/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | ManifestDigestTest.java | 53 new ManifestDigest(MessageDigest.getInstance("SHA-256").digest(MESSAGE_1)); 65 ManifestDigest digest = ManifestDigest.fromInputStream(is); 68 digest.writeToParcel(p, 0); 74 + digest.toString() + " and " + fromParcel.toString(), digest,
|
/frameworks/base/tests/CoreTests/android/core/ |
H A D | Sha1Test.java | 24 * Tests SHA1 message digest algorithm. 45 MessageDigest digest = MessageDigest.getInstance("SHA-1"); 49 digest.update(mTestData[i].input.getBytes()); 50 byte[] hash = digest.digest();
|
/frameworks/compile/libbcc/lib/Support/ |
H A D | sha1.h | 23 void SHA1Final(uint8_t digest[HASHSIZE], SHA1_CTX* context);
|
H A D | sha1.c | 237 /* Add padding and return the message digest. */ 239 void SHA1Final(uint8_t digest[HASHSIZE], SHA1_CTX* argument 258 digest[i] = (uint8_t) 277 it in the 20-byte array digest. If fname is NULL, stdin is 280 void sha1file(char *fname, uint8_t* digest) argument 293 memset(digest, 0, HASHSIZE); 307 SHA1Final(digest, &context); 331 uint8_t digest[HASHSIZE]; local 366 sha1file(s, digest); 371 err |= digest[ 421 uint8_t digest[HASHSIZE]; local [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ManifestDigest.java | 35 * Represents the manifest digest for a package. This is suitable for comparison 44 /** The digest of the manifest in our preferred order. */ 53 ManifestDigest(byte[] digest) { argument 54 mDigest = digest; 86 final byte[] digest = md.digest(); 87 return new ManifestDigest(digest);
|
/frameworks/base/obex/javax/obex/ |
H A D | ObexSession.java | 70 * the authentication challenge and it represents the challenge digest 148 * 0x00 and is the response digest. The first optional tag is 0x01 and 163 byte[] digest = new byte[challenge.length + password.length + 1]; 164 System.arraycopy(challenge, 0, digest, 0, challenge.length); 166 digest[challenge.length] = (byte)0x3A; 167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); 173 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16);
|
H A D | ObexHelper.java | 933 return md5.digest(in);
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | PersistentDataBlockService.java | 164 byte[] digest = computeDigestLocked(storedDigest); 165 if (digest == null || !Arrays.equals(storedDigest, digest)) { 176 byte[] digest = computeDigestLocked(null); 177 if (digest != null) { 188 outputStream.write(digest, 0, DIGEST_SIZE_BYTES); 230 md.update(data, 0, DIGEST_SIZE_BYTES); // include 0 checksum in digest 241 return md.digest();
|
/frameworks/base/services/usb/java/com/android/server/usb/ |
H A D | UsbDebuggingManager.java | 244 byte[] digest; 246 digest = digester.digest(Base64.decode(base64_data, Base64.DEFAULT)); 251 for (int i = 0; i < digest.length; i++) { 252 sb.append(hex.charAt((digest[i] >> 4) & 0xf)); 253 sb.append(hex.charAt(digest[i] & 0xf)); 254 if (i < digest.length - 1)
|
/frameworks/base/core/java/android/net/http/ |
H A D | RequestHandle.java | 234 * Create and queue an HTTP authentication-response (digest) request. 314 String digest = computeDigest(A1, A2, nonce, QOP, nc, cnonce); 321 response += "response=" + doubleQuote(digest) ; 350 * @return Double-quoted MD5 digest. 384 byte[] d = md5.digest(param.getBytes());
|
H A D | SslCertificate.java | 272 byte[] digest = md.digest(bytes); 273 return fingerprint(digest);
|
/frameworks/base/services/core/java/com/android/server/updates/ |
H A D | ConfigUpdateInstallReceiver.java | 199 byte[] fingerprint = dgst.digest(content);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 130 byte[] fingerprint = dgst.digest(encoded);
|
/frameworks/base/telecomm/java/android/telecom/ |
H A D | Log.java | 147 byte[] result = messageDigest.digest();
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | SELinuxMMAC.java | 457 return MessageDigest.getInstance("SHA-1").digest(contents);
|
H A D | UserManagerService.java | 1623 byte[] sha1 = MessageDigest.getInstance(algo = "SHA-1").digest(saltedPassword); 1624 byte[] md5 = MessageDigest.getInstance(algo = "MD5").digest(saltedPassword);
|
/frameworks/av/media/libstagefright/rtsp/ |
H A D | ARTSPConnection.cpp | 903 // so we won't support digest authentication. 1022 AString digest; local 1023 H(tmp, &digest); 1037 fragment.append(digest);
|
H A D | MyTransmitter.h | 325 AString digest; local 326 H(tmp, &digest); 337 request->append(digest);
|
/frameworks/base/core/java/com/android/internal/widget/ |
H A D | LockPatternUtils.java | 1053 byte[] hash = md.digest(res); 1090 byte[] sha1 = MessageDigest.getInstance(algo = "SHA-1").digest(saltedPassword); 1091 byte[] md5 = MessageDigest.getInstance(algo = "MD5").digest(saltedPassword);
|
/frameworks/native/services/inputflinger/ |
H A D | EventHub.cpp | 86 u_char digest[SHA_DIGEST_LENGTH]; local 87 SHA1_Final(digest, &ctx); 91 out.appendFormat("%02x", digest[i]);
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
H A D | UiccCarrierPrivilegeRules.java | 534 return md.digest(signature.toByteArray());
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | BackupManagerService.java | 2705 checksum = md.digest(input); 6852 MessageDigest digest = MessageDigest.getInstance("SHA-256"); 6853 digest.update(sig.toByteArray()); 6854 return digest.digest();
|