/external/elfutils/lib/ |
sha1.c | 1 /* Functions to compute SHA1 message digest of files or memory blocks. 2 according to the definition of SHA1 in FIPS 180-1 from April 1997. 37 #include "sha1.h" 195 /* These are the four functions used in the four steps of the SHA1 algorithm
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/dh/ |
DhExchange.java | 128 HashForSSH2Types hash = new HashForSSH2Types("SHA1");
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.sample-natt | 82 hash_algorithm sha1;
|
/external/openssl/crypto/evp/ |
c_alld.c | 83 EVP_add_digest_alias(SN_sha1,"ssl3-sha1");
|
/external/openssl/crypto/sha/ |
sha1_one.c | 65 unsigned char *SHA1(const unsigned char *d, size_t n, unsigned char *md)
|
sha1dgst.c | 68 const char SHA1_version[]="SHA1" OPENSSL_VERSION_PTEXT;
|
/external/srtp/crypto/ |
Makefile | 73 hashes = hash/null_auth.o hash/sha1.o \
|
Makefile.in | 73 hashes = hash/null_auth.o hash/sha1.o \
|
/external/srtp/crypto/hash/ |
sha1.c | 2 * sha1.c 48 #include "sha1.h" 77 sha1(const uint8_t *msg, int octets_in_msg, uint32_t hash_value[5]) { function 92 * complete SHA1 function
|
/libcore/luni/src/test/java/com/android/org/bouncycastle/crypto/digests/ |
DigestTest.java | 106 Digest newDigest = new OpenSSLDigest.SHA1();
|
/sdk/sdkmanager/libs/sdklib/src/com/android/sdklib/internal/repository/sources/ |
SdkRepoSource.java | 374 // double check that the checksum element contains a type=sha1 attribute
385 String sha1 = node == null ? null : node.getTextContent().trim();
local 386 if (sha1 == null ||
387 sha1.length() != RepoConstants.SHA1_CHECKSUM_LEN) {
|
/system/core/mkbootimg/ |
bootimg.h | 49 unsigned id[8]; /* timestamp / checksum / sha1 / etc */
|
/system/extras/ext4_utils/ |
Android.mk | 17 sha1.c \
|
/external/chromium/net/base/ |
x509_certificate_win.cc | 10 #include "base/sha1.h" 1003 SHA1Fingerprint sha1; local [all...] |
/external/dropbear/libtomcrypt/testprof/ |
katja_test.c | 13 hash_idx = find_hash("sha1"); 16 fprintf(stderr, "katja_test requires SHA1 and yarrow");
|
x86_prof.c | 195 #ifdef SHA1 847 find_prng("yarrow"), find_hash("sha1"), 867 if ((err = rsa_decrypt_key(buf[1], z, buf[0], &zzz, (const unsigned char *)"testprog", 8, find_hash("sha1"), 888 find_prng("yarrow"), find_hash("sha1"), 8, &key)) != CRYPT_OK) { 906 if ((err = rsa_verify_hash(buf[1], z, buf[0], 20, find_hash("sha1"), 8, &stat, &key)) != CRYPT_OK) { 966 find_prng("yarrow"), find_hash("sha1"), 982 if ((err = katja_decrypt_key(buf[1], z, buf[0], &zzz, "testprog", 8, find_hash("sha1"), 1066 if ((err = ecc_encrypt_key(buf[0], 20, buf[1], &z, &yarrow_prng, find_prng("yarrow"), find_hash("sha1"), 1166 hash_idx = find_hash("sha1"); 1169 fprintf(stderr, "Warning the MAC tests requires AES and SHA1 to operate... so sorry\n") [all...] |
/external/ipsec-tools/src/racoon/ |
eaytest.c | 747 printf("\n**Test for HMAC MD5, SHA1, and SHA256.**\n"); 749 printf("\n**Test for HMAC MD5 & SHA1.**\n"); 789 /* HMAC SHA1 */ 790 printf("HMAC SHA1 by eay_hmacsha1_one()\n"); 801 /* HMAC SHA1 */ 802 printf("HMAC SHA1 by eay_hmacsha1_xxx()\n"); 847 printf("\n**Test for SHA1.**\n"); 1008 { "sha1", sha1test, },
|
/external/oauth/core/src/main/java/net/oauth/ |
OAuth.java | 53 public static final String HMAC_SHA1 = "HMAC-SHA1"; 54 public static final String RSA_SHA1 = "RSA-SHA1";
|
/dalvik/libdex/ |
sha1.cpp | 82 #include "sha1.h" 125 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ 203 /* SHA1 initialization constants */ 352 1 /*(!strncmp(checkline,"SHA1=", 5))*/) 483 //printf("SHA1="); 502 "No SHA1 lines found in %s\n",
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKKeyStore.java | 826 HMac hMac = new HMac(new OpenSSLDigest.SHA1()); 833 PBEParametersGenerator pbeGen = new PKCS12ParametersGenerator(new OpenSSLDigest.SHA1()); 886 HMac hMac = new HMac(new OpenSSLDigest.SHA1()); 888 PBEParametersGenerator pbeGen = new PKCS12ParametersGenerator(new OpenSSLDigest.SHA1()); 978 Digest dig = new OpenSSLDigest.SHA1(); 1020 DigestOutputStream dgOut = new DigestOutputStream(cOut, new OpenSSLDigest.SHA1());
|
/frameworks/compile/libbcc/helper/ |
sha1.c | 87 #include "sha1.h" 124 /* (R0+R1), R2, R3, R4 are the different operations used in SHA1 */ 202 /* SHA1 initialization constants */ 351 1 /*(!strncmp(checkline,"SHA1=", 5))*/) 503 //printf("SHA1="); 522 "No SHA1 lines found in %s\n",
|
/external/openssl/crypto/objects/ |
obj_dat.h | [all...] |
/external/openssl/crypto/sha/asm/ |
sha1-sparcv9a.pl | 22 # 40% over pure IALU sha1-sparcv9.pl on UltraSPARC-IIi, but 12% on 29 # crypto/sha/asm/sha1-sparcv9.pl with this module. 110 # 2x-parallelized the procedure is "worth" 5, 8.5 or 6 ticks per SHA1 117 # sha1-sparcv9.pl module exhibits virtually uniform performance of 118 # ~9.3 cycles per SHA1 round. Timings mentioned above are theoretical 120 # per SHA1 round on USIIi and 8.3 on USIII. The latter is lower than 541 .asciz "SHA1 block transform for SPARCv9a, CRYPTOGAMS by <appro\@openssl.org>"
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/gdocs/ |
chrome_ex_oauthsimple.js | 70 * that will sign as a "GET" using "SHA1-MAC" the url. If you need more than 97 this._default_signature_method= "HMAC-SHA1"; 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 395 // heavily optimized and compressed version of http://pajhome.org.uk/crypt/md5/sha1.js 448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
|
/external/chromium/chrome/common/extensions/docs/examples/extensions/oauth_contacts/ |
chrome_ex_oauthsimple.js | 70 * that will sign as a "GET" using "SHA1-MAC" the url. If you need more than 97 this._default_signature_method= "HMAC-SHA1"; 226 if (method.toUpperCase().match(/(PLAINTEXT|HMAC-SHA1)/) === undefined) { 395 // heavily optimized and compressed version of http://pajhome.org.uk/crypt/md5/sha1.js 448 if (this._parameters['oauth_signature_method'] == 'HMAC-SHA1')
|