/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
H A D | BCMessageDigest.java | 1 package org.bouncycastle.jcajce.provider.digest; 10 protected Digest digest; field in class:BCMessageDigest 13 Digest digest) 15 super(digest.getAlgorithmName()); 17 this.digest = digest; 22 digest.reset(); 28 digest.update(input); 36 digest.update(input, offset, len); 41 byte[] digestBytes = new byte[digest 12 BCMessageDigest( Digest digest) argument [all...] |
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/ |
H A D | RawContentVerifier.java | 5 * verified using the digest of the calculated data. 10 * Verify that the expected signature value was derived from the passed in digest. 12 * @param digest digest calculated from the content. 14 * @return true if the expected signature is derived from the digest, false otherwise. 16 boolean verify(byte[] digest, byte[] expected); argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
H A D | HMac.java | 24 private Digest digest; field in class:HMac 65 Digest digest) 67 if (digest instanceof ExtendedDigest) 69 return ((ExtendedDigest)digest).getByteLength(); 72 Integer b = (Integer)blockLengths.get(digest.getAlgorithmName()); 76 throw new IllegalArgumentException("unknown digest passed: " + digest.getAlgorithmName()); 83 * Base constructor for one of the standard digest algorithms that the 86 * @param digest the digest 64 getByteLength( Digest digest) argument 88 HMac( Digest digest) argument 94 HMac( Digest digest, int byteLength) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
H A D | DigestOutputStream.java | 11 protected Digest digest; field in class:DigestOutputStream 16 this.digest = Digest; 22 digest.update((byte)b); 31 digest.update(b, off, len); 36 byte[] res = new byte[digest.getDigestSize()]; 38 digest.doFinal(res, 0);
|
H A D | DigestInputStream.java | 12 protected Digest digest; field in class:DigestInputStream 16 Digest digest) 19 this.digest = digest; 29 digest.update((byte)b); 43 digest.update(b, off, n); 50 return digest; 14 DigestInputStream( InputStream stream, Digest digest) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | PKCS5S1ParametersGenerator.java | 12 * digest used to drive it. 21 private Digest digest; field in class:PKCS5S1ParametersGenerator 26 * @param digest the digest to be used as the source of derived keys. 29 Digest digest) 31 this.digest = digest; 39 byte[] digestBytes = new byte[digest.getDigestSize()]; 41 digest.update(password, 0, password.length); 42 digest 28 PKCS5S1ParametersGenerator( Digest digest) argument [all...] |
H A D | OpenSSLPBEParametersGenerator.java | 23 private Digest digest = AndroidDigestFactory.getMD5(); field in class:OpenSSLPBEParametersGenerator 52 byte[] buf = new byte[digest.getDigestSize()]; 58 digest.update(password, 0, password.length); 59 digest.update(salt, 0, salt.length); 61 digest.doFinal(buf, 0); 75 digest.reset(); 76 digest.update(buf, 0, buf.length);
|
/external/vboot_reference/tests/ |
H A D | vb2_sha_tests.c | 6 /* FIPS 180-2 Tests for message digest functions. */ 19 uint8_t *digest, 33 return vb2_digest_finalize(&dc, digest, digest_size); 38 uint8_t digest[VB2_SHA1_DIGEST_SIZE]; local 49 VB2_HASH_SHA1, digest, sizeof(digest)), 51 TEST_EQ(memcmp(digest, sha1_results[i], sizeof(digest)), 52 0, "SHA1 digest"); 56 VB2_HASH_SHA1, digest, sizeo 16 vb2_digest(const uint8_t *buf, uint32_t size, enum vb2_hash_algorithm hash_alg, uint8_t *digest, uint32_t digest_size) argument 62 uint8_t digest[VB2_SHA256_DIGEST_SIZE]; local 86 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local 111 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local [all...] |
/external/skia/tests/ |
H A D | BitmapHasherTest.cpp | 27 uint64_t digest; local 30 REPORTER_ASSERT(reporter, SkBitmapHasher::ComputeDigest(bitmap, &digest)); 31 REPORTER_ASSERT(reporter, digest == 0xfb2903562766ef87ULL); 34 REPORTER_ASSERT(reporter, SkBitmapHasher::ComputeDigest(bitmap, &digest)); 35 REPORTER_ASSERT(reporter, digest == 0xfe04023fb97d0f61ULL); 38 REPORTER_ASSERT(reporter, SkBitmapHasher::ComputeDigest(bitmap, &digest)); 39 REPORTER_ASSERT(reporter, digest == 0x2423c51cad6d1edcULL);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | DigestInputStream2Test.java | 33 MessageDigest digest; field in class:DigestInputStream2Test 42 DigestInputStream dis = new DigestInputStream(inStream, digest); 52 DigestInputStream dis = new DigestInputStream(inStream, digest); 53 assertEquals("getMessageDigest returned a bogus result", digest, dis 62 MessageDigest originalDigest = (MessageDigest) (digest.clone()); 63 MessageDigest noChangeDigest = (MessageDigest) (digest.clone()); 71 // make sure the digest for the part where it was off has not 74 MessageDigest.isEqual(noChangeDigest.digest(), originalDigest 75 .digest())); 76 MessageDigest changeDigest = (MessageDigest) (digest [all...] |
/external/ppp/pppd/ |
H A D | chap-new.h | 45 * CHAP digest codes. 66 /* Return the digest alg. ID for the most preferred digest type. */ 73 /* Return the bit flag (lsb set) for our most preferred digest type. */ 76 /* Return the bit flag for a given digest algorithm ID. */ 77 #define CHAP_MDTYPE_D(digest) \ 78 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 79 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 80 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 83 /* Can we do the requested digest [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
H A D | PBESecretKeyFactory.java | 18 private int digest; field in class:PBESecretKeyFactory 27 int digest, 35 this.digest = digest; 51 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 56 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 60 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 63 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param); 22 PBESecretKeyFactory( String algorithm, ASN1ObjectIdentifier oid, boolean forCipher, int scheme, int digest, int keySize, int ivSize) argument
|
/external/vboot_reference/utility/ |
H A D | pad_digest_utility.c | 22 uint8_t* digest = NULL; local 37 digest = BufferFromFile(argv[2], &len); 38 if (!digest) { 43 padded_digest = PrependDigestInfo(algorithm, digest); 53 free(digest);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
H A D | DSABase.java | 17 protected Digest digest; field in class:DSABase 22 Digest digest, 26 this.digest = digest; 35 digest.update(b); 44 digest.update(b, off, len); 50 byte[] hash = new byte[digest.getDigestSize()]; 52 digest.doFinal(hash, 0); 70 byte[] hash = new byte[digest.getDigestSize()]; 72 digest 21 DSABase( Digest digest, DSA signer, DSAEncoder encoder) argument [all...] |
/external/vboot_reference/firmware/lib/cryptolib/ |
H A D | sha_utility.c | 5 * Utility functions for message digest functions. 55 uint8_t* digest = NULL; local 59 digest = (uint8_t*) VbExMalloc(SHA1_DIGEST_SIZE); 60 Memcpy(digest, SHA1_final(ctx->sha1_ctx), SHA1_DIGEST_SIZE); 65 digest = (uint8_t*) VbExMalloc(SHA256_DIGEST_SIZE); 66 Memcpy(digest, SHA256_final(ctx->sha256_ctx), SHA256_DIGEST_SIZE); 71 digest = (uint8_t*) VbExMalloc(SHA512_DIGEST_SIZE); 72 Memcpy(digest, SHA512_final(ctx->sha512_ctx), SHA512_DIGEST_SIZE); 77 return digest; 81 /* Allocate enough space for the largest digest */ 82 uint8_t* digest = (uint8_t*) VbExMalloc(SHA512_DIGEST_SIZE); local [all...] |
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
H A D | Credential.java | 36 * a Password itself is a Credential, a UnixCrypt or MD5 digest of a a password 39 * This class includes an implementation for unix Crypt an MD5 digest. 131 MD5(String digest) argument 133 digest = digest.startsWith(__TYPE) ? digest.substring(__TYPE.length()) : digest; 134 _digest = TypeUtil.parseBytes(digest, 16); 149 byte[] digest = null; 160 digest 195 public static String digest(String password) method in class:Credential.MD5 [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | DigestInfo.java | 19 * digest OCTET STRING } 25 private byte[] digest; field in class:DigestInfo 52 byte[] digest) 54 this.digest = digest; 64 digest = ASN1OctetString.getInstance(e.nextElement()).getOctets(); 74 return digest; 82 v.add(new DEROctetString(digest)); 50 DigestInfo( AlgorithmIdentifier algId, byte[] digest) argument
|
/external/openssh/ |
H A D | digest-libc.c | 1 /* $OpenBSD: digest-libc.c,v 1.4 2014/12/21 22:27:56 djm Exp $ */ 37 #include "digest.h" 148 const struct ssh_digest *digest = ssh_digest_by_alg(alg); local 150 return digest == NULL ? NULL : digest->name; 156 const struct ssh_digest *digest = ssh_digest_by_alg(alg); local 158 return digest == NULL ? 0 : digest->digest_len; 164 const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg); local 166 return digest 172 const struct ssh_digest *digest = ssh_digest_by_alg(alg); local 189 const struct ssh_digest *digest = ssh_digest_by_alg(from->alg); local 200 const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg); local 217 const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg); local 232 const struct ssh_digest *digest; local [all...] |
H A D | digest-openssl.c | 1 /* $OpenBSD: digest-openssl.c,v 1.5 2014/12/21 22:27:56 djm Exp $ */ 32 #include "digest.h" 94 const struct ssh_digest *digest = ssh_digest_by_alg(alg); local 96 return digest == NULL ? NULL : digest->name; 102 const struct ssh_digest *digest = ssh_digest_by_alg(alg); local 104 return digest == NULL ? 0 : digest->digest_len; 116 const struct ssh_digest *digest = ssh_digest_by_alg(alg); local 119 if (digest 158 const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg); local 185 const struct ssh_digest *digest = ssh_digest_by_alg(alg); local [all...] |
/external/boringssl/src/crypto/evp/ |
H A D | algorithm.c | 70 const EVP_MD *digest; local 74 digest = EVP_MD_CTX_md(ctx); 76 if (!digest || !pkey) { 98 if (!OBJ_find_sigid_by_algs(&sign_nid, EVP_MD_type(digest), 120 const EVP_MD *digest; local 122 /* Convert signature OID into digest and public key OIDs */ 149 /* Otherwise, initialize with the digest from the OID. */ 150 digest = EVP_get_digestbynid(digest_nid); 151 if (digest == NULL) { 157 return EVP_DigestVerifyInit(ctx, NULL, digest, NUL [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha1-pbkdf2.c | 16 u8 *digest) 43 os_memcpy(digest, tmp, SHA1_MAC_LEN); 51 digest[j] ^= tmp2[j]; 78 unsigned char digest[SHA1_MAC_LEN]; local 83 count, digest)) 86 os_memcpy(pos, digest, plen); 14 pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, size_t ssid_len, int iterations, unsigned int count, u8 *digest) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha1-pbkdf2.c | 16 u8 *digest) 43 os_memcpy(digest, tmp, SHA1_MAC_LEN); 51 digest[j] ^= tmp2[j]; 78 unsigned char digest[SHA1_MAC_LEN]; local 83 count, digest)) 86 os_memcpy(pos, digest, plen); 14 pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, size_t ssid_len, int iterations, unsigned int count, u8 *digest) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha1-pbkdf2.c | 16 u8 *digest) 43 os_memcpy(digest, tmp, SHA1_MAC_LEN); 51 digest[j] ^= tmp2[j]; 78 unsigned char digest[SHA1_MAC_LEN]; local 83 count, digest)) 86 os_memcpy(pos, digest, plen); 14 pbkdf2_sha1_f(const char *passphrase, const u8 *ssid, size_t ssid_len, int iterations, unsigned int count, u8 *digest) argument
|
/external/pdfium/core/include/fdrm/ |
H A D | fx_crypt.h | 23 void CRYPT_MD5Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[16]); 26 void CRYPT_MD5Finish(FX_LPVOID context, FX_BYTE digest[16]); 27 void CRYPT_SHA1Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[20]); 30 void CRYPT_SHA1Finish(FX_LPVOID context, FX_BYTE digest[20]); 31 void CRYPT_SHA256Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[32]); 34 void CRYPT_SHA256Finish(FX_LPVOID context, FX_BYTE digest[32]); 37 void CRYPT_SHA384Finish(FX_LPVOID context, FX_BYTE digest[48]); 38 void CRYPT_SHA384Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[48]); 41 void CRYPT_SHA512Finish(FX_LPVOID context, FX_BYTE digest[64]); 42 void CRYPT_SHA512Generate(FX_LPCBYTE data, FX_DWORD size, FX_BYTE digest[6 [all...] |
/external/boringssl/src/crypto/digest/ |
H A D | digest.c | 57 #include <openssl/digest.h> 91 if (ctx->digest && ctx->digest->ctx_size && ctx->md_data) { 92 OPENSSL_cleanse(ctx->md_data, ctx->digest->ctx_size); 118 if (in == NULL || in->digest == NULL) { 124 if (out->digest == in->digest) { 135 if (in->md_data && in->digest->ctx_size) { 139 out->md_data = OPENSSL_malloc(in->digest->ctx_size); 145 memcpy(out->md_data, in->md_data, in->digest 260 EVP_add_digest(const EVP_MD *digest) argument [all...] |