Searched defs:digest (Results 1 - 25 of 278) sorted by relevance

1234567891011>>

/external/webrtc/webrtc/base/
H A Dsslfingerprint.h47 rtc::Buffer digest; member in struct:rtc::SSLFingerprint
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/
H A DRawContentVerifier.java5 * verified using the digest of the calculated data.
10 * Verify that the expected signature value was derived from the passed in digest.
12 * @param digest digest calculated from the content.
14 * @return true if the expected signature is derived from the digest, false otherwise.
16 boolean verify(byte[] digest, byte[] expected); argument
/external/dbus/dbus/
H A Ddbus-sha.h39 dbus_uint32_t digest[5]; /**< Message digest */ member in struct:DBusSHAContext
/external/libchrome/base/metrics/
H A Dmetrics_hashes.cc16 inline uint64_t DigestToUInt64(const base::MD5Digest& digest) { argument
18 DCHECK_GE(sizeof(digest.a), sizeof(value));
19 memcpy(&value, digest.a, sizeof(value));
26 base::MD5Digest digest; local
27 base::MD5Sum(name.c_str(), name.size(), &digest);
28 return DigestToUInt64(digest);
/external/tpm2/
H A DVerifySignature_fp.h14 TPM2B_DIGEST digest; member in struct:__anon17845
H A D_TPM_Hash_End.c19 TPM2B_DIGEST digest; local
62 digest.t.size = CryptGetHashDigestSize(hash);
63 CryptCompleteHash2B(&hashObject->state.hashState[i], &digest.b);
65 PcrDrtm(pcrHandle, hash, &digest);
H A DSign_fp.h14 TPM2B_DIGEST digest; member in struct:__anon17825
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/
H A DBCMessageDigest.java1 package org.bouncycastle.jcajce.provider.digest;
10 protected Digest digest; field in class:BCMessageDigest
13 Digest digest)
15 super(digest.getAlgorithmName());
17 this.digest = digest;
22 digest.reset();
28 digest.update(input);
36 digest.update(input, offset, len);
41 byte[] digestBytes = new byte[digest
12 BCMessageDigest( Digest digest) argument
[all...]
H A DDigestAlgorithmProvider.java1 package org.bouncycastle.jcajce.provider.digest;
H A DMD5.java1 package org.bouncycastle.jcajce.provider.digest;
53 d.digest = new MD5Digest((MD5Digest)digest);
H A DSHA224.java1 package org.bouncycastle.jcajce.provider.digest;
32 d.digest = new SHA224Digest((SHA224Digest)digest);
H A DSHA256.java1 package org.bouncycastle.jcajce.provider.digest;
33 d.digest = new SHA256Digest((SHA256Digest)digest);
H A DSHA384.java1 package org.bouncycastle.jcajce.provider.digest;
35 d.digest = new SHA384Digest((SHA384Digest)digest);
H A DSHA512.java1 package org.bouncycastle.jcajce.provider.digest;
38 d.digest = new SHA512Digest((SHA512Digest)digest);
58 // d.digest = new SHA512tDigest((SHA512tDigest)digest);
/external/boringssl/include/openssl/
H A Ddigest.h92 * such digest is known. */
96 * if no such digest is known. */
102 * An EVP_MD_CTX represents the state of a specific digest operation in
141 /* EVP_MAX_MD_SIZE is the largest digest size supported, in bytes.
142 * Functions that output a digest generally require the buffer have
146 /* EVP_DigestFinal_ex finishes the digest in |ctx| and writes the output to
160 * |len| bytes from |data| and writes the digest to |md_out|. At most
181 /* EVP_MD_size returns the digest size of |md|, in bytes. */
187 /* EVP_MD_FLAG_PKEY_DIGEST indicates the the digest function is used with a
193 * DigestAlgorithmIdentifier representing this digest functio
237 const EVP_MD *digest; member in struct:env_md_ctx_st
[all...]
/external/boringssl/src/include/openssl/
H A Ddigest.h92 * such digest is known. */
96 * if no such digest is known. */
102 * An EVP_MD_CTX represents the state of a specific digest operation in
141 /* EVP_MAX_MD_SIZE is the largest digest size supported, in bytes.
142 * Functions that output a digest generally require the buffer have
146 /* EVP_DigestFinal_ex finishes the digest in |ctx| and writes the output to
160 * |len| bytes from |data| and writes the digest to |md_out|. At most
181 /* EVP_MD_size returns the digest size of |md|, in bytes. */
187 /* EVP_MD_FLAG_PKEY_DIGEST indicates the the digest function is used with a
193 * DigestAlgorithmIdentifier representing this digest functio
237 const EVP_MD *digest; member in struct:env_md_ctx_st
[all...]
/external/ppp/pppd/
H A Dmd5.h57 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon16242
/external/vboot_reference/utility/
H A Dpad_digest_utility.c22 uint8_t* digest = NULL; local
37 digest = BufferFromFile(argv[2], &len);
38 if (!digest) {
43 padded_digest = PrependDigestInfo(algorithm, digest);
53 free(digest);
/external/boringssl/src/crypto/evp/
H A Dalgorithm.c70 const EVP_MD *digest; local
74 digest = EVP_MD_CTX_md(ctx);
76 if (!digest || !pkey) {
97 if (!OBJ_find_sigid_by_algs(&sign_nid, EVP_MD_type(digest),
118 const EVP_MD *digest; local
120 /* Convert signature OID into digest and public key OIDs */
144 /* Otherwise, initialize with the digest from the OID. */
145 digest = EVP_get_digestbynid(digest_nid);
146 if (digest == NULL) {
151 return EVP_DigestVerifyInit(ctx, NULL, digest, NUL
[all...]
/external/boringssl/src/crypto/hmac/
H A Dhmac_test.cc64 #include <openssl/digest.h>
93 const EVP_MD *digest = GetDigest(digest_str); local
94 if (digest == nullptr) {
95 t->PrintLine("Unknown digest '%s'", digest_str.c_str());
109 if (nullptr == HMAC(digest, key.data(), key.size(), input.data(),
118 if (!HMAC_Init_ex(ctx.get(), key.data(), key.size(), digest, nullptr) ||
127 if (!HMAC_Init_ex(ctx.get(), nullptr, 0, digest, nullptr) ||
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/
H A DDigestInfo.java19 * digest OCTET STRING }
25 private byte[] digest; field in class:DigestInfo
52 byte[] digest)
54 this.digest = digest;
64 digest = ASN1OctetString.getInstance(e.nextElement()).getOctets();
74 return digest;
82 v.add(new DEROctetString(digest));
50 DigestInfo( AlgorithmIdentifier algId, byte[] digest) argument
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/
H A DOpenSSLPBEParametersGenerator.java23 private Digest digest = AndroidDigestFactory.getMD5(); field in class:OpenSSLPBEParametersGenerator
52 byte[] buf = new byte[digest.getDigestSize()];
58 digest.update(password, 0, password.length);
59 digest.update(salt, 0, salt.length);
61 digest.doFinal(buf, 0);
75 digest.reset();
76 digest.update(buf, 0, buf.length);
H A DPKCS5S1ParametersGenerator.java12 * digest used to drive it.
21 private Digest digest; field in class:PKCS5S1ParametersGenerator
26 * @param digest the digest to be used as the source of derived keys.
29 Digest digest)
31 this.digest = digest;
39 byte[] digestBytes = new byte[digest.getDigestSize()];
41 digest.update(password, 0, password.length);
42 digest
28 PKCS5S1ParametersGenerator( Digest digest) argument
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/
H A DDigestInputStream.java12 protected Digest digest; field in class:DigestInputStream
16 Digest digest)
19 this.digest = digest;
29 digest.update((byte)b);
43 digest.update(b, off, n);
50 return digest;
14 DigestInputStream( InputStream stream, Digest digest) argument
H A DDigestOutputStream.java11 protected Digest digest; field in class:DigestOutputStream
16 this.digest = Digest;
22 digest.update((byte)b);
31 digest.update(b, off, len);
36 byte[] res = new byte[digest.getDigestSize()];
38 digest.doFinal(res, 0);

Completed in 5249 milliseconds

1234567891011>>