/external/webrtc/webrtc/base/ |
H A D | sslfingerprint.h | 47 rtc::Buffer digest; member in struct:rtc::SSLFingerprint
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/ |
H A D | RawContentVerifier.java | 5 * verified using the digest of the calculated data. 10 * Verify that the expected signature value was derived from the passed in digest. 12 * @param digest digest calculated from the content. 14 * @return true if the expected signature is derived from the digest, false otherwise. 16 boolean verify(byte[] digest, byte[] expected); argument
|
/external/dbus/dbus/ |
H A D | dbus-sha.h | 39 dbus_uint32_t digest[5]; /**< Message digest */ member in struct:DBusSHAContext
|
/external/libchrome/base/metrics/ |
H A D | metrics_hashes.cc | 16 inline uint64_t DigestToUInt64(const base::MD5Digest& digest) { argument 18 DCHECK_GE(sizeof(digest.a), sizeof(value)); 19 memcpy(&value, digest.a, sizeof(value)); 26 base::MD5Digest digest; local 27 base::MD5Sum(name.c_str(), name.size(), &digest); 28 return DigestToUInt64(digest);
|
/external/tpm2/ |
H A D | VerifySignature_fp.h | 14 TPM2B_DIGEST digest; member in struct:__anon17845
|
H A D | _TPM_Hash_End.c | 19 TPM2B_DIGEST digest; local 62 digest.t.size = CryptGetHashDigestSize(hash); 63 CryptCompleteHash2B(&hashObject->state.hashState[i], &digest.b); 65 PcrDrtm(pcrHandle, hash, &digest);
|
H A D | Sign_fp.h | 14 TPM2B_DIGEST digest; member in struct:__anon17825
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
H A D | BCMessageDigest.java | 1 package org.bouncycastle.jcajce.provider.digest; 10 protected Digest digest; field in class:BCMessageDigest 13 Digest digest) 15 super(digest.getAlgorithmName()); 17 this.digest = digest; 22 digest.reset(); 28 digest.update(input); 36 digest.update(input, offset, len); 41 byte[] digestBytes = new byte[digest 12 BCMessageDigest( Digest digest) argument [all...] |
H A D | DigestAlgorithmProvider.java | 1 package org.bouncycastle.jcajce.provider.digest;
|
H A D | MD5.java | 1 package org.bouncycastle.jcajce.provider.digest; 53 d.digest = new MD5Digest((MD5Digest)digest);
|
H A D | SHA224.java | 1 package org.bouncycastle.jcajce.provider.digest; 32 d.digest = new SHA224Digest((SHA224Digest)digest);
|
H A D | SHA256.java | 1 package org.bouncycastle.jcajce.provider.digest; 33 d.digest = new SHA256Digest((SHA256Digest)digest);
|
H A D | SHA384.java | 1 package org.bouncycastle.jcajce.provider.digest; 35 d.digest = new SHA384Digest((SHA384Digest)digest);
|
H A D | SHA512.java | 1 package org.bouncycastle.jcajce.provider.digest; 38 d.digest = new SHA512Digest((SHA512Digest)digest); 58 // d.digest = new SHA512tDigest((SHA512tDigest)digest);
|
/external/boringssl/include/openssl/ |
H A D | digest.h | 92 * such digest is known. */ 96 * if no such digest is known. */ 102 * An EVP_MD_CTX represents the state of a specific digest operation in 141 /* EVP_MAX_MD_SIZE is the largest digest size supported, in bytes. 142 * Functions that output a digest generally require the buffer have 146 /* EVP_DigestFinal_ex finishes the digest in |ctx| and writes the output to 160 * |len| bytes from |data| and writes the digest to |md_out|. At most 181 /* EVP_MD_size returns the digest size of |md|, in bytes. */ 187 /* EVP_MD_FLAG_PKEY_DIGEST indicates the the digest function is used with a 193 * DigestAlgorithmIdentifier representing this digest functio 237 const EVP_MD *digest; member in struct:env_md_ctx_st [all...] |
/external/boringssl/src/include/openssl/ |
H A D | digest.h | 92 * such digest is known. */ 96 * if no such digest is known. */ 102 * An EVP_MD_CTX represents the state of a specific digest operation in 141 /* EVP_MAX_MD_SIZE is the largest digest size supported, in bytes. 142 * Functions that output a digest generally require the buffer have 146 /* EVP_DigestFinal_ex finishes the digest in |ctx| and writes the output to 160 * |len| bytes from |data| and writes the digest to |md_out|. At most 181 /* EVP_MD_size returns the digest size of |md|, in bytes. */ 187 /* EVP_MD_FLAG_PKEY_DIGEST indicates the the digest function is used with a 193 * DigestAlgorithmIdentifier representing this digest functio 237 const EVP_MD *digest; member in struct:env_md_ctx_st [all...] |
/external/ppp/pppd/ |
H A D | md5.h | 57 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon16242
|
/external/vboot_reference/utility/ |
H A D | pad_digest_utility.c | 22 uint8_t* digest = NULL; local 37 digest = BufferFromFile(argv[2], &len); 38 if (!digest) { 43 padded_digest = PrependDigestInfo(algorithm, digest); 53 free(digest);
|
/external/boringssl/src/crypto/evp/ |
H A D | algorithm.c | 70 const EVP_MD *digest; local 74 digest = EVP_MD_CTX_md(ctx); 76 if (!digest || !pkey) { 97 if (!OBJ_find_sigid_by_algs(&sign_nid, EVP_MD_type(digest), 118 const EVP_MD *digest; local 120 /* Convert signature OID into digest and public key OIDs */ 144 /* Otherwise, initialize with the digest from the OID. */ 145 digest = EVP_get_digestbynid(digest_nid); 146 if (digest == NULL) { 151 return EVP_DigestVerifyInit(ctx, NULL, digest, NUL [all...] |
/external/boringssl/src/crypto/hmac/ |
H A D | hmac_test.cc | 64 #include <openssl/digest.h> 93 const EVP_MD *digest = GetDigest(digest_str); local 94 if (digest == nullptr) { 95 t->PrintLine("Unknown digest '%s'", digest_str.c_str()); 109 if (nullptr == HMAC(digest, key.data(), key.size(), input.data(), 118 if (!HMAC_Init_ex(ctx.get(), key.data(), key.size(), digest, nullptr) || 127 if (!HMAC_Init_ex(ctx.get(), nullptr, 0, digest, nullptr) ||
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | DigestInfo.java | 19 * digest OCTET STRING } 25 private byte[] digest; field in class:DigestInfo 52 byte[] digest) 54 this.digest = digest; 64 digest = ASN1OctetString.getInstance(e.nextElement()).getOctets(); 74 return digest; 82 v.add(new DEROctetString(digest)); 50 DigestInfo( AlgorithmIdentifier algId, byte[] digest) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | OpenSSLPBEParametersGenerator.java | 23 private Digest digest = AndroidDigestFactory.getMD5(); field in class:OpenSSLPBEParametersGenerator 52 byte[] buf = new byte[digest.getDigestSize()]; 58 digest.update(password, 0, password.length); 59 digest.update(salt, 0, salt.length); 61 digest.doFinal(buf, 0); 75 digest.reset(); 76 digest.update(buf, 0, buf.length);
|
H A D | PKCS5S1ParametersGenerator.java | 12 * digest used to drive it. 21 private Digest digest; field in class:PKCS5S1ParametersGenerator 26 * @param digest the digest to be used as the source of derived keys. 29 Digest digest) 31 this.digest = digest; 39 byte[] digestBytes = new byte[digest.getDigestSize()]; 41 digest.update(password, 0, password.length); 42 digest 28 PKCS5S1ParametersGenerator( Digest digest) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
H A D | DigestInputStream.java | 12 protected Digest digest; field in class:DigestInputStream 16 Digest digest) 19 this.digest = digest; 29 digest.update((byte)b); 43 digest.update(b, off, n); 50 return digest; 14 DigestInputStream( InputStream stream, Digest digest) argument
|
H A D | DigestOutputStream.java | 11 protected Digest digest; field in class:DigestOutputStream 16 this.digest = Digest; 22 digest.update((byte)b); 31 digest.update(b, off, len); 36 byte[] res = new byte[digest.getDigestSize()]; 38 digest.doFinal(res, 0);
|