| /system/keymaster/ |
| keymaster_enforcement.cpp | 79 keymaster_algorithm_t algorithm; local 80 return auth_set.GetTagValue(TAG_ALGORITHM, &algorithm) && 81 (algorithm == KM_ALGORITHM_RSA || algorithm == KM_ALGORITHM_EC); 317 /* Algorithm specific parameters not used for access control. */
|
| attestation_record.cpp | 63 ASN1_INTEGER* algorithm; member in struct:keymaster::km_auth_list 98 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.masked_tag()), 273 integer_ptr = &record->algorithm; 642 // Algorithm 643 if (!get_enum(record->algorithm, TAG_ALGORITHM, auth_list)) [all...] |
| soft_keymaster_device.cpp | 26 #include <algorithm> 108 static keymaster_error_t add_digests(keymaster1_device_t* dev, keymaster_algorithm_t algorithm, 111 auto key = std::make_pair(algorithm, purpose); 116 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); 136 for (auto algorithm : sig_algorithms) 140 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); 148 for (auto algorithm : crypt_algorithms) 152 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); 443 keymaster_algorithm_t algorithm, 455 return km1_dev->get_supported_block_modes(km1_dev, algorithm, purpose, modes, modes_length) 1226 keymaster_algorithm_t algorithm = KM_ALGORITHM_AES; local [all...] |
| /system/security/keystore/ |
| keymaster_enforcement.cpp | 78 auto algorithm = auth_set.GetTagValue(TAG_ALGORITHM); local 79 return algorithm.isOk() && 80 (algorithm.value() == Algorithm::RSA || algorithm.value() == Algorithm::EC); 304 case Tag::ALGORITHM: 319 /* Algorithm specific parameters not used for access control. */
|
| keystore_client_impl.cpp | 65 // The encryption algorithm is AES-256-CBC with PKCS #7 padding and a random 66 // IV. The authentication algorithm is HMAC-SHA256 and is computed over the 451 auto algorithm = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_ALGORITHM), local 453 if (!algorithm.isOk() || algorithm.value() != Algorithm::AES) { 454 ALOGW("Found encryption key with invalid algorithm."); 492 auto algorithm = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_ALGORITHM), local 494 if (!algorithm.isOk() || algorithm.value() != Algorithm::HMAC) [all...] |
| /bionic/libc/dns/nameser/ |
| ns_print.c | 461 u_int keyflags, protocol, algorithm, key_id; local 468 /* Key flags, Protocol, Algorithm. */ 476 algorithm = *rdata++; 478 keyflags, protocol, algorithm); 508 u_int typ, algorithm, labels, footprint; local 516 /* Type covered, Algorithm, Label count, Original TTL. */ 518 algorithm = *rdata++; 522 p_type((int)typ), algorithm, labels, t); 631 /* Algorithm name. */ 1012 unsigned int i, hip_len, algorithm, key_len local [all...] |
| /external/wycheproof/java/com/google/security/wycheproof/testcases/ |
| DsaTest.java | 19 // - add tests for "alternative" algorithm names 798 String algorithm = "SHA256WithDSA"; local [all...] |
| /frameworks/base/core/java/android/util/jar/ |
| StrictJarVerifier.java | 229 final String algorithm = DIGEST_ALGORITHMS[i]; local 230 final String hash = attributes.getValue(algorithm + "-Digest"); 237 return new VerifierEntry(name, MessageDigest.getInstance(algorithm), hashBytes, 471 String algorithm = DIGEST_ALGORITHMS[i]; local 472 String hash = attributes.getValue(algorithm + entry); 479 md = MessageDigest.getInstance(algorithm);
|
| /hardware/interfaces/drm/1.0/vts/functional/ |
| drm_hal_clearkey_test.cpp | 689 hidl_string algorithm = "AES/CBC/NoPadding"; local 690 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 696 * Setting an empty algorithm should return BAD_VALUE 700 hidl_string algorithm; local 701 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 707 * Setting a cipher algorithm with no session returns BAD_VALUE 711 hidl_string algorithm = "AES/CBC/NoPadding"; local 712 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 721 hidl_string algorithm = "HmacSHA256"; local 722 Status status = drmPlugin->setMacAlgorithm(session, algorithm); 732 hidl_string algorithm; local 743 hidl_string algorithm = "HmacSHA256"; local 818 hidl_string algorithm = "RSASSA-PSS-SHA1"; local [all...] |
| drm_hal_vendor_test.cpp | 825 * Test that setting an invalid cipher algorithm returns 831 hidl_string algorithm; local 832 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 838 * Test that setting a cipher algorithm with no session returns 844 hidl_string algorithm = "AES/CBC/NoPadding"; local 845 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 850 * Test that setting a valid cipher algorithm returns 852 * vendor modules support this algorithm, but they must 859 hidl_string algorithm = "AES/CBC/NoPadding"; local 860 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 873 hidl_string algorithm; local 886 hidl_string algorithm = "HmacSHA256"; local 900 hidl_string algorithm = "HmacSHA256"; local 968 hidl_string algorithm; local [all...] |
| /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
| KeyFactoryTest.java | 71 String algorithm = parameters[i]; local 73 String message = "getInstance(" + (algorithm == null ? "null" : "\"" + algorithm + "\"") + ")"; 75 KeyFactory.getInstance(algorithm); 159 String algorithm = algorithms[i]; local 162 (algorithm == null ? "null" : "\"" + algorithm + "\"") + 167 KeyFactory.getInstance(algorithm, provider);
|
| /libcore/ojluni/src/main/java/sun/security/util/ |
| SignatureFileVerifier.java | 226 private MessageDigest getDigest(String algorithm) throws SignatureException { 227 // check that algorithm is not restricted 228 if (!JAR_DISABLED_CHECK.permits(DIGEST_PRIMITIVE_SET, algorithm, null)) { 231 "Disabled algorithm used: " + algorithm); 238 MessageDigest digest = createdDigests.get(algorithm); 242 digest = MessageDigest.getInstance(algorithm); 243 createdDigests.put(algorithm, digest); 366 String algorithm = key.substring(0, key.length()-16); local 370 MessageDigest digest = getDigest(algorithm); 409 String algorithm = local 485 String algorithm = key.substring(0, key.length()-7); local [all...] |
| /external/libchrome/crypto/ |
| signature_verifier_unittest.cc | 18 // is signed), signature, and algorithm come from the certificate of 146 // algorithm AlgorithmIdentifier, 150 // algorithm 1050 static const uint8_t algorithm[] = { local [all...] |
| /frameworks/av/drm/libmediadrm/ |
| IDrm.cpp | 398 String8 const &algorithm) { 403 data.writeString8(algorithm); 412 String8 const &algorithm) { 417 data.writeString8(algorithm); 511 String8 const &algorithm, 519 data.writeString8(algorithm); 832 String8 algorithm = data.readString8(); local 833 reply->writeInt32(setCipherAlgorithm(sessionId, algorithm)); 842 String8 algorithm = data.readString8(); local 843 reply->writeInt32(setMacAlgorithm(sessionId, algorithm)); 908 String8 algorithm = data.readString8(); local [all...] |
| /libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
| SSLServerSocketTest.java | 400 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local 401 KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(algorithm);
|
| HandshakeCompletedEventTest.java | 545 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local 546 KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(algorithm);
|
| SSLSocketTest.java | 597 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local 598 KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(algorithm);
|
| /libcore/luni/src/test/java/libcore/java/security/ |
| KeyPairGeneratorTest.java | 142 String algorithm = service.getAlgorithm(); local 145 if ("DH".equals(algorithm)) { 151 KeyPairGenerator kpg1 = KeyPairGenerator.getInstance(algorithm); 152 assertEquals(algorithm, kpg1.getAlgorithm()); 159 KeyPairGenerator kpg2 = KeyPairGenerator.getInstance(algorithm, provider); 160 assertEquals(algorithm, kpg2.getAlgorithm()); 168 KeyPairGenerator kpg3 = KeyPairGenerator.getInstance(algorithm, 170 assertEquals(algorithm, kpg3.getAlgorithm()); 177 throw new Exception("Problem testing KeyPairGenerator." + algorithm, e); 184 private static void putKeySize(String algorithm, int keySize) 231 String algorithm = kpg.getAlgorithm(); local [all...] |
| /libcore/ojluni/src/main/java/java/security/ |
| Signature.java | 50 * of a digital signature algorithm. Digital signatures are used for 53 * <p> The signature algorithm can be, among others, the NIST standard 54 * DSA, using DSA and SHA-1. The DSA algorithm using the 55 * SHA-1 message digest algorithm can be specified as {@code SHA1withDSA}. 57 * algorithm, so the signing algorithm could be specified as, for example, 59 * The algorithm name must be specified, as there is no default. 104 * <th>Algorithm</th> 243 * Java Cryptography Architecture Standard Algorithm Name Documentation. 264 * The algorithm for this signature object 268 private String algorithm; field in class:Signature [all...] |
| /cts/libs/testserver/src/android/webkit/cts/ |
| TestWebServer.java | 540 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local 541 KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(algorithm);
|
| /cts/tests/tests/keystore/src/android/keystore/cts/ |
| AuthorizationList.java | 46 // Algorithm values. 156 private Integer algorithm; field in class:AuthorizationList 199 algorithm = Asn1Utils.getIntegerFromAsn1(value); 271 public static String algorithmToString(int algorithm) { 272 switch (algorithm) { 360 return algorithm; 499 if (algorithm != null) { 500 s.append("\nAlgorithm: ").append(algorithmToString(algorithm));
|
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/ |
| BcKeyStoreSpi.java | 417 String algorithm = dIn.readUTF(); local 433 return new SecretKeySpec(enc, algorithm); 445 return helper.createKeyFactory(algorithm).generatePrivate(spec); 447 return helper.createKeyFactory(algorithm).generatePublic(spec); 449 return helper.createSecretKeyFactory(algorithm).generateSecret(spec); 461 String algorithm, 471 SecretKeyFactory keyFact = helper.createSecretKeyFactory(algorithm); 474 Cipher cipher = helper.createCipher(algorithm);
|
| /external/syslinux/gpxe/src/include/gpxe/ |
| net80211.h | 128 /** An 802.11 data encryption algorithm */ 552 * into a suitable input to the encryption algorithm, and for WPA and 685 * copy of the static definition plus whatever space the algorithm has 691 /** The cryptographic algorithm implemented */ 692 enum net80211_crypto_alg algorithm; member in struct:net80211_crypto 765 /** Private data for the algorithm to store key and state info */ [all...] |
| /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
| CipherTest.java | 188 final String algorithm = "DESede/CBC/PKCS5Padding"; local 190 Cipher cipher = Cipher.getInstance(algorithm); 191 assertTrue("Cipher algorithm does not match", cipher.getAlgorithm() 192 .equals(algorithm)); 199 final String algorithm = "DESede/CBC/PKCS5Padding"; local 201 Cipher cipher = Cipher.getInstance(algorithm); [all...] |
| /system/keymaster/include/keymaster/ |
| android_keymaster_messages.h | 137 return append_uint32_to_buf(buf, end, algorithm); 140 return copy_uint32_from_buf(buf_ptr, end, &algorithm); 143 keymaster_algorithm_t algorithm; member in struct:keymaster::SupportedByAlgorithmRequest 162 buf = append_uint32_to_buf(buf, end, algorithm); 166 return copy_uint32_from_buf(buf_ptr, end, &algorithm) && 170 keymaster_algorithm_t algorithm; member in struct:keymaster::SupportedByAlgorithmAndPurposeRequest
|