/cts/common/device-side/device-info/src/com/android/compatibility/common/deviceinfo/ |
D | LocaleDeviceInfo.java | 112 byte[] digest = md.digest(); in sha256() 113 StringBuilder sb = new StringBuilder(digest.length * 2); in sha256() 114 for(int i = 0; i < digest.length; i++){ in sha256() 115 sb.append(Character.forDigit((digest[i] >> 4) & 0xF, 16)); in sha256() 116 sb.append(Character.forDigit((digest[i] & 0xF), 16)); in sha256()
|
/cts/common/device-side/util-axt/src/com/android/compatibility/common/util/mainline/ |
D | ModuleDetector.java | 90 final byte[] digest = messageDigest.digest(); in getSignatureDigest() 91 final int digestLength = digest.length; in getSignatureDigest() 96 final int byteHex = digest[i] & 0xFF; in getSignatureDigest()
|
/cts/tests/devicepolicy/src/android/devicepolicy/cts/ |
D | EnrollmentSpecificIdTest.java | 194 byte[] digest = new byte[0]; in computeHkdf() 196 mac.update(digest); in computeHkdf() 199 digest = mac.doFinal(); in computeHkdf() 200 if (pos + digest.length < size) { in computeHkdf() 201 System.arraycopy(digest, 0, result, pos, digest.length); in computeHkdf() 202 pos += digest.length; in computeHkdf() 205 System.arraycopy(digest, 0, result, pos, size - pos); in computeHkdf()
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
D | TestUtils.java | 653 MessageDigest digest = MessageDigest.getInstance("SHA-512"); in generateLargeKatMsg() local 657 seed = digest.digest(seed); in generateLargeKatMsg() 819 String digest = algorithmUpperCase.substring(0, withIndex); in getSignatureAlgorithmDigest() local 820 if (digest.startsWith("SHA")) { in getSignatureAlgorithmDigest() 821 digest = "SHA-" + digest.substring("SHA".length()); in getSignatureAlgorithmDigest() 823 return digest; in getSignatureAlgorithmDigest() 857 String digest = getSignatureAlgorithmDigest(algorithm); in isKeyLongEnoughForSignatureAlgorithm() local 858 int digestOutputSizeBits = getDigestOutputSizeBits(digest); in isKeyLongEnoughForSignatureAlgorithm() 896 String digest = getCipherDigest(transformation); in getMaxSupportedPlaintextInputSizeBytes() local 897 int digestOutputSizeBytes = (getDigestOutputSizeBits(digest) + 7) / 8; in getMaxSupportedPlaintextInputSizeBytes() [all …]
|
D | RsaCipherPerformanceTest.java | 84 String digest = TestUtils.getCipherDigest(algorithm); in AndroidKeystoreRsaKeyGenerator() local 96 (digest != null) in AndroidKeystoreRsaKeyGenerator() 97 ? new String[] {digest} in AndroidKeystoreRsaKeyGenerator()
|
D | KeyGeneratorTest.java | 424 String digest = TestUtils.getHmacAlgorithmDigest(algorithm); in testHmacKeyOnlyOneDigestCanBeAuthorizedHelper() local 425 assertNotNull(digest); in testHmacKeyOnlyOneDigestCanBeAuthorizedHelper() 440 Arrays.asList(TestUtils.getKeyInfo(key).getDigests()), digest); in testHmacKeyOnlyOneDigestCanBeAuthorizedHelper() local 444 .setDigests(digest) in testHmacKeyOnlyOneDigestCanBeAuthorizedHelper() 449 Arrays.asList(TestUtils.getKeyInfo(key).getDigests()), digest); in testHmacKeyOnlyOneDigestCanBeAuthorizedHelper() local 461 String anotherDigest = "SHA-256".equalsIgnoreCase(digest) ? "SHA-384" : "SHA-256"; in testHmacKeyOnlyOneDigestCanBeAuthorizedHelper() 471 .setDigests(digest, anotherDigest) in testHmacKeyOnlyOneDigestCanBeAuthorizedHelper() 613 String digest = TestUtils.getHmacAlgorithmDigest(algorithm); in testInitWithKeyAlgorithmDigestMissingFromAuthorizedDigestFailsHelper() local 614 String anotherDigest = KeyProperties.DIGEST_SHA256.equalsIgnoreCase(digest) in testInitWithKeyAlgorithmDigestMissingFromAuthorizedDigestFailsHelper()
|
D | RSASignatureTest.java | 113 String digest = TestUtils.getSignatureAlgorithmDigest(algorithm); in testSmallKeyRejected() local 114 if (KeyProperties.DIGEST_NONE.equalsIgnoreCase(digest)) { in testSmallKeyRejected() 119 int digestOutputSizeBits = TestUtils.getDigestOutputSizeBits(digest); in testSmallKeyRejected()
|
D | SecretKeyFactoryTest.java | 104 String digest = TestUtils.getHmacAlgorithmDigest(algorithm); in testGetKeySpecWithKeystoreKeyAndKeyInfoReflectsAllAuthorizations() local 105 digests = new String[] {digest}; in testGetKeySpecWithKeystoreKeyAndKeyInfoReflectsAllAuthorizations()
|
D | SignatureTest.java | 732 String digest = TestUtils.getSignatureAlgorithmDigest(algorithm); in testLongMsgKat() local 734 if ((KeyProperties.DIGEST_NONE.equalsIgnoreCase(digest)) in testLongMsgKat() 885 String digest = TestUtils.getSignatureAlgorithmDigest(algorithm); in testInitSignFailsWhenDigestNotAuthorized() local 887 (KeyProperties.DIGEST_SHA256.equalsIgnoreCase(digest)) in testInitSignFailsWhenDigestNotAuthorized() 893 if (!KeyProperties.DIGEST_NONE.equalsIgnoreCase(digest)) { in testInitSignFailsWhenDigestNotAuthorized() 911 String digest = TestUtils.getSignatureAlgorithmDigest(algorithm); in testInitVerifyIgnoresThatDigestNotAuthorized() local 913 (KeyProperties.DIGEST_SHA256.equalsIgnoreCase(digest)) in testInitVerifyIgnoresThatDigestNotAuthorized()
|
/cts/hostsidetests/appsecurity/res/pkgsigverify/ |
D | generate-apks.sh | 5 …dsa-3072.x509.pem -out cts/hostsidetests/appsecurity/res/pkgsigverify/v4-digest-v2-Sha256withDSA.a… 6 …/ec-p256.x509.pem -out cts/hostsidetests/appsecurity/res/pkgsigverify/v4-digest-v2-Sha256withEC.ap… 7 …rsa-2048.x509.pem -out cts/hostsidetests/appsecurity/res/pkgsigverify/v4-digest-v2-Sha256withRSA.a… 8 …/ec-p384.x509.pem -out cts/hostsidetests/appsecurity/res/pkgsigverify/v4-digest-v2-Sha512withEC.ap… 9 …rsa-4096.x509.pem -out cts/hostsidetests/appsecurity/res/pkgsigverify/v4-digest-v2-Sha512withRSA.a… 12 …dsa-3072.x509.pem -out cts/hostsidetests/appsecurity/res/pkgsigverify/v4-digest-v2-Sha256withDSA-V… 13 …/ec-p256.x509.pem -out cts/hostsidetests/appsecurity/res/pkgsigverify/v4-digest-v2-Sha256withEC-Ve… 14 …rsa-2048.x509.pem -out cts/hostsidetests/appsecurity/res/pkgsigverify/v4-digest-v2-Sha256withRSA-V… 17 …dsa-3072.x509.pem -out cts/hostsidetests/appsecurity/res/pkgsigverify/v4-digest-v3-Sha256withDSA.a… 18 …/ec-p256.x509.pem -out cts/hostsidetests/appsecurity/res/pkgsigverify/v4-digest-v3-Sha256withEC.ap… [all …]
|
/cts/common/device-side/util-axt/src/com/android/compatibility/common/util/ |
D | PackageUtil.java | 136 final byte[] digest = messageDigest.digest(); in computePackageSignatureDigest() 137 final int digestLength = digest.length; in computePackageSignatureDigest() 142 final int byteHex = digest[i] & 0xFF; in computePackageSignatureDigest() 189 BigInteger bigInt = new BigInteger(1, md.digest()); in computeFileHash()
|
D | BaseDefaultPermissionGrantPolicyTest.java | 282 final byte[] digest = messageDigest.digest(); in computePackageCertDigest() 283 final int digestLength = digest.length; in computePackageCertDigest() 288 final int byteHex = digest[i] & 0xFF; in computePackageCertDigest()
|
/cts/tools/utils/ |
D | certificates.py | 52 def create(cn, issuer=None, key=None, keysize=2048, digest="sha256", argument 75 cert.sign(signing_key, digest) 82 a_sha1 = Certificate.create("Root A", key=a.key, digest="sha1")
|
/cts/tests/tests/media/libmediandkjni/ |
D | md5_utils.h | 42 void MD5Final(unsigned char digest[16], struct MD5Context *context);
|
D | md5_utils.cpp | 108 MD5Final(md5byte digest[16], struct MD5Context *ctx) { in MD5Final() 135 memcpy(digest, ctx->buf, 16); in MD5Final()
|
/cts/hostsidetests/appsecurity/test-apps/KeyRotationTest/src/android/appsecurity/cts/keyrotationtest/utils/ |
D | SignatureUtils.java | 44 return Optional.of(toHexString(messageDigest.digest())); in computeSha256Digest()
|
/cts/hostsidetests/blobstore/test-apps/BlobStoreHostTestHelper/src/com/android/cts/device/blob/ |
D | DataPersistenceTest.java | 121 final byte[] digest = Base64.getDecoder().decode(sharedPref.getString(KEY_DIGEST, null)); in readBlobHandleFromDisk() 125 return BlobHandle.createWithSha256(digest, label, expiryMillis, tag); in readBlobHandleFromDisk()
|
D | DataCleanupTest.java | 172 final byte[] digest = Base64.getDecoder().decode(args.getString(KEY_DIGEST)); in getBlobHandleFromArgs() 176 return BlobHandle.createWithSha256(digest, label, expiryTimeMillis, tag); in getBlobHandleFromArgs()
|
/cts/tests/tests/identity/src/android/security/identity/cts/ |
D | Util.java | 1046 byte[] salt = MessageDigest.getInstance("SHA-256").digest(sessionTranscriptBytes); in calcEMacKeyForReader() 1102 byte[] digest = new byte[0]; in computeHkdf() 1104 mac.update(digest); in computeHkdf() 1107 digest = mac.doFinal(); in computeHkdf() 1108 if (pos + digest.length < size) { in computeHkdf() 1109 System.arraycopy(digest, 0, result, pos, digest.length); in computeHkdf() 1110 pos += digest.length; in computeHkdf() 1113 System.arraycopy(digest, 0, result, pos, size - pos); in computeHkdf()
|
/cts/tests/tests/wifi/src/android/net/wifi/passpoint/cts/ |
D | PasspointConfigurationTest.java | 246 MessageDigest.getInstance("SHA-256").digest(FakeKeys.CLIENT_CERT.getEncoded())); in createCredentialWithCertificateCredential() 249 .digest(FakeKeys.CLIENT_SUITE_B_RSA3072_CERT.getEncoded())); in createCredentialWithCertificateCredential()
|
/cts/tools/cts-api-coverage/src/com/android/cts/apicoverage/ |
D | TestSuiteContentReport.java | 277 byte[] mdbytes = md.digest(); in getFileContentId() 294 byte[] mdbytes = md.digest(); in getFolderContentId() 308 byte[] mdbytes = md.digest(); in getId()
|
/cts/tests/tests/telephony/current/src/android/telephony/cts/util/ |
D | CarrierPrivilegeUtils.java | 132 final byte[] certHash = md.digest(pkgInfo.signatures[0].toByteArray()); in getCertHashForThisPackage()
|
/cts/tools/release-parser/src/com/android/cts/releaseparser/ |
D | FileParser.java | 140 mContentId = Base64.getEncoder().encodeToString(md.digest()); in getFileContentId()
|
/cts/tools/cfassembler/src/dxconvext/ |
D | ClassFileAssembler.java | 140 int amt = md.digest(bytes, 12, 20); in calcSignature()
|
/cts/tests/security/src/android/keystore/cts/ |
D | AttestationApplicationId.java | 62 signatureDigests.add(sha256.digest(signature.toByteArray())); in AttestationApplicationId()
|