/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | md5_i.h | 21 void MD5Final(unsigned char digest[16], struct MD5Context *context);
|
H A D | sha1_i.h | 20 void SHA1Final(unsigned char digest[20], struct SHA1Context *context);
|
/external/guava/guava-tests/test/com/google/common/hash/ |
H A D | MessageDigestHashFunctionTest.java | 97 MessageDigest digest = MessageDigest.getInstance(algorithmName); 99 HashCode.fromBytes(digest.digest(input)), 101 for (int bytes = 4; bytes <= digest.getDigestLength(); bytes++) { 103 HashCode.fromBytes(Arrays.copyOf(digest.digest(input), bytes)), 107 int maxSize = digest.getDigestLength();
|
/external/libvpx/libvpx/examples/ |
H A D | decode_to_md5.c | 46 static void get_image_md5(const vpx_image_t *img, unsigned char digest[16]) { argument 64 MD5Final(digest, &md5); 67 static void print_md5(FILE *stream, unsigned char digest[16]) { argument 71 fprintf(stream, "%02x", digest[i]); 122 unsigned char digest[16]; local 124 get_image_md5(img, digest); 125 print_md5(outfile, digest);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
H A D | BCPBEKey.java | 18 int digest; field in class:BCPBEKey 32 int digest, 41 this.digest = digest; 99 return digest; 28 BCPBEKey( String algorithm, ASN1ObjectIdentifier oid, int type, int digest, int keySize, int ivSize, PBEKeySpec pbeKeySpec, CipherParameters param) argument
|
/external/jetty/src/java/org/eclipse/jetty/security/authentication/ |
H A D | DigestAuthenticator.java | 172 final Digest digest = new Digest(request.getMethod()); 198 digest.username = tok; 200 digest.realm = tok; 202 digest.nonce = tok; 204 digest.nc = tok; 206 digest.cnonce = tok; 208 digest.qop = tok; 210 digest.uri = tok; 212 digest.response = tok; 218 int n = checkNonce(digest,(Reques 284 checkNonce(Digest digest, Request request) argument [all...] |
/external/vboot_reference/tests/ |
H A D | rsa_verify_benchmark.c | 23 uint8_t* digest = NULL; local 45 /* Get expected digest. */ 46 snprintf(file_name, FILE_NAME_SIZE, "testcases/test_file.%s.digest", 48 digest = BufferFromFile(file_name, &digest_len); 49 if (!digest) { 50 VBDEBUG(("Couldn't read digest file.\n")); 67 if (!RSAVerify(key, signature, sig_len, algorithm, digest)) 82 free(digest);
|
H A D | vb2_api_tests.c | 180 uint8_t digest[VB2_PCR_DIGEST_RECOMMENDED_SIZE]; local 187 digest_size = sizeof(digest); 188 memset(digest, 0, sizeof(digest)); 190 &cc, BOOT_MODE_PCR, digest, &digest_size), 192 TEST_EQ(digest_size, VB2_SHA1_DIGEST_SIZE, "BOOT_MODE_PCR digest size"); 193 TEST_TRUE(memcmp(digest, digest_org, digest_size), 194 "BOOT_MODE_PCR digest"); 196 digest_size = sizeof(digest); 197 memset(digest, [all...] |
/external/vogar/src/vogar/ |
H A D | Md5Cache.java | 54 byte[] digest = null; 64 digest = digester.digest(); 71 return (digest == null) ? null : byteArrayToHexString(digest);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/signers/ |
H A D | RSADigestSigner.java | 32 private final Digest digest; field in class:RSADigestSigner 64 Digest digest) 66 this(digest, (ASN1ObjectIdentifier)oidMap.get(digest.getAlgorithmName())); 70 Digest digest, 73 this.digest = digest; 82 return digest.getAlgorithmName() + "withRSA"; 125 * update the internal digest with the byte b 130 digest 63 RSADigestSigner( Digest digest) argument 69 RSADigestSigner( Digest digest, ASN1ObjectIdentifier digestOid) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
H A D | DigestSignatureSpi.java | 52 private Digest digest; field in class:DigestSignatureSpi 58 Digest digest, 61 this.digest = digest; 69 Digest digest, 72 this.digest = digest; 88 digest.reset(); 103 digest.reset(); 123 digest 57 DigestSignatureSpi( Digest digest, AsymmetricBlockCipher cipher) argument 67 DigestSignatureSpi( ASN1ObjectIdentifier objId, Digest digest, AsymmetricBlockCipher cipher) argument [all...] |
/external/openssh/ |
H A D | hmac.c | 24 #include "digest.h" 31 struct ssh_digest_ctx *digest; member in struct:ssh_hmac_ctx 52 (ret->digest = ssh_digest_start(alg)) == NULL) 87 if (ssh_digest_copy_state(ctx->ictx, ctx->digest) < 0) 95 return ssh_digest_update(ctx->digest, m, mlen); 101 return ssh_digest_update_buffer(ctx->digest, b); 111 ssh_digest_final(ctx->digest, ctx->buf, len)) 114 if (ssh_digest_copy_state(ctx->octx, ctx->digest) < 0 || 115 ssh_digest_update(ctx->digest, ctx->buf, len) < 0 || 116 ssh_digest_final(ctx->digest, 145 u_char digest[16]; local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | MessageDigest1Test.java | 121 * @tests java.security.MessageDigest#digest() 125 assertEquals("incorrect result", 0, md.digest().length); 130 * @tests java.security.MessageDigest#digest(byte[]) 135 assertEquals("incorrect result", 0, md.digest(b).length); 140 * @tests java.security.MessageDigest#digest(byte[], int, int) 145 assertEquals("incorrect result", 0, md.digest(b, 2, 3)); 146 assertTrue("digest failed", md.runEngineDigest); 153 md.digest(null, 0, 1); 159 md.digest(bytes, 0, bytes.length + 1); 165 md.digest(byte [all...] |
H A D | DigestOutputStreamTest.java | 42 * Message digest algorithm name used during testing 58 * Test message for digest computations 104 MessageDigest digest = new MyMessageDigest1(); 108 DigestOutputStream dos = new DigestOutputStream(out, digest); 109 assertSame(digest, dos.getMessageDigest()); 122 MessageDigest digest = new MyMessageDigest1(); 128 dos.setMessageDigest(digest); 129 assertSame(digest, dos.getMessageDigest()); 142 * Assertion: updates associated digest<br> 157 // check that associated digest ha 592 MyDigestOutputStream(OutputStream out, MessageDigest digest) argument [all...] |
/external/boringssl/include/openssl/ |
H A D | dsa.h | 146 /* DSA_do_sign returns a signature of the hash in |digest| by the key in |dsa| 148 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, 152 * |dsa|, of the hash in |digest|. It returns one if so, zero if invalid and -1 161 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len, 165 * is a valid signature, by the public key in |dsa| of the hash in |digest| 170 OPENSSL_EXPORT int DSA_do_check_signature(int *out_valid, const uint8_t *digest, 181 /* DSA_sign signs |digest| with the key in |dsa| and writes the resulting 187 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len, 192 * key in |dsa|, of the hash in |digest|. It returns one if so, zero if invalid 203 OPENSSL_EXPORT int DSA_verify(int type, const uint8_t *digest, [all...] |
/external/boringssl/src/include/openssl/ |
H A D | dsa.h | 146 /* DSA_do_sign returns a signature of the hash in |digest| by the key in |dsa| 148 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len, 152 * |dsa|, of the hash in |digest|. It returns one if so, zero if invalid and -1 161 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len, 165 * is a valid signature, by the public key in |dsa| of the hash in |digest| 170 OPENSSL_EXPORT int DSA_do_check_signature(int *out_valid, const uint8_t *digest, 181 /* DSA_sign signs |digest| with the key in |dsa| and writes the resulting 187 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len, 192 * key in |dsa|, of the hash in |digest|. It returns one if so, zero if invalid 203 OPENSSL_EXPORT int DSA_verify(int type, const uint8_t *digest, [all...] |
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/ |
H A D | PoloChallengeResponse.java | 97 MessageDigest digest; 99 digest = MessageDigest.getInstance(HASH_ALGORITHM); 101 throw new PoloException("Could not get digest algorithm", e); 129 digest.update(clientModulus); 130 digest.update(clientExponent); 131 digest.update(serverModulus); 132 digest.update(serverExponent); 133 digest.update(nonce); 135 digestBytes = digest.digest(); [all...] |
/external/boringssl/src/crypto/hmac/ |
H A D | hmac_test.cc | 64 #include <openssl/digest.h> 94 const EVP_MD *digest = GetDigest(digest_str); local 95 if (digest == nullptr) { 96 t->PrintLine("Unknown digest '%s'", digest_str.c_str()); 110 if (nullptr == HMAC(digest, bssl::vector_data(&key), key.size(), 121 if (!HMAC_Init_ex(ctx.get(), bssl::vector_data(&key), key.size(), digest, 132 if (!HMAC_Init_ex(ctx.get(), nullptr, 0, digest, nullptr) ||
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | AuthorityKeyIdentifier.java | 112 Digest digest = AndroidDigestFactory.getSHA1(); 114 byte[] resBuf = new byte[digest.getDigestSize()]; 117 digest.update(bytes, 0, bytes.length); 118 digest.doFinal(resBuf, 0); 133 Digest digest = AndroidDigestFactory.getSHA1(); 135 byte[] resBuf = new byte[digest.getDigestSize()]; 138 digest.update(bytes, 0, bytes.length); 139 digest.doFinal(resBuf, 0);
|
/external/lzma/CS/7zip/Common/ |
H A D | CRC.cs | 50 static bool VerifyDigest(uint digest, byte[] data, uint offset, uint size)
argument 52 return (CalculateDigest(data, offset, size) == digest);
|
/external/boringssl/src/crypto/hkdf/ |
H A D | hkdf.c | 25 const EVP_MD *digest, 30 const size_t digest_len = EVP_MD_size(digest); 50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) { 55 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) { 24 HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len) argument
|
/external/flac/libFLAC/include/private/ |
H A D | md5.h | 5 * This is the header file for the MD5 message-digest algorithm. 15 * To compute the message digest of a chunk of bytes, declare an 18 * will fill a supplied 16-byte array with the digest. 46 void FLAC__MD5Final(FLAC__byte digest[16], FLAC__MD5Context *context);
|
/external/libvpx/libvpx/ |
H A D | md5_utils.h | 2 * This is the header file for the MD5 message-digest algorithm. 12 * To compute the message digest of a chunk of bytes, declare an 15 * will fill a supplied 16-byte array with the digest. 42 void MD5Final(unsigned char digest[16], struct MD5Context *context);
|
/external/lzma/C/ |
H A D | Xz.c | 66 int XzCheck_Final(CXzCheck *p, Byte *digest)
argument 71 SetUi32(digest, CRC_GET_DIGEST(p->crc));
78 digest[i] = (Byte)(v & 0xFF);
82 Sha256_Final(&p->sha, digest);
|
/external/tcpdump/ |
H A D | signature.c | 13 * Functions for signature and digest verification. 54 unsigned int key_len, u_int8_t *digest) 104 MD5_Final(digest, &context); /* finish up 1st pass */ 111 MD5_Update(&context, digest, 16); /* then results of 1st hash */ 112 MD5_Final(digest, &context); /* finish up 2nd pass */ 53 signature_compute_hmac_md5(const u_int8_t *text, int text_len, unsigned char *key, unsigned int key_len, u_int8_t *digest) argument
|