/frameworks/base/core/tests/coretests/src/android/content/pm/ |
D | ManifestDigestTest.java | 53 new ManifestDigest(MessageDigest.getInstance("SHA-256").digest(MESSAGE_1)); in testManifestDigest_Equals() 65 ManifestDigest digest = ManifestDigest.fromInputStream(is); in testManifestDigest_Parcel() local 68 digest.writeToParcel(p, 0); in testManifestDigest_Parcel() 74 + digest.toString() + " and " + fromParcel.toString(), digest, in testManifestDigest_Parcel()
|
/frameworks/base/tests/CoreTests/android/core/ |
D | Sha1Test.java | 45 MessageDigest digest = MessageDigest.getInstance("SHA-1"); in testSha1() local 49 digest.update(mTestData[i].input.getBytes()); in testSha1() 50 byte[] hash = digest.digest(); in testSha1()
|
/frameworks/base/keystore/java/android/security/keystore/ |
D | KeyProperties.java | 552 public static int toKeymaster(@NonNull @DigestEnum String digest) { in toKeymaster() argument 553 switch (digest.toUpperCase(Locale.US)) { in toKeymaster() 569 throw new IllegalArgumentException("Unsupported digest algorithm: " + digest); in toKeymaster() 574 public static @DigestEnum String fromKeymaster(int digest) { in fromKeymaster() argument 575 switch (digest) { in fromKeymaster() 591 throw new IllegalArgumentException("Unsupported digest algorithm: " + digest); in fromKeymaster() 596 public static @DigestEnum String fromKeymasterToSignatureAlgorithmDigest(int digest) { in fromKeymasterToSignatureAlgorithmDigest() argument 597 switch (digest) { in fromKeymasterToSignatureAlgorithmDigest() 613 throw new IllegalArgumentException("Unsupported digest algorithm: " + digest); in fromKeymasterToSignatureAlgorithmDigest() 624 for (int digest : digests) { in allFromKeymaster() [all …]
|
/frameworks/base/core/java/android/content/pm/ |
D | ManifestDigest.java | 53 ManifestDigest(byte[] digest) { in ManifestDigest() argument 54 mDigest = digest; in ManifestDigest() 86 final byte[] digest = md.digest(); in fromInputStream() 87 return new ManifestDigest(digest); in fromInputStream()
|
/frameworks/base/obex/javax/obex/ |
D | ObexSession.java | 169 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall() 170 System.arraycopy(challenge, 0, digest, 0, challenge.length); in handleAuthChall() 172 digest[challenge.length] = (byte)0x3A; in handleAuthChall() 173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall() 179 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16); in handleAuthChall()
|
D | ObexHelper.java | 979 return md5.digest(in); in computeMd5Hash()
|
/frameworks/base/services/core/java/com/android/server/ |
D | PersistentDataBlockService.java | 167 byte[] digest = computeDigestLocked(storedDigest); in enforceChecksumValidity() 168 if (digest == null || !Arrays.equals(storedDigest, digest)) { in enforceChecksumValidity() 179 byte[] digest = computeDigestLocked(null); in computeAndWriteDigestLocked() 180 if (digest != null) { in computeAndWriteDigestLocked() 191 outputStream.write(digest, 0, DIGEST_SIZE_BYTES); in computeAndWriteDigestLocked() 244 return md.digest(); in computeDigestLocked()
|
/frameworks/base/services/usb/java/com/android/server/usb/ |
D | UsbDebuggingManager.java | 308 byte[] digest; in getFingerprints() 310 digest = digester.digest(Base64.decode(base64_data, Base64.DEFAULT)); in getFingerprints() 315 for (int i = 0; i < digest.length; i++) { in getFingerprints() 316 sb.append(hex.charAt((digest[i] >> 4) & 0xf)); in getFingerprints() 317 sb.append(hex.charAt(digest[i] & 0xf)); in getFingerprints() 318 if (i < digest.length - 1) in getFingerprints()
|
/frameworks/compile/libbcc/lib/Support/ |
D | sha1.h | 23 void SHA1Final(uint8_t digest[HASHSIZE], SHA1_CTX* context);
|
/frameworks/base/core/java/android/net/http/ |
D | SslCertificate.java | 272 byte[] digest = md.digest(bytes); in getDigest() 273 return fingerprint(digest); in getDigest()
|
/frameworks/base/packages/StatementService/src/com/android/statementservice/retriever/ |
D | Utils.java | 122 return byteArrayToHexString(digester.digest()); in computeNormalizedSha256Fingerprint()
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/pps/ |
D | Credential.java | 147 fingerPrint = digester.digest(enterpriseConfig.getClientCertificate().getEncoded()); in Credential() 159 fingerPrint = digester.digest(octets); in Credential()
|
/frameworks/base/services/core/java/com/android/server/updates/ |
D | ConfigUpdateInstallReceiver.java | 157 byte[] fingerprint = dgst.digest(content); in getCurrentHash()
|
/frameworks/av/media/libstagefright/rtsp/ |
D | MyTransmitter.h | 325 AString digest; in addAuthentication() local 326 H(tmp, &digest); in addAuthentication() 337 request->append(digest); in addAuthentication()
|
D | ARTSPConnection.cpp | 1022 AString digest; in addAuthentication() local 1023 H(tmp, &digest); in addAuthentication() 1037 fragment.append(digest); in addAuthentication()
|
/frameworks/base/core/java/com/android/internal/widget/ |
D | LockPatternUtils.java | 903 byte[] hash = md.digest(res); in patternToHash() 941 byte[] sha1 = MessageDigest.getInstance("SHA-1").digest(saltedPassword); in passwordToHash() 942 byte[] md5 = MessageDigest.getInstance("MD5").digest(saltedPassword); in passwordToHash()
|
/frameworks/base/telecomm/java/android/telecom/ |
D | Log.java | 147 byte[] result = messageDigest.digest(); in secureHash()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
D | CertPinInstallReceiverTest.java | 130 byte[] fingerprint = dgst.digest(encoded); in getCurrentHash()
|
/frameworks/base/core/java/com/android/server/backup/ |
D | AccountSyncSettingsBackupHelper.java | 231 return md5.digest(data); in generateMd5Checksum()
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/configparse/ |
D | ConfigBuilder.java | 281 byte[] fingerprint = digester.digest(certificate.getEncoded()); in buildTLSConfig()
|
/frameworks/native/services/inputflinger/ |
D | EventHub.cpp | 86 u_char digest[SHA_DIGEST_LENGTH]; in sha1() local 87 SHA1_Final(digest, &ctx); in sha1() 91 out.appendFormat("%02x", digest[i]); in sha1()
|
/frameworks/base/services/core/java/com/android/server/pm/ |
D | SELinuxMMAC.java | 450 return MessageDigest.getInstance("SHA-1").digest(contents); in returnHash()
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
D | UiccCarrierPrivilegeRules.java | 556 return md.digest(signature.toByteArray()); in getCertHash()
|
/frameworks/base/ |
D | preloaded-classes | 2537 com.android.org.bouncycastle.jcajce.provider.digest.DigestAlgorithmProvider 2538 com.android.org.bouncycastle.jcajce.provider.digest.MD5 2539 com.android.org.bouncycastle.jcajce.provider.digest.MD5$Mappings 2540 com.android.org.bouncycastle.jcajce.provider.digest.SHA1 2541 com.android.org.bouncycastle.jcajce.provider.digest.SHA1$Mappings 2542 com.android.org.bouncycastle.jcajce.provider.digest.SHA224 2543 com.android.org.bouncycastle.jcajce.provider.digest.SHA224$Mappings 2544 com.android.org.bouncycastle.jcajce.provider.digest.SHA256 2545 com.android.org.bouncycastle.jcajce.provider.digest.SHA256$Mappings 2546 com.android.org.bouncycastle.jcajce.provider.digest.SHA384 [all …]
|
/frameworks/base/docs/html/design/patterns/ |
D | notifications_k.jd | 187 a stack by using the expanded digest layout. This allows users to gain a better
|