/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
H A D | DigestAlgorithmProvider.java | 1 package org.bouncycastle.jcajce.provider.digest;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertBlacklist.java | 217 Digest digest = AndroidDigestFactory.getSHA1(); 218 digest.update(encoded, 0, encoded.length); 219 byte[] out = new byte[digest.getDigestSize()]; 220 digest.doFinal(out, 0);
|
/external/glide/library/src/main/java/com/bumptech/glide/load/engine/cache/ |
H A D | SafeKeyGenerator.java | 26 safeKey = Util.sha256BytesToHex(messageDigest.digest());
|
/external/openssh/ |
H A D | roaming_client.c | 45 #include "digest.h" 88 u_char digest[SSH_DIGEST_MAX_LENGTH]; local 103 if (ssh_digest_buffer(SSH_DIGEST_SHA1, &b, digest, sizeof(digest)) != 0) 109 packet_put_raw(digest, ssh_digest_bytes(SSH_DIGEST_SHA1));
|
/external/skia/src/utils/ |
H A D | SkMD5.h | 24 /** Processes input, adding it to the digest. 34 /** Processes input, adding it to the digest. Calling this after finish is undefined. */ 47 /** Computes and returns the digest. */ 48 void finish(Digest& digest);
|
/external/vboot_reference/firmware/2lib/ |
H A D | 2stub.c | 55 int vb2ex_hwcrypto_digest_finalize(uint8_t *digest, argument
|
H A D | 2sha256.c | 281 void vb2_sha256_finalize(struct vb2_sha256_context *ctx, uint8_t *digest) argument 304 UNPACK32(ctx->h[i], &digest[i << 2]); 307 UNPACK32(ctx->h[0], &digest[ 0]); 308 UNPACK32(ctx->h[1], &digest[ 4]); 309 UNPACK32(ctx->h[2], &digest[ 8]); 310 UNPACK32(ctx->h[3], &digest[12]); 311 UNPACK32(ctx->h[4], &digest[16]); 312 UNPACK32(ctx->h[5], &digest[20]); 313 UNPACK32(ctx->h[6], &digest[24]); 314 UNPACK32(ctx->h[7], &digest[2 [all...] |
H A D | 2sha512.c | 311 void vb2_sha512_finalize(struct vb2_sha512_context *ctx, uint8_t *digest) argument 334 UNPACK64(ctx->h[0], &digest[ 0]); 335 UNPACK64(ctx->h[1], &digest[ 8]); 336 UNPACK64(ctx->h[2], &digest[16]); 337 UNPACK64(ctx->h[3], &digest[24]); 338 UNPACK64(ctx->h[4], &digest[32]); 339 UNPACK64(ctx->h[5], &digest[40]); 340 UNPACK64(ctx->h[6], &digest[48]); 341 UNPACK64(ctx->h[7], &digest[56]); 344 UNPACK64(ctx->h[i], &digest[ [all...] |
/external/vboot_reference/firmware/lib/cryptolib/include/ |
H A D | rsa.h | 63 * of data, its digest is passed as the argument. */ 66 const uint8_t* digest,
|
/external/vboot_reference/firmware/lib20/include/ |
H A D | vb2_common.h | 96 * Verify a signature against an expected hash digest. 100 * @param digest Digest of signed data 106 const uint8_t *digest,
|
/external/vboot_reference/firmware/lib21/include/ |
H A D | vb2_common.h | 116 * Verify a signature against an expected hash digest. 120 * @param digest Digest of signed data 126 const uint8_t *digest,
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | DigitalSignatureTest.java | 71 sha.digest(sha_hash, 0, sha_hash.length); 72 md5.digest(md5_hash, 0, md5_hash.length);
|
/external/vboot_reference/firmware/lib21/ |
H A D | common.c | 229 const uint8_t *digest, 248 digest, key_sig_size)) 253 /* RSA-signed digest */ 256 digest, wb); 268 uint8_t *digest; local 282 digest = vb2_workbuf_alloc(&wblocal, digest_size); 283 if (!digest) 299 rv = vb2_digest_finalize(dc, digest, digest_size); 305 return vb2_verify_digest(key, sig, digest, &wblocal); 227 vb2_verify_digest(const struct vb2_public_key *key, struct vb2_signature *sig, const uint8_t *digest, const struct vb2_workbuf *wb) argument
|
/external/jetty/src/java/org/eclipse/jetty/client/security/ |
H A D | DigestAuthentication.java | 80 // calc A1 digest 86 byte[] ha1 = md.digest(); 87 // calc A2 digest 92 byte[] ha2=md.digest(); 105 byte[] digest=md.digest(); 107 // check digest 108 return encode(digest); 121 byte[] b= md.digest(String.valueOf(System.currentTimeMillis()).getBytes(StringUtil.__ISO_8859_1));
|
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/ |
H A D | auth_tkt.py | 66 whether to secure the cookie and the digest algorithm (for details 112 # correct specification of digest from hashlib or fail 117 def digest(self): member in class:AuthTicket 123 v = '%s%08x%s!' % (self.digest(), int(self.time), url_quote(self.userid)) 141 far enough to determine what the expected digest should have 158 # correct specification of digest from hashlib or fail 162 digest = ticket[:digest_hexa_size] 183 if expected != digest: 185 expected=(expected, digest)) 202 digest [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.c | 32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument 35 crypto_hash_finish(hash, digest, &len); 44 u8 digest[SHA256_MAC_LEN]; local 59 crypto_hash_update(hash, digest, SHA256_MAC_LEN); 64 if (crypto_hash_finish(hash, digest, &mdlen) < 0) 67 os_memcpy(result + len, digest, resultbytelen - len); 69 os_memcpy(result + len, digest, mdlen);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.c | 32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument 35 crypto_hash_finish(hash, digest, &len); 44 u8 digest[SHA256_MAC_LEN]; local 59 crypto_hash_update(hash, digest, SHA256_MAC_LEN); 64 if (crypto_hash_finish(hash, digest, &mdlen) < 0) 67 os_memcpy(result + len, digest, resultbytelen - len); 69 os_memcpy(result + len, digest, mdlen);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pwd_common.c | 32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument 35 crypto_hash_finish(hash, digest, &len); 44 u8 digest[SHA256_MAC_LEN]; local 59 crypto_hash_update(hash, digest, SHA256_MAC_LEN); 64 if (crypto_hash_finish(hash, digest, &mdlen) < 0) 67 os_memcpy(result + len, digest, resultbytelen - len); 69 os_memcpy(result + len, digest, mdlen);
|
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
H A D | sha2.c | 328 * digest to a readable hexadecimal character string: 566 void SHA256_Final(sha2_byte digest[], SHA256_CTX* context) { argument 567 sha2_word32 *d = (sha2_word32*)digest; 573 /* If no digest buffer is passed, we don't bother doing this: */ 574 if (digest != (sha2_byte*)0) { 630 sha2_byte digest[SHA256_DIGEST_LENGTH], *d = digest; local 637 SHA256_Final(digest, context); 648 bzero(digest, SHA256_DIGEST_LENGTH); 652 char* SHA256_Data(const sha2_byte* data, size_t len, char digest[SHA256_DIGEST_STRING_LENGT argument 929 SHA512_Final(sha2_byte digest[], SHA512_CTX* context) argument 959 sha2_byte digest[SHA512_DIGEST_LENGTH], *d = digest; local 981 SHA512_Data(const sha2_byte* data, size_t len, char digest[SHA512_DIGEST_STRING_LENGTH]) argument 1004 SHA384_Final(sha2_byte digest[], SHA384_CTX* context) argument 1034 sha2_byte digest[SHA384_DIGEST_LENGTH], *d = digest; local 1056 SHA384_Data(const sha2_byte* data, size_t len, char digest[SHA384_DIGEST_STRING_LENGTH]) argument [all...] |
/external/boringssl/src/crypto/bn/ |
H A D | random.c | 254 uint8_t digest[SHA512_DIGEST_LENGTH]; local 301 SHA512_Final(digest, &sha); 307 memcpy(k_bytes + done, digest, todo);
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
H A D | MessageDigestAlgorithm.java | 21 * to produce the digest and a checksum. 34 * @return a digest response as defined in rfc2617 55 // digest as specified by rfc2617 95 * to produce the digest and a checksum. 111 * @return a digest response as defined in rfc2617 132 // digest as specified by rfc2617 181 MessageDigest digest = MessageDigest.getInstance("MD5"); 183 return toHexString(digest.digest(data.getBytes()));
|
/external/toybox/scripts/ |
H A D | mkflags.c | 52 struct flag *digest(char *string) function 152 flist = digest(flags); 153 offlist = aflist = digest(allflags);
|
/external/vboot_reference/host/lib/ |
H A D | util_misc.c | 25 uint8_t *digest = DigestBuf(buf, buflen, SHA1_DIGEST_ALGORITHM); local 28 printf("%02x", digest[i]); 29 free(digest);
|
/external/okhttp/okio/okio/src/main/java/okio/ |
H A D | ByteString.java | 107 return digest("MD5"); 112 return digest("SHA-256"); 115 private ByteString digest(String digest) { argument 117 return ByteString.of(MessageDigest.getInstance(digest).digest(data));
|
/external/boringssl/include/openssl/ |
H A D | digest.h | 92 * such digest is known. */ 96 * if no such digest is known. */ 102 * An EVP_MD_CTX represents the state of a specific digest operation in 141 /* EVP_MAX_MD_SIZE is the largest digest size supported. Functions that output 142 * a digest generally require the buffer have at least this much space. */ 145 /* EVP_DigestFinal_ex finishes the digest in |ctx| and writes the output to 159 * |len| bytes from |data| and writes the digest to |md_out|. At most 180 /* EVP_MD_size returns the digest size of |md|, in bytes. */ 186 /* EVP_MD_FLAG_PKEY_DIGEST indicates the the digest function is used with a 192 * DigestAlgorithmIdentifier representing this digest functio 236 const EVP_MD *digest; member in struct:env_md_ctx_st [all...] |