| /external/wycheproof/java/com/google/security/wycheproof/testcases/ |
| DsaTest.java | 19 // - add tests for "alternative" algorithm names 798 String algorithm = "SHA256WithDSA"; local [all...] |
| /hardware/interfaces/drm/1.0/vts/functional/ |
| drm_hal_clearkey_test.cpp | 721 hidl_string algorithm = "AES/CBC/NoPadding"; local 722 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 728 * Setting an empty algorithm should return BAD_VALUE 732 hidl_string algorithm; local 733 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 739 * Setting a cipher algorithm with no session returns BAD_VALUE 743 hidl_string algorithm = "AES/CBC/NoPadding"; local 744 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 753 hidl_string algorithm = "HmacSHA256"; local 754 Status status = drmPlugin->setMacAlgorithm(session, algorithm); 764 hidl_string algorithm; local 775 hidl_string algorithm = "HmacSHA256"; local 850 hidl_string algorithm = "RSASSA-PSS-SHA1"; local [all...] |
| /prebuilts/go/darwin-x86/src/crypto/x509/ |
| pem_decrypt.go | 7 // RFC 1423 describes the encryption of PEM blocks. The algorithm used to 25 // Possible values for the EncryptPEMBlock encryption algorithm. 80 // with the number of bits our cipher requires. This algorithm was derived from 109 // the DEK-Info header to determine the algorithm used for decryption. If no 181 // given DER-encoded data encrypted with the specified algorithm and
|
| /prebuilts/go/linux-x86/src/crypto/x509/ |
| pem_decrypt.go | 7 // RFC 1423 describes the encryption of PEM blocks. The algorithm used to 25 // Possible values for the EncryptPEMBlock encryption algorithm. 80 // with the number of bits our cipher requires. This algorithm was derived from 109 // the DEK-Info header to determine the algorithm used for decryption. If no 181 // given DER-encoded data encrypted with the specified algorithm and
|
| /device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/ |
| Tpm2Capability.c | 298 algorithm ID and a set of properties of the algorithm.
302 @param[out] AlgList List of algorithm.
524 This command is used to check to see if specific combinations of algorithm parameters are supported.
526 @param[in] Parameters Algorithm parameters to be validated
572 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->parameters.symDetail.algorithm));
574 switch (Parameters->parameters.symDetail.algorithm) {
598 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->parameters.rsaDetail.symmetric.algorithm));
600 switch (Parameters->parameters.rsaDetail.symmetric.algorithm) {
646 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Parameters->parameters.eccDetail.symmetric.algorithm));
[all...] |
| /hardware/interfaces/drm/1.0/default/ |
| DrmPlugin.cpp | 251 const hidl_vec<uint8_t>& sessionId, const hidl_string& algorithm) { 254 String8(algorithm.c_str())); 259 const hidl_vec<uint8_t>& sessionId, const hidl_string& algorithm) { 262 String8(algorithm.c_str())); 311 const hidl_string& algorithm, const hidl_vec<uint8_t>& message, 316 String8(algorithm.c_str()), toVector(message), toVector(wrappedKey),
|
| /prebuilts/go/darwin-x86/doc/codewalk/ |
| markov.go | 6 Generating random text: a Markov chain algorithm 12 A Markov chain algorithm generates text by creating a statistical model of 17 Our Markov chain algorithm would arrange this text into this set of prefixes
|
| /prebuilts/go/darwin-x86/src/crypto/ |
| crypto.go | 99 // PublicKey represents a public key using an unspecified algorithm. 102 // PrivateKey represents a private key using an unspecified algorithm. 119 // to type assert opts to other types in order to obtain algorithm
|
| /prebuilts/go/linux-x86/doc/codewalk/ |
| markov.go | 6 Generating random text: a Markov chain algorithm 12 A Markov chain algorithm generates text by creating a statistical model of 17 Our Markov chain algorithm would arrange this text into this set of prefixes
|
| /prebuilts/go/linux-x86/src/crypto/ |
| crypto.go | 99 // PublicKey represents a public key using an unspecified algorithm. 102 // PrivateKey represents a private key using an unspecified algorithm. 119 // to type assert opts to other types in order to obtain algorithm
|
| /system/security/keystore/ |
| keystore_client_impl.cpp | 65 // The encryption algorithm is AES-256-CBC with PKCS #7 padding and a random 66 // IV. The authentication algorithm is HMAC-SHA256 and is computed over the 451 auto algorithm = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_ALGORITHM), local 453 if (!algorithm.isOk() || algorithm.value() != Algorithm::AES) { 454 ALOGW("Found encryption key with invalid algorithm."); 492 auto algorithm = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_ALGORITHM), local 494 if (!algorithm.isOk() || algorithm.value() != Algorithm::HMAC) [all...] |
| /external/tpm2/ |
| CryptUtil_fp.h | 41 TPMI_ALG_HASH nameAlg, // IN: object name algorithm 117 CryptGetHashDigestSize(TPM_ALG_ID hashAlg // IN: hash algorithm 149 TPM_ALG_ID hashAlg, // IN: hash algorithm for the KDF 157 CryptGetHashDigestSize(TPM_ALG_ID hashAlg // IN: hash algorithm 162 TPMI_ALG_SYM algorithm, // IN: symmetric algorithm 168 CryptHashBlock(TPM_ALG_ID algId, // IN: the hash algorithm to use 229 BOOL CryptIsAsymAlgorithm(TPM_ALG_ID algID // IN: algorithm ID 233 TPM_ALG_ID scheme // IN: the scheme algorithm to test 236 BOOL CryptIsSplitSign(TPM_ALG_ID scheme // IN: the algorithm selecto [all...] |
| /external/vboot_reference/tests/ |
| vb20_misc_tests.c | 91 mock_gbb.rootkey.algorithm = 11; 98 kb->data_key.algorithm = 7; 196 TEST_EQ(k->algorithm, 7, "data key algorithm");
|
| /art/test/ti-agent/ |
| jvmti_helper.cc | 19 #include <algorithm>
|
| /bionic/libc/malloc_debug/ |
| TrackData.cpp | 33 #include <algorithm>
|
| /cts/suite/audio_quality/lib/src/task/ |
| TaskSequential.cpp | 17 #include <algorithm>
|
| /device/linaro/hikey/bluetooth/ |
| async_fd_watcher.cc | 19 #include <algorithm>
|
| /external/antlr/antlr-3.4/runtime/Ruby/test/functional/parser/ |
| backtracking.rb | 44 * The LL(*) analysis algorithm fails to deal with this due to
|
| ll-star.rb | 25 * LL(*). The LL(*) algorithm simply scans ahead until it sees
|
| /external/boringssl/src/crypto/lhash/ |
| lhash_test.cc | 25 #include <algorithm>
|
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
| BaseAgreementSpi.java | 227 "KDF can only be used when algorithm is known"); 251 String algorithm) 255 String algKey = Strings.toUpperCase(algorithm); 256 String oidAlgorithm = algorithm; 268 throw new NoSuchAlgorithmException("unknown algorithm encountered: " + oidAlgorithm); 282 // throw new NoSuchAlgorithmException("no OID for algorithm: " + oidAlgorithm); 312 String algName = getAlgorithm(algorithm);
|
| /external/bsdiff/ |
| extents_file.cc | 9 #include <algorithm>
|
| file.cc | 23 #include <algorithm>
|
| /external/chromium-libpac/src/ |
| net_util.cc | 6 #include <algorithm>
|
| /external/clang/include/clang/Serialization/ |
| ContinuousRangeMap.h | 20 #include <algorithm>
|