HomeSort by relevance Sort by last modified time
    Searched defs:algorithm (Results 101 - 125 of 370) sorted by null

1 2 3 45 6 7 8 91011>>

  /system/keymaster/
keymaster_enforcement.cpp 79 keymaster_algorithm_t algorithm; local
80 return auth_set.GetTagValue(TAG_ALGORITHM, &algorithm) &&
81 (algorithm == KM_ALGORITHM_RSA || algorithm == KM_ALGORITHM_EC);
317 /* Algorithm specific parameters not used for access control. */
attestation_record.cpp 63 ASN1_INTEGER* algorithm; member in struct:keymaster::km_auth_list
98 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.masked_tag()),
273 integer_ptr = &record->algorithm;
642 // Algorithm
643 if (!get_enum(record->algorithm, TAG_ALGORITHM, auth_list))
    [all...]
soft_keymaster_device.cpp 26 #include <algorithm>
108 static keymaster_error_t add_digests(keymaster1_device_t* dev, keymaster_algorithm_t algorithm,
111 auto key = std::make_pair(algorithm, purpose);
116 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length);
136 for (auto algorithm : sig_algorithms)
140 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all);
148 for (auto algorithm : crypt_algorithms)
152 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all);
443 keymaster_algorithm_t algorithm,
455 return km1_dev->get_supported_block_modes(km1_dev, algorithm, purpose, modes, modes_length)
1226 keymaster_algorithm_t algorithm = KM_ALGORITHM_AES; local
    [all...]
  /system/security/keystore/
keymaster_enforcement.cpp 78 auto algorithm = auth_set.GetTagValue(TAG_ALGORITHM); local
79 return algorithm.isOk() &&
80 (algorithm.value() == Algorithm::RSA || algorithm.value() == Algorithm::EC);
304 case Tag::ALGORITHM:
319 /* Algorithm specific parameters not used for access control. */
keystore_client_impl.cpp 65 // The encryption algorithm is AES-256-CBC with PKCS #7 padding and a random
66 // IV. The authentication algorithm is HMAC-SHA256 and is computed over the
451 auto algorithm = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_ALGORITHM), local
453 if (!algorithm.isOk() || algorithm.value() != Algorithm::AES) {
454 ALOGW("Found encryption key with invalid algorithm.");
492 auto algorithm = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_ALGORITHM), local
494 if (!algorithm.isOk() || algorithm.value() != Algorithm::HMAC)
    [all...]
  /bionic/libc/dns/nameser/
ns_print.c 461 u_int keyflags, protocol, algorithm, key_id; local
468 /* Key flags, Protocol, Algorithm. */
476 algorithm = *rdata++;
478 keyflags, protocol, algorithm);
508 u_int typ, algorithm, labels, footprint; local
516 /* Type covered, Algorithm, Label count, Original TTL. */
518 algorithm = *rdata++;
522 p_type((int)typ), algorithm, labels, t);
631 /* Algorithm name. */
1012 unsigned int i, hip_len, algorithm, key_len local
    [all...]
  /external/wycheproof/java/com/google/security/wycheproof/testcases/
DsaTest.java 19 // - add tests for "alternative" algorithm names
798 String algorithm = "SHA256WithDSA"; local
    [all...]
  /frameworks/base/core/java/android/util/jar/
StrictJarVerifier.java 229 final String algorithm = DIGEST_ALGORITHMS[i]; local
230 final String hash = attributes.getValue(algorithm + "-Digest");
237 return new VerifierEntry(name, MessageDigest.getInstance(algorithm), hashBytes,
471 String algorithm = DIGEST_ALGORITHMS[i]; local
472 String hash = attributes.getValue(algorithm + entry);
479 md = MessageDigest.getInstance(algorithm);
  /hardware/interfaces/drm/1.0/vts/functional/
drm_hal_clearkey_test.cpp 689 hidl_string algorithm = "AES/CBC/NoPadding"; local
690 Status status = drmPlugin->setCipherAlgorithm(session, algorithm);
696 * Setting an empty algorithm should return BAD_VALUE
700 hidl_string algorithm; local
701 Status status = drmPlugin->setCipherAlgorithm(session, algorithm);
707 * Setting a cipher algorithm with no session returns BAD_VALUE
711 hidl_string algorithm = "AES/CBC/NoPadding"; local
712 Status status = drmPlugin->setCipherAlgorithm(session, algorithm);
721 hidl_string algorithm = "HmacSHA256"; local
722 Status status = drmPlugin->setMacAlgorithm(session, algorithm);
732 hidl_string algorithm; local
743 hidl_string algorithm = "HmacSHA256"; local
818 hidl_string algorithm = "RSASSA-PSS-SHA1"; local
    [all...]
drm_hal_vendor_test.cpp 825 * Test that setting an invalid cipher algorithm returns
831 hidl_string algorithm; local
832 Status status = drmPlugin->setCipherAlgorithm(session, algorithm);
838 * Test that setting a cipher algorithm with no session returns
844 hidl_string algorithm = "AES/CBC/NoPadding"; local
845 Status status = drmPlugin->setCipherAlgorithm(session, algorithm);
850 * Test that setting a valid cipher algorithm returns
852 * vendor modules support this algorithm, but they must
859 hidl_string algorithm = "AES/CBC/NoPadding"; local
860 Status status = drmPlugin->setCipherAlgorithm(session, algorithm);
873 hidl_string algorithm; local
886 hidl_string algorithm = "HmacSHA256"; local
900 hidl_string algorithm = "HmacSHA256"; local
968 hidl_string algorithm; local
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyFactoryTest.java 71 String algorithm = parameters[i]; local
73 String message = "getInstance(" + (algorithm == null ? "null" : "\"" + algorithm + "\"") + ")";
75 KeyFactory.getInstance(algorithm);
159 String algorithm = algorithms[i]; local
162 (algorithm == null ? "null" : "\"" + algorithm + "\"") +
167 KeyFactory.getInstance(algorithm, provider);
  /libcore/ojluni/src/main/java/sun/security/util/
SignatureFileVerifier.java 226 private MessageDigest getDigest(String algorithm) throws SignatureException {
227 // check that algorithm is not restricted
228 if (!JAR_DISABLED_CHECK.permits(DIGEST_PRIMITIVE_SET, algorithm, null)) {
231 "Disabled algorithm used: " + algorithm);
238 MessageDigest digest = createdDigests.get(algorithm);
242 digest = MessageDigest.getInstance(algorithm);
243 createdDigests.put(algorithm, digest);
366 String algorithm = key.substring(0, key.length()-16); local
370 MessageDigest digest = getDigest(algorithm);
409 String algorithm = local
485 String algorithm = key.substring(0, key.length()-7); local
    [all...]
  /external/libchrome/crypto/
signature_verifier_unittest.cc 18 // is signed), signature, and algorithm come from the certificate of
146 // algorithm AlgorithmIdentifier,
150 // algorithm
1050 static const uint8_t algorithm[] = { local
    [all...]
  /frameworks/av/drm/libmediadrm/
IDrm.cpp 398 String8 const &algorithm) {
403 data.writeString8(algorithm);
412 String8 const &algorithm) {
417 data.writeString8(algorithm);
511 String8 const &algorithm,
519 data.writeString8(algorithm);
832 String8 algorithm = data.readString8(); local
833 reply->writeInt32(setCipherAlgorithm(sessionId, algorithm));
842 String8 algorithm = data.readString8(); local
843 reply->writeInt32(setMacAlgorithm(sessionId, algorithm));
908 String8 algorithm = data.readString8(); local
    [all...]
  /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/
SSLServerSocketTest.java 400 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local
401 KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(algorithm);
HandshakeCompletedEventTest.java 545 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local
546 KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(algorithm);
SSLSocketTest.java 597 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local
598 KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(algorithm);
  /libcore/luni/src/test/java/libcore/java/security/
KeyPairGeneratorTest.java 142 String algorithm = service.getAlgorithm(); local
145 if ("DH".equals(algorithm)) {
151 KeyPairGenerator kpg1 = KeyPairGenerator.getInstance(algorithm);
152 assertEquals(algorithm, kpg1.getAlgorithm());
159 KeyPairGenerator kpg2 = KeyPairGenerator.getInstance(algorithm, provider);
160 assertEquals(algorithm, kpg2.getAlgorithm());
168 KeyPairGenerator kpg3 = KeyPairGenerator.getInstance(algorithm,
170 assertEquals(algorithm, kpg3.getAlgorithm());
177 throw new Exception("Problem testing KeyPairGenerator." + algorithm, e);
184 private static void putKeySize(String algorithm, int keySize)
231 String algorithm = kpg.getAlgorithm(); local
    [all...]
  /libcore/ojluni/src/main/java/java/security/
Signature.java 50 * of a digital signature algorithm. Digital signatures are used for
53 * <p> The signature algorithm can be, among others, the NIST standard
54 * DSA, using DSA and SHA-1. The DSA algorithm using the
55 * SHA-1 message digest algorithm can be specified as {@code SHA1withDSA}.
57 * algorithm, so the signing algorithm could be specified as, for example,
59 * The algorithm name must be specified, as there is no default.
104 * <th>Algorithm</th>
243 * Java Cryptography Architecture Standard Algorithm Name Documentation.
264 * The algorithm for this signature object
268 private String algorithm; field in class:Signature
    [all...]
  /cts/libs/testserver/src/android/webkit/cts/
TestWebServer.java 540 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local
541 KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(algorithm);
  /cts/tests/tests/keystore/src/android/keystore/cts/
AuthorizationList.java 46 // Algorithm values.
156 private Integer algorithm; field in class:AuthorizationList
199 algorithm = Asn1Utils.getIntegerFromAsn1(value);
271 public static String algorithmToString(int algorithm) {
272 switch (algorithm) {
360 return algorithm;
499 if (algorithm != null) {
500 s.append("\nAlgorithm: ").append(algorithmToString(algorithm));
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/
BcKeyStoreSpi.java 417 String algorithm = dIn.readUTF(); local
433 return new SecretKeySpec(enc, algorithm);
445 return helper.createKeyFactory(algorithm).generatePrivate(spec);
447 return helper.createKeyFactory(algorithm).generatePublic(spec);
449 return helper.createSecretKeyFactory(algorithm).generateSecret(spec);
461 String algorithm,
471 SecretKeyFactory keyFact = helper.createSecretKeyFactory(algorithm);
474 Cipher cipher = helper.createCipher(algorithm);
  /external/syslinux/gpxe/src/include/gpxe/
net80211.h 128 /** An 802.11 data encryption algorithm */
552 * into a suitable input to the encryption algorithm, and for WPA and
685 * copy of the static definition plus whatever space the algorithm has
691 /** The cryptographic algorithm implemented */
692 enum net80211_crypto_alg algorithm; member in struct:net80211_crypto
765 /** Private data for the algorithm to store key and state info */
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/
CipherTest.java 188 final String algorithm = "DESede/CBC/PKCS5Padding"; local
190 Cipher cipher = Cipher.getInstance(algorithm);
191 assertTrue("Cipher algorithm does not match", cipher.getAlgorithm()
192 .equals(algorithm));
199 final String algorithm = "DESede/CBC/PKCS5Padding"; local
201 Cipher cipher = Cipher.getInstance(algorithm);
    [all...]
  /system/keymaster/include/keymaster/
android_keymaster_messages.h 137 return append_uint32_to_buf(buf, end, algorithm);
140 return copy_uint32_from_buf(buf_ptr, end, &algorithm);
143 keymaster_algorithm_t algorithm; member in struct:keymaster::SupportedByAlgorithmRequest
162 buf = append_uint32_to_buf(buf, end, algorithm);
166 return copy_uint32_from_buf(buf_ptr, end, &algorithm) &&
170 keymaster_algorithm_t algorithm; member in struct:keymaster::SupportedByAlgorithmAndPurposeRequest

Completed in 1585 milliseconds

1 2 3 45 6 7 8 91011>>