/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JCEMac.java | 57 private int pbeHash = SHA1; 285 * SHA1 HMac 287 public static class SHA1 290 public SHA1() 433 super(new HMac(new SHA1Digest()), PKCS12, SHA1, 160);
|
PBE.java | 36 static final int SHA1 = 1; 70 case SHA1: 74 throw new IllegalStateException("PKCS5 scheme 1 only supports MD2, MD5 and SHA1."); 93 case SHA1:
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/signature/ |
DSASHA1Verify.java | 11 import ch.ethz.ssh2.crypto.digest.SHA1; 132 SHA1 md = new SHA1(); 187 SHA1 md = new SHA1();
|
/external/openssl/crypto/store/ |
README | 35 Key ID - the value is a 160 bit SHA1 hash 36 Issuer Key ID - the value is a 160 bit SHA1 hash 37 Subject Key ID - the value is a 160 bit SHA1 hash 38 Issuer/Serial Hash - the value is a 160 bit SHA1 hash 42 Certificate Hash - the value is a 160 bit SHA1 hash
|
/external/ppp/pppd/ |
eap.h | 63 /* EAP SRP-SHA1 Subtypes */ 87 eapSRP1, /* Sent EAP SRP-SHA1 Subtype 1 */ 88 eapSRP2, /* Sent EAP SRP-SHA1 Subtype 2 */ 89 eapSRP3, /* Sent EAP SRP-SHA1 Subtype 3 */ 92 eapSRP4, /* Sent EAP SRP-SHA1 Subtype 4 */
|
/external/srtp/crypto/test/ |
sha1_driver.c | 47 #include "sha1.h" 496 printf("error adding SHA1 test cases (error code %d)\n", err); 522 printf("sha1 test driver\n"); 526 printf("SHA1 did not pass validation testing\n"); 529 printf("SHA1 passed validation tests\n");
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/tsp/ |
TSTInfoTest.java | 44 // SHA1 OID as defined in RFC 3161 45 String sha1 = "1.3.14.3.2.26"; local 47 sha1), new byte[20]);
|
TimeStampRespTest.java | 60 String sha1 = "1.3.14.3.2.26"; local 62 sha1), new byte[20]); 84 new AlgorithmIdentifier(sha1), null, new AlgorithmIdentifier( 92 .singletonList(new AlgorithmIdentifier(sha1)), tSTInfoEncoded,
|
/external/openssh/ |
kex.h | 38 #define KEX_DH1 "diffie-hellman-group1-sha1" 39 #define KEX_DH14 "diffie-hellman-group14-sha1" 40 #define KEX_DHGEX_SHA1 "diffie-hellman-group-exchange-sha1"
|
ssh_config | 41 # MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160
|
/libcore/luni/src/main/java/org/apache/harmony/security/provider/crypto/ |
CryptoProvider.java | 40 super("Crypto", 1.0, "HARMONY (SHA1 digest; SecureRandom; SHA1withDSA signature)"); 55 put("Alg.Alias.MessageDigest.SHA1", "SHA-1"); 67 put("Alg.Alias.Signature.SHA1/DSA", SIGN_ALIAS);
|
/bootable/recovery/applypatch/ |
applypatch.c | 103 SHA(file->data, file->size, file->sha1); 127 // sha1 hash will be loaded. It is acceptable for a size value to be 168 int pairs = (colons-1)/2; // # of (size,sha1) pairs in filename 266 printf("failed to parse sha1 %s in %s\n", 296 // Ran off the end of the list of (size,sha1) pairs without 307 file->sha1[i] = sha_final[i]; 472 // Search an array of sha1 strings for one matching the given sha1. 475 int FindMatchingPatch(uint8_t* sha1, const char** patch_sha1_str, 481 memcmp(patch_sha1, sha1, SHA_DIGEST_SIZE) == 0) [all...] |
/external/oauth/core/src/main/java/net/oauth/signature/ |
RSA_SHA1.java | 37 * Class to handle RSA-SHA1 signatures on OAuth requests. A consumer 85 final static public String PRIVATE_KEY = "RSA-SHA1.PrivateKey"; 86 final static public String PUBLIC_KEY = "RSA-SHA1.PublicKey"; 87 final static public String X509_CERTIFICATE = "RSA-SHA1.X509Certificate"; 219 "generating RSA-SHA1 signatures."); 232 "verifying RSA-SHA1 signatures.");
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/ |
CryptoProviderTest.java | 39 private static final String sha_1_alias = "SHA1"; // alias name 45 "SHA1/DSA",
|
/external/chromium/chrome/browser/chromeos/login/ |
owner_key_utils.h | 52 // Verfiy that |signature| is a Sha1-with-RSA signature over |data| with 59 // Sign |data| with |key| using Sha1 with RSA. If successful, return true
|
/external/elfutils/lib/ |
Makefile.am | 39 crc32.c crc32_file.c md5.c sha1.c 42 sha1.h eu-config.h
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.in | 68 hash_algorithm sha1; 90 hash_algorithm sha1;
|
racoon.conf.sample-gssapi | 23 hash_algorithm sha1;
|
racoon.conf.sample-plainrsa | 33 hash_algorithm sha1;
|
/external/openssh/regress/ |
cipher-speed.sh | 19 macs="hmac-sha1 hmac-md5 umac-64@openssh.com hmac-sha1-96 hmac-md5-96"
|
try-ciphers.sh | 10 macs="hmac-sha1 hmac-md5 umac-64@openssh.com hmac-sha1-96 hmac-md5-96"
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
KnownHosts.java | 26 import ch.ethz.ssh2.crypto.digest.SHA1; 161 SHA1 sha1 = new SHA1(); local 163 byte[] salt = new byte[sha1.getDigestLength()]; 177 SHA1 sha1 = new SHA1(); local 179 if (salt.length != sha1.getDigestLength()) 184 HMAC hmac = new HMAC(sha1, salt, salt.length) 225 SHA1 sha1 = new SHA1(); local [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/asn1/oiw/ |
OIWObjectIdentifiers.java | 7 // id-SHA1 OBJECT IDENTIFIER ::=
|
/external/chromium/net/base/ |
cert_verify_result.h | 34 // If the certificate was successfully verified then this contains the SHA1
|
/external/dropbear/ |
common-algo.c | 113 {"hmac-sha1-96", 0, (void*)&dropbear_sha1_96, 1}, 116 {"hmac-sha1", 0, (void*)&dropbear_sha1, 1}, 143 {"diffie-hellman-group1-sha1", DROPBEAR_KEX_DH_GROUP1, NULL, 1}, 169 /* we need sha1 for hostkey stuff regardless */
|