/prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/test/std/algorithms/alg.modifying.operations/alg.replace/ |
replace_if.pass.cpp | 10 // <algorithm> 19 #include <algorithm>
|
/prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/test/std/algorithms/alg.nonmodifying/alg.adjacent.find/ |
adjacent_find.pass.cpp | 10 // <algorithm> 17 #include <algorithm>
|
/prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/test/std/algorithms/alg.nonmodifying/alg.find/ |
find_if.pass.cpp | 10 // <algorithm> 17 #include <algorithm>
|
find_if_not.pass.cpp | 10 // <algorithm> 17 #include <algorithm>
|
/prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/test/std/algorithms/alg.nonmodifying/alg.foreach/ |
test.pass.cpp | 10 // <algorithm> 17 #include <algorithm>
|
/prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/test/std/algorithms/alg.sorting/alg.heap.operations/make.heap/ |
make_heap.pass.cpp | 10 // <algorithm> 17 #include <algorithm>
|
/prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/test/std/algorithms/alg.sorting/alg.heap.operations/push.heap/ |
push_heap.pass.cpp | 10 // <algorithm> 18 #include <algorithm>
|
/prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/test/std/experimental/algorithms/alg.random.sample/ |
sample.fail.cpp | 10 // <algorithm> 18 #include <experimental/algorithm>
|
/system/keymaster/include/keymaster/ |
keymaster_context.h | 90 virtual KeyFactory* GetKeyFactory(keymaster_algorithm_t algorithm) const = 0; 91 virtual OperationFactory* GetOperationFactory(keymaster_algorithm_t algorithm, 163 * Return the attestation signing key of the specified algorithm (KM_ALGORITHM_RSA or 166 virtual EVP_PKEY* AttestationKey(keymaster_algorithm_t algorithm, 170 * Return the certificate chain of the attestation signing key of the specified algorithm 173 virtual keymaster_cert_chain_t* AttestationChain(keymaster_algorithm_t algorithm,
|
/system/vold/ |
KeyBuffer.cpp | 19 #include <algorithm>
|
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/arm/ |
relax_load_align.s | 1 @ The relaxation algorithm used to not compensate for alignment statements.
|
/build/make/tools/releasetools/ |
check_ota_package_signature.py | 34 """Check if the cert uses SHA-256 hashing algorithm.""" 40 algorithm = re.search(r'Signature Algorithm: ([a-zA-Z0-9]+)', cert_dump) 41 assert algorithm, "Failed to identify the signature algorithm." 43 assert not algorithm.group(1).startswith('ecdsa'), ( 46 return algorithm.group(1).startswith('sha256')
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/bc/ |
BcDigestCalculatorProvider.java | 19 public DigestCalculator get(final AlgorithmIdentifier algorithm) 22 Digest dig = digestProvider.get(algorithm); 30 return algorithm;
|
/external/libchrome/crypto/ |
symmetric_key.h | 32 // Defines the algorithm that a key will be used with. See also 34 enum Algorithm { 41 // Generates a random key suitable to be used with |algorithm| and of 45 Algorithm algorithm, 49 // for use with specified |algorithm|. Note |algorithm| is not the algorithm 54 Algorithm algorithm, [all...] |
/libcore/benchmarks/src/benchmarks/regression/ |
DigestBenchmark.java | 33 @Param private Algorithm algorithm; field in class:DigestBenchmark 35 public enum Algorithm { MD5, SHA1, SHA256, SHA384, SHA512 }; 48 className += ("OpenSSLDigest$" + algorithm); 51 className += (algorithm + "Digest");
|
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
KeyStoreTestSupport.java | 90 private String algorithm; field in class:KeyStoreTestSupport.MyPrivateKey 96 public MyPrivateKey(String algorithm, String format, byte[] encoded) { 97 this.algorithm = algorithm; 103 return algorithm;
|
/external/nist-sip/java/gov/nist/javax/sip/clientauthutils/ |
MessageDigestAlgorithm.java | 10 * MD5 algorithm 20 * @param algorithm a string indicating a pair of algorithms (MD5 (default), or MD5-sess) used 38 static String calculateResponse(String algorithm, String hashUserNameRealmPasswd, 43 stackLogger.logDebug("trying to authenticate using : " + algorithm + ", "+ 54 // The following follows closely the algorithm for generating a response 59 "cnonce_value may not be absent for MD5-Sess algorithm."); 94 * @param algorithm a string indicating a pair of algorithms (MD5 (default), or MD5-sess) used 114 static String calculateResponse(String algorithm, String username_value, String realm_value, 119 stackLogger.logDebug("trying to authenticate using : " + algorithm + ", " 131 // The following follows closely the algorithm for generating a respons [all...] |
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
RsaSignatureTest.java | 1078 String algorithm = "SHA256WithRSA"; local 1192 String algorithm = ALGORITHM_KEY1; local [all...] |
/system/keymaster/ |
android_keymaster.cpp | 85 bool check_supported(const KeymasterContext& context, keymaster_algorithm_t algorithm, 87 if (context.GetKeyFactory(algorithm) == NULL) { 122 void GetSupported(const KeymasterContext& context, keymaster_algorithm_t algorithm, 126 if (response == NULL || !check_supported(context, algorithm, response)) 129 const OperationFactory* factory = context.GetOperationFactory(algorithm, purpose); 142 GetSupported(*context_, request.algorithm, request.purpose, 148 GetSupported(*context_, request.algorithm, request.purpose, 154 GetSupported(*context_, request.algorithm, request.purpose, &OperationFactory::SupportedDigests, 160 if (response == NULL || !check_supported(*context_, request.algorithm, response)) 165 context_->GetKeyFactory(request.algorithm)->SupportedImportFormats(&count) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509Util.java | 199 String algorithm) 202 return Signature.getInstance(algorithm); 206 String algorithm, 212 return Signature.getInstance(algorithm, provider); 216 return Signature.getInstance(algorithm); 232 throw new IllegalStateException("no signature algorithm specified"); 264 throw new IllegalStateException("no signature algorithm specified"); 321 * see if we can find an algorithm (or its alias and what it represents) in 326 String algorithm, 330 algorithm = Strings.toUpperCase(algorithm) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
KeyFactorySpi.java | 30 String algorithm; field in class:KeyFactorySpi 34 String algorithm, 37 this.algorithm = algorithm; 130 return new BCECPrivateKey(algorithm, (ECPrivateKeySpec)keySpec, configuration); 134 return new BCECPrivateKey(algorithm, (java.security.spec.ECPrivateKeySpec)keySpec, configuration); 148 return new BCECPublicKey(algorithm, (ECPublicKeySpec)keySpec, configuration); 152 return new BCECPublicKey(algorithm, (java.security.spec.ECPublicKeySpec)keySpec, configuration); 170 return new BCECPrivateKey(algorithm, keyInfo, configuration); 174 throw new IOException("algorithm identifier " + algOid + " in key not recognised") [all...] |
/external/openssh/ |
dns.c | 81 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, 89 *algorithm = SSHFP_KEY_RSA; 94 *algorithm = SSHFP_KEY_DSA; 99 *algorithm = SSHFP_KEY_ECDSA; 104 *algorithm = SSHFP_KEY_ED25519; 109 *algorithm = SSHFP_KEY_RESERVED; /* 0 */ 124 if (*algorithm && *digest_type) { 143 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, 148 *algorithm = SSHFP_KEY_RESERVED; 152 *algorithm = rdata[0] [all...] |
/libcore/luni/src/test/java/libcore/java/security/ |
KeyPairGeneratorTest.java | 142 String algorithm = service.getAlgorithm(); local 145 if ("DH".equals(algorithm)) { 151 KeyPairGenerator kpg1 = KeyPairGenerator.getInstance(algorithm); 152 assertEquals(algorithm, kpg1.getAlgorithm()); 159 KeyPairGenerator kpg2 = KeyPairGenerator.getInstance(algorithm, provider); 160 assertEquals(algorithm, kpg2.getAlgorithm()); 168 KeyPairGenerator kpg3 = KeyPairGenerator.getInstance(algorithm, 170 assertEquals(algorithm, kpg3.getAlgorithm()); 177 throw new Exception("Problem testing KeyPairGenerator." + algorithm, e); 184 private static void putKeySize(String algorithm, int keySize) 231 String algorithm = kpg.getAlgorithm(); local [all...] |
/external/vboot_reference/firmware/lib/ |
vboot_common.c | 107 key->algorithm = kNumAlgorithms; /* Key not present yet */ 117 dest->algorithm = src->algorithm; 128 if (kNumAlgorithms <= key->algorithm) { 129 VBDEBUG(("Invalid algorithm.\n")); 132 if (!RSAProcessedKeySize(key->algorithm, &key_size) || 134 VBDEBUG(("Wrong key size for algorithm\n")); 142 rsa->algorithm = (unsigned int)key->algorithm; 149 VBDEBUG((" - sig_size=%d, expecting %d for algorithm %d\n" [all...] |
/external/boringssl/src/crypto/digest_extra/ |
digest_extra.c | 165 CBS algorithm, oid; local 166 if (!CBS_get_asn1(cbs, &algorithm, CBS_ASN1_SEQUENCE) || 167 !CBS_get_asn1(&algorithm, &oid, CBS_ASN1_OBJECT)) { 182 if (CBS_len(&algorithm) > 0) { 184 if (!CBS_get_asn1(&algorithm, ¶m, CBS_ASN1_NULL) || 186 CBS_len(&algorithm) != 0) {
|