/external/boringssl/src/crypto/cipher/ |
H A D | derive_key.c | 61 #include <openssl/digest.h>
|
/external/boringssl/src/crypto/x509/ |
H A D | a_sign.c | 58 #include <openssl/digest.h>
|
/external/boringssl/src/crypto/x509v3/ |
H A D | v3_skey.c | 61 #include <openssl/digest.h>
|
/external/boringssl/src/tool/ |
H A D | digest.cc | 42 #include <openssl/digest.h> 165 uint8_t digest[EVP_MAX_MD_SIZE]; local 167 if (!EVP_DigestFinal_ex(&ctx, digest, &digest_len)) { 175 const uint8_t b = digest[i]; 194 // between the digest and the filename.
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
H A D | JcaDigestCalculatorProviderBuilder.java | 111 return dig.digest();
|
/external/guava/guava-tests/benchmark/com/google/common/hash/ |
H A D | MessageDigestAlgorithmBenchmark.java | 52 return md.digest();
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/ |
H A D | SHA1ImplTest.java | 82 byte[] dgst = md.digest(); 109 byte[] dgst = md.digest(); 147 byte[] dgst = md.digest();
|
/external/boringssl/src/crypto/evp/ |
H A D | pbkdf_test.cc | 20 #include <openssl/digest.h> 36 const EVP_MD *digest, size_t key_len, 46 (const uint8_t *)salt, salt_len, iterations, digest, 99 // Note that each of these test vectors uses SHA-1 as the digest. 34 TestPBKDF2(const void *password, size_t password_len, const void *salt, size_t salt_len, unsigned iterations, const EVP_MD *digest, size_t key_len, const uint8_t *expected_key) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
H A D | DESedeWrapEngine.java | 55 // checksum digest 60 byte[] digest = new byte[20]; field in class:DESedeWrapEngine 324 sha1.doFinal(digest, 0); 326 System.arraycopy(digest, 0, result, 0, 8);
|
/external/chromium-trace/trace-viewer/third_party/Paste/paste/auth/ |
H A D | cookie.py | 55 _signature_size = len(hmac.new(b'x', b'x', sha1).digest()) 148 hmac.new(self.secret, content, sha1).digest() + 167 if signature == hmac.new(self.secret, content, sha1).digest():
|
/external/harfbuzz_ng/src/ |
H A D | hb-ot-layout-private.hh | 125 digest.init (); 126 lookup.add_coverage (&digest); 133 hb_set_digest_t digest; member in struct:hb_ot_layout_lookup_accelerator_t
|
/external/iputils/ninfod/ |
H A D | ninfod_name.c | 265 unsigned char digest[16]; local 272 MD5_Final(digest, &ctxt); 284 memcpy(&nigroup->s6_addr[12], digest, 4);
|
/external/javassist/src/main/javassist/ |
H A D | SerialVersionUID.java | 187 MessageDigest digest = MessageDigest.getInstance("SHA"); 188 byte[] digested = digest.digest(bout.toByteArray());
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/ |
H A D | Util.java | 195 byte[] md5bytes = messageDigest.digest(s.getBytes("UTF-8")); 206 byte[] sha1Bytes = messageDigest.digest(s.getBytes("UTF-8")); 217 byte[] sha1Bytes = messageDigest.digest(s.toByteArray());
|
/external/openssh/ |
H A D | kex.c | 57 #include "digest.h" 686 u_char *digest; local 691 if ((digest = calloc(1, roundup(need, mdsz))) == NULL) { 703 ssh_digest_final(hashctx, digest, mdsz) != 0) { 719 ssh_digest_update(hashctx, digest, have) != 0 || 720 ssh_digest_final(hashctx, digest + have, mdsz) != 0) { 729 dump_digest("key", digest, need); 731 *keyp = digest; 732 digest = NULL; 735 if (digest) 830 dump_digest(char *msg, u_char *digest, int len) argument [all...] |
H A D | mac.c | 33 #include "digest.h" 51 int truncatebits; /* truncate digest if != 0 */ 173 u_char *digest, size_t dlen) 208 if (digest != NULL) { 211 memcpy(digest, u.m, dlen); 172 mac_compute(struct sshmac *mac, u_int32_t seqno, const u_char *data, int datalen, u_char *digest, size_t dlen) argument
|
H A D | cipher.c | 50 #include "digest.h" 490 u_char digest[16]; local 495 digest, sizeof(digest))) != 0) 498 r = cipher_init(cc, cipher, digest, 16, NULL, 0, do_encrypt); 500 explicit_bzero(digest, sizeof(digest));
|
/external/openssh/openbsd-compat/ |
H A D | sha2.c | 545 SHA256_Final(u_int8_t digest[SHA256_DIGEST_LENGTH], SHA256_CTX *context) argument 549 /* If no digest buffer is passed, we don't bother doing this: */ 550 if (digest != NULL) { 556 BE_32_TO_8(digest + i * 4, context->state[i]); 558 memcpy(digest, context->state, SHA256_DIGEST_LENGTH); 826 SHA512_Final(u_int8_t digest[SHA512_DIGEST_LENGTH], SHA512_CTX *context) argument 830 /* If no digest buffer is passed, we don't bother doing this: */ 831 if (digest != NULL) { 837 BE_64_TO_8(digest + i * 8, context->state[i]); 839 memcpy(digest, contex 883 SHA384_Final(u_int8_t digest[SHA384_DIGEST_LENGTH], SHA384_CTX *context) argument [all...] |
/external/ppp/pppd/plugins/radius/ |
H A D | radius.c | 78 struct chap_digest_type *digest, 87 struct chap_digest_type *digest, 323 * digest -- points to the structure representing the digest type 335 struct chap_digest_type *digest, 363 if ((digest->code != CHAP_MD5) 365 && (digest->code != CHAP_MICROSOFT) 366 && (digest->code != CHAP_MICROSOFT_V2) 369 error("RADIUS: Challenge type %u unsupported", digest->code); 397 switch (digest 334 radius_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 537 radius_setparams(VALUE_PAIR *vp, char *msg, REQUEST_INFO *req_info, struct chap_digest_type *digest, unsigned char *challenge, char *message, int message_space) argument [all...] |
/external/sfntly/cpp/src/sfntly/ |
H A D | font.h | 152 void SetDigest(ByteVector* digest); 237 // Gets a copy of the fonts digest that was created when the font was read. If 238 // no digest was set at creation time then the return result will be null. 239 ByteVector* digest() { return &digest_; } function in class:sfntly::Font 300 // @param digest the computed digest for the font; null if digest was not 302 // Note: Current C++ port does not support SHA digest validation. 303 Font(int32_t sfnt_version, ByteVector* digest);
|
/external/vboot_reference/firmware/2lib/ |
H A D | 2rsa.c | 9 * multiple RSA key lengths and hash digest algorithms. 293 const uint8_t *digest, 303 if (!key || !sig || !digest) 329 * Otherwise, continue on to check the digest to reduce the risk of 337 * Check digest. Even though there are probably no timing issues here, 342 if (vb2_safe_memcmp(sig + pad_size, digest, key_bytes - pad_size)) { 291 vb2_rsa_verify_digest(const struct vb2_public_key *key, uint8_t *sig, const uint8_t *digest, const struct vb2_workbuf *wb) argument
|
H A D | 2sha1.c | 259 void vb2_sha1_finalize(struct vb2_sha1_context *ctx, uint8_t *digest) argument 275 *digest++ = (uint8_t)(tmp >> 24); 276 *digest++ = (uint8_t)(tmp >> 16); 277 *digest++ = (uint8_t)(tmp >> 8); 278 *digest++ = (uint8_t)(tmp >> 0);
|
/external/vboot_reference/tests/ |
H A D | vboot_api_kernel3_tests.c | 171 uint8_t *internal_SHA256(const uint8_t *data, uint64_t len, uint8_t *digest) argument 173 Memcpy(digest, mock_sha, sizeof(mock_sha)); 174 return digest;
|
/external/llvm/include/llvm/ADT/ |
H A D | ImmutableSet.h | 233 uint32_t digest; member in class:llvm::ImutAVLTree 247 IsCanonicalized(0), value(v), digest(0), refCount(0) 261 /// hasCachedDigest - Returns true if the digest for this tree is cached. 298 uint32_t digest = 0; local 301 digest += L->computeDigest(); 303 // Compute digest of stored data. 306 digest += ID.ComputeHash(); 309 digest += R->computeDigest(); 311 return digest; 315 // Check the lowest bit to determine if digest ha 615 unsigned digest = TNew->computeDigest(); local [all...] |
/external/pdfium/core/src/fdrm/crypto/ |
H A D | fx_crypt.cpp | 231 void CRYPT_MD5Finish(FX_LPVOID pctx, FX_BYTE digest[16] ) 242 PUT_FX_DWORD( ctx->state[0], digest, 0 ); 243 PUT_FX_DWORD( ctx->state[1], digest, 4 ); 244 PUT_FX_DWORD( ctx->state[2], digest, 8 ); 245 PUT_FX_DWORD( ctx->state[3], digest, 12 ); 247 void CRYPT_MD5Generate(FX_LPCBYTE input, FX_DWORD length, FX_BYTE digest[16]) argument 252 CRYPT_MD5Finish(&ctx, digest);
|