/external/deqp/external/openglcts/scripts/ |
verify_kc_cts_rev.py | 30 from fetch_kc_cts import SHA1 74 if out.replace('\n', '') != SHA1: 75 raise Exception ("KC CTS checkout revision %s in external/fetch_kc_cts.py doesn't match KC CTS master HEAD revision %s" % (SHA1, out))
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLMessageDigestJDK.java | 33 * Holds the EVP_MD for the hashing algorithm, e.g. EVP_get_digestbyname("sha1"); 166 public static final class SHA1 extends OpenSSLMessageDigestJDK { 167 public SHA1() throws NoSuchAlgorithmException { 168 super(EvpMdRef.SHA1.EVP_MD, EvpMdRef.SHA1.SIZE_BYTES);
|
OpenSSLMac.java | 39 * EVP_get_digestbyname("sha1"); 168 super(EvpMdRef.SHA1.EVP_MD, EvpMdRef.SHA1.SIZE_BYTES);
|
OpenSSLSignature.java | 295 super(EvpMdRef.SHA1.EVP_MD); 321 super(EvpMdRef.SHA1.EVP_MD, EngineType.EC); 468 super(EvpMdRef.SHA1.EVP_MD, EvpMdRef.SHA1.JCA_NAME, EvpMdRef.SHA1.SIZE_BYTES);
|
/external/libchrome/crypto/ |
hmac.h | 6 // only support SHA1 for the hash algorithm, but this can be extended easily. 30 SHA1,
|
signature_verifier.h | 27 SHA1,
|
hmac_unittest.cc | 80 crypto::HMAC hmac(crypto::HMAC::SHA1); 149 crypto::HMAC hmac(crypto::HMAC::SHA1); 216 crypto::HMAC hmac(crypto::HMAC::SHA1); 241 crypto::HMAC hmac(crypto::HMAC::SHA1); 255 crypto::HMAC hmac(crypto::HMAC::SHA1); 289 crypto::HMAC hmac(crypto::HMAC::SHA1);
|
signature_creator_unittest.cc | 13 #include "base/sha1.h" 33 crypto::SignatureCreator::SHA1)); 69 std::string sha1 = base::SHA1HashString(data); local 70 // Sign sha1 of the input data. 73 key.get(), crypto::SignatureCreator::SHA1, 74 reinterpret_cast<const uint8_t*>(sha1.c_str()), sha1.size(), &signature));
|
/external/robolectric/v1/ |
update-downloads.rb | 12 require 'digest/sha1' 16 sha1 = Digest::SHA1.hexdigest File.read(f) 28 download_html += " <td class=\"sha\">#{sha1}</td>\n"
|
/libcore/luni/src/test/java/libcore/javax/crypto/spec/ |
AlgorithmParametersTestOAEP.java | 45 // hashFunc=EXP:0,SEQUENCE:sha1 50 // params=SEQUENCE:sha1 54 // [sha1] 55 // oid=OID:sha1 99 super("OAEP", new AlgorithmParameterAsymmetricHelper("RSA"), new OAEPParameterSpec("SHA-1", "MGF1", MGF1ParameterSpec.SHA1, PSource.PSpecified.DEFAULT)); 113 "SHA-1", "MGF1", MGF1ParameterSpec.SHA1, PSource.PSpecified.DEFAULT); 142 MGF1ParameterSpec.SHA1.getDigestAlgorithm(), 155 MGF1ParameterSpec.SHA1.getDigestAlgorithm(),
|
/libcore/luni/src/test/java/tests/security/spec/ |
MGF1ParameterSpecTest.java | 89 assertEquals("SHA-1", MGF1ParameterSpec.SHA1.getDigestAlgorithm());
|
/libcore/ojluni/src/main/java/java/security/spec/ |
PSSParameterSpec.java | 40 * hashAlgorithm [0] OAEP-PSSDigestAlgorithms DEFAULT sha1, 49 * { OID id-sha1 PARAMETERS NULL }| 65 * parameters for mgf -- MGF1ParameterSpec.SHA1 83 private AlgorithmParameterSpec mgfSpec = MGF1ParameterSpec.SHA1;
|
/libcore/ojluni/src/main/java/javax/crypto/spec/ |
OAEPParameterSpec.java | 41 * hashAlgorithm [0] OAEP-PSSDigestAlgorithms DEFAULT sha1, 49 * { OID id-sha1 PARAMETERS NULL }| 67 * parameters for mgf -- MGF1ParameterSpec.SHA1 81 private AlgorithmParameterSpec mgfSpec = MGF1ParameterSpec.SHA1;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
PBEPBKDF2.java | 135 this(name, scheme, SHA1); 245 return SHA1; 330 super(name, scheme, SHA1); 420 super("PBEWithHmacSHA1AndAES_128", PKCS5S2_UTF8, SHA1, 128, 128); 456 super("PBEWithHmacSHA1AndAES_256", PKCS5S2_UTF8, SHA1, 256, 128); 502 // were provided in org.bouncycastle.jcajce.provider.digest.SHA1. During that
|
DESede.java | 222 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 192, 8); 234 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 128, 8); 246 super("PBEwithSHAandDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64); 258 super("PBEwithSHAandDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64);
|
AES.java | 321 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 128, 16); 330 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 192, 16); 339 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 256, 16); 431 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128); 443 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128); 455 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128); [all...] |
/prebuilts/devtools/ |
update_jars.sh | 52 local SHA1=$( cd ../../tools/$repo ; git show-ref --head --hash HEAD ) 54 tools/$repo: @ $SHA1"
|
/bootable/recovery/applypatch/ |
bspatch.cpp | 83 // print SHA1 of the patch in the case of a data error. 86 SHA1(reinterpret_cast<const uint8_t*>(patch.data.data() + patch_offset), 89 LOG(ERROR) << "Patch may be corrupted, offset: " << patch_offset << ", SHA1: " << patch_sha1;
|
/device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Hash/ |
CryptSha1.c | 225 if (SHA1 (Data, DataSize, HashValue) == NULL) {
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ct/ |
DigitallySigned.java | 33 SHA1,
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
openssl_utils.h | 40 case android::hardware::keymaster::V3_0::Digest::SHA1:
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
openssl_utils.h | 46 case android::hardware::keymaster::V4_0::Digest::SHA1:
|
/libcore/benchmarks/src/benchmarks/regression/ |
DigestBenchmark.java | 35 public enum Algorithm { MD5, SHA1, SHA256, SHA384, SHA512 };
|
/compatibility/cdd/9_security-model/ |
9_11_keys-and-credentials.md | 19 algorithms and MD5, SHA1, and SHA-2 family hash functions to properly support
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreECDSASignatureSpi.java | 111 public final static class SHA1 extends AndroidKeyStoreECDSASignatureSpi { 112 public SHA1() {
|