Searched refs:digest (Results 201 - 225 of 338) sorted by relevance

1234567891011>>

/external/apache-http/android/src/android/net/http/
H A DRequestHandle.java233 * Create and queue an HTTP authentication-response (digest) request.
326 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce);
333 response += "response=" + doubleQuote(digest) ;
362 * @return Double-quoted MD5 digest.
396 byte[] d = md5.digest(param.getBytes());
/external/vboot_reference/tests/
H A Dvb20_api_tests.c156 int vb2ex_hwcrypto_digest_finalize(uint8_t *digest, argument
192 uint8_t *digest,
207 const uint8_t *digest,
191 vb2_digest_finalize(struct vb2_digest_context *dc, uint8_t *digest, uint32_t digest_size) argument
205 vb2_rsa_verify_digest(const struct vb2_public_key *key, uint8_t *sig, const uint8_t *digest, const struct vb2_workbuf *wb) argument
/external/boringssl/src/crypto/ecdh/
H A Decdh.c72 #include <openssl/digest.h>
/external/chromium-trace/trace-viewer/third_party/Paste/tests/test_auth/
H A Dtest_auth_digest.py5 from paste.auth.digest import *
/external/conscrypt/src/platform/java/org/conscrypt/
H A DPinListEntry.java114 byte[] fingerprint = dgst.digest(encoded);
/external/ppp/pppd/plugins/
H A Dwinbind.c99 struct chap_digest_type *digest,
512 struct chap_digest_type *digest,
545 switch (digest->code) {
656 error("WINBIND: Challenge type %u unsupported", digest->code);
511 winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
/external/vboot_reference/firmware/lib/include/
H A Dvboot_common.h109 * Verify a secure hash digest from DigestBuf() or DigestFinal(), using
112 int VerifyDigest(const uint8_t *digest, const VbSignature *sig,
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmd4-internal.c26 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx);
46 * This code implements the MD4 message-digest algorithm.
57 * To compute the message digest of a chunk of bytes, declare an
60 * will fill a supplied 16-byte array with the digest.
163 * Final wrapup--call MD4Pad, fill in digest and zero out ctx.
165 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) argument
170 if (digest != NULL) {
172 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
H A Dms_funcs.c396 u8 digest[SHA1_MAC_LEN]; local
409 if (sha1_vector(4, addr, len, digest))
414 os_memcpy(session_key, digest, session_key_len);
/external/wpa_supplicant_8/src/crypto/
H A Dmd4-internal.c26 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx);
46 * This code implements the MD4 message-digest algorithm.
57 * To compute the message digest of a chunk of bytes, declare an
60 * will fill a supplied 16-byte array with the digest.
163 * Final wrapup--call MD4Pad, fill in digest and zero out ctx.
165 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) argument
170 if (digest != NULL) {
172 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
H A Dms_funcs.c396 u8 digest[SHA1_MAC_LEN]; local
409 if (sha1_vector(4, addr, len, digest))
414 os_memcpy(session_key, digest, session_key_len);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmd4-internal.c26 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx);
46 * This code implements the MD4 message-digest algorithm.
57 * To compute the message digest of a chunk of bytes, declare an
60 * will fill a supplied 16-byte array with the digest.
163 * Final wrapup--call MD4Pad, fill in digest and zero out ctx.
165 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) argument
170 if (digest != NULL) {
172 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
H A DCMSSignedHelper.java45 private static void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption) argument
47 digestAlgs.put(alias.getId(), digest);
129 * Return the digest encryption algorithm using one of the standard
H A DCMSUtils.java310 DigestCalculator digest = (DigestCalculator)it.next();
311 result = new TeeInputStream(result, digest.getOutputStream());
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
H A DJcaContentVerifierProviderBuilder.java264 public boolean verify(byte[] digest, byte[] expected) argument
268 rawSignature.update(digest);
/external/fio/crc/
H A Dtest.c54 uint32_t digest[4]; local
55 struct fio_md5_ctx ctx = { .hash = digest };
/external/skia/tests/
H A DCodexTest.cpp19 static void md5(const SkBitmap& bm, SkMD5::Digest* digest) { argument
27 md5.finish(*digest);
/external/vboot_reference/tests/futility/
H A Dtest_gbb_utility.sh207 # GBB v1.2 adds a sha256 digest field in what was previously padding:
216 # See that the digest is updated properly.
221 ${FUTILITY} gbb_utility -g --digest ${TMP}.blob | grep ${expect}
223 # Garble the digest, see that it's noticed.
226 ${FUTILITY} gbb_utility -g --digest ${TMP}.blob.bad | grep '0000000000'
227 ${FUTILITY} gbb_utility -g --digest ${TMP}.blob.bad | grep 'invalid'
229 # Garble the HWID. The digest is unchanged, but now invalid.
231 ${FUTILITY} gbb_utility -g --digest ${TMP}.blob.bad | grep 'invalid'
/external/boringssl/src/crypto/dsa/
H A Ddsa_impl.c65 #include <openssl/digest.h>
80 BIGNUM **rp, const uint8_t *digest, size_t digest_len) {
108 /* If possible, we'll include the private key and message digest in the k
109 * generation. The |digest| argument is only empty if |DSA_sign_setup| is
114 ok = BN_generate_dsa_nonce(&k, dsa->q, dsa->priv_key, digest, digest_len,
188 static DSA_SIG *sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument
228 /* if the digest length is greater than the size of q use the
229 * BN_num_bits(dsa->q) leftmost bits of the digest, see
234 if (BN_bin2bn(digest, digest_len, &m) == NULL) {
339 /* if the digest lengt
79 sign_setup(const DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument
[all...]
/external/ppp/pppd/
H A Dmd5.c41 ** Message-digest routines: **
42 ** To form the message digest for a message M **
46 ** The message digest is now in mdContext->digest[0...15] **
102 /* The routine MD5_Init initializes the message-digest context
118 /* The routine MD5Update updates the message-digest context to
120 in the message whose digest is being computed.
157 /* The routine MD5Final terminates the message-digest computation and
158 ends with the desired message digest in mdContext->digest[
[all...]
/external/iputils/
H A Dping6.c329 static __u8 digest[MD5_DIGEST_LENGTH]; local
338 MD5_Final(digest, &ctxt);
344 memcpy(nonce + sizeof(__u16), digest, NI_NONCE_SIZE - sizeof(__u16));
347 if (memcmp(nonce + sizeof(__u16), digest, NI_NONCE_SIZE - sizeof(__u16)))
516 __u8 digest[MD5_DIGEST_LENGTH]; local
600 MD5_Final(digest, &ctxt);
603 digest[0], digest[1], digest[2], digest[
[all...]
/external/valgrind/none/tests/
H A Dsha1_test.c66 void SHA1Final(unsigned char digest[20], SHA1_CTX* context);
200 /* Add padding and return the message digest. */
202 void SHA1Final(unsigned char digest[20], SHA1_CTX* context) argument
238 digest[i] = (unsigned char)
/external/vboot_reference/firmware/lib/cryptolib/
H A Dsha1.c278 uint8_t* internal_SHA1(const uint8_t *data, uint64_t len, uint8_t *digest) { argument
286 digest[i] = *p++;
288 return digest;
H A Dsha256.c315 uint8_t* internal_SHA256(const uint8_t* data, uint64_t len, uint8_t* digest) { argument
339 digest[i] = *result++;
341 return digest;
H A Dsha512.c339 uint8_t* internal_SHA512(const uint8_t* data, uint64_t len, uint8_t* digest) { argument
362 digest[i] = *result++;
364 return digest;

Completed in 561 milliseconds

1234567891011>>