/external/wpa_supplicant_8/hs20/server/www/ |
est.php | 169 $fingerprint = hash("sha256", $der);
|
/external/wpa_supplicant_8/src/common/ |
sae.c | 13 #include "crypto/sha256.h" 314 * H(salt, ikm) = HMAC-SHA256(salt, ikm) 386 * H(salt, ikm) = HMAC-SHA256(salt, ikm) 933 * HMAC-SHA256(key, D2OS(X) || D2OS(Y) || D2OS(Z) | ...)
|
wpa_common.c | 14 #include "crypto/sha256.h" 84 * @use_sha256: Whether to use SHA256-based KDF 904 * @use_sha256: Whether to use SHA256-based KDF 996 return "WPA2-EAP-SHA256"; 998 return "WPA2-PSK-SHA256"; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
AES.java | 272 super("PBEWithSHA256And128BitAES-CBC-BC", null, true, PKCS12, SHA256, 128, 128); 284 super("PBEWithSHA256And192BitAES-CBC-BC", null, true, PKCS12, SHA256, 192, 128); 296 super("PBEWithSHA256And256BitAES-CBC-BC", null, true, PKCS12, SHA256, 256, 128);
|
/external/chromium_org/net/cert/ |
cert_verify_proc_mac.cc | 259 HashValue sha256(HASH_VALUE_SHA256); 260 CC_SHA256(spki_bytes.data(), spki_bytes.size(), sha256.data()); 261 hashes->push_back(sha256);
|
cert_verify_proc_win.cc | 484 HashValue sha256(HASH_VALUE_SHA256); 485 crypto::SHA256HashString(spki_bytes, sha256.data(), crypto::kSHA256Length); 486 hashes->push_back(sha256);
|
/external/ipsec-tools/src/racoon/ |
strnames.c | 443 { IPSECDOI_AH_SHA256, "SHA256", NULL }, 579 { IPSECDOI_ATTR_AUTH_HMAC_SHA2_256, "hmac-sha256", NULL }, 692 { OAKLEY_ATTR_HASH_ALG_SHA2_256,"SHA256", NULL },
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_eke.c | 197 /* Proposal - DH Group 16 with AES128-CBC and SHA256 */ 203 /* Proposal - DH Group 15 with AES128-CBC and SHA256 */ 209 /* Proposal - DH Group 14 with AES128-CBC and SHA256 */
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 574 cipher = "ADH-AES-128-SHA256"; 583 cipher = "AES-256-SHA256"; 589 cipher = "AES-128-SHA256";
|
/external/chromium_org/chrome/browser/policy/test/ |
policy_testserver.py | 113 # <domain1>: <base64-encdoded SHA256 signature for key + domain1> 114 # <domain2>: <base64-encdoded SHA256 signature for key + domain2> 321 settings.secure_hash = hashlib.sha256(data).digest() 480 1: replies with no new modulus and the sha256 hash of "0" [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/objects/ |
objects.txt | 85 ecdsa-with-Specified 2 : ecdsa-with-SHA256 173 pkcs1 11 : RSA-SHA256 : sha256WithRSAEncryption 903 # OIDs for SHA224, SHA256, SHA385 and SHA512, according to x9.84. 905 nist_hashalgs 1 : SHA256 : sha256 910 # OIDs for dsa-with-sha224 and dsa-with-sha256 [all...] |
/external/openssl/crypto/objects/ |
objects.txt | 85 ecdsa-with-Specified 2 : ecdsa-with-SHA256 173 pkcs1 11 : RSA-SHA256 : sha256WithRSAEncryption 903 # OIDs for SHA224, SHA256, SHA385 and SHA512, according to x9.84. 905 nist_hashalgs 1 : SHA256 : sha256 910 # OIDs for dsa-with-sha224 and dsa-with-sha256 [all...] |
/build/tools/signapk/ |
SignApk.java | 270 md_sha256 = MessageDigest.getInstance("SHA256"); 328 MessageDigest md = MessageDigest.getInstance(hash == USE_SHA1 ? "SHA1" : "SHA256"); 387 hash == USE_SHA256 ? "SHA256" : "SHA1"); [all...] |
/external/openssl/crypto/sha/asm/ |
sha256-armv4.pl | 10 # SHA256 block procedure for ARMv4. May 2007. 617 .asciz "SHA256 block transform for ARMv4/NEON/ARMv8, CRYPTOGAMS by <appro\@openssl.org>" 648 s/\b(sha256\w+)\s+(q.*)/unsha256($1,$2)/geo;
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/lib32/ |
libcrypt.a | 72 ? ? ( R ? ? & + 3 C J O o u ? ? ? ? ? ? sha256-crypt.o/ 1271956505 0 0 100644 6432 ` 114 ?D?????;?7???????f?????T??????)?D$#??????T$?\$?$????????8????? ???????v ??P?????????E ? " ???????T????}?t$?<$?T$???????T???????????E?D$?]??4$??X??????????X????$??????\$?<$??????D$1??L?????????H??? ??????D$" ?D$? ?D$ ?$ ???????T????????D$" ?D$? ?D$ ?$4 ???????& |