Searched refs:digest (Results 126 - 150 of 338) sorted by relevance

1234567891011>>

/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
H A DDigestAlgorithmProvider.java1 package org.bouncycastle.jcajce.provider.digest;
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
H A DCertBlacklist.java217 Digest digest = AndroidDigestFactory.getSHA1();
218 digest.update(encoded, 0, encoded.length);
219 byte[] out = new byte[digest.getDigestSize()];
220 digest.doFinal(out, 0);
/external/glide/library/src/main/java/com/bumptech/glide/load/engine/cache/
H A DSafeKeyGenerator.java26 safeKey = Util.sha256BytesToHex(messageDigest.digest());
/external/openssh/
H A Droaming_client.c45 #include "digest.h"
88 u_char digest[SSH_DIGEST_MAX_LENGTH]; local
103 if (ssh_digest_buffer(SSH_DIGEST_SHA1, &b, digest, sizeof(digest)) != 0)
109 packet_put_raw(digest, ssh_digest_bytes(SSH_DIGEST_SHA1));
/external/skia/src/utils/
H A DSkMD5.h24 /** Processes input, adding it to the digest.
34 /** Processes input, adding it to the digest. Calling this after finish is undefined. */
47 /** Computes and returns the digest. */
48 void finish(Digest& digest);
/external/vboot_reference/firmware/2lib/
H A D2stub.c55 int vb2ex_hwcrypto_digest_finalize(uint8_t *digest, argument
H A D2sha256.c281 void vb2_sha256_finalize(struct vb2_sha256_context *ctx, uint8_t *digest) argument
304 UNPACK32(ctx->h[i], &digest[i << 2]);
307 UNPACK32(ctx->h[0], &digest[ 0]);
308 UNPACK32(ctx->h[1], &digest[ 4]);
309 UNPACK32(ctx->h[2], &digest[ 8]);
310 UNPACK32(ctx->h[3], &digest[12]);
311 UNPACK32(ctx->h[4], &digest[16]);
312 UNPACK32(ctx->h[5], &digest[20]);
313 UNPACK32(ctx->h[6], &digest[24]);
314 UNPACK32(ctx->h[7], &digest[2
[all...]
H A D2sha512.c311 void vb2_sha512_finalize(struct vb2_sha512_context *ctx, uint8_t *digest) argument
334 UNPACK64(ctx->h[0], &digest[ 0]);
335 UNPACK64(ctx->h[1], &digest[ 8]);
336 UNPACK64(ctx->h[2], &digest[16]);
337 UNPACK64(ctx->h[3], &digest[24]);
338 UNPACK64(ctx->h[4], &digest[32]);
339 UNPACK64(ctx->h[5], &digest[40]);
340 UNPACK64(ctx->h[6], &digest[48]);
341 UNPACK64(ctx->h[7], &digest[56]);
344 UNPACK64(ctx->h[i], &digest[
[all...]
/external/vboot_reference/firmware/lib/cryptolib/include/
H A Drsa.h63 * of data, its digest is passed as the argument. */
66 const uint8_t* digest,
/external/vboot_reference/firmware/lib20/include/
H A Dvb2_common.h96 * Verify a signature against an expected hash digest.
100 * @param digest Digest of signed data
106 const uint8_t *digest,
/external/vboot_reference/firmware/lib21/include/
H A Dvb2_common.h116 * Verify a signature against an expected hash digest.
120 * @param digest Digest of signed data
126 const uint8_t *digest,
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
H A DDigitalSignatureTest.java71 sha.digest(sha_hash, 0, sha_hash.length);
72 md5.digest(md5_hash, 0, md5_hash.length);
/external/vboot_reference/firmware/lib21/
H A Dcommon.c229 const uint8_t *digest,
248 digest, key_sig_size))
253 /* RSA-signed digest */
256 digest, wb);
268 uint8_t *digest; local
282 digest = vb2_workbuf_alloc(&wblocal, digest_size);
283 if (!digest)
299 rv = vb2_digest_finalize(dc, digest, digest_size);
305 return vb2_verify_digest(key, sig, digest, &wblocal);
227 vb2_verify_digest(const struct vb2_public_key *key, struct vb2_signature *sig, const uint8_t *digest, const struct vb2_workbuf *wb) argument
/external/jetty/src/java/org/eclipse/jetty/client/security/
H A DDigestAuthentication.java80 // calc A1 digest
86 byte[] ha1 = md.digest();
87 // calc A2 digest
92 byte[] ha2=md.digest();
105 byte[] digest=md.digest();
107 // check digest
108 return encode(digest);
121 byte[] b= md.digest(String.valueOf(System.currentTimeMillis()).getBytes(StringUtil.__ISO_8859_1));
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/
H A Dauth_tkt.py66 whether to secure the cookie and the digest algorithm (for details
112 # correct specification of digest from hashlib or fail
117 def digest(self): member in class:AuthTicket
123 v = '%s%08x%s!' % (self.digest(), int(self.time), url_quote(self.userid))
141 far enough to determine what the expected digest should have
158 # correct specification of digest from hashlib or fail
162 digest = ticket[:digest_hexa_size]
183 if expected != digest:
185 expected=(expected, digest))
202 digest
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pwd_common.c32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument
35 crypto_hash_finish(hash, digest, &len);
44 u8 digest[SHA256_MAC_LEN]; local
59 crypto_hash_update(hash, digest, SHA256_MAC_LEN);
64 if (crypto_hash_finish(hash, digest, &mdlen) < 0)
67 os_memcpy(result + len, digest, resultbytelen - len);
69 os_memcpy(result + len, digest, mdlen);
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pwd_common.c32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument
35 crypto_hash_finish(hash, digest, &len);
44 u8 digest[SHA256_MAC_LEN]; local
59 crypto_hash_update(hash, digest, SHA256_MAC_LEN);
64 if (crypto_hash_finish(hash, digest, &mdlen) < 0)
67 os_memcpy(result + len, digest, resultbytelen - len);
69 os_memcpy(result + len, digest, mdlen);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pwd_common.c32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument
35 crypto_hash_finish(hash, digest, &len);
44 u8 digest[SHA256_MAC_LEN]; local
59 crypto_hash_update(hash, digest, SHA256_MAC_LEN);
64 if (crypto_hash_finish(hash, digest, &mdlen) < 0)
67 os_memcpy(result + len, digest, resultbytelen - len);
69 os_memcpy(result + len, digest, mdlen);
/external/ipsec-tools/src/racoon/missing/crypto/sha2/
H A Dsha2.c328 * digest to a readable hexadecimal character string:
566 void SHA256_Final(sha2_byte digest[], SHA256_CTX* context) { argument
567 sha2_word32 *d = (sha2_word32*)digest;
573 /* If no digest buffer is passed, we don't bother doing this: */
574 if (digest != (sha2_byte*)0) {
630 sha2_byte digest[SHA256_DIGEST_LENGTH], *d = digest; local
637 SHA256_Final(digest, context);
648 bzero(digest, SHA256_DIGEST_LENGTH);
652 char* SHA256_Data(const sha2_byte* data, size_t len, char digest[SHA256_DIGEST_STRING_LENGT argument
929 SHA512_Final(sha2_byte digest[], SHA512_CTX* context) argument
959 sha2_byte digest[SHA512_DIGEST_LENGTH], *d = digest; local
981 SHA512_Data(const sha2_byte* data, size_t len, char digest[SHA512_DIGEST_STRING_LENGTH]) argument
1004 SHA384_Final(sha2_byte digest[], SHA384_CTX* context) argument
1034 sha2_byte digest[SHA384_DIGEST_LENGTH], *d = digest; local
1056 SHA384_Data(const sha2_byte* data, size_t len, char digest[SHA384_DIGEST_STRING_LENGTH]) argument
[all...]
/external/boringssl/src/crypto/bn/
H A Drandom.c254 uint8_t digest[SHA512_DIGEST_LENGTH]; local
301 SHA512_Final(digest, &sha);
307 memcpy(k_bytes + done, digest, todo);
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/
H A DMessageDigestAlgorithm.java21 * to produce the digest and a checksum.
34 * @return a digest response as defined in rfc2617
55 // digest as specified by rfc2617
95 * to produce the digest and a checksum.
111 * @return a digest response as defined in rfc2617
132 // digest as specified by rfc2617
181 MessageDigest digest = MessageDigest.getInstance("MD5");
183 return toHexString(digest.digest(data.getBytes()));
/external/toybox/scripts/
H A Dmkflags.c52 struct flag *digest(char *string) function
152 flist = digest(flags);
153 offlist = aflist = digest(allflags);
/external/vboot_reference/host/lib/
H A Dutil_misc.c25 uint8_t *digest = DigestBuf(buf, buflen, SHA1_DIGEST_ALGORITHM); local
28 printf("%02x", digest[i]);
29 free(digest);
/external/okhttp/okio/okio/src/main/java/okio/
H A DByteString.java107 return digest("MD5");
112 return digest("SHA-256");
115 private ByteString digest(String digest) { argument
117 return ByteString.of(MessageDigest.getInstance(digest).digest(data));
/external/boringssl/include/openssl/
H A Ddigest.h92 * such digest is known. */
96 * if no such digest is known. */
102 * An EVP_MD_CTX represents the state of a specific digest operation in
141 /* EVP_MAX_MD_SIZE is the largest digest size supported. Functions that output
142 * a digest generally require the buffer have at least this much space. */
145 /* EVP_DigestFinal_ex finishes the digest in |ctx| and writes the output to
159 * |len| bytes from |data| and writes the digest to |md_out|. At most
180 /* EVP_MD_size returns the digest size of |md|, in bytes. */
186 /* EVP_MD_FLAG_PKEY_DIGEST indicates the the digest function is used with a
192 * DigestAlgorithmIdentifier representing this digest functio
236 const EVP_MD *digest; member in struct:env_md_ctx_st
[all...]

Completed in 624 milliseconds

1234567891011>>