CRC.cs | 50 static bool VerifyDigest(uint digest, byte[] data, uint offset, uint size)
argument 52 return (CalculateDigest(data, offset, size) == digest);
|
/external/openssl/crypto/hmac/ |
H A D | hmactest.c | 88 unsigned char *digest; member in struct:test_st 150 if (strcmp(p,(char *)test[i].digest) != 0) 153 printf("got %s instead of %s\n",p,test[i].digest);
|
/external/skia/src/utils/ |
H A D | SkBitmapHasher.cpp | 46 SkMD5::Digest digest; local 47 out.finish(digest); 48 *result = first_8_bytes_as_uint64(digest.data);
|
/external/skia/tests/ |
H A D | MD5Test.cpp | 27 SkMD5::Digest digest; local 28 context.finish(digest); 30 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest)); 41 SkMD5::Digest digest; local 42 context.finish(digest); 44 REPORTER_ASSERT(reporter, digests_equal(expectedDigest, digest)); 50 SkMD5::Digest digest; member in struct:MD5Test 56 { "message digest", {{ 0xf9, 0x6b, 0x69, 0x7d, 0x7c, 0xb7, 0x93, 0x8d, 0x52, 0x5a, 0x2f, 0x31, 0xaa, 0xf1, 0x61, 0xd0 }} }, 64 md5_test(md5_tests[i].message, md5_tests[i].digest, reporter);
|
H A D | SHA1Test.cpp | 23 const SkSHA1::Digest digest; member in struct:SHA1Test 43 SkSHA1::Digest digest; local 44 context.finish(digest); 46 REPORTER_ASSERT(reporter, digests_equal(test.digest, digest));
|
/external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/ |
H A D | Socks5Client.java | 44 /* SHA-1 digest identifying the SOCKS5 stream */
45 protected String digest;
field in class:Socks5Client 51 * @param digest identifying the SOCKS5 Bytestream
53 public Socks5Client(StreamHost streamHost, String digest) {
argument 55 this.digest = digest;
123 * requesting a stream for the given digest. Currently only the no-authentication method is
161 // request SOCKS5 connection with given address/digest
182 * type "domain" and the digest as address.
189 byte addr[] = this.digest [all...] |
H A D | Socks5ClientForInitiator.java | 50 * @param digest identifying the SOCKS5 Bytestream
55 public Socks5ClientForInitiator(StreamHost streamHost, String digest, Connection connection,
argument 57 super(streamHost, digest);
70 socket = socks5Server.getSocket(this.digest);
|
/external/smack/src/org/jivesoftware/smackx/pubsub/ |
H A D | SubscribeOptionFields.java | 39 digest,
enum constant in enum:SubscribeOptionFields
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | DigestInputStream2Test.java | 33 MessageDigest digest; field in class:DigestInputStream2Test 42 DigestInputStream dis = new DigestInputStream(inStream, digest); 52 DigestInputStream dis = new DigestInputStream(inStream, digest); 53 assertEquals("getMessageDigest returned a bogus result", digest, dis 62 MessageDigest originalDigest = (MessageDigest) (digest.clone()); 63 MessageDigest noChangeDigest = (MessageDigest) (digest.clone()); 71 // make sure the digest for the part where it was off has not 74 MessageDigest.isEqual(noChangeDigest.digest(), originalDigest 75 .digest())); 76 MessageDigest changeDigest = (MessageDigest) (digest [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | PKCS5S2ParametersGenerator.java | 38 public PKCS5S2ParametersGenerator(Digest digest) argument 40 hMac = new HMac(digest);
|
/external/chromium_org/base/ |
H A D | md5_unittest.cc | 16 MD5Digest digest; local 26 digest.a[i] = data[i] & 0xff; 28 std::string actual = MD5DigestToBase16(digest); 35 MD5Digest digest; local 38 MD5Sum(data, strlen(data), &digest); 48 EXPECT_EQ(expected[i], digest.a[i] & 0xFF); 52 MD5Digest digest; local 55 MD5Sum(data, strlen(data), &digest); 65 EXPECT_EQ(expected[i], digest.a[i] & 0xFF); 75 MD5Digest digest; local 93 MD5Digest digest; local 130 MD5Digest digest; local 198 MD5Digest digest; local 241 MD5Digest digest; local [all...] |
/external/chromium_org/components/visitedlink/common/ |
H A D | visitedlink_common.cc | 90 base::MD5Digest digest; local 91 base::MD5Final(&digest, &ctx); 93 // This is the same as "return *(Fingerprint*)&digest.a;" but if we do that 99 *reinterpret_cast<uint8(*)[8]>(&digest.a));
|