/frameworks/base/keystore/java/android/security/ |
SystemKeyStore.java | 65 public String generateNewKeyHexString(int numBits, String algName, String keyName) 67 return toHexString(generateNewKey(numBits, algName, keyName)); 70 public byte[] generateNewKey(int numBits, String algName, String keyName) 74 File keyFile = getKeyFile(keyName); 105 private File getKeyFile(String keyName) { 108 File keyFile = new File(sysKeystoreDir, keyName + KEY_FILE_EXTENSION); 112 public String retrieveKeyHexString(String keyName) throws IOException { 113 return toHexString(retrieveKey(keyName)); 116 public byte[] retrieveKey(String keyName) throws IOException { 117 File keyFile = getKeyFile(keyName); [all...] |
/frameworks/base/keystore/tests/src/android/security/ |
SystemKeyStoreTest.java | 38 private static final String keyName = "TestKey"; 50 mSysKeyStore.deleteKey(keyName); 59 mSysKeyStore.deleteKey(keyName); 67 byte[] newKey = mSysKeyStore.generateNewKey(128, "AES", keyName); 69 byte[] recKey = mSysKeyStore.retrieveKey(keyName); 74 mSysKeyStore.deleteKey(keyName); 75 byte[] nullKey = mSysKeyStore.retrieveKey(keyName);
|
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/third_party/dns/ |
tsigkeyring.py | 29 keyname = dns.name.from_text(keytext) 31 keyring[keyname] = secret 40 for keyname in keyring: 41 keytext = dns.name.to_text(keyname) 42 secret = base64.encodestring(keyring[keyname])
|
tsig.py | 60 def sign(wire, keyname, secret, time, fudge, original_id, error, 82 ctx.update(keyname.to_digestable()) 111 def hmac_md5(wire, keyname, secret, time, fudge, original_id, error, 114 return sign(wire, keyname, secret, time, fudge, original_id, error, 117 def validate(wire, keyname, secret, now, request_mac, tsig_start, tsig_rdata, 163 (junk, our_mac, ctx) = sign(new_wire, keyname, secret, time, fudge,
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/camera/its/ |
ItsSerializer.java | 302 String keyName = getKeyName(keyObj); 307 return new MetadataEntry(keyName, JSONObject.NULL); 311 Logt.w(TAG, "Inf/NaN floating point value serialized: " + keyName); 314 return new MetadataEntry(keyName, keyValue); 317 return new MetadataEntry(keyName, keyValue); 319 return new MetadataEntry(keyName, serializeRational((Rational)keyValue)); 321 return new MetadataEntry(keyName, serializeSize((Size)keyValue)); 323 return new MetadataEntry(keyName, serializeSizeF((SizeF)keyValue)); 325 return new MetadataEntry(keyName, serializeRect((Rect)keyValue)); 327 return new MetadataEntry(keyName, serializeFace((Face)keyValue)) [all...] |
/external/lzma/CPP/Windows/ |
Registry.h | 12 LONG SetValue(HKEY parentKey, LPCTSTR keyName, LPCTSTR valueName, LPCTSTR value);
30 LONG Create(HKEY parentKey, LPCTSTR keyName,
35 LONG Open(HKEY parentKey, LPCTSTR keyName, REGSAM accessMask = KEY_ALL_ACCESS) throw();
61 LONG SetKeyValue(LPCTSTR keyName, LPCTSTR valueName, LPCTSTR value) throw();
|
Registry.cpp | 19 LONG CKey::Create(HKEY parentKey, LPCTSTR keyName,
26 LONG res = RegCreateKeyEx(parentKey, keyName, 0, keyClass,
38 LONG CKey::Open(HKEY parentKey, LPCTSTR keyName, REGSAM accessMask) throw()
42 LONG res = RegOpenKeyEx(parentKey, keyName, 0, accessMask, &key);
170 LONG SetValue(HKEY parentKey, LPCTSTR keyName, LPCTSTR valueName, LPCTSTR value)
174 LONG res = key.Create(parentKey, keyName);
180 LONG CKey::SetKeyValue(LPCTSTR keyName, LPCTSTR valueName, LPCTSTR value) throw()
184 LONG res = key.Create(_object, keyName);
306 CSysString keyName;
312 LONG result = ::RegEnumKeyEx(_object, index, keyName.GetBuffer(kBufferSize), [all...] |
/external/autotest/server/cros/servo/ |
chrome_ec.py | 140 def key_down(self, keyname): 144 keyname: Key name, one of the keys of KEYMATRIX. 147 (KEYMATRIX[keyname][1], KEYMATRIX[keyname][0])) 150 def key_up(self, keyname): 154 keyname: Key name, one of the keys of KEYMATRIX. 157 (KEYMATRIX[keyname][1], KEYMATRIX[keyname][0])) 160 def key_press(self, keyname): 164 keyname: Key name, one of the keys of KEYMATRIX [all...] |
/cts/tests/camera/src/android/hardware/camera2/cts/helpers/ |
CameraMetadataGetter.java | 461 String keyName = getKeyName(keyObj); 466 return new MetadataEntry(keyName, JSONObject.NULL); 470 Log.w(TAG, "Inf/NaN floating point value serialized: " + keyName); 473 return new MetadataEntry(keyName, keyValue); 476 return new MetadataEntry(keyName, keyValue); 478 return new MetadataEntry(keyName, serializeRational((Rational) keyValue)); 480 return new MetadataEntry(keyName, serializeSize((Size) keyValue)); 482 return new MetadataEntry(keyName, serializeSizeF((SizeF) keyValue)); 484 return new MetadataEntry(keyName, serializeRect((Rect) keyValue)); 486 return new MetadataEntry(keyName, serializeFace((Face) keyValue)) [all...] |
/external/autotest/client/site_tests/network_EthCaps/ |
network_EthCaps.py | 66 (keyname, value) = cap_str.split(': ') 67 caps[keyname].extend(value.split()) 68 prev_keyname = keyname 70 # keyname from previous line, add there 74 for keyname in caps: 75 logging.debug("cap['%s'] = %s", keyname, caps[keyname]) 100 for keyname in default_eth_caps: 101 if keyname not in self._caps: 102 logging.error("\'%s\' not a capability of %s", keyname, [all...] |
/external/zlib/src/contrib/dotzlib/DotZLib/ |
AssemblyInfo.cs | 39 // (*) KeyName refers to a key that has been installed in the Crypto Service
42 // (*) If the KeyFile and the KeyName values are both specified, the
44 // (1) If the KeyName can be found in the CSP, that key is used.
45 // (2) If the KeyName does not exist and the KeyFile does exist, the key
|
/external/testng/ |
README.dev | 33 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> deploy 36 mvn -Dgpg.passphrase= -Dgpg.keyname=<public_key> release:clean release:prepare release:perform
|
/external/dagger2/util/ |
mvn-deploy.sh | 20 -Dgpg.skip=false -Dgpg.keyname=${key} \
|
/external/owasp/sanitizer/tools/ |
stage_to_maven_central.sh | 26 KEYNAME=41449802 36 echo "<passphrase> is the passphrase for the GPG key $KEYNAME." 80 -Dgpg.keyname="$KEYNAME" \
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_common.h | 15 const u8 *keyname; member in struct:erp_tlvs
|
/system/security/keystore/ |
keystore.h | 56 android::String8 getKeyName(const android::String8& keyName); 57 android::String8 getKeyNameForUid(const android::String8& keyName, uid_t uid); 58 android::String8 getKeyNameForUidWithDir(const android::String8& keyName, uid_t uid); 87 ResponseCode getKeyForName(Blob* keyBlob, const android::String8& keyName, const uid_t uid,
|
keystore.cpp | 91 static size_t encode_key_length(const android::String8& keyName) { 92 const uint8_t* in = reinterpret_cast<const uint8_t*>(keyName.string()); 93 size_t length = keyName.length(); 102 static int encode_key(char* out, const android::String8& keyName) { 103 const uint8_t* in = reinterpret_cast<const uint8_t*>(keyName.string()); 104 size_t length = keyName.length(); 118 android::String8 KeyStore::getKeyName(const android::String8& keyName) { 119 char encoded[encode_key_length(keyName) + 1]; // add 1 for null char 120 encode_key(encoded, keyName); 124 android::String8 KeyStore::getKeyNameForUid(const android::String8& keyName, uid_t uid) [all...] |
/external/dbus/bus/ |
desktop-file.h | 48 const char *keyname, 52 const char *keyname,
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
ticket.go | 139 keyName := encrypted[:ticketKeyNameLen] 147 copy(keyName, key.keyName[:]) 167 keyName := encrypted[:ticketKeyNameLen] 174 if bytes.Equal(keyName, candidateKey.keyName[:]) {
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
ticket.go | 139 keyName := encrypted[:ticketKeyNameLen] 147 copy(keyName, key.keyName[:]) 167 keyName := encrypted[:ticketKeyNameLen] 174 if bytes.Equal(keyName, candidateKey.keyName[:]) {
|
/external/e2fsprogs/lib/ext2fs/ |
tdbtool.c | 206 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) 210 if ((keyname == NULL) || (keylen == 0)) { 215 key.dptr = (unsigned char *)keyname; 225 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) 229 if ((keyname == NULL) || (keylen == 0)) { 239 key.dptr = (unsigned char *)keyname; 252 static void show_tdb(char *keyname, size_t keylen) 256 if ((keyname == NULL) || (keylen == 0)) { 261 key.dptr = (unsigned char *)keyname; 277 static void delete_tdb(char *keyname, size_t keylen [all...] |
/external/autotest/client/site_tests/graphics_GLBench/ |
graphics_GLBench.py | 72 def report_temperature(self, keyname): 73 """Report current max observed temperature with given keyname. 75 @param keyname: key to be used when reporting perf value. 78 logging.info('%s = %f degree Celsius', keyname, temperature) 79 self.output_perf_value(description=keyname, value=temperature, 82 def report_temperature_critical(self, keyname): 83 """Report temperature at which we will see throttling with given keyname. 85 @param keyname: key to be used when reporting perf value. 88 logging.info('%s = %f degree Celsius', keyname, temperature) 89 self.output_perf_value(description=keyname, value=temperature [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/rsa/rsa/ |
cli.py | 95 keyname = 'public' # or 'private' variable in class:CryptoOperation 96 usage = 'usage: %%prog [options] %(keyname)s_key' 153 help='Key format of the %s key - default PEM' % self.keyname, 167 print('Reading %s key from %s' % (self.keyname, filename), file=sys.stderr) 198 keyname = 'public' variable in class:EncryptOperation 215 keyname = 'private' variable in class:DecryptOperation 232 keyname = 'private' variable in class:SignOperation 258 keyname = 'public' variable in class:VerifyOperation 343 keyname = 'public' variable in class:EncryptBigfileOperation 359 keyname = 'private variable in class:DecryptBigfileOperation [all...] |
/developers/build/prebuilts/gradle/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/ |
MainActivity.java | 156 * @param keyName the key name to init the cipher 161 private boolean initCipher(Cipher cipher, String keyName) { 164 SecretKey key = (SecretKey) mKeyStore.getKey(keyName, null); 223 * @param keyName the name of the key to be created 233 public void createKey(String keyName, boolean invalidatedByBiometricEnrollment) { 242 KeyGenParameterSpec.Builder builder = new KeyGenParameterSpec.Builder(keyName, 290 PurchaseButtonClickListener(Cipher cipher, String keyName) { 292 mKeyName = keyName;
|
/developers/samples/android/security/FingerprintDialog/Application/src/main/java/com/example/android/fingerprintdialog/ |
MainActivity.java | 156 * @param keyName the key name to init the cipher 161 private boolean initCipher(Cipher cipher, String keyName) { 164 SecretKey key = (SecretKey) mKeyStore.getKey(keyName, null); 223 * @param keyName the name of the key to be created 233 public void createKey(String keyName, boolean invalidatedByBiometricEnrollment) { 242 KeyGenParameterSpec.Builder builder = new KeyGenParameterSpec.Builder(keyName, 290 PurchaseButtonClickListener(Cipher cipher, String keyName) { 292 mKeyName = keyName;
|