/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 396 u8 digest[SHA1_MAC_LEN]; local 409 if (sha1_vector(4, addr, len, digest)) 414 os_memcpy(session_key, digest, session_key_len);
|
/external/conscrypt/src/test/java/org/conscrypt/ |
H A D | CertPinManagerTest.java | 51 byte[] fingerprint = dgst.digest(encoded);
|
/external/nanohttpd/websocket/src/main/java/fi/iki/elonen/ |
H A D | WebSocketResponseHandler.java | 78 byte[] sha1hash = md.digest();
|
/external/pdfium/core/src/fpdfapi/fpdf_page/ |
H A D | fpdf_page_doc.cpp | 575 FX_BYTE digest[20]; local 577 CRYPT_SHA1Generate(stream.GetData(), stream.GetSize(), digest); 578 if (m_HashProfileMap.Lookup(CFX_ByteStringC(digest, 20), (void*&)pCopiedStream)) { 588 m_HashProfileMap.SetAt(CFX_ByteStringC(digest, 20), pIccProfileStream);
|
/external/sfntly/cpp/src/sfntly/ |
H A D | font.cc | 80 Font::Font(int32_t sfnt_version, ByteVector* digest) argument 84 digest_ = *digest; 268 void Font::Builder::SetDigest(ByteVector* digest) { argument 270 digest_ = *digest;
|
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/test/ |
H A D | grammar.rb | 9 require 'digest/md5' 308 unless test( ?f, @path ) and MD5.digest( @source ) == MD5.digest( File.read( @path ) )
|
/external/vboot_reference/tests/ |
H A D | vb21_api_tests.c | 167 int vb2ex_hwcrypto_digest_finalize(uint8_t *digest, argument 170 vb2_digest_finalize(&hwcrypto_emulation_dc, digest, digest_size);
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | NativeCrypto.java | 227 // --- Message digest functions -------------- 236 // --- Message digest context functions -------------- 368 byte[] digest = MessageDigest.getInstance(algorithm).digest(principal.getEncoded()); 370 return (((digest[offset++] & 0xff) << 0) | 371 ((digest[offset++] & 0xff) << 8) | 372 ((digest[offset++] & 0xff) << 16) | 373 ((digest[offset ] & 0xff) << 24));
|
/external/lzma/C/ |
H A D | XzDec.c | 752 Byte digest[XZ_CHECK_SIZE_MAX];
local 755 if (XzCheck_Final(&p->check, digest) && memcmp(digest, p->buf, checkSize) != 0)
795 Byte digest[SHA256_DIGEST_SIZE];
local 799 Sha256_Final(&p->sha, digest);
800 if (memcmp(digest, p->shaDigest, SHA256_DIGEST_SIZE) != 0)
|
H A D | XzEnc.c | 168 void SeqCheckInStream_GetDigest(CSeqCheckInStream *p, Byte *digest)
argument 170 XzCheck_Final(&p->check, digest);
|
/external/tcpdump/ |
H A D | print-rsvp.c | 307 u_int8_t digest[16]; member in struct:rsvp_obj_integrity_t 1671 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->digest), 1672 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->digest+4), 1673 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->digest+8), 1674 EXTRACT_32BITS(obj_ptr.rsvp_obj_integrity->digest+12)); 1678 rsvp_obj_integrity->digest);
|
/external/boringssl/src/crypto/pkcs8/ |
H A D | pkcs8.c | 66 #include <openssl/digest.h> 455 pass_raw_len, pkcs8->digest); 537 M_ASN1_OCTET_STRING_free(pkcs8->digest); 538 pkcs8->digest = pkcs12_item_i2d_encrypt( 540 if (!pkcs8->digest) {
|
/external/vboot_reference/firmware/lib/ |
H A D | vboot_display.c | 347 uint8_t *digest = DigestBuf(buf, buflen, SHA1_DIGEST_ALGORITHM); local 350 Uint8ToString(outbuf, digest[i]); 354 VbExFree(digest);
|
H A D | vboot_common.c | 171 int VerifyDigest(const uint8_t *digest, const VbSignature *sig, argument 175 VBDEBUG(("Wrong digest signature size for algorithm.\n")); 179 if (!RSAVerifyBinaryWithDigest_f(NULL, key, digest,
|
/external/libvncserver/x11vnc/ |
H A D | enc.h | 174 " Use cipher@md+n,m to change the message digest. E.g. arc4@sha+8,16\n" 440 /* set the default message digest (md5) */ 1105 char digest[EVP_MAX_MD_SIZE], tmp[16]; local 1111 EVP_DigestFinal(&md, (unsigned char *)digest, &size); 1115 unsigned char uc = (unsigned char) digest[i]; 1452 unsigned char digest[EVP_MAX_MD_SIZE], *signature; local 1471 * signed digest. The additional information below would be the 1500 EVP_DigestFinal(&dctx, (unsigned char *)digest, &ndig); 1503 RSA_sign(NID_sha1, digest, ndig, signature, &nsig, client_rsa);
|
/external/boringssl/include/openssl/ |
H A D | evp.h | 64 /* OpenSSL included digest and cipher functions in this header so we include 70 #include <openssl/digest.h> 398 * and |salt|, using |digest|, and outputs |key_len| bytes to |out_key|. It 402 unsigned iterations, const EVP_MD *digest, 405 /* PKCS5_PBKDF2_HMAC_SHA1 is the same as PKCS5_PBKDF2_HMAC, but with |digest| 561 /* EVP_PKEY_CTX_set_signature_md sets |md| as the digest to be used in a 566 /* EVP_PKEY_CTX_get_signature_md sets |*out_md| to the digest to be used in a 585 * signature. A value of -1 cause the salt to be the same length as the digest 613 /* EVP_PKEY_CTX_set_rsa_oaep_md sets |md| as the digest used in OAEP padding. 618 /* EVP_PKEY_CTX_get_rsa_oaep_md sets |*out_md| to the digest functio [all...] |
/external/boringssl/src/crypto/md5/ |
H A D | md5.c | 65 static uint8_t digest[MD5_DIGEST_LENGTH]; local 69 out = digest; 119 #include "../digest/md32_common.h"
|
/external/boringssl/src/include/openssl/ |
H A D | evp.h | 64 /* OpenSSL included digest and cipher functions in this header so we include 70 #include <openssl/digest.h> 398 * and |salt|, using |digest|, and outputs |key_len| bytes to |out_key|. It 402 unsigned iterations, const EVP_MD *digest, 405 /* PKCS5_PBKDF2_HMAC_SHA1 is the same as PKCS5_PBKDF2_HMAC, but with |digest| 561 /* EVP_PKEY_CTX_set_signature_md sets |md| as the digest to be used in a 566 /* EVP_PKEY_CTX_get_signature_md sets |*out_md| to the digest to be used in a 585 * signature. A value of -1 cause the salt to be the same length as the digest 613 /* EVP_PKEY_CTX_set_rsa_oaep_md sets |md| as the digest used in OAEP padding. 618 /* EVP_PKEY_CTX_get_rsa_oaep_md sets |*out_md| to the digest functio [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.core.runtime.compatibility.auth_3.2.200.v20100517.jar | ... byteStream private int byteStreamOffset private java.security.MessageDigest digest private java.util.Random random private final byte ... |
/external/google-breakpad/src/common/ |
H A D | md5.cc | 10 * To compute the message digest of a chunk of bytes, declare an 13 * will fill a supplied 16-byte array with the digest. 109 void MD5Final(unsigned char digest[16], struct MD5Context *ctx) argument 146 memcpy(digest, ctx->buf, 16);
|
/external/libvpx/libvpx/ |
H A D | md5_utils.c | 2 * This code implements the MD5 message-digest algorithm. 12 * To compute the message digest of a chunk of bytes, declare an 15 * will fill a supplied 16-byte array with the digest. 108 MD5Final(md5byte digest[16], struct MD5Context *ctx) { argument 135 memcpy(digest, ctx->buf, 16);
|
/external/openssh/openbsd-compat/ |
H A D | md5.c | 4 * This code implements the MD5 message-digest algorithm. 14 * To compute the message digest of a chunk of bytes, declare an 17 * will fill a supplied 16-byte array with the digest. 125 * Final wrapup--call MD5Pad, fill in digest and zero out ctx. 128 MD5Final(unsigned char digest[MD5_DIGEST_LENGTH], MD5_CTX *ctx) argument 134 PUT_32BIT_LE(digest + i * 4, ctx->state[i]);
|
H A D | sha1.c | 147 * Add padding and return the message digest. 166 SHA1Final(u_int8_t digest[SHA1_DIGEST_LENGTH], SHA1_CTX *context) argument 172 digest[i] = (u_int8_t)
|
/external/ppp/pppd/ |
H A D | sha1.c | 139 /* Add padding and return the message digest. */ 142 SHA1_Final(unsigned char digest[20], SHA1_CTX *context) argument 157 digest[i] = (unsigned char)
|
/external/skia/src/utils/ |
H A D | SkMD5.cpp | 63 void SkMD5::finish(Digest& digest) { argument 82 // Write out digest. 83 encode(digest.data, this->state);
|