/system/core/fastboot/ |
signfile.sh | 9 openssl dgst -passin pass:"$3" -binary -sha1 -sign $1.pem $2 > $2.sign
|
/external/dropbear/libtomcrypt/src/hashes/ |
sha1.c | 14 @file sha1.c 15 SHA1 code by Tom St Denis 19 #ifdef SHA1 23 "sha1", 61 a = md->sha1.state[0]; 62 b = md->sha1.state[1]; 63 c = md->sha1.state[2]; 64 d = md->sha1.state[3]; 65 e = md->sha1.state[4]; 141 md->sha1.state[0] = md->sha1.state[0] + a [all...] |
/system/extras/ext4_utils/ |
uuid.c | 21 #include "sha1.h" 35 unsigned char sha1[SHA1_DIGEST_LENGTH]) 41 SHA1Final(sha1, &ctx); 46 unsigned char sha1[SHA1_DIGEST_LENGTH]; local 49 sha1_hash(namespace, name, (unsigned char*)sha1); 50 memcpy(uuid, sha1, sizeof(struct uuid));
|
Android.mk | 16 sha1.c \
|
/device/samsung/crespo4g/ |
releasetools.py | 65 elif sf and tf.sha1 == sf.sha1: 75 elif sf and tf.sha1 == sf.sha1:
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JCEDigestUtil.java | 26 private static Set sha1 = new HashSet(); field in class:JCEDigestUtil 41 sha1.add("SHA1"); 42 sha1.add("SHA-1"); 43 sha1.add(OIWObjectIdentifiers.idSHA1.getId()); 66 oids.put("SHA1", OIWObjectIdentifiers.idSHA1); 94 if (sha1.contains(digestName)) 128 return (sha1.contains(digest1) && sha1.contains(digest2))
|
/device/samsung/crespo/ |
releasetools.py | 99 if tf.sha1 == sf.sha1: 118 sf.size, sf.sha1, tf.size, tf.sha1), 119 "-", tf.size, tf.sha1, sf.sha1, "radio.img.p")
|
/bootable/recovery/applypatch/ |
applypatch.h | 25 uint8_t sha1[SHA_DIGEST_SIZE]; member in struct:_Patch 30 uint8_t sha1[SHA_DIGEST_SIZE]; member in struct:_FileContents
|
imgdiff_test.sh | 56 sha1() { function 94 /data/local/tmp/target $(sha1 $tmpdir/target) $(size $tmpdir/target) \ 95 $(sha1 $tmpdir/source):/data/local/tmp/patch \
|
applypatch.c | 78 SHA(file->data, file->size, file->sha1); 107 // sha1 hash will be loaded. It is acceptable for a size value to be 148 int pairs = (colons-1)/2; // # of (size,sha1) pairs in filename 246 printf("failed to parse sha1 %s in %s\n", 276 // Ran off the end of the list of (size,sha1) pairs without 287 file->sha1[i] = sha_final[i]; 452 // Search an array of sha1 strings for one matching the given sha1. 455 int FindMatchingPatch(uint8_t* sha1, char** const patch_sha1_str, 461 memcmp(patch_sha1, sha1, SHA_DIGEST_SIZE) == 0) [all...] |
/external/ipsec-tools/src/racoon/samples/roadwarrior/client/ |
racoon.conf | 20 hash_algorithm sha1;
|
/external/ipsec-tools/src/racoon/samples/roadwarrior/server/ |
racoon.conf | 18 hash_algorithm sha1;
|
/external/wpa_supplicant/ |
crypto_internal.c | 20 #include "sha1.h" 59 struct SHA1Context sha1; member in union:crypto_hash::__anon8232 85 SHA1Init(&ctx->u.sha1); 107 SHA1Init(&ctx->u.sha1); 108 SHA1Update(&ctx->u.sha1, key, key_len); 109 SHA1Final(tk, &ctx->u.sha1); 120 SHA1Init(&ctx->u.sha1); 121 SHA1Update(&ctx->u.sha1, k_pad, sizeof(k_pad)); 144 SHA1Update(&ctx->u.sha1, data, len); 180 SHA1Final(mac, &ctx->u.sha1); [all...] |
Makefile | 40 rc4.o sha1.o des.o 41 OBJS_p = wpa_passphrase.o sha1.o md5.o md4.o \ 789 crypto_$(CONFIG_CRYPTO).o md5.o sha1.o \ 798 md5.o sha1.o \ 846 TEST_MS_FUNCS_OBJS = crypto.o sha1.o md5.o \ 853 TEST_SHA1_OBJS = sha1.o md5.o tests/test_sha1.o #crypto.o 854 test-sha1: $(TEST_SHA1_OBJS) 856 ./test-sha1 857 rm test-sha1 871 TEST_EAP_SIM_COMMON_OBJS = sha1.o md5.o [all...] |
/packages/apps/Email/tests/src/com/android/email/ |
UtilityUnitTests.java | 193 byte[] sha1 = new byte[20]; 196 assertEquals(0, Utility.getSmallHashFromSha1(sha1)); 198 for (int i = 0; i < sha1.length; i++) { 199 sha1[i] = (byte) 0xFF; 201 assertEquals(Integer.MAX_VALUE, Utility.getSmallHashFromSha1(sha1)); 205 sha1[19] = (byte) i; 206 Utility.getSmallHashFromSha1(sha1);
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/generators/ |
DSAParametersGenerator.java | 78 SHA1Digest sha1 = new SHA1Digest(); local 86 hash(sha1, seed, part1); 89 hash(sha1, part2, part2); 114 hash(sha1, offset, part1); 119 hash(sha1, offset, part1);
|
/development/tools/ |
make_key | 54 openssl req -new -x509 -sha1 -key ${two} -out $1.x509.pem \
|
/device/htc/common/updater/ |
firmware.c | 136 const uint8_t* sha1 = SHA_final(&sha_ctx); local 137 if (memcmp(sha1, expected_sha1, SHA_DIGEST_SIZE) != 0) { 138 printf("verify image: sha1 doesn't match\n");
|
/build/tools/releasetools/ |
ota_from_target_files | 330 'boot_sha1': boot_img.sha1, 334 'recovery_sha1': recovery_img.sha1, 487 elif tf.sha1 != sf.sha1: 549 script.PatchCheck("/"+fn, tf.sha1, sf.sha1) 565 source_boot.size, source_boot.sha1, 566 target_boot.size, target_boot.sha1)) 595 script.ApplyPatch("/"+fn, "-", tf.size, tf.sha1, sf.sha1, "patch/"+fn+".p" [all...] |
edify_generator.py | 114 def PatchCheck(self, filename, *sha1): 116 given *sha1 hashes, checking the version saved in cache if the 119 "".join([', "%s"' % (i,) for i in sha1]) + 122 def FileCheck(self, filename, *sha1): 124 given *sha1 hashes.""" 126 "".join([', "%s"' % (i,) for i in sha1]) +
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_internal.c | 20 #include "sha1.h" 60 struct SHA1Context sha1; member in union:crypto_hash::__anon8398 86 SHA1Init(&ctx->u.sha1); 108 SHA1Init(&ctx->u.sha1); 109 SHA1Update(&ctx->u.sha1, key, key_len); 110 SHA1Final(tk, &ctx->u.sha1); 121 SHA1Init(&ctx->u.sha1); 122 SHA1Update(&ctx->u.sha1, k_pad, sizeof(k_pad)); 145 SHA1Update(&ctx->u.sha1, data, len); 181 SHA1Final(mac, &ctx->u.sha1); [all...] |
/bootable/recovery/ |
verifier.c | 143 LOGE("failed to alloc memory for sha1 buffer\n"); 170 const uint8_t* sha1 = SHA_final(&ctx); local 175 RSANUMBYTES, sha1)) {
|
/dalvik/libdex/ |
Android.mk | 31 sha1.c \
|
/external/openssl/android.testssl/ |
CAss.cnf | 14 default_md = sha1
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/ |
DESedeWrapEngine.java | 55 Digest sha1 = new SHA1Digest(); field in class:DESedeWrapEngine 318 sha1.update(key, 0, key.length); 319 sha1.doFinal(digest, 0);
|