/frameworks/base/core/tests/coretests/src/android/content/pm/ |
D | ManifestDigestTest.java | 53 new ManifestDigest(MessageDigest.getInstance("SHA-256").digest(MESSAGE_1)); in testManifestDigest_Equals() 65 ManifestDigest digest = ManifestDigest.fromInputStream(is); in testManifestDigest_Parcel() local 68 digest.writeToParcel(p, 0); in testManifestDigest_Parcel() 74 + digest.toString() + " and " + fromParcel.toString(), digest, in testManifestDigest_Parcel()
|
/frameworks/base/tests/CoreTests/android/core/ |
D | Sha1Test.java | 45 MessageDigest digest = MessageDigest.getInstance("SHA-1"); in testSha1() local 49 digest.update(mTestData[i].input.getBytes()); in testSha1() 50 byte[] hash = digest.digest(); in testSha1()
|
/frameworks/base/core/java/android/content/pm/ |
D | ManifestDigest.java | 53 ManifestDigest(byte[] digest) { in ManifestDigest() argument 54 mDigest = digest; in ManifestDigest() 86 final byte[] digest = md.digest(); in fromInputStream() 87 return new ManifestDigest(digest); in fromInputStream()
|
/frameworks/base/obex/javax/obex/ |
D | ObexSession.java | 163 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall() 164 System.arraycopy(challenge, 0, digest, 0, challenge.length); in handleAuthChall() 166 digest[challenge.length] = (byte)0x3A; in handleAuthChall() 167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall() 173 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16); in handleAuthChall()
|
D | ObexHelper.java | 933 return md5.digest(in); in computeMd5Hash()
|
/frameworks/compile/libbcc/lib/Support/ |
D | sha1.c | 239 void SHA1Final(uint8_t digest[HASHSIZE], SHA1_CTX* in SHA1Final() 258 digest[i] = (uint8_t) in SHA1Final() 280 void sha1file(char *fname, uint8_t* digest) in sha1file() argument 293 memset(digest, 0, HASHSIZE); in sha1file() 307 SHA1Final(digest, &context); in sha1file() 331 uint8_t digest[HASHSIZE]; in verifyfile() local 366 sha1file(s, digest); in verifyfile() 371 err |= digest[k]- in verifyfile() 382 fprintf(stderr, "%02X", digest[k]); in verifyfile() 421 uint8_t digest[HASHSIZE]; in main() local [all …]
|
D | sha1.h | 23 void SHA1Final(uint8_t digest[HASHSIZE], SHA1_CTX* context);
|
/frameworks/base/services/usb/java/com/android/server/usb/ |
D | UsbDebuggingManager.java | 244 byte[] digest; in getFingerprints() 246 digest = digester.digest(Base64.decode(base64_data, Base64.DEFAULT)); in getFingerprints() 251 for (int i = 0; i < digest.length; i++) { in getFingerprints() 252 sb.append(hex.charAt((digest[i] >> 4) & 0xf)); in getFingerprints() 253 sb.append(hex.charAt(digest[i] & 0xf)); in getFingerprints() 254 if (i < digest.length - 1) in getFingerprints()
|
/frameworks/base/services/core/java/com/android/server/ |
D | PersistentDataBlockService.java | 165 byte[] digest = computeDigestLocked(storedDigest); in enforceChecksumValidity() 166 if (digest == null || !Arrays.equals(storedDigest, digest)) { in enforceChecksumValidity() 177 byte[] digest = computeDigestLocked(null); in computeAndWriteDigestLocked() 178 if (digest != null) { in computeAndWriteDigestLocked() 189 outputStream.write(digest, 0, DIGEST_SIZE_BYTES); in computeAndWriteDigestLocked() 242 return md.digest(); in computeDigestLocked()
|
/frameworks/base/core/java/android/net/http/ |
D | RequestHandle.java | 314 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce); in computeDigestAuthResponse() local 321 response += "response=" + doubleQuote(digest) ; in computeDigestAuthResponse() 384 byte[] d = md5.digest(param.getBytes()); in H()
|
D | SslCertificate.java | 272 byte[] digest = md.digest(bytes); in getDigest() 273 return fingerprint(digest); in getDigest()
|
/frameworks/av/media/libstagefright/rtsp/ |
D | MyTransmitter.h | 325 AString digest; in addAuthentication() local 326 H(tmp, &digest); in addAuthentication() 337 request->append(digest); in addAuthentication()
|
D | ARTSPConnection.cpp | 1022 AString digest; in addAuthentication() local 1023 H(tmp, &digest); in addAuthentication() 1037 fragment.append(digest); in addAuthentication()
|
/frameworks/base/telecomm/java/android/telecom/ |
D | Log.java | 147 byte[] result = messageDigest.digest(); in secureHash()
|
/frameworks/base/services/core/java/com/android/server/updates/ |
D | ConfigUpdateInstallReceiver.java | 199 byte[] fingerprint = dgst.digest(content); in getCurrentHash()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
D | CertPinInstallReceiverTest.java | 130 byte[] fingerprint = dgst.digest(encoded); in getCurrentHash()
|
/frameworks/base/core/java/com/android/internal/widget/ |
D | LockPatternUtils.java | 1053 byte[] hash = md.digest(res); in patternToHash() 1090 byte[] sha1 = MessageDigest.getInstance(algo = "SHA-1").digest(saltedPassword); in passwordToHash() 1091 byte[] md5 = MessageDigest.getInstance(algo = "MD5").digest(saltedPassword); in passwordToHash()
|
/frameworks/base/services/core/java/com/android/server/pm/ |
D | SELinuxMMAC.java | 457 return MessageDigest.getInstance("SHA-1").digest(contents); in returnHash()
|
D | UserManagerService.java | 1623 byte[] sha1 = MessageDigest.getInstance(algo = "SHA-1").digest(saltedPassword); in passwordToHash() 1624 byte[] md5 = MessageDigest.getInstance(algo = "MD5").digest(saltedPassword); in passwordToHash()
|
/frameworks/base/ |
D | preloaded-classes | 2012 com.android.org.bouncycastle.jcajce.provider.digest.DigestAlgorithmProvider 2013 com.android.org.bouncycastle.jcajce.provider.digest.MD5 2014 com.android.org.bouncycastle.jcajce.provider.digest.MD5$Mappings 2015 com.android.org.bouncycastle.jcajce.provider.digest.SHA1 2016 com.android.org.bouncycastle.jcajce.provider.digest.SHA1$Mappings 2017 com.android.org.bouncycastle.jcajce.provider.digest.SHA224 2018 com.android.org.bouncycastle.jcajce.provider.digest.SHA224$Mappings 2019 com.android.org.bouncycastle.jcajce.provider.digest.SHA256 2020 com.android.org.bouncycastle.jcajce.provider.digest.SHA256$Mappings 2021 com.android.org.bouncycastle.jcajce.provider.digest.SHA384 [all …]
|
/frameworks/native/services/inputflinger/ |
D | EventHub.cpp | 86 u_char digest[SHA_DIGEST_LENGTH]; in sha1() local 87 SHA1_Final(digest, &ctx); in sha1() 91 out.appendFormat("%02x", digest[i]); in sha1()
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
D | UiccCarrierPrivilegeRules.java | 534 return md.digest(signature.toByteArray()); in getCertHash()
|
/frameworks/base/docs/html/design/patterns/ |
D | notifications_k.jd | 187 a stack by using the expanded digest layout. This allows users to gain a better
|
D | notifications.jd | 521 summary by using the expanded digest layout. This approach allows users to gain a
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
D | BackupManagerService.java | 2705 checksum = md.digest(input); in SHA1Checksum() 6852 MessageDigest digest = MessageDigest.getInstance("SHA-256"); in hashSignature() local 6853 digest.update(sig.toByteArray()); in hashSignature() 6854 return digest.digest(); in hashSignature()
|