/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
H A D | BCMessageDigest.java | 1 package org.bouncycastle.jcajce.provider.digest; 10 protected Digest digest; field in class:BCMessageDigest 13 Digest digest) 15 super(digest.getAlgorithmName()); 17 this.digest = digest; 22 digest.reset(); 28 digest.update(input); 36 digest.update(input, offset, len); 41 byte[] digestBytes = new byte[digest 12 BCMessageDigest( Digest digest) argument [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/ |
H A D | RawContentVerifier.java | 5 * verified using the digest of the calculated data. 10 * Verify that the expected signature value was derived from the passed in digest. 12 * @param digest digest calculated from the content. 14 * @return true if the expected signature is derived from the digest, false otherwise. 16 boolean verify(byte[] digest, byte[] expected); argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
H A D | HMac.java | 24 private Digest digest; field in class:HMac 65 Digest digest) 67 if (digest instanceof ExtendedDigest) 69 return ((ExtendedDigest)digest).getByteLength(); 72 Integer b = (Integer)blockLengths.get(digest.getAlgorithmName()); 76 throw new IllegalArgumentException("unknown digest passed: " + digest.getAlgorithmName()); 83 * Base constructor for one of the standard digest algorithms that the 86 * @param digest the digest 64 getByteLength( Digest digest) argument 88 HMac( Digest digest) argument 94 HMac( Digest digest, int byteLength) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
H A D | DigestOutputStream.java | 11 protected Digest digest; field in class:DigestOutputStream 16 this.digest = Digest; 22 digest.update((byte)b); 31 digest.update(b, off, len); 36 byte[] res = new byte[digest.getDigestSize()]; 38 digest.doFinal(res, 0);
|
H A D | DigestInputStream.java | 12 protected Digest digest; field in class:DigestInputStream 16 Digest digest) 19 this.digest = digest; 29 digest.update((byte)b); 43 digest.update(b, off, n); 50 return digest; 14 DigestInputStream( InputStream stream, Digest digest) argument
|
/external/smack/src/org/xbill/DNS/utils/ |
H A D | HMAC.java | 16 private MessageDigest digest; field in class:HMAC 29 key = digest.digest(key); 30 digest.reset(); 42 digest.update(ipad); 47 * @param digest The message digest object. 48 * @param blockLength The block length of the message digest. 52 HMAC(MessageDigest digest, int blockLength, byte [] key) { argument 53 digest 87 HMAC(MessageDigest digest, byte [] key) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | PKCS5S1ParametersGenerator.java | 12 * digest used to drive it. 21 private Digest digest; field in class:PKCS5S1ParametersGenerator 26 * @param digest the digest to be used as the source of derived keys. 29 Digest digest) 31 this.digest = digest; 39 byte[] digestBytes = new byte[digest.getDigestSize()]; 41 digest.update(password, 0, password.length); 42 digest 28 PKCS5S1ParametersGenerator( Digest digest) argument [all...] |
H A D | OpenSSLPBEParametersGenerator.java | 23 private Digest digest = AndroidDigestFactory.getMD5(); field in class:OpenSSLPBEParametersGenerator 52 byte[] buf = new byte[digest.getDigestSize()]; 58 digest.update(password, 0, password.length); 59 digest.update(salt, 0, salt.length); 61 digest.doFinal(buf, 0); 75 digest.reset(); 76 digest.update(buf, 0, buf.length);
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | messagedigest.cc | 39 MessageDigest* digest = new OpenSSLDigest(alg); local 40 if (digest->Size() == 0) { // invalid algorithm 41 delete digest; 42 digest = NULL; 44 return digest; 46 MessageDigest* digest = NULL; 48 digest = new Md5Digest(); 50 digest = new Sha1Digest(); 52 return digest; 69 size_t ComputeDigest(MessageDigest* digest, cons argument 83 ComputeDigest(MessageDigest* digest, const std::string& input) argument 107 ComputeHmac(MessageDigest* digest, const void* key, size_t key_len, const void* input, size_t in_len, void* output, size_t out_len) argument 155 ComputeHmac(MessageDigest* digest, const std::string& key, const std::string& input) argument [all...] |
/external/chromium_org/crypto/ |
H A D | hmac.cc | 37 const base::StringPiece& digest) const { 38 if (digest.size() != DigestLength()) 40 return VerifyTruncated(data, digest); 44 const base::StringPiece& digest) const { 45 if (digest.empty()) 53 return SecureMemEqual(digest.data(), computed_digest.get(), 54 std::min(digest.size(), digest_length));
|
/external/chromium_org/third_party/skia/tests/ |
H A D | BitmapHasherTest.cpp | 27 uint64_t digest; local 30 REPORTER_ASSERT(reporter, SkBitmapHasher::ComputeDigest(bitmap, &digest)); 31 REPORTER_ASSERT(reporter, digest == 0xfb2903562766ef87ULL); 34 REPORTER_ASSERT(reporter, SkBitmapHasher::ComputeDigest(bitmap, &digest)); 35 REPORTER_ASSERT(reporter, digest == 0xfe04023fb97d0f61ULL); 38 REPORTER_ASSERT(reporter, SkBitmapHasher::ComputeDigest(bitmap, &digest)); 39 REPORTER_ASSERT(reporter, digest == 0x2423c51cad6d1edcULL);
|
/external/skia/tests/ |
H A D | BitmapHasherTest.cpp | 28 uint64_t digest; local 31 REPORTER_ASSERT(reporter, SkBitmapHasher::ComputeDigest(bitmap, &digest)); 32 REPORTER_ASSERT(reporter, digest == 0xfb2903562766ef87ULL); 35 REPORTER_ASSERT(reporter, SkBitmapHasher::ComputeDigest(bitmap, &digest)); 36 REPORTER_ASSERT(reporter, digest == 0xfe04023fb97d0f61ULL); 39 REPORTER_ASSERT(reporter, SkBitmapHasher::ComputeDigest(bitmap, &digest)); 40 REPORTER_ASSERT(reporter, digest == 0x2423c51cad6d1edcULL);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | DigestInputStream2Test.java | 33 MessageDigest digest; field in class:DigestInputStream2Test 42 DigestInputStream dis = new DigestInputStream(inStream, digest); 52 DigestInputStream dis = new DigestInputStream(inStream, digest); 53 assertEquals("getMessageDigest returned a bogus result", digest, dis 62 MessageDigest originalDigest = (MessageDigest) (digest.clone()); 63 MessageDigest noChangeDigest = (MessageDigest) (digest.clone()); 71 // make sure the digest for the part where it was off has not 74 MessageDigest.isEqual(noChangeDigest.digest(), originalDigest 75 .digest())); 76 MessageDigest changeDigest = (MessageDigest) (digest [all...] |
/external/chromium_org/base/ |
H A D | md5.h | 31 // MD5Digest digest; // the result of the computation 32 // MD5Final(&digest, &ctx); 34 // You can call MD5DigestToBase16() to generate a string of the digest. 46 // The given 'digest' structure will be filled with the result data. 47 BASE_EXPORT void MD5Sum(const void* data, size_t length, MD5Digest* digest); 58 // Finalizes the MD5 operation and fills the buffer with the digest. 59 BASE_EXPORT void MD5Final(MD5Digest* digest, MD5Context* context); 61 // MD5IntermediateFinal() generates a digest without finalizing the MD5 63 // without affecting the digest generated for the entire input. 64 BASE_EXPORT void MD5IntermediateFinal(MD5Digest* digest, [all...] |
H A D | md5_unittest.cc | 16 MD5Digest digest; local 26 digest.a[i] = data[i] & 0xff; 28 std::string actual = MD5DigestToBase16(digest); 35 MD5Digest digest; local 38 MD5Sum(data, strlen(data), &digest); 48 EXPECT_EQ(expected[i], digest.a[i] & 0xFF); 52 MD5Digest digest; local 55 MD5Sum(data, strlen(data), &digest); 65 EXPECT_EQ(expected[i], digest.a[i] & 0xFF); 75 MD5Digest digest; local 93 MD5Digest digest; local 130 MD5Digest digest; local 198 MD5Digest digest; local 241 MD5Digest digest; local [all...] |
/external/chromium_org/components/metrics/ |
H A D | metrics_hashes.cc | 32 base::MD5Digest digest; local 33 base::MD5Final(&digest, &context); 35 std::string hash_str(reinterpret_cast<char*>(digest.a), arraysize(digest.a));
|
/external/ppp/pppd/ |
H A D | chap-new.h | 45 * CHAP digest codes. 66 /* Return the digest alg. ID for the most preferred digest type. */ 73 /* Return the bit flag (lsb set) for our most preferred digest type. */ 76 /* Return the bit flag for a given digest algorithm ID. */ 77 #define CHAP_MDTYPE_D(digest) \ 78 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 79 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 80 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 83 /* Can we do the requested digest [all...] |
/external/smack/src/org/xbill/DNS/ |
H A D | DLVRecord.java | 28 private byte [] digest; field in class:DLVRecord 41 * @param digestid The digest id code. 42 * @param digest A hash of the original key. 46 int digestid, byte [] digest) 52 this.digest = digest; 60 digest = in.readByteArray(); 68 digest = st.getHex(); 82 if (digest != null) { 84 sb.append(base16.toString(digest)); 45 DLVRecord(Name name, int dclass, long ttl, int footprint, int alg, int digestid, byte [] digest) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
H A D | PBESecretKeyFactory.java | 18 private int digest; field in class:PBESecretKeyFactory 27 int digest, 35 this.digest = digest; 51 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 56 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 60 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 63 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param); 22 PBESecretKeyFactory( String algorithm, ASN1ObjectIdentifier oid, boolean forCipher, int scheme, int digest, int keySize, int ivSize) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
H A D | DSABase.java | 17 protected Digest digest; field in class:DSABase 22 Digest digest, 26 this.digest = digest; 35 digest.update(b); 44 digest.update(b, off, len); 50 byte[] hash = new byte[digest.getDigestSize()]; 52 digest.doFinal(hash, 0); 70 byte[] hash = new byte[digest.getDigestSize()]; 72 digest 21 DSABase( Digest digest, DSA signer, DSAEncoder encoder) argument [all...] |
/external/smack/src/org/jivesoftware/smack/packet/ |
H A D | Authentication.java | 33 private String digest = null; field in class:Authentication 86 * Returns the password digest or <tt>null</tt> if the digest hasn't 88 * authentication compared to plain text. The digest is the hex-encoded 90 * digest and password are set, digest authentication will be used. If 93 * @return the digest of the user's password. 96 return digest; 100 * Sets the digest value using a connection ID and password. Password 102 * plain text. The digest i 126 setDigest(String digest) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | DigestInfo.java | 19 * digest OCTET STRING } 25 private byte[] digest; field in class:DigestInfo 52 byte[] digest) 54 this.digest = digest; 64 digest = ASN1OctetString.getInstance(e.nextElement()).getOctets(); 74 return digest; 82 v.add(new DEROctetString(digest)); 50 DigestInfo( AlgorithmIdentifier algId, byte[] digest) argument
|
/external/openssl/crypto/evp/ |
H A D | digest.c | 1 /* crypto/evp/digest.c */ 153 if (ctx->engine && ctx->digest && (!type || 154 (type && (type->type == ctx->digest->type)))) 185 /* We'll use the ENGINE's private digest definition */ 196 if(!ctx->digest) 202 if (ctx->digest != type) 204 if (ctx->digest && ctx->digest->ctx_size) 206 ctx->digest=type; 242 return ctx->digest [all...] |
/external/chromium_org/third_party/libaddressinput/src/cpp/src/util/ |
H A D | md5.h | 35 // MD5Digest digest; // the result of the computation 36 // MD5Final(&digest, &ctx); 38 // You can call MD5DigestToBase16() to generate a string of the digest. 50 // The given 'digest' structure will be filled with the result data. 51 void MD5Sum(const void* data, size_t length, MD5Digest* digest); 62 // Finalizes the MD5 operation and fills the buffer with the digest. 63 void MD5Final(MD5Digest* digest, MD5Context* context); 65 // Converts a digest into human-readable hexadecimal. 66 std::string MD5DigestToBase16(const MD5Digest& digest);
|
/external/chromium_org/chrome/browser/profile_resetter/ |
H A D | jtl_foundation.cc | 23 unsigned char digest[kHashSizeInBytes]; local 24 if (!hmac_.Sign(input, digest, arraysize(digest))) { 30 cached_hashes_[input] = base::HexEncode(digest, kHashSizeInBytes / 2);
|