/external/apache-http/android/src/android/net/http/ |
H A D | RequestHandle.java | 233 * Create and queue an HTTP authentication-response (digest) request. 326 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce); 333 response += "response=" + doubleQuote(digest) ; 362 * @return Double-quoted MD5 digest. 396 byte[] d = md5.digest(param.getBytes());
|
/external/vboot_reference/tests/ |
H A D | vb20_api_tests.c | 156 int vb2ex_hwcrypto_digest_finalize(uint8_t *digest, argument 192 uint8_t *digest, 207 const uint8_t *digest, 191 vb2_digest_finalize(struct vb2_digest_context *dc, uint8_t *digest, uint32_t digest_size) argument 205 vb2_rsa_verify_digest(const struct vb2_public_key *key, uint8_t *sig, const uint8_t *digest, const struct vb2_workbuf *wb) argument
|
/external/boringssl/src/crypto/ecdh/ |
H A D | ecdh.c | 72 #include <openssl/digest.h>
|
/external/chromium-trace/trace-viewer/third_party/Paste/tests/test_auth/ |
H A D | test_auth_digest.py | 5 from paste.auth.digest import *
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
H A D | PinListEntry.java | 114 byte[] fingerprint = dgst.digest(encoded);
|
/external/ppp/pppd/plugins/ |
H A D | winbind.c | 99 struct chap_digest_type *digest, 512 struct chap_digest_type *digest, 545 switch (digest->code) { 656 error("WINBIND: Challenge type %u unsupported", digest->code); 511 winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
|
/external/vboot_reference/firmware/lib/include/ |
H A D | vboot_common.h | 109 * Verify a secure hash digest from DigestBuf() or DigestFinal(), using 112 int VerifyDigest(const uint8_t *digest, const VbSignature *sig,
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | md4-internal.c | 26 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx); 46 * This code implements the MD4 message-digest algorithm. 57 * To compute the message digest of a chunk of bytes, declare an 60 * will fill a supplied 16-byte array with the digest. 163 * Final wrapup--call MD4Pad, fill in digest and zero out ctx. 165 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) argument 170 if (digest != NULL) { 172 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
|
H A D | ms_funcs.c | 396 u8 digest[SHA1_MAC_LEN]; local 409 if (sha1_vector(4, addr, len, digest)) 414 os_memcpy(session_key, digest, session_key_len);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | md4-internal.c | 26 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx); 46 * This code implements the MD4 message-digest algorithm. 57 * To compute the message digest of a chunk of bytes, declare an 60 * will fill a supplied 16-byte array with the digest. 163 * Final wrapup--call MD4Pad, fill in digest and zero out ctx. 165 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) argument 170 if (digest != NULL) { 172 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
|
H A D | ms_funcs.c | 396 u8 digest[SHA1_MAC_LEN]; local 409 if (sha1_vector(4, addr, len, digest)) 414 os_memcpy(session_key, digest, session_key_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md4-internal.c | 26 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx); 46 * This code implements the MD4 message-digest algorithm. 57 * To compute the message digest of a chunk of bytes, declare an 60 * will fill a supplied 16-byte array with the digest. 163 * Final wrapup--call MD4Pad, fill in digest and zero out ctx. 165 static void MD4Final(unsigned char digest[MD4_DIGEST_LENGTH], MD4_CTX *ctx) argument 170 if (digest != NULL) { 172 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
H A D | CMSSignedHelper.java | 45 private static void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption) argument 47 digestAlgs.put(alias.getId(), digest); 129 * Return the digest encryption algorithm using one of the standard
|
H A D | CMSUtils.java | 310 DigestCalculator digest = (DigestCalculator)it.next(); 311 result = new TeeInputStream(result, digest.getOutputStream());
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
H A D | JcaContentVerifierProviderBuilder.java | 264 public boolean verify(byte[] digest, byte[] expected) argument 268 rawSignature.update(digest);
|
/external/fio/crc/ |
H A D | test.c | 54 uint32_t digest[4]; local 55 struct fio_md5_ctx ctx = { .hash = digest };
|
/external/skia/tests/ |
H A D | CodexTest.cpp | 19 static void md5(const SkBitmap& bm, SkMD5::Digest* digest) { argument 27 md5.finish(*digest);
|
/external/vboot_reference/tests/futility/ |
H A D | test_gbb_utility.sh | 207 # GBB v1.2 adds a sha256 digest field in what was previously padding: 216 # See that the digest is updated properly. 221 ${FUTILITY} gbb_utility -g --digest ${TMP}.blob | grep ${expect} 223 # Garble the digest, see that it's noticed. 226 ${FUTILITY} gbb_utility -g --digest ${TMP}.blob.bad | grep '0000000000' 227 ${FUTILITY} gbb_utility -g --digest ${TMP}.blob.bad | grep 'invalid' 229 # Garble the HWID. The digest is unchanged, but now invalid. 231 ${FUTILITY} gbb_utility -g --digest ${TMP}.blob.bad | grep 'invalid'
|
/external/boringssl/src/crypto/dsa/ |
H A D | dsa_impl.c | 65 #include <openssl/digest.h> 80 BIGNUM **rp, const uint8_t *digest, size_t digest_len) { 108 /* If possible, we'll include the private key and message digest in the k 109 * generation. The |digest| argument is only empty if |DSA_sign_setup| is 114 ok = BN_generate_dsa_nonce(&k, dsa->q, dsa->priv_key, digest, digest_len, 188 static DSA_SIG *sign(const uint8_t *digest, size_t digest_len, DSA *dsa) { argument 228 /* if the digest length is greater than the size of q use the 229 * BN_num_bits(dsa->q) leftmost bits of the digest, see 234 if (BN_bin2bn(digest, digest_len, &m) == NULL) { 339 /* if the digest lengt 79 sign_setup(const DSA *dsa, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp, const uint8_t *digest, size_t digest_len) argument [all...] |
/external/ppp/pppd/ |
H A D | md5.c | 41 ** Message-digest routines: ** 42 ** To form the message digest for a message M ** 46 ** The message digest is now in mdContext->digest[0...15] ** 102 /* The routine MD5_Init initializes the message-digest context 118 /* The routine MD5Update updates the message-digest context to 120 in the message whose digest is being computed. 157 /* The routine MD5Final terminates the message-digest computation and 158 ends with the desired message digest in mdContext->digest[ [all...] |
/external/iputils/ |
H A D | ping6.c | 329 static __u8 digest[MD5_DIGEST_LENGTH]; local 338 MD5_Final(digest, &ctxt); 344 memcpy(nonce + sizeof(__u16), digest, NI_NONCE_SIZE - sizeof(__u16)); 347 if (memcmp(nonce + sizeof(__u16), digest, NI_NONCE_SIZE - sizeof(__u16))) 516 __u8 digest[MD5_DIGEST_LENGTH]; local 600 MD5_Final(digest, &ctxt); 603 digest[0], digest[1], digest[2], digest[ [all...] |
/external/valgrind/none/tests/ |
H A D | sha1_test.c | 66 void SHA1Final(unsigned char digest[20], SHA1_CTX* context); 200 /* Add padding and return the message digest. */ 202 void SHA1Final(unsigned char digest[20], SHA1_CTX* context) argument 238 digest[i] = (unsigned char)
|
/external/vboot_reference/firmware/lib/cryptolib/ |
H A D | sha1.c | 278 uint8_t* internal_SHA1(const uint8_t *data, uint64_t len, uint8_t *digest) { argument 286 digest[i] = *p++; 288 return digest;
|
H A D | sha256.c | 315 uint8_t* internal_SHA256(const uint8_t* data, uint64_t len, uint8_t* digest) { argument 339 digest[i] = *result++; 341 return digest;
|
H A D | sha512.c | 339 uint8_t* internal_SHA512(const uint8_t* data, uint64_t len, uint8_t* digest) { argument 362 digest[i] = *result++; 364 return digest;
|