HomeSort by relevance Sort by last modified time
    Searched refs:SHA1 (Results 51 - 75 of 429) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/deqp/external/openglcts/scripts/
verify_kc_cts_rev.py 30 from fetch_kc_cts import SHA1
74 if out.replace('\n', '') != SHA1:
75 raise Exception ("KC CTS checkout revision %s in external/fetch_kc_cts.py doesn't match KC CTS master HEAD revision %s" % (SHA1, out))
  /external/conscrypt/common/src/main/java/org/conscrypt/
OpenSSLMessageDigestJDK.java 33 * Holds the EVP_MD for the hashing algorithm, e.g. EVP_get_digestbyname("sha1");
166 public static final class SHA1 extends OpenSSLMessageDigestJDK {
167 public SHA1() throws NoSuchAlgorithmException {
168 super(EvpMdRef.SHA1.EVP_MD, EvpMdRef.SHA1.SIZE_BYTES);
OpenSSLMac.java 39 * EVP_get_digestbyname("sha1");
168 super(EvpMdRef.SHA1.EVP_MD, EvpMdRef.SHA1.SIZE_BYTES);
OpenSSLSignature.java 295 super(EvpMdRef.SHA1.EVP_MD);
321 super(EvpMdRef.SHA1.EVP_MD, EngineType.EC);
468 super(EvpMdRef.SHA1.EVP_MD, EvpMdRef.SHA1.JCA_NAME, EvpMdRef.SHA1.SIZE_BYTES);
  /external/libchrome/crypto/
hmac.h 6 // only support SHA1 for the hash algorithm, but this can be extended easily.
30 SHA1,
signature_verifier.h 27 SHA1,
hmac_unittest.cc 80 crypto::HMAC hmac(crypto::HMAC::SHA1);
149 crypto::HMAC hmac(crypto::HMAC::SHA1);
216 crypto::HMAC hmac(crypto::HMAC::SHA1);
241 crypto::HMAC hmac(crypto::HMAC::SHA1);
255 crypto::HMAC hmac(crypto::HMAC::SHA1);
289 crypto::HMAC hmac(crypto::HMAC::SHA1);
signature_creator_unittest.cc 13 #include "base/sha1.h"
33 crypto::SignatureCreator::SHA1));
69 std::string sha1 = base::SHA1HashString(data); local
70 // Sign sha1 of the input data.
73 key.get(), crypto::SignatureCreator::SHA1,
74 reinterpret_cast<const uint8_t*>(sha1.c_str()), sha1.size(), &signature));
  /external/robolectric/v1/
update-downloads.rb 12 require 'digest/sha1'
16 sha1 = Digest::SHA1.hexdigest File.read(f)
28 download_html += " <td class=\"sha\">#{sha1}</td>\n"
  /libcore/luni/src/test/java/libcore/javax/crypto/spec/
AlgorithmParametersTestOAEP.java 45 // hashFunc=EXP:0,SEQUENCE:sha1
50 // params=SEQUENCE:sha1
54 // [sha1]
55 // oid=OID:sha1
99 super("OAEP", new AlgorithmParameterAsymmetricHelper("RSA"), new OAEPParameterSpec("SHA-1", "MGF1", MGF1ParameterSpec.SHA1, PSource.PSpecified.DEFAULT));
113 "SHA-1", "MGF1", MGF1ParameterSpec.SHA1, PSource.PSpecified.DEFAULT);
142 MGF1ParameterSpec.SHA1.getDigestAlgorithm(),
155 MGF1ParameterSpec.SHA1.getDigestAlgorithm(),
  /libcore/luni/src/test/java/tests/security/spec/
MGF1ParameterSpecTest.java 89 assertEquals("SHA-1", MGF1ParameterSpec.SHA1.getDigestAlgorithm());
  /libcore/ojluni/src/main/java/java/security/spec/
PSSParameterSpec.java 40 * hashAlgorithm [0] OAEP-PSSDigestAlgorithms DEFAULT sha1,
49 * { OID id-sha1 PARAMETERS NULL }|
65 * parameters for mgf -- MGF1ParameterSpec.SHA1
83 private AlgorithmParameterSpec mgfSpec = MGF1ParameterSpec.SHA1;
  /libcore/ojluni/src/main/java/javax/crypto/spec/
OAEPParameterSpec.java 41 * hashAlgorithm [0] OAEP-PSSDigestAlgorithms DEFAULT sha1,
49 * { OID id-sha1 PARAMETERS NULL }|
67 * parameters for mgf -- MGF1ParameterSpec.SHA1
81 private AlgorithmParameterSpec mgfSpec = MGF1ParameterSpec.SHA1;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/
PBEPBKDF2.java 135 this(name, scheme, SHA1);
245 return SHA1;
330 super(name, scheme, SHA1);
420 super("PBEWithHmacSHA1AndAES_128", PKCS5S2_UTF8, SHA1, 128, 128);
456 super("PBEWithHmacSHA1AndAES_256", PKCS5S2_UTF8, SHA1, 256, 128);
502 // were provided in org.bouncycastle.jcajce.provider.digest.SHA1. During that
DESede.java 222 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 192, 8);
234 super(new CBCBlockCipher(new DESedeEngine()), PKCS12, SHA1, 128, 8);
246 super("PBEwithSHAandDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64);
258 super("PBEwithSHAandDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64);
AES.java 321 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 128, 16);
330 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 192, 16);
339 super(new CBCBlockCipher(new AESEngine()), PKCS12, SHA1, 256, 16);
431 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128);
443 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128);
455 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128);
    [all...]
  /prebuilts/devtools/
update_jars.sh 52 local SHA1=$( cd ../../tools/$repo ; git show-ref --head --hash HEAD )
54 tools/$repo: @ $SHA1"
  /bootable/recovery/applypatch/
bspatch.cpp 83 // print SHA1 of the patch in the case of a data error.
86 SHA1(reinterpret_cast<const uint8_t*>(patch.data.data() + patch_offset),
89 LOG(ERROR) << "Patch may be corrupted, offset: " << patch_offset << ", SHA1: " << patch_sha1;
  /device/linaro/bootloader/edk2/CryptoPkg/Library/BaseCryptLib/Hash/
CryptSha1.c 225 if (SHA1 (Data, DataSize, HashValue) == NULL) {
  /external/conscrypt/platform/src/main/java/org/conscrypt/ct/
DigitallySigned.java 33 SHA1,
  /hardware/interfaces/keymaster/3.0/vts/functional/
openssl_utils.h 40 case android::hardware::keymaster::V3_0::Digest::SHA1:
  /hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/
openssl_utils.h 46 case android::hardware::keymaster::V4_0::Digest::SHA1:
  /libcore/benchmarks/src/benchmarks/regression/
DigestBenchmark.java 35 public enum Algorithm { MD5, SHA1, SHA256, SHA384, SHA512 };
  /compatibility/cdd/9_security-model/
9_11_keys-and-credentials.md 19 algorithms and MD5, SHA1, and SHA-2 family hash functions to properly support
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreECDSASignatureSpi.java 111 public final static class SHA1 extends AndroidKeyStoreECDSASignatureSpi {
112 public SHA1() {

Completed in 2429 milliseconds

1 23 4 5 6 7 8 91011>>