/frameworks/base/core/java/android/security/net/config/ |
H A D | Pin.java | 24 public final byte[] digest; field in class:Pin 28 public Pin(String digestAlgorithm, byte[] digest) { argument 30 this.digest = digest; 31 mHashCode = Arrays.hashCode(digest) ^ digestAlgorithm.hashCode(); 50 throw new IllegalArgumentException("Unsupported digest algorithm: " + algorithm); 70 if (!Arrays.equals(digest, other.digest)) {
|
H A D | XmlConfigSource.java | 106 String digestAlgorithm = parser.getAttributeValue(null, "digest"); 108 throw new ParserException(parser, "Unsupported pin digest algorithm: " 112 throw new ParserException(parser, "Missing pin digest"); 114 String digest = parser.getText().trim(); 117 decodedDigest = Base64.decode(digest, 0); 119 throw new ParserException(parser, "Invalid pin digest", e); 123 throw new ParserException(parser, "digest length " + decodedDigest.length
|
H A D | NetworkSecurityTrustManager.java | 141 if (pinSet.pins.contains(new Pin(algorithm, md.digest(encodedSPKI)))) {
|
/frameworks/base/tests/CoreTests/android/core/ |
H A D | Sha1Test.java | 24 * Tests SHA1 message digest algorithm. 45 MessageDigest digest = MessageDigest.getInstance("SHA-1"); 49 digest.update(mTestData[i].input.getBytes()); 50 byte[] hash = digest.digest();
|
/frameworks/base/obex/javax/obex/ |
H A D | ObexSession.java | 75 * the authentication challenge and it represents the challenge digest 154 * 0x00 and is the response digest. The first optional tag is 0x01 and 169 byte[] digest = new byte[challenge.length + password.length + 1]; 170 System.arraycopy(challenge, 0, digest, 0, challenge.length); 172 digest[challenge.length] = (byte)0x3A; 173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); 179 System.arraycopy(ObexHelper.computeMd5Hash(digest), 0, header.mAuthResp, 2, 16);
|
/frameworks/base/services/core/java/com/android/server/backup/ |
H A D | BackupUtils.java | 96 MessageDigest digest = MessageDigest.getInstance("SHA-256"); 97 digest.update(signature); 98 return digest.digest();
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | KeyProperties.java | 227 throw new IllegalArgumentException("Unsupported HMAC digest: " 239 * @return keymaster digest or {@code -1} if the algorithm does not involve a digest. 258 "Unsupported HMAC digest: " + digestUpper); 512 * No digest: sign/authenticate the raw message. 517 * MD5 digest. 522 * SHA-1 digest. 527 * SHA-2 224 (aka SHA-224) digest. 532 * SHA-2 256 (aka SHA-256) digest. 537 * SHA-2 384 (aka SHA-384) digest 552 toKeymaster(@onNull @igestEnum String digest) argument 574 fromKeymaster(int digest) argument 596 fromKeymasterToSignatureAlgorithmDigest(int digest) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | EphemeralResolveInfo.java | 37 /** Algorithm that will be used to generate the domain digest */ 40 /** Full digest of the domain hash */ 93 final MessageDigest digest = MessageDigest.getInstance(SHA_ALGORITHM); 95 return digest.digest(hostBytes); 97 throw new IllegalStateException("could not find digest algorithm");
|
/frameworks/base/core/java/android/util/jar/ |
H A D | StrictJarVerifier.java | 63 * List of accepted digest algorithms. This list is in order from most 89 * Stores and a hash and a message digest and verifies that massage digest 96 private final MessageDigest digest; field in class:StrictJarVerifier.VerifierEntry 104 VerifierEntry(String name, MessageDigest digest, byte[] hash, argument 107 this.digest = digest; 114 * Updates a digest with one byte. 118 digest.update((byte) value); 122 * Updates a digest wit [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | PersistentDataBlockService.java | 186 byte[] digest = computeDigestLocked(storedDigest); 187 if (digest == null || !Arrays.equals(storedDigest, digest)) { 198 byte[] digest = computeDigestLocked(null); 199 if (digest != null) { 210 outputStream.write(digest, 0, DIGEST_SIZE_BYTES); 252 md.update(data, 0, DIGEST_SIZE_BYTES); // include 0 checksum in digest 263 return md.digest();
|
/frameworks/base/services/usb/java/com/android/server/usb/ |
H A D | UsbDebuggingManager.java | 309 byte[] digest; 311 digest = digester.digest(Base64.decode(base64_data, Base64.DEFAULT)); 316 for (int i = 0; i < digest.length; i++) { 317 sb.append(hex.charAt((digest[i] >> 4) & 0xf)); 318 sb.append(hex.charAt(digest[i] & 0xf)); 319 if (i < digest.length - 1)
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/osu/ |
H A D | SPVerifier.java | 161 MessageDigest digest = MessageDigest.getInstance(hash.getJCEName()); 162 byte[] computed = digest.digest(iconData.getIconData());
|
/frameworks/base/packages/PrintSpooler/src/com/android/printspooler/model/ |
H A D | CustomPrinterIconCache.java | 75 sb.append(String.format("%#040x", new java.math.BigInteger(1, md.digest())));
|
/frameworks/base/packages/StatementService/src/com/android/statementservice/retriever/ |
H A D | Utils.java | 122 return byteArrayToHexString(digester.digest());
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | ProcessLoggingHandler.java | 110 return md.digest();
|
H A D | EphemeralApplicationRegistry.java | 683 final byte[] digest = messageDigest.digest(); 684 final int digestLength = digest.length; 689 final int byteHex = digest[i] & 0xFF;
|
/frameworks/base/core/java/android/net/http/ |
H A D | SslCertificate.java | 274 byte[] digest = md.digest(bytes); 275 return fingerprint(digest);
|
/frameworks/base/core/java/android/util/apk/ |
H A D | ApkSignatureSchemeV2Verifier.java | 331 ByteBuffer digest = getLengthPrefixedSlice(digests); 332 if (digest.remaining() < 8) { 335 int sigAlgorithm = digest.getInt(); 338 contentDigest = readLengthPrefixedByteArray(digest); 341 throw new IOException("Failed to parse digest record #" + digestCount, e); 355 + " contents digest does not match the digest specified by a preceding signer"); 436 throw new SecurityException("Failed to compute digest(s) of contents", e); 445 + " digest of contents did not verify"); 453 // For each digest algorith [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/pps/ |
H A D | Credential.java | 147 fingerPrint = digester.digest(enterpriseConfig.getClientCertificate().getEncoded()); 159 fingerPrint = digester.digest(octets); 161 Log.e(Utils.hs2LogTag(getClass()), "Failed to construct digest: " + gse);
|
/frameworks/base/packages/Osu/src/com/android/configparse/ |
H A D | ConfigBuilder.java | 145 byte[] fingerprint = digester.digest(certificate.getEncoded());
|
/frameworks/base/services/core/java/com/android/server/updates/ |
H A D | ConfigUpdateInstallReceiver.java | 158 byte[] fingerprint = dgst.digest(content);
|
/frameworks/base/core/java/com/android/server/backup/ |
H A D | AccountSyncSettingsBackupHelper.java | 238 return md5.digest(data);
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/utils/ |
H A D | HTTPRequest.java | 77 if (tokens.length < 3 || !tokens[0].equalsIgnoreCase("digest")) { 116 * A2 = Method ":" digest-uri-value 188 return hash.digest();
|
/frameworks/base/services/tests/servicestests/src/com/android/server/updates/ |
H A D | CertPinInstallReceiverTest.java | 132 byte[] fingerprint = dgst.digest(encoded);
|
/frameworks/base/telecomm/java/android/telecom/ |
H A D | Log.java | 197 byte[] result = sMessageDigest.digest();
|