/frameworks/base/core/java/android/security/net/config/ |
H A D | Pin.java | 24 public final byte[] digest; field in class:Pin 28 public Pin(String digestAlgorithm, byte[] digest) { argument 30 this.digest = digest; 31 mHashCode = Arrays.hashCode(digest) ^ digestAlgorithm.hashCode(); 50 throw new IllegalArgumentException("Unsupported digest algorithm: " + algorithm); 70 if (!Arrays.equals(digest, other.digest)) {
|
/frameworks/base/services/core/java/com/android/server/net/watchlist/ |
H A D | HarmfulDigests.java | 45 public boolean contains(byte[] digest) { argument 46 return mDigestSet.contains(HexDump.toHexString(digest)); 50 for (String digest : mDigestSet) { 51 pw.println(digest);
|
H A D | DigestUtils.java | 52 return digester.digest();
|
H A D | WatchlistLoggingHandler.java | 79 // A cache for uid and apk digest mapping. 234 final byte[] digest = getDigestFromUid(uid); 235 if (digest == null) { 236 Slog.e(TAG, "Cannot get digest from uid: " + uid); 239 final boolean result = mDbHelper.insertNewRecord(digest, cncHost, timestamp); 307 byte[] digest = getDigestFromUid(apps.get(i).uid); 308 if (digest != null) { 309 result.add(HexDump.toHexString(digest)); 311 Slog.e(TAG, "Cannot get digest from uid: " + apps.get(i).uid 325 * Get app digest fro [all...] |
H A D | ReportEncoder.java | 89 // Set app digest, encoded_isPha pair to report 92 byte[] digest = HexDump.hexStringToByteArray(key);
|
/frameworks/base/core/java/android/content/pm/ |
H A D | InstantAppRequest.java | 45 /** The instant app digest for this request */ 46 public final InstantAppResolveInfo.InstantAppDigest digest; field in class:InstantAppRequest 59 digest = new InstantAppResolveInfo.InstantAppDigest( 62 digest = InstantAppResolveInfo.InstantAppDigest.UNDEFINED;
|
H A D | InstantAppResolveInfo.java | 45 * If the {@link android.content.Intent} has the scheme set to http/s and a set of digest 66 /** Algorithm that will be used to generate the domain digest */ 86 public InstantAppResolveInfo(@NonNull InstantAppDigest digest, @Nullable String packageName, argument 88 this(digest, packageName, filters, (long) versionCode, null /* extras */); 92 public InstantAppResolveInfo(@NonNull InstantAppDigest digest, @Nullable String packageName, argument 95 this(digest, packageName, filters, versionCode, extras, false); 113 private InstantAppResolveInfo(@NonNull InstantAppDigest digest, @Nullable String packageName, argument 121 mDigest = digest; 238 * A special instance that represents and undefined digest used for cases that a host was 253 /** Full digest o [all...] |
/frameworks/base/obex/javax/obex/ |
H A D | ObexSession.java | 75 * the authentication challenge and it represents the challenge digest 154 * 0x00 and is the response digest. The first optional tag is 0x01 and 169 byte[] digest = new byte[challenge.length + password.length + 1]; 170 System.arraycopy(challenge, 0, digest, 0, challenge.length); 172 digest[challenge.length] = (byte)0x3A; 173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); 179 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16);
|
/frameworks/base/core/tests/privacytests/src/android/privacy/ |
H A D | RapporEncoderTest.java | 201 byte[] digest = md5.digest(testingSecret.getBytes(StandardCharsets.UTF_8)); 202 assertEquals(16, digest.length); 203 return ByteBuffer.allocate(48).put(digest).put(digest).put(digest).array();
|
H A D | LongitudinalReportingEncoderTest.java | 414 byte[] digest = md5.digest(testingSecret.getBytes(StandardCharsets.UTF_8)); 415 assertEquals(16, digest.length); 416 return ByteBuffer.allocate(48).put(digest).put(digest).put(digest).array();
|
/frameworks/base/services/core/java/com/android/server/backup/ |
H A D | BackupUtils.java | 106 MessageDigest digest = MessageDigest.getInstance("SHA-256"); 107 digest.update(signature); 108 return digest.digest();
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | KeyProperties.java | 249 throw new IllegalArgumentException("Unsupported HMAC digest: " 261 * @return keymaster digest or {@code -1} if the algorithm does not involve a digest. 280 "Unsupported HMAC digest: " + digestUpper); 534 * No digest: sign/authenticate the raw message. 539 * MD5 digest. 544 * SHA-1 digest. 549 * SHA-2 224 (aka SHA-224) digest. 554 * SHA-2 256 (aka SHA-256) digest. 559 * SHA-2 384 (aka SHA-384) digest 574 toKeymaster(@onNull @igestEnum String digest) argument 596 fromKeymaster(int digest) argument 618 fromKeymasterToSignatureAlgorithmDigest(int digest) argument [all...] |
/frameworks/base/core/java/android/privacy/internal/rappor/ |
H A D | RapporEncoder.java | 84 MessageDigest digest = MessageDigest.getInstance("SHA-256"); 85 byte[] bytes = digest.digest(input.getBytes(StandardCharsets.UTF_8));
|
/frameworks/support/room/compiler/src/main/kotlin/androidx/room/vo/ |
H A D | SchemaIdentityKey.kt | 19 import org.apache.commons.codec.digest.DigestUtils
|
/frameworks/base/telephony/java/android/telephony/mbms/ |
H A D | DownloadRequest.java | 365 MessageDigest digest; 367 digest = MessageDigest.getInstance("SHA-256"); 373 digest.update(sourceUri.toString().getBytes(StandardCharsets.UTF_8)); 374 digest.update(destinationUri.toString().getBytes(StandardCharsets.UTF_8)); 376 digest.update(serializedResultIntentForApp.getBytes(StandardCharsets.UTF_8)); 380 return Base64.encodeToString(digest.digest(), Base64.URL_SAFE | Base64.NO_WRAP);
|
/frameworks/base/core/java/android/util/jar/ |
H A D | StrictJarVerifier.java | 71 * List of accepted digest algorithms. This list is in order from most 97 * Stores and a hash and a message digest and verifies that massage digest 104 private final MessageDigest digest; field in class:StrictJarVerifier.VerifierEntry 112 VerifierEntry(String name, MessageDigest digest, byte[] hash, argument 115 this.digest = digest; 122 * Updates a digest with one byte. 126 digest.update((byte) value); 130 * Updates a digest wit [all...] |
/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | SyntheticPasswordCrypto.java | 193 MessageDigest digest = MessageDigest.getInstance("SHA-512"); 200 digest.update(personalisation); 202 digest.update(data); 204 return digest.digest();
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerBackupHelper.java | 65 private static final String ATTR_DIGEST = "digest"; 192 final String digest = PackageUtils.computeSignaturesSha256Digest( 194 if (digest != null) { 199 serializer.attribute(null, ATTR_DIGEST, digest); 241 String digest = parser.getAttributeValue(null, ATTR_DIGEST); 242 if (TextUtils.isEmpty(digest)) { 247 accountDigest, packageName, digest, userId);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/net/watchlist/ |
H A D | ReportEncoderTests.java | 90 final String digest = appProto.appDigest; 91 assertEquals(map.get(digest), appProto.encodedResult);
|
/frameworks/base/core/java/android/util/ |
H A D | PackageUtils.java | 44 * @return The digest array. 56 * Computes a SHA256 digest of the signatures' SHA256 digests. First, 61 * @return The digest. 76 * Computes a SHA256 digest in of the signatures SHA256 digests. First, 80 * @return The digest. 104 * Computes the SHA256 digest of some data. 106 * @return The digest or null if an error occurs. 119 return messageDigest.digest(); 123 * Computes the SHA256 digest of some data. 125 * @return The digest o [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
H A D | MockScrypt.java | 47 return MessageDigest.getInstance("SHA-256").digest(byteBuffer.array());
|
/frameworks/base/services/usb/java/com/android/server/usb/ |
H A D | UsbDebuggingManager.java | 310 byte[] digest; 312 digest = digester.digest(Base64.decode(base64_data, Base64.DEFAULT)); 317 for (int i = 0; i < digest.length; i++) { 318 sb.append(hex.charAt((digest[i] >> 4) & 0xf)); 319 sb.append(hex.charAt(digest[i] & 0xf)); 320 if (i < digest.length - 1)
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | PersistentDataBlockService.java | 228 byte[] digest = computeDigestLocked(storedDigest); 229 if (digest == null || !Arrays.equals(storedDigest, digest)) { 240 byte[] digest = computeDigestLocked(null); 241 if (digest != null) { 252 outputStream.write(digest, 0, DIGEST_SIZE_BYTES); 294 md.update(data, 0, DIGEST_SIZE_BYTES); // include 0 checksum in digest 305 return md.digest();
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | InstantAppResolver.java | 135 requestObj.digest.getDigestPrefixSecure(), token); 139 requestObj.userId, origIntent.getPackage(), requestObj.digest, token); 194 0 /*userId*/, origIntent.getPackage(), requestObj.digest, 227 requestObj.digest.getDigestPrefixSecure(), token, callback, callbackHandler, 369 InstantAppDigest digest, String token) { 370 final int[] shaPrefix = digest.getDigestPrefix(); 371 final byte[][] digestBytes = digest.getDigestBytes(); 378 Slog.d(TAG, "InstantAppResolveInfo with mShouldLetInstallerDecide=true when digest" 384 // prefixed request or the resolveInfo specifies digest details. 366 filterInstantAppIntent( List<InstantAppResolveInfo> instantAppResolveInfoList, Intent origIntent, String resolvedType, int userId, String packageName, InstantAppDigest digest, String token) argument
|
/frameworks/base/core/java/android/util/apk/ |
H A D | ApkSignatureSchemeV2Verifier.java | 305 ByteBuffer digest = getLengthPrefixedSlice(digests); 306 if (digest.remaining() < 8) { 309 int sigAlgorithm = digest.getInt(); 312 contentDigest = readLengthPrefixedByteArray(digest); 315 throw new IOException("Failed to parse digest record #" + digestCount, e); 329 + " contents digest does not match the digest specified by a preceding signer");
|