Searched refs:digest (Results 176 - 200 of 338) sorted by relevance

1234567891011>>

/external/boringssl/src/crypto/cipher/
H A Dderive_key.c61 #include <openssl/digest.h>
/external/boringssl/src/crypto/x509/
H A Da_sign.c58 #include <openssl/digest.h>
/external/boringssl/src/crypto/x509v3/
H A Dv3_skey.c61 #include <openssl/digest.h>
/external/boringssl/src/tool/
H A Ddigest.cc42 #include <openssl/digest.h>
165 uint8_t digest[EVP_MAX_MD_SIZE]; local
167 if (!EVP_DigestFinal_ex(&ctx, digest, &digest_len)) {
175 const uint8_t b = digest[i];
194 // between the digest and the filename.
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
H A DJcaDigestCalculatorProviderBuilder.java111 return dig.digest();
/external/guava/guava-tests/benchmark/com/google/common/hash/
H A DMessageDigestAlgorithmBenchmark.java52 return md.digest();
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/
H A DSHA1ImplTest.java82 byte[] dgst = md.digest();
109 byte[] dgst = md.digest();
147 byte[] dgst = md.digest();
/external/boringssl/src/crypto/evp/
H A Dpbkdf_test.cc20 #include <openssl/digest.h>
36 const EVP_MD *digest, size_t key_len,
46 (const uint8_t *)salt, salt_len, iterations, digest,
99 // Note that each of these test vectors uses SHA-1 as the digest.
34 TestPBKDF2(const void *password, size_t password_len, const void *salt, size_t salt_len, unsigned iterations, const EVP_MD *digest, size_t key_len, const uint8_t *expected_key) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/
H A DDESedeWrapEngine.java55 // checksum digest
60 byte[] digest = new byte[20]; field in class:DESedeWrapEngine
324 sha1.doFinal(digest, 0);
326 System.arraycopy(digest, 0, result, 0, 8);
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/
H A Dcookie.py55 _signature_size = len(hmac.new(b'x', b'x', sha1).digest())
148 hmac.new(self.secret, content, sha1).digest() +
167 if signature == hmac.new(self.secret, content, sha1).digest():
/external/harfbuzz_ng/src/
H A Dhb-ot-layout-private.hh125 digest.init ();
126 lookup.add_coverage (&digest);
133 hb_set_digest_t digest; member in struct:hb_ot_layout_lookup_accelerator_t
/external/iputils/ninfod/
H A Dninfod_name.c265 unsigned char digest[16]; local
272 MD5_Final(digest, &ctxt);
284 memcpy(&nigroup->s6_addr[12], digest, 4);
/external/javassist/src/main/javassist/
H A DSerialVersionUID.java187 MessageDigest digest = MessageDigest.getInstance("SHA");
188 byte[] digested = digest.digest(bout.toByteArray());
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/
H A DUtil.java195 byte[] md5bytes = messageDigest.digest(s.getBytes("UTF-8"));
206 byte[] sha1Bytes = messageDigest.digest(s.getBytes("UTF-8"));
217 byte[] sha1Bytes = messageDigest.digest(s.toByteArray());
/external/openssh/
H A Dkex.c57 #include "digest.h"
686 u_char *digest; local
691 if ((digest = calloc(1, roundup(need, mdsz))) == NULL) {
703 ssh_digest_final(hashctx, digest, mdsz) != 0) {
719 ssh_digest_update(hashctx, digest, have) != 0 ||
720 ssh_digest_final(hashctx, digest + have, mdsz) != 0) {
729 dump_digest("key", digest, need);
731 *keyp = digest;
732 digest = NULL;
735 if (digest)
830 dump_digest(char *msg, u_char *digest, int len) argument
[all...]
H A Dmac.c33 #include "digest.h"
51 int truncatebits; /* truncate digest if != 0 */
173 u_char *digest, size_t dlen)
208 if (digest != NULL) {
211 memcpy(digest, u.m, dlen);
172 mac_compute(struct sshmac *mac, u_int32_t seqno, const u_char *data, int datalen, u_char *digest, size_t dlen) argument
H A Dcipher.c50 #include "digest.h"
490 u_char digest[16]; local
495 digest, sizeof(digest))) != 0)
498 r = cipher_init(cc, cipher, digest, 16, NULL, 0, do_encrypt);
500 explicit_bzero(digest, sizeof(digest));
/external/openssh/openbsd-compat/
H A Dsha2.c545 SHA256_Final(u_int8_t digest[SHA256_DIGEST_LENGTH], SHA256_CTX *context) argument
549 /* If no digest buffer is passed, we don't bother doing this: */
550 if (digest != NULL) {
556 BE_32_TO_8(digest + i * 4, context->state[i]);
558 memcpy(digest, context->state, SHA256_DIGEST_LENGTH);
826 SHA512_Final(u_int8_t digest[SHA512_DIGEST_LENGTH], SHA512_CTX *context) argument
830 /* If no digest buffer is passed, we don't bother doing this: */
831 if (digest != NULL) {
837 BE_64_TO_8(digest + i * 8, context->state[i]);
839 memcpy(digest, contex
883 SHA384_Final(u_int8_t digest[SHA384_DIGEST_LENGTH], SHA384_CTX *context) argument
[all...]
/external/ppp/pppd/plugins/radius/
H A Dradius.c78 struct chap_digest_type *digest,
87 struct chap_digest_type *digest,
323 * digest -- points to the structure representing the digest type
335 struct chap_digest_type *digest,
363 if ((digest->code != CHAP_MD5)
365 && (digest->code != CHAP_MICROSOFT)
366 && (digest->code != CHAP_MICROSOFT_V2)
369 error("RADIUS: Challenge type %u unsupported", digest->code);
397 switch (digest
334 radius_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
537 radius_setparams(VALUE_PAIR *vp, char *msg, REQUEST_INFO *req_info, struct chap_digest_type *digest, unsigned char *challenge, char *message, int message_space) argument
[all...]
/external/sfntly/cpp/src/sfntly/
H A Dfont.h152 void SetDigest(ByteVector* digest);
237 // Gets a copy of the fonts digest that was created when the font was read. If
238 // no digest was set at creation time then the return result will be null.
239 ByteVector* digest() { return &digest_; } function in class:sfntly::Font
300 // @param digest the computed digest for the font; null if digest was not
302 // Note: Current C++ port does not support SHA digest validation.
303 Font(int32_t sfnt_version, ByteVector* digest);
/external/vboot_reference/firmware/2lib/
H A D2rsa.c9 * multiple RSA key lengths and hash digest algorithms.
293 const uint8_t *digest,
303 if (!key || !sig || !digest)
329 * Otherwise, continue on to check the digest to reduce the risk of
337 * Check digest. Even though there are probably no timing issues here,
342 if (vb2_safe_memcmp(sig + pad_size, digest, key_bytes - pad_size)) {
291 vb2_rsa_verify_digest(const struct vb2_public_key *key, uint8_t *sig, const uint8_t *digest, const struct vb2_workbuf *wb) argument
H A D2sha1.c259 void vb2_sha1_finalize(struct vb2_sha1_context *ctx, uint8_t *digest) argument
275 *digest++ = (uint8_t)(tmp >> 24);
276 *digest++ = (uint8_t)(tmp >> 16);
277 *digest++ = (uint8_t)(tmp >> 8);
278 *digest++ = (uint8_t)(tmp >> 0);
/external/vboot_reference/tests/
H A Dvboot_api_kernel3_tests.c171 uint8_t *internal_SHA256(const uint8_t *data, uint64_t len, uint8_t *digest) argument
173 Memcpy(digest, mock_sha, sizeof(mock_sha));
174 return digest;
/external/llvm/include/llvm/ADT/
H A DImmutableSet.h233 uint32_t digest; member in class:llvm::ImutAVLTree
247 IsCanonicalized(0), value(v), digest(0), refCount(0)
261 /// hasCachedDigest - Returns true if the digest for this tree is cached.
298 uint32_t digest = 0; local
301 digest += L->computeDigest();
303 // Compute digest of stored data.
306 digest += ID.ComputeHash();
309 digest += R->computeDigest();
311 return digest;
315 // Check the lowest bit to determine if digest ha
615 unsigned digest = TNew->computeDigest(); local
[all...]
/external/pdfium/core/src/fdrm/crypto/
H A Dfx_crypt.cpp231 void CRYPT_MD5Finish(FX_LPVOID pctx, FX_BYTE digest[16] )
242 PUT_FX_DWORD( ctx->state[0], digest, 0 );
243 PUT_FX_DWORD( ctx->state[1], digest, 4 );
244 PUT_FX_DWORD( ctx->state[2], digest, 8 );
245 PUT_FX_DWORD( ctx->state[3], digest, 12 );
247 void CRYPT_MD5Generate(FX_LPCBYTE input, FX_DWORD length, FX_BYTE digest[16]) argument
252 CRYPT_MD5Finish(&ctx, digest);

Completed in 679 milliseconds

1234567891011>>