/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/symmetric/ |
Twofish.java | 96 super("PBEwithSHAandTwofish-CBC", null, true, PKCS12, SHA1, 256, 128); 109 super(new CBCBlockCipher(new TwofishEngine()), PKCS12, SHA1, 256, 16);
|
DESede.java | 244 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 192, 8); 257 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 128, 8); 270 super("PBEwithSHAandDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64); 283 super("PBEwithSHAandDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64);
|
PBEPBKDF2.java | 48 prfCodes.put(PKCSObjectIdentifiers.id_hmacWithSHA1, Integers.valueOf(PBE.SHA1)); 167 this(name, scheme, SHA1); 390 super(name, scheme, SHA1); 513 super("PBEWithHmacSHA1AndAES_128", PKCS5S2_UTF8, SHA1, 128, 128); 564 super("PBEWithHmacSHA1AndAES_256", PKCS5S2_UTF8, SHA1, 256, 128); 625 // were provided in org.bouncycastle.jcajce.provider.digest.SHA1. During that
|
AES.java | 343 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 128, 16); 355 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 192, 16); 367 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 256, 16); 470 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128); 483 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128); 496 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128); [all...] |
/external/deqp/external/openglcts/scripts/ |
verify_kc_cts_rev.py | 30 from fetch_kc_cts import SHA1 74 if out.replace('\n', '') != SHA1: 75 raise Exception ("KC CTS checkout revision %s in external/fetch_kc_cts.py doesn't match KC CTS master HEAD revision %s" % (SHA1, out))
|
/bootable/recovery/applypatch/ |
bspatch.cpp | 77 // print SHA1 of the patch in the case of a data error. 80 SHA1(reinterpret_cast<const uint8_t*>(patch.data.data() + patch_offset), 83 LOG(ERROR) << "Patch may be corrupted, offset: " << patch_offset << ", SHA1: " << patch_sha1;
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLMessageDigestJDK.java | 31 * Holds the EVP_MD for the hashing algorithm, e.g. EVP_get_digestbyname("sha1"); 164 public static final class SHA1 extends OpenSSLMessageDigestJDK { 165 public SHA1() throws NoSuchAlgorithmException { 166 super(EvpMdRef.SHA1.EVP_MD, EvpMdRef.SHA1.SIZE_BYTES);
|
OpenSSLMac.java | 37 * EVP_get_digestbyname("sha1"); 166 super(EvpMdRef.SHA1.EVP_MD, EvpMdRef.SHA1.SIZE_BYTES);
|
OpenSSLSignature.java | 293 super(EvpMdRef.SHA1.EVP_MD); 319 super(EvpMdRef.SHA1.EVP_MD, EngineType.EC); 466 super(EvpMdRef.SHA1.EVP_MD, EvpMdRef.SHA1.JCA_NAME, EvpMdRef.SHA1.SIZE_BYTES);
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ |
OpenSSLMessageDigestJDK.java | 34 * Holds the EVP_MD for the hashing algorithm, e.g. EVP_get_digestbyname("sha1"); 176 public static final class SHA1 extends OpenSSLMessageDigestJDK { 178 public SHA1() throws NoSuchAlgorithmException { 179 super(EvpMdRef.SHA1.EVP_MD, EvpMdRef.SHA1.SIZE_BYTES);
|
OpenSSLMac.java | 40 * EVP_get_digestbyname("sha1"); 179 super(EvpMdRef.SHA1.EVP_MD, EvpMdRef.SHA1.SIZE_BYTES);
|
/external/grpc-grpc/tools/distrib/ |
docker_for_windows.rb | 25 version = Digest::SHA1.file(dockerfile).hexdigest
|
/external/libaom/libaom/test/ |
test_data_util.cmake | 560 # Parses test/test-data.sha1 and writes captured file names and checksums to 609 file(SHA1 "${local_path}" file_checksum) 629 EXPECTED_HASH SHA1=${file_checksum})
|
/external/libchrome/crypto/ |
hmac.h | 6 // only support SHA1 for the hash algorithm, but this can be extended easily. 30 SHA1,
|
hmac_unittest.cc | 80 crypto::HMAC hmac(crypto::HMAC::SHA1); 149 crypto::HMAC hmac(crypto::HMAC::SHA1); 216 crypto::HMAC hmac(crypto::HMAC::SHA1); 241 crypto::HMAC hmac(crypto::HMAC::SHA1); 255 crypto::HMAC hmac(crypto::HMAC::SHA1); 289 crypto::HMAC hmac(crypto::HMAC::SHA1);
|
/external/u-boot/drivers/crypto/fsl/ |
fsl_hash.c | 28 SHA1 = 0, 34 .name = "sha1", 47 if (!strcmp(algo->name, driver_hash[SHA1].name)) 48 return SHA1; 56 * @caam_algo: Enum for SHA1 or SHA256 79 * @caam_algo: Enum for SHA1 or SHA256 125 * @caam_algo: Enum for SHA1 or SHA256 211 if (caam_hash(pbuf, buf_len, pout, SHA1))
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
PBEPBKDF2.java | 44 prfCodes.put(PKCSObjectIdentifiers.id_hmacWithSHA1, Integers.valueOf(PBE.SHA1)); 160 this(name, scheme, SHA1); 380 super(name, scheme, SHA1); 470 super("PBEWithHmacSHA1AndAES_128", PKCS5S2_UTF8, SHA1, 128, 128); 506 super("PBEWithHmacSHA1AndAES_256", PKCS5S2_UTF8, SHA1, 256, 128); 552 // were provided in org.bouncycastle.jcajce.provider.digest.SHA1. During that
|
DESede.java | 223 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 192, 8); 235 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 128, 8); 247 super("PBEwithSHAandDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64); 259 super("PBEwithSHAandDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64);
|
AES.java | 319 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 128, 16); 328 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 192, 16); 337 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 256, 16); 429 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128); 441 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128); 453 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128); [all...] |
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Hash/ |
CryptSha1.c | 225 if (SHA1 (Data, DataSize, HashValue) == NULL) {
|
/external/conscrypt/common/src/main/java/org/conscrypt/ct/ |
DigitallySigned.java | 31 SHA1,
|
/external/conscrypt/openjdk-integ-tests/src/test/java/org/conscrypt/java/security/ |
AlgorithmParametersTestOAEP.java | 50 // hashFunc=EXP:0,SEQUENCE:sha1 55 // params=SEQUENCE:sha1 59 // [sha1] 60 // oid=OID:sha1 108 // hashFunc=EXP:0,SEQUENCE:sha1 111 // [sha1] 112 // oid=OID:sha1 127 super("OAEP", new AlgorithmParameterAsymmetricHelper("RSA/ECB/OAEPPadding"), new OAEPParameterSpec("SHA-1", "MGF1", MGF1ParameterSpec.SHA1, PSource.PSpecified.DEFAULT)); 142 "SHA-1", "MGF1", MGF1ParameterSpec.SHA1, PSource.PSpecified.DEFAULT); 185 MGF1ParameterSpec.SHA1.getDigestAlgorithm() [all...] |
/external/conscrypt/repackaged/openjdk-integ-tests/src/test/java/com/android/org/conscrypt/java/security/ |
AlgorithmParametersTestOAEP.java | 54 // hashFunc=EXP:0,SEQUENCE:sha1 59 // params=SEQUENCE:sha1 63 // [sha1] 64 // oid=OID:sha1 112 // hashFunc=EXP:0,SEQUENCE:sha1 115 // [sha1] 116 // oid=OID:sha1 131 super("OAEP", new AlgorithmParameterAsymmetricHelper("RSA/ECB/OAEPPadding"), new OAEPParameterSpec("SHA-1", "MGF1", MGF1ParameterSpec.SHA1, PSource.PSpecified.DEFAULT)); 146 "SHA-1", "MGF1", MGF1ParameterSpec.SHA1, PSource.PSpecified.DEFAULT); 189 MGF1ParameterSpec.SHA1.getDigestAlgorithm() [all...] |
/external/swiftshader/third_party/llvm-7.0/llvm/unittests/Support/ |
raw_sha1_ostream_test.cpp | 35 auto Hash = toHex(Sha1Stream.sha1()); 42 std::array<uint8_t, 20> Vec = SHA1::hash(Input); 52 auto Hash = toHex(Sha1Stream.sha1()); 56 Hash = toHex(Sha1Stream.sha1()); 61 auto NonSplitHash = toHex(NonSplitSha1Stream.sha1()); 69 auto Hash = toHex(Sha1Stream.sha1()); 75 Hash = toHex(Sha1Stream.sha1());
|
/external/swiftshader/third_party/llvm-7.0/llvm/lib/Support/ |
SHA1.cpp | 1 //====- SHA1.cpp - Private copy of the SHA1 implementation ---*- C++ -* ======// 11 // (http://oauth.googlecode.com/svn/code/c/liboauth/src/sha1.c and 12 // http://cvsweb.netbsd.org/bsdweb.cgi/src/common/lib/libc/hash/sha1/sha1.c?rev=1.6) 18 #include "llvm/Support/SHA1.h" 85 void SHA1::init() { 95 void SHA1::hashBlock() { 194 void SHA1::addUncounted(uint8_t Data) { 208 void SHA1::writebyte(uint8_t Data) [all...] |