/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/digest/ |
H A D | BCMessageDigest.java | 1 package org.bouncycastle.jcajce.provider.digest; 10 protected Digest digest; field in class:BCMessageDigest 13 Digest digest) 15 super(digest.getAlgorithmName()); 17 this.digest = digest; 22 digest.reset(); 28 digest.update(input); 36 digest.update(input, offset, len); 41 byte[] digestBytes = new byte[digest 12 BCMessageDigest( Digest digest) argument [all...] |
/external/libchrome/base/metrics/ |
H A D | metrics_hashes.cc | 16 inline uint64_t DigestToUInt64(const base::MD5Digest& digest) { argument 18 DCHECK_GE(sizeof(digest.a), sizeof(value)); 19 memcpy(&value, digest.a, sizeof(value)); 26 base::MD5Digest digest; local 27 base::MD5Sum(name.c_str(), name.size(), &digest); 28 return DigestToUInt64(digest);
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/ |
H A D | RawContentVerifier.java | 5 * verified using the digest of the calculated data. 10 * Verify that the expected signature value was derived from the passed in digest. 12 * @param digest digest calculated from the content. 14 * @return true if the expected signature is derived from the digest, false otherwise. 16 boolean verify(byte[] digest, byte[] expected); argument
|
/external/selinux/libselinux/src/ |
H A D | label_support.c | 101 void hidden digest_gen_hash(struct selabel_digest *digest) argument 106 if (!digest) 110 Sha1Update(&context, digest->hashbuf, digest->hashbuf_size); 111 Sha1Finalise(&context, (SHA1_HASH *)digest->digest); 112 free(digest->hashbuf); 113 digest->hashbuf = NULL; 120 * @digest: pointer to the selabel_digest struct 129 int hidden digest_add_specfile(struct selabel_digest *digest, FIL argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/macs/ |
H A D | HMac.java | 24 private Digest digest; field in class:HMac 65 Digest digest) 67 if (digest instanceof ExtendedDigest) 69 return ((ExtendedDigest)digest).getByteLength(); 72 Integer b = (Integer)blockLengths.get(digest.getAlgorithmName()); 76 throw new IllegalArgumentException("unknown digest passed: " + digest.getAlgorithmName()); 83 * Base constructor for one of the standard digest algorithms that the 86 * @param digest the digest 64 getByteLength( Digest digest) argument 88 HMac( Digest digest) argument 94 HMac( Digest digest, int byteLength) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/io/ |
H A D | DigestOutputStream.java | 11 protected Digest digest; field in class:DigestOutputStream 16 this.digest = Digest; 22 digest.update((byte)b); 31 digest.update(b, off, len); 36 byte[] res = new byte[digest.getDigestSize()]; 38 digest.doFinal(res, 0);
|
H A D | DigestInputStream.java | 12 protected Digest digest; field in class:DigestInputStream 16 Digest digest) 19 this.digest = digest; 29 digest.update((byte)b); 43 digest.update(b, off, n); 50 return digest; 14 DigestInputStream( InputStream stream, Digest digest) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | PKCS5S1ParametersGenerator.java | 12 * digest used to drive it. 21 private Digest digest; field in class:PKCS5S1ParametersGenerator 26 * @param digest the digest to be used as the source of derived keys. 29 Digest digest) 31 this.digest = digest; 39 byte[] digestBytes = new byte[digest.getDigestSize()]; 41 digest.update(password, 0, password.length); 42 digest 28 PKCS5S1ParametersGenerator( Digest digest) argument [all...] |
/external/webrtc/webrtc/base/ |
H A D | messagedigest.cc | 40 MessageDigest* digest = new OpenSSLDigest(alg); local 41 if (digest->Size() == 0) { // invalid algorithm 42 delete digest; 43 digest = NULL; 45 return digest; 47 MessageDigest* digest = NULL; 49 digest = new Md5Digest(); 51 digest = new Sha1Digest(); 53 return digest; 70 size_t ComputeDigest(MessageDigest* digest, cons argument 84 ComputeDigest(MessageDigest* digest, const std::string& input) argument 108 ComputeHmac(MessageDigest* digest, const void* key, size_t key_len, const void* input, size_t in_len, void* output, size_t out_len) argument 157 ComputeHmac(MessageDigest* digest, const std::string& key, const std::string& input) argument [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ |
H A D | RSA.java | 212 String digest, 216 String mainName = digest + "WITHRSA"; 217 String jdk11Variation1 = digest + "withRSA"; 218 String jdk11Variation2 = digest + "WithRSA"; 219 String alias = digest + "/" + "RSA"; 220 String longName = digest + "WITHRSAENCRYPTION"; 221 String longJdk11Variation1 = digest + "withRSAEncryption"; 222 String longJdk11Variation2 = digest + "WithRSAEncryption"; 241 String digest, 244 provider.addAlgorithm("Alg.Alias.Signature." + digest 210 addDigestSignature( ConfigurableProvider provider, String digest, String className, ASN1ObjectIdentifier oid) argument 239 addISO9796Signature( ConfigurableProvider provider, String digest, String className) argument 249 addPSSSignature( ConfigurableProvider provider, String digest, String className) argument 261 addX931Signature( ConfigurableProvider provider, String digest, String className) argument [all...] |
/external/vboot_reference/tests/ |
H A D | vb2_sha_tests.c | 6 /* FIPS 180-2 Tests for message digest functions. */ 19 uint8_t *digest, 33 return vb2_digest_finalize(&dc, digest, digest_size); 38 uint8_t digest[VB2_SHA1_DIGEST_SIZE]; local 49 VB2_HASH_SHA1, digest, sizeof(digest)), 51 TEST_EQ(memcmp(digest, sha1_results[i], sizeof(digest)), 52 0, "SHA1 digest"); 56 VB2_HASH_SHA1, digest, sizeo 16 vb2_digest(const uint8_t *buf, uint32_t size, enum vb2_hash_algorithm hash_alg, uint8_t *digest, uint32_t digest_size) argument 62 uint8_t digest[VB2_SHA256_DIGEST_SIZE]; local 86 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local 111 uint8_t digest[VB2_SHA512_DIGEST_SIZE]; local [all...] |
/external/libchrome/crypto/ |
H A D | hmac.cc | 39 const base::StringPiece& digest) const { 40 if (digest.size() != DigestLength()) 42 return VerifyTruncated(data, digest); 46 const base::StringPiece& digest) const { 47 if (digest.empty()) 55 return SecureMemEqual(digest.data(), computed_digest.get(), 56 std::min(digest.size(), digest_length));
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | DigestInputStream2Test.java | 33 MessageDigest digest; field in class:DigestInputStream2Test 42 DigestInputStream dis = new DigestInputStream(inStream, digest); 52 DigestInputStream dis = new DigestInputStream(inStream, digest); 53 assertEquals("getMessageDigest returned a bogus result", digest, dis 62 MessageDigest originalDigest = (MessageDigest) (digest.clone()); 63 MessageDigest noChangeDigest = (MessageDigest) (digest.clone()); 71 // make sure the digest for the part where it was off has not 74 MessageDigest.isEqual(noChangeDigest.digest(), originalDigest 75 .digest())); 76 MessageDigest changeDigest = (MessageDigest) (digest [all...] |
/external/libchrome/base/ |
H A D | md5.h | 34 // MD5Digest digest; // the result of the computation 35 // MD5Final(&digest, &ctx); 37 // You can call MD5DigestToBase16() to generate a string of the digest. 57 // Finalizes the MD5 operation and fills the buffer with the digest. 58 BASE_EXPORT void MD5Final(MD5Digest* digest, MD5Context* context); 60 // MD5IntermediateFinal() generates a digest without finalizing the MD5 62 // without affecting the digest generated for the entire input. 63 BASE_EXPORT void MD5IntermediateFinal(MD5Digest* digest, 66 // Converts a digest into human-readable hexadecimal. 67 BASE_EXPORT std::string MD5DigestToBase16(const MD5Digest& digest); [all...] |
/external/ppp/pppd/ |
H A D | chap-new.h | 45 * CHAP digest codes. 66 /* Return the digest alg. ID for the most preferred digest type. */ 73 /* Return the bit flag (lsb set) for our most preferred digest type. */ 76 /* Return the bit flag for a given digest algorithm ID. */ 77 #define CHAP_MDTYPE_D(digest) \ 78 ((digest) == CHAP_MICROSOFT_V2)? MDTYPE_MICROSOFT_V2: \ 79 ((digest) == CHAP_MICROSOFT)? MDTYPE_MICROSOFT: \ 80 ((digest) == CHAP_MD5)? MDTYPE_MD5: \ 83 /* Can we do the requested digest [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
H A D | PBESecretKeyFactory.java | 18 private int digest; field in class:PBESecretKeyFactory 27 int digest, 35 this.digest = digest; 51 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, null); 56 param = PBE.Util.makePBEParameters(pbeSpec, scheme, digest, keySize, ivSize); 60 param = PBE.Util.makePBEMacParameters(pbeSpec, scheme, digest, keySize); 63 return new BCPBEKey(this.algName, this.algOid, scheme, digest, keySize, ivSize, pbeSpec, param); 22 PBESecretKeyFactory( String algorithm, ASN1ObjectIdentifier oid, boolean forCipher, int scheme, int digest, int keySize, int ivSize) argument
|
/external/mmc-utils/3rdparty/hmac_sha/ |
H A D | sha2.h | 82 void sha224_final(sha224_ctx *ctx, unsigned char *digest); 84 unsigned char *digest); 89 void sha256_final(sha256_ctx *ctx, unsigned char *digest); 91 unsigned char *digest); 96 void sha384_final(sha384_ctx *ctx, unsigned char *digest); 98 unsigned char *digest); 103 void sha512_final(sha512_ctx *ctx, unsigned char *digest); 105 unsigned char *digest);
|
/external/vboot_reference/utility/ |
H A D | pad_digest_utility.c | 22 uint8_t* digest = NULL; local 37 digest = BufferFromFile(argv[2], &len); 38 if (!digest) { 43 padded_digest = PrependDigestInfo(algorithm, digest); 53 free(digest);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
H A D | DSABase.java | 17 protected Digest digest; field in class:DSABase 22 Digest digest, 26 this.digest = digest; 35 digest.update(b); 44 digest.update(b, off, len); 50 byte[] hash = new byte[digest.getDigestSize()]; 52 digest.doFinal(hash, 0); 70 byte[] hash = new byte[digest.getDigestSize()]; 72 digest 21 DSABase( Digest digest, DSA signer, DSAEncoder encoder) argument [all...] |
/external/pdfium/core/include/fdrm/ |
H A D | fx_crypt.h | 36 void CRYPT_MD5Generate(const uint8_t* data, FX_DWORD size, uint8_t digest[16]); 39 void CRYPT_MD5Finish(void* context, uint8_t digest[16]); 40 void CRYPT_SHA1Generate(const uint8_t* data, FX_DWORD size, uint8_t digest[20]); 43 void CRYPT_SHA1Finish(void* context, uint8_t digest[20]); 46 uint8_t digest[32]); 49 void CRYPT_SHA256Finish(void* context, uint8_t digest[32]); 52 void CRYPT_SHA384Finish(void* context, uint8_t digest[48]); 55 uint8_t digest[48]); 58 void CRYPT_SHA512Finish(void* context, uint8_t digest[64]); 61 uint8_t digest[6 [all...] |
/external/vboot_reference/firmware/lib/cryptolib/ |
H A D | sha_utility.c | 5 * Utility functions for message digest functions. 55 uint8_t* digest = NULL; local 59 digest = (uint8_t*) VbExMalloc(SHA1_DIGEST_SIZE); 60 Memcpy(digest, SHA1_final(ctx->sha1_ctx), SHA1_DIGEST_SIZE); 65 digest = (uint8_t*) VbExMalloc(SHA256_DIGEST_SIZE); 66 Memcpy(digest, SHA256_final(ctx->sha256_ctx), SHA256_DIGEST_SIZE); 71 digest = (uint8_t*) VbExMalloc(SHA512_DIGEST_SIZE); 72 Memcpy(digest, SHA512_final(ctx->sha512_ctx), SHA512_DIGEST_SIZE); 77 return digest; 81 /* Allocate enough space for the largest digest */ 82 uint8_t* digest = (uint8_t*) VbExMalloc(SHA512_DIGEST_SIZE); local [all...] |
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/third_party/dns/rdtypes/ |
H A D | dsbase.py | 28 @ivar digest_type: the digest type 30 @ivar digest: the digest 31 @type digest: int 34 __slots__ = ['key_tag', 'algorithm', 'digest_type', 'digest'] 37 digest): 42 self.digest = digest 47 dns.rdata._hexify(self.digest, 62 digest [all...] |
/external/curl/lib/ |
H A D | http_digest.c | 52 struct digestdata *digest; local 55 digest = &data->state.proxydigest; 58 digest = &data->state.digest; 68 return Curl_sasl_decode_digest_http_message(header, digest); 93 struct digestdata *digest; local 97 digest = &data->state.proxydigest; 104 digest = &data->state.digest; 121 have_chlg = digest [all...] |
/external/jetty/src/java/org/eclipse/jetty/util/security/ |
H A D | Credential.java | 36 * a Password itself is a Credential, a UnixCrypt or MD5 digest of a a password 39 * This class includes an implementation for unix Crypt an MD5 digest. 131 MD5(String digest) argument 133 digest = digest.startsWith(__TYPE) ? digest.substring(__TYPE.length()) : digest; 134 _digest = TypeUtil.parseBytes(digest, 16); 149 byte[] digest = null; 160 digest 195 public static String digest(String password) method in class:Credential.MD5 [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | DigestInfo.java | 19 * digest OCTET STRING } 25 private byte[] digest; field in class:DigestInfo 52 byte[] digest) 54 this.digest = digest; 64 digest = ASN1OctetString.getInstance(e.nextElement()).getOctets(); 74 return digest; 82 v.add(new DEROctetString(digest)); 50 DigestInfo( AlgorithmIdentifier algId, byte[] digest) argument
|