Searched refs:digest (Results 51 - 75 of 338) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmd5_i.h21 void MD5Final(unsigned char digest[16], struct MD5Context *context);
H A Dsha1_i.h20 void SHA1Final(unsigned char digest[20], struct SHA1Context *context);
/external/guava/guava-tests/test/com/google/common/hash/
H A DMessageDigestHashFunctionTest.java97 MessageDigest digest = MessageDigest.getInstance(algorithmName);
99 HashCode.fromBytes(digest.digest(input)),
101 for (int bytes = 4; bytes <= digest.getDigestLength(); bytes++) {
103 HashCode.fromBytes(Arrays.copyOf(digest.digest(input), bytes)),
107 int maxSize = digest.getDigestLength();
/external/libvpx/libvpx/examples/
H A Ddecode_to_md5.c46 static void get_image_md5(const vpx_image_t *img, unsigned char digest[16]) { argument
64 MD5Final(digest, &md5);
67 static void print_md5(FILE *stream, unsigned char digest[16]) { argument
71 fprintf(stream, "%02x", digest[i]);
122 unsigned char digest[16]; local
124 get_image_md5(img, digest);
125 print_md5(outfile, digest);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/
H A DBCPBEKey.java18 int digest; field in class:BCPBEKey
32 int digest,
41 this.digest = digest;
99 return digest;
28 BCPBEKey( String algorithm, ASN1ObjectIdentifier oid, int type, int digest, int keySize, int ivSize, PBEKeySpec pbeKeySpec, CipherParameters param) argument
/external/jetty/src/java/org/eclipse/jetty/security/authentication/
H A DDigestAuthenticator.java172 final Digest digest = new Digest(request.getMethod());
198 digest.username = tok;
200 digest.realm = tok;
202 digest.nonce = tok;
204 digest.nc = tok;
206 digest.cnonce = tok;
208 digest.qop = tok;
210 digest.uri = tok;
212 digest.response = tok;
218 int n = checkNonce(digest,(Reques
284 checkNonce(Digest digest, Request request) argument
[all...]
/external/vboot_reference/tests/
H A Drsa_verify_benchmark.c23 uint8_t* digest = NULL; local
45 /* Get expected digest. */
46 snprintf(file_name, FILE_NAME_SIZE, "testcases/test_file.%s.digest",
48 digest = BufferFromFile(file_name, &digest_len);
49 if (!digest) {
50 VBDEBUG(("Couldn't read digest file.\n"));
67 if (!RSAVerify(key, signature, sig_len, algorithm, digest))
82 free(digest);
H A Dvb2_api_tests.c180 uint8_t digest[VB2_PCR_DIGEST_RECOMMENDED_SIZE]; local
187 digest_size = sizeof(digest);
188 memset(digest, 0, sizeof(digest));
190 &cc, BOOT_MODE_PCR, digest, &digest_size),
192 TEST_EQ(digest_size, VB2_SHA1_DIGEST_SIZE, "BOOT_MODE_PCR digest size");
193 TEST_TRUE(memcmp(digest, digest_org, digest_size),
194 "BOOT_MODE_PCR digest");
196 digest_size = sizeof(digest);
197 memset(digest,
[all...]
/external/vogar/src/vogar/
H A DMd5Cache.java54 byte[] digest = null;
64 digest = digester.digest();
71 return (digest == null) ? null : byteArrayToHexString(digest);
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/signers/
H A DRSADigestSigner.java32 private final Digest digest; field in class:RSADigestSigner
64 Digest digest)
66 this(digest, (ASN1ObjectIdentifier)oidMap.get(digest.getAlgorithmName()));
70 Digest digest,
73 this.digest = digest;
82 return digest.getAlgorithmName() + "withRSA";
125 * update the internal digest with the byte b
130 digest
63 RSADigestSigner( Digest digest) argument
69 RSADigestSigner( Digest digest, ASN1ObjectIdentifier digestOid) argument
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/
H A DDigestSignatureSpi.java52 private Digest digest; field in class:DigestSignatureSpi
58 Digest digest,
61 this.digest = digest;
69 Digest digest,
72 this.digest = digest;
88 digest.reset();
103 digest.reset();
123 digest
57 DigestSignatureSpi( Digest digest, AsymmetricBlockCipher cipher) argument
67 DigestSignatureSpi( ASN1ObjectIdentifier objId, Digest digest, AsymmetricBlockCipher cipher) argument
[all...]
/external/openssh/
H A Dhmac.c24 #include "digest.h"
31 struct ssh_digest_ctx *digest; member in struct:ssh_hmac_ctx
52 (ret->digest = ssh_digest_start(alg)) == NULL)
87 if (ssh_digest_copy_state(ctx->ictx, ctx->digest) < 0)
95 return ssh_digest_update(ctx->digest, m, mlen);
101 return ssh_digest_update_buffer(ctx->digest, b);
111 ssh_digest_final(ctx->digest, ctx->buf, len))
114 if (ssh_digest_copy_state(ctx->octx, ctx->digest) < 0 ||
115 ssh_digest_update(ctx->digest, ctx->buf, len) < 0 ||
116 ssh_digest_final(ctx->digest,
145 u_char digest[16]; local
[all...]
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DMessageDigest1Test.java121 * @tests java.security.MessageDigest#digest()
125 assertEquals("incorrect result", 0, md.digest().length);
130 * @tests java.security.MessageDigest#digest(byte[])
135 assertEquals("incorrect result", 0, md.digest(b).length);
140 * @tests java.security.MessageDigest#digest(byte[], int, int)
145 assertEquals("incorrect result", 0, md.digest(b, 2, 3));
146 assertTrue("digest failed", md.runEngineDigest);
153 md.digest(null, 0, 1);
159 md.digest(bytes, 0, bytes.length + 1);
165 md.digest(byte
[all...]
H A DDigestOutputStreamTest.java42 * Message digest algorithm name used during testing
58 * Test message for digest computations
104 MessageDigest digest = new MyMessageDigest1();
108 DigestOutputStream dos = new DigestOutputStream(out, digest);
109 assertSame(digest, dos.getMessageDigest());
122 MessageDigest digest = new MyMessageDigest1();
128 dos.setMessageDigest(digest);
129 assertSame(digest, dos.getMessageDigest());
142 * Assertion: updates associated digest<br>
157 // check that associated digest ha
592 MyDigestOutputStream(OutputStream out, MessageDigest digest) argument
[all...]
/external/boringssl/include/openssl/
H A Ddsa.h146 /* DSA_do_sign returns a signature of the hash in |digest| by the key in |dsa|
148 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len,
152 * |dsa|, of the hash in |digest|. It returns one if so, zero if invalid and -1
161 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len,
165 * is a valid signature, by the public key in |dsa| of the hash in |digest|
170 OPENSSL_EXPORT int DSA_do_check_signature(int *out_valid, const uint8_t *digest,
181 /* DSA_sign signs |digest| with the key in |dsa| and writes the resulting
187 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len,
192 * key in |dsa|, of the hash in |digest|. It returns one if so, zero if invalid
203 OPENSSL_EXPORT int DSA_verify(int type, const uint8_t *digest,
[all...]
/external/boringssl/src/include/openssl/
H A Ddsa.h146 /* DSA_do_sign returns a signature of the hash in |digest| by the key in |dsa|
148 OPENSSL_EXPORT DSA_SIG *DSA_do_sign(const uint8_t *digest, size_t digest_len,
152 * |dsa|, of the hash in |digest|. It returns one if so, zero if invalid and -1
161 OPENSSL_EXPORT int DSA_do_verify(const uint8_t *digest, size_t digest_len,
165 * is a valid signature, by the public key in |dsa| of the hash in |digest|
170 OPENSSL_EXPORT int DSA_do_check_signature(int *out_valid, const uint8_t *digest,
181 /* DSA_sign signs |digest| with the key in |dsa| and writes the resulting
187 OPENSSL_EXPORT int DSA_sign(int type, const uint8_t *digest, size_t digest_len,
192 * key in |dsa|, of the hash in |digest|. It returns one if so, zero if invalid
203 OPENSSL_EXPORT int DSA_verify(int type, const uint8_t *digest,
[all...]
/external/google-tv-pairing-protocol/java/src/com/google/polo/pairing/
H A DPoloChallengeResponse.java97 MessageDigest digest;
99 digest = MessageDigest.getInstance(HASH_ALGORITHM);
101 throw new PoloException("Could not get digest algorithm", e);
129 digest.update(clientModulus);
130 digest.update(clientExponent);
131 digest.update(serverModulus);
132 digest.update(serverExponent);
133 digest.update(nonce);
135 digestBytes = digest.digest();
[all...]
/external/boringssl/src/crypto/hmac/
H A Dhmac_test.cc64 #include <openssl/digest.h>
94 const EVP_MD *digest = GetDigest(digest_str); local
95 if (digest == nullptr) {
96 t->PrintLine("Unknown digest '%s'", digest_str.c_str());
110 if (nullptr == HMAC(digest, bssl::vector_data(&key), key.size(),
121 if (!HMAC_Init_ex(ctx.get(), bssl::vector_data(&key), key.size(), digest,
132 if (!HMAC_Init_ex(ctx.get(), nullptr, 0, digest, nullptr) ||
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
H A DAuthorityKeyIdentifier.java112 Digest digest = AndroidDigestFactory.getSHA1();
114 byte[] resBuf = new byte[digest.getDigestSize()];
117 digest.update(bytes, 0, bytes.length);
118 digest.doFinal(resBuf, 0);
133 Digest digest = AndroidDigestFactory.getSHA1();
135 byte[] resBuf = new byte[digest.getDigestSize()];
138 digest.update(bytes, 0, bytes.length);
139 digest.doFinal(resBuf, 0);
/external/lzma/CS/7zip/Common/
H A DCRC.cs50 static bool VerifyDigest(uint digest, byte[] data, uint offset, uint size) argument
52 return (CalculateDigest(data, offset, size) == digest);
/external/boringssl/src/crypto/hkdf/
H A Dhkdf.c25 const EVP_MD *digest,
30 const size_t digest_len = EVP_MD_size(digest);
50 if (HMAC(digest, salt, salt_len, secret, secret_len, prk, &prk_len) == NULL) {
55 if (!HMAC_Init_ex(&hmac, prk, prk_len, digest, NULL)) {
24 HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, const uint8_t *secret, size_t secret_len, const uint8_t *salt, size_t salt_len, const uint8_t *info, size_t info_len) argument
/external/flac/libFLAC/include/private/
H A Dmd5.h5 * This is the header file for the MD5 message-digest algorithm.
15 * To compute the message digest of a chunk of bytes, declare an
18 * will fill a supplied 16-byte array with the digest.
46 void FLAC__MD5Final(FLAC__byte digest[16], FLAC__MD5Context *context);
/external/libvpx/libvpx/
H A Dmd5_utils.h2 * This is the header file for the MD5 message-digest algorithm.
12 * To compute the message digest of a chunk of bytes, declare an
15 * will fill a supplied 16-byte array with the digest.
42 void MD5Final(unsigned char digest[16], struct MD5Context *context);
/external/lzma/C/
H A DXz.c66 int XzCheck_Final(CXzCheck *p, Byte *digest) argument
71 SetUi32(digest, CRC_GET_DIGEST(p->crc));
78 digest[i] = (Byte)(v & 0xFF);
82 Sha256_Final(&p->sha, digest);
/external/tcpdump/
H A Dsignature.c13 * Functions for signature and digest verification.
54 unsigned int key_len, u_int8_t *digest)
104 MD5_Final(digest, &context); /* finish up 1st pass */
111 MD5_Update(&context, digest, 16); /* then results of 1st hash */
112 MD5_Final(digest, &context); /* finish up 2nd pass */
53 signature_compute_hmac_md5(const u_int8_t *text, int text_len, unsigned char *key, unsigned int key_len, u_int8_t *digest) argument

Completed in 606 milliseconds

1234567891011>>