| /cts/tests/tests/keystore/src/android/keystore/cts/ |
| RSASignatureTest.java | 46 for (String algorithm : SignatureTest.EXPECTED_SIGNATURE_ALGORITHMS) { 47 String keyAlgorithm = TestUtils.getSignatureAlgorithmKeyAlgorithm(algorithm); 49 sigAlgs.add(algorithm); external variable declarations 110 for (String algorithm : SIGNATURE_ALGORITHMS) { 112 String digest = TestUtils.getSignatureAlgorithmDigest(algorithm); 128 TestUtils.getMinimalWorkingImportParametersForSigningingWith(algorithm)) 133 Signature signature = Signature.getInstance(algorithm, provider); 145 throw new RuntimeException("Failed for " + algorithm, e);
|
| /external/boringssl/src/crypto/evp/ |
| p_ec_asn1.c | 74 CBB spki, algorithm, oid, key_bitstring; local 76 !CBB_add_asn1(&spki, &algorithm, CBS_ASN1_SEQUENCE) || 77 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 79 !EC_KEY_marshal_curve_name(&algorithm, group) || 174 CBB pkcs8, algorithm, oid, private_key; local 177 !CBB_add_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) || 178 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 180 !EC_KEY_marshal_curve_name(&algorithm, EC_KEY_get0_group(ec_key)) ||
|
| /external/boringssl/src/crypto/pkcs8/ |
| p5_pbev2.c | 177 CBB algorithm, oid, param, kdf, kdf_oid, kdf_param, salt_cbb, cipher_cbb, local 179 if (!CBB_add_asn1(out, &algorithm, CBS_ASN1_SEQUENCE) || 180 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 182 !CBB_add_asn1(&algorithm, ¶m, CBS_ASN1_SEQUENCE) || 229 /* See if we recognise the encryption algorithm. */
|
| pkcs8.c | 337 CBB algorithm, oid, param, salt_cbb; local 338 if (!CBB_add_asn1(out, &algorithm, CBS_ASN1_SEQUENCE) || 339 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 341 !CBB_add_asn1(&algorithm, ¶m, CBS_ASN1_SEQUENCE) || 353 int pkcs8_pbe_decrypt(uint8_t **out, size_t *out_len, CBS *algorithm, 362 if (!CBS_get_asn1(algorithm, &obj, CBS_ASN1_OBJECT)) { 379 if (!suite->decrypt_init(suite, &ctx, pass, pass_len, algorithm)) { 415 CBS epki, algorithm, ciphertext; local 417 !CBS_get_asn1(&epki, &algorithm, CBS_ASN1_SEQUENCE) || 426 if (!pkcs8_pbe_decrypt(&out, &out_len, &algorithm, pass, pass_len [all...] |
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
| BCPBEKey.java | 15 String algorithm; field in class:BCPBEKey 29 String algorithm, 38 this.algorithm = algorithm; 50 return algorithm;
|
| /external/dhcpcd-6.8.2/ |
| auth.c | 110 uint8_t protocol, algorithm, rdm, *mm, type; local 132 algorithm = *d++; 142 algorithm != auth->algorithm || 328 switch (algorithm) { 516 switch(auth->algorithm) { 572 *data++ = auth->algorithm; 654 switch(auth->algorithm) {
|
| auth.h | 63 uint8_t algorithm; member in struct:auth
|
| /external/ipsec-tools/src/racoon/ |
| getcertsbyname.c | 70 getnewci(qtype, keytag, algorithm, flags, certlen, cert) 71 int qtype, keytag, algorithm, flags, certlen; 83 res->ci_algorithm = algorithm; 127 int type, keytag, algorithm; local 170 algorithm = *cp++; /* algorithm */ 175 type, keytag, algorithm, rdlength); 179 cur->ci_next = getnewci(type, keytag, algorithm, 214 int qtype, qclass, keytag, algorithm; local 303 algorithm = *cp++; /* algorithm * [all...] |
| /external/nist-sip/java/gov/nist/core/net/ |
| SslNetworkLayer.java | 72 String algorithm = KeyManagerFactory.getDefaultAlgorithm();
local 73 TrustManagerFactory tmFactory = TrustManagerFactory.getInstance(algorithm);
74 KeyManagerFactory kmFactory = KeyManagerFactory.getInstance(algorithm);
|
| /external/wycheproof/java/com/google/security/wycheproof/testcases/ |
| RsaSignatureTest.java | 1078 String algorithm = "SHA256WithRSA"; local 1192 String algorithm = ALGORITHM_KEY1; local [all...] |
| /libcore/luni/src/test/java/libcore/java/security/ |
| SecureRandomTest.java | 45 String algorithm = service.getAlgorithm(); local 47 SecureRandom sr1 = SecureRandom.getInstance(algorithm); 48 assertEquals(algorithm, sr1.getAlgorithm()); 52 SecureRandom sr2 = SecureRandom.getInstance(algorithm, provider); 53 assertEquals(algorithm, sr2.getAlgorithm()); 58 SecureRandom sr3 = SecureRandom.getInstance(algorithm, provider.getName()); 59 assertEquals(algorithm, sr3.getAlgorithm()); 63 System.out.println("SecureRandomTest " + algorithm + " and provider " 66 throw new Exception("Problem testing SecureRandom." + algorithm
|
| /libcore/luni/src/test/java/libcore/javax/crypto/ |
| KeyGeneratorTest.java | 49 // providing AndroidKeyStore-specific algorithm parameters. 56 String algorithm = service.getAlgorithm(); local 59 KeyGenerator kg1 = KeyGenerator.getInstance(algorithm); 60 assertEquals(algorithm, kg1.getAlgorithm()); 64 KeyGenerator kg2 = KeyGenerator.getInstance(algorithm, provider); 65 assertEquals(algorithm, kg2.getAlgorithm()); 70 KeyGenerator kg3 = KeyGenerator.getInstance(algorithm, provider.getName()); 71 assertEquals(algorithm, kg3.getAlgorithm()); 75 throw new Exception("Problem testing KeyPairGenerator." + algorithm, e); 83 private static void putKeySize(String algorithm, int keySize) 147 String algorithm = kg.getAlgorithm(); local [all...] |
| /libcore/ojluni/src/main/java/java/security/ |
| KeyPairGenerator.java | 48 * <p>A Key pair generator for a particular algorithm creates a public/private 49 * key pair that can be used with this algorithm. It also associates 50 * algorithm-specific parameters with each of the generated keys. 52 * <p>There are two ways to generate a key pair: in an algorithm-independent 53 * manner, and in an algorithm-specific manner. 57 * <li><b>Algorithm-Independent Initialization</b> 60 * algorithms (e.g., in the case of the <i>DSA</i> algorithm, the keysize 73 * algorithm-independent {@code initialize} methods, it is up to the 74 * provider what to do about the algorithm-specific parameters (if any) to be 77 * <p>If the algorithm is the <i>DSA</i> algorithm, and the keysize (modulu 160 private final String algorithm; field in class:KeyPairGenerator [all...] |
| /libcore/ojluni/src/main/java/javax/crypto/ |
| KeyAgreement.java | 64 * <th>Algorithm</th> 80 * This algorithm is described in the <a href= 83 * Java Cryptography Architecture Standard Algorithm Name Documentation. 107 // The name of the key agreement algorithm. 108 private final String algorithm; field in class:KeyAgreement 117 * @param algorithm the algorithm 120 String algorithm) { 123 this.algorithm = algorithm; [all...] |
| KeyGenerator.java | 50 * <p>There are two ways to generate a key: in an algorithm-independent 51 * manner, and in an algorithm-specific manner. 55 * <li><b>Algorithm-Independent Initialization</b> 69 * algorithm-independent <code>init</code> methods, it is up to the 70 * provider what to do about the algorithm-specific parameters (if any) to be 73 * <li><b>Algorithm-Specific Initialization</b> 74 * <p>For situations where a set of algorithm-specific parameters already 93 * <th>Algorithm</th> 160 * Java Cryptography Architecture Standard Algorithm Name Documentation. 190 // The algorithm 191 private final String algorithm; field in class:KeyGenerator [all...] |
| Mac.java | 45 * (MAC) algorithm. 63 * <th>Algorithm</th> 150 * Java Cryptography Architecture Standard Algorithm Name Documentation. 172 // The name of the MAC algorithm. 173 private final String algorithm; field in class:Mac 185 * @param algorithm the algorithm 187 protected Mac(MacSpi macSpi, Provider provider, String algorithm) { 190 this.algorithm = algorithm; [all...] |
| /libcore/ojluni/src/main/java/sun/security/util/ |
| ManifestEntryVerifier.java | 128 String algorithm = key.substring(0, key.length()-7); local 130 MessageDigest digest = createdDigests.get(algorithm); 136 (algorithm, SunProviderHolder.instance); 137 createdDigests.put(algorithm, digest);
|
| /system/core/trusty/keymaster/ |
| trusty_keymaster_device.cpp | 209 keymaster_algorithm_t algorithm; local 210 keymaster_error_t err = GetPkcs8KeyAlgorithm(key, key_length, &algorithm); 213 request.key_description.push_back(TAG_ALGORITHM, algorithm); 231 keymaster_algorithm_t* algorithm) { 252 *algorithm = KM_ALGORITHM_RSA; 255 *algorithm = KM_ALGORITHM_EC; 258 ALOGE("Unsupported algorithm %d", EVP_PKEY_type(pkey->type)); 482 ALOGE("Error %d extracting public key to determine algorithm", err);
|
| /system/security/keystore/ |
| auth_token_table.cpp | 22 #include <algorithm> 89 inline bool is_secret_key_operation(Algorithm algorithm, KeyPurpose purpose) { 90 if ((algorithm != Algorithm::RSA && algorithm != Algorithm::EC)) 98 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES); local 99 return is_secret_key_operation(algorithm, purpose) & 104 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES); local [all...] |
| /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
| KeyFactory2Test.java | 98 "algorithm name"); 99 assertEquals("algorithm name", kf.getAlgorithm()); 125 assertEquals("generatePrivate generated different key for algorithm " + keyfactAlgs[i], 129 assertEquals("generatePrivate generated different key for algorithm " + keyfactAlgs[i], 155 "generatePublic generated different key for algorithm " 169 assertTrue("getAlgorithm ok for algorithm " + keyfactAlgs[i], 250 "generatePrivate generated different key for algorithm " 256 "generatePublic generated different key for algorithm " 279 assertNotNull("provider is null for algorithm " + keyfactAlgs[i], p); 330 String algorithm = (String) e.nextElement() local [all...] |
| MessageDigest2Test.java | 67 for (String algorithm : algorithms) { 68 MessageDigestStub md = new MessageDigestStub(algorithm); 69 assertEquals(algorithm, md.getAlgorithm()); 81 for (String algorithm : e.getValue()) { 82 MessageDigest d1 = MessageDigest.getInstance(algorithm, e.getKey().getName()); 91 assertTrue("cloned hash differs from original for algorithm " + algorithm, 243 for (String algorithm : e.getValue()) { 244 MessageDigest digest = MessageDigest.getInstance(algorithm, e.getKey().getName()); 256 for (String algorithm : e.getValue()) 445 String algorithm = (String) key; local [all...] |
| /device/linaro/bootloader/edk2/StdLib/BsdSocketLib/ |
| ns_print.c | 468 u_int keyflags, protocol, algorithm;
local 475 /* Key flags, Protocol, Algorithm. */
478 algorithm = *rdata++;
480 (unsigned int)keyflags, (unsigned int)protocol, (unsigned int)algorithm));
506 u_int type, algorithm, labels, footprint;
local 514 /* Type covered, Algorithm, Label count, Original TTL. */
516 algorithm = *rdata++;
520 p_type((int)type), (int)algorithm, (unsigned long)t));
|
| /external/apache-http/src/org/apache/http/impl/auth/ |
| DigestScheme.java | 253 "Unsupported algorithm in HTTP Digest authentication: " 263 * @throws AuthenticationException when MD5 is an unsupported algorithm 271 String algorithm = getParameter("algorithm"); local 281 // If an algorithm is not specified, default to MD5. 282 if (algorithm == null) { 283 algorithm = "MD5"; 311 //a1 is suitable for MD5 algorithm 312 if(algorithm.equalsIgnoreCase("MD5-sess")) { // android-changed: ignore case 327 } else if (!algorithm.equalsIgnoreCase("MD5")) { // android-changed: ignore cas 403 String algorithm = getParameter("algorithm"); local [all...] |
| /external/boringssl/src/crypto/digest/ |
| digests.c | 356 CBS algorithm, oid; local 357 if (!CBS_get_asn1(cbs, &algorithm, CBS_ASN1_SEQUENCE) || 358 !CBS_get_asn1(&algorithm, &oid, CBS_ASN1_OBJECT)) { 373 if (CBS_len(&algorithm) > 0) { 375 if (!CBS_get_asn1(&algorithm, ¶m, CBS_ASN1_NULL) || 377 CBS_len(&algorithm) != 0) {
|
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
| BCECPrivateKey.java | 42 private String algorithm = "EC"; field in class:BCECPrivateKey 61 this.algorithm = key.getAlgorithm(); 67 String algorithm, 71 this.algorithm = algorithm; 93 String algorithm, 97 this.algorithm = algorithm; 104 String algorithm, 107 this.algorithm = algorithm [all...] |