HomeSort by relevance Sort by last modified time
    Searched refs:sha1 (Results 1 - 25 of 59) sorted by null

1 2 3

  /system/core/fastboot/
signfile.sh 9 openssl dgst -passin pass:"$3" -binary -sha1 -sign $1.pem $2 > $2.sign
  /external/dropbear/libtomcrypt/src/hashes/
sha1.c 14 @file sha1.c
15 SHA1 code by Tom St Denis
19 #ifdef SHA1
23 "sha1",
61 a = md->sha1.state[0];
62 b = md->sha1.state[1];
63 c = md->sha1.state[2];
64 d = md->sha1.state[3];
65 e = md->sha1.state[4];
141 md->sha1.state[0] = md->sha1.state[0] + a
    [all...]
  /system/extras/ext4_utils/
uuid.c 21 #include "sha1.h"
35 unsigned char sha1[SHA1_DIGEST_LENGTH])
41 SHA1Final(sha1, &ctx);
46 unsigned char sha1[SHA1_DIGEST_LENGTH]; local
49 sha1_hash(namespace, name, (unsigned char*)sha1);
50 memcpy(uuid, sha1, sizeof(struct uuid));
Android.mk 16 sha1.c \
  /device/samsung/crespo4g/
releasetools.py 65 elif sf and tf.sha1 == sf.sha1:
75 elif sf and tf.sha1 == sf.sha1:
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
JCEDigestUtil.java 26 private static Set sha1 = new HashSet(); field in class:JCEDigestUtil
41 sha1.add("SHA1");
42 sha1.add("SHA-1");
43 sha1.add(OIWObjectIdentifiers.idSHA1.getId());
66 oids.put("SHA1", OIWObjectIdentifiers.idSHA1);
94 if (sha1.contains(digestName))
128 return (sha1.contains(digest1) && sha1.contains(digest2))
  /device/samsung/crespo/
releasetools.py 99 if tf.sha1 == sf.sha1:
118 sf.size, sf.sha1, tf.size, tf.sha1),
119 "-", tf.size, tf.sha1, sf.sha1, "radio.img.p")
  /bootable/recovery/applypatch/
applypatch.h 25 uint8_t sha1[SHA_DIGEST_SIZE]; member in struct:_Patch
30 uint8_t sha1[SHA_DIGEST_SIZE]; member in struct:_FileContents
imgdiff_test.sh 56 sha1() { function
94 /data/local/tmp/target $(sha1 $tmpdir/target) $(size $tmpdir/target) \
95 $(sha1 $tmpdir/source):/data/local/tmp/patch \
applypatch.c 78 SHA(file->data, file->size, file->sha1);
107 // sha1 hash will be loaded. It is acceptable for a size value to be
148 int pairs = (colons-1)/2; // # of (size,sha1) pairs in filename
246 printf("failed to parse sha1 %s in %s\n",
276 // Ran off the end of the list of (size,sha1) pairs without
287 file->sha1[i] = sha_final[i];
452 // Search an array of sha1 strings for one matching the given sha1.
455 int FindMatchingPatch(uint8_t* sha1, char** const patch_sha1_str,
461 memcmp(patch_sha1, sha1, SHA_DIGEST_SIZE) == 0)
    [all...]
  /external/ipsec-tools/src/racoon/samples/roadwarrior/client/
racoon.conf 20 hash_algorithm sha1;
  /external/ipsec-tools/src/racoon/samples/roadwarrior/server/
racoon.conf 18 hash_algorithm sha1;
  /external/wpa_supplicant/
crypto_internal.c 20 #include "sha1.h"
59 struct SHA1Context sha1; member in union:crypto_hash::__anon8232
85 SHA1Init(&ctx->u.sha1);
107 SHA1Init(&ctx->u.sha1);
108 SHA1Update(&ctx->u.sha1, key, key_len);
109 SHA1Final(tk, &ctx->u.sha1);
120 SHA1Init(&ctx->u.sha1);
121 SHA1Update(&ctx->u.sha1, k_pad, sizeof(k_pad));
144 SHA1Update(&ctx->u.sha1, data, len);
180 SHA1Final(mac, &ctx->u.sha1);
    [all...]
Makefile 40 rc4.o sha1.o des.o
41 OBJS_p = wpa_passphrase.o sha1.o md5.o md4.o \
789 crypto_$(CONFIG_CRYPTO).o md5.o sha1.o \
798 md5.o sha1.o \
846 TEST_MS_FUNCS_OBJS = crypto.o sha1.o md5.o \
853 TEST_SHA1_OBJS = sha1.o md5.o tests/test_sha1.o #crypto.o
854 test-sha1: $(TEST_SHA1_OBJS)
856 ./test-sha1
857 rm test-sha1
871 TEST_EAP_SIM_COMMON_OBJS = sha1.o md5.o
    [all...]
  /packages/apps/Email/tests/src/com/android/email/
UtilityUnitTests.java 193 byte[] sha1 = new byte[20];
196 assertEquals(0, Utility.getSmallHashFromSha1(sha1));
198 for (int i = 0; i < sha1.length; i++) {
199 sha1[i] = (byte) 0xFF;
201 assertEquals(Integer.MAX_VALUE, Utility.getSmallHashFromSha1(sha1));
205 sha1[19] = (byte) i;
206 Utility.getSmallHashFromSha1(sha1);
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/generators/
DSAParametersGenerator.java 78 SHA1Digest sha1 = new SHA1Digest(); local
86 hash(sha1, seed, part1);
89 hash(sha1, part2, part2);
114 hash(sha1, offset, part1);
119 hash(sha1, offset, part1);
  /development/tools/
make_key 54 openssl req -new -x509 -sha1 -key ${two} -out $1.x509.pem \
  /device/htc/common/updater/
firmware.c 136 const uint8_t* sha1 = SHA_final(&sha_ctx); local
137 if (memcmp(sha1, expected_sha1, SHA_DIGEST_SIZE) != 0) {
138 printf("verify image: sha1 doesn't match\n");
  /build/tools/releasetools/
ota_from_target_files 330 'boot_sha1': boot_img.sha1,
334 'recovery_sha1': recovery_img.sha1,
487 elif tf.sha1 != sf.sha1:
549 script.PatchCheck("/"+fn, tf.sha1, sf.sha1)
565 source_boot.size, source_boot.sha1,
566 target_boot.size, target_boot.sha1))
595 script.ApplyPatch("/"+fn, "-", tf.size, tf.sha1, sf.sha1, "patch/"+fn+".p"
    [all...]
edify_generator.py 114 def PatchCheck(self, filename, *sha1):
116 given *sha1 hashes, checking the version saved in cache if the
119 "".join([', "%s"' % (i,) for i in sha1]) +
122 def FileCheck(self, filename, *sha1):
124 given *sha1 hashes."""
126 "".join([', "%s"' % (i,) for i in sha1]) +
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_internal.c 20 #include "sha1.h"
60 struct SHA1Context sha1; member in union:crypto_hash::__anon8398
86 SHA1Init(&ctx->u.sha1);
108 SHA1Init(&ctx->u.sha1);
109 SHA1Update(&ctx->u.sha1, key, key_len);
110 SHA1Final(tk, &ctx->u.sha1);
121 SHA1Init(&ctx->u.sha1);
122 SHA1Update(&ctx->u.sha1, k_pad, sizeof(k_pad));
145 SHA1Update(&ctx->u.sha1, data, len);
181 SHA1Final(mac, &ctx->u.sha1);
    [all...]
  /bootable/recovery/
verifier.c 143 LOGE("failed to alloc memory for sha1 buffer\n");
170 const uint8_t* sha1 = SHA_final(&ctx); local
175 RSANUMBYTES, sha1)) {
  /dalvik/libdex/
Android.mk 31 sha1.c \
  /external/openssl/android.testssl/
CAss.cnf 14 default_md = sha1
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/
DESedeWrapEngine.java 55 Digest sha1 = new SHA1Digest(); field in class:DESedeWrapEngine
318 sha1.update(key, 0, key.length);
319 sha1.doFinal(digest, 0);

Completed in 565 milliseconds

1 2 3