| /system/security/keystore/ |
| auth_token_table.cpp | 24 #include <algorithm> 97 inline bool is_secret_key_operation(Algorithm algorithm, KeyPurpose purpose) { 98 if ((algorithm != Algorithm::RSA && algorithm != Algorithm::EC)) 106 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES); local 107 return is_secret_key_operation(algorithm, purpose) & 112 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES); local [all...] |
| /external/avb/libavb/ |
| avb_vbmeta_image.c | 40 const AvbAlgorithmData* algorithm; local 154 /* Ensure algorithm field is supported. */ 155 algorithm = avb_get_algorithm_data(h.algorithm_type); 156 if (!algorithm) { 157 avb_error("Invalid or unknown algorithm.\n"); 161 /* Bail if the embedded hash size doesn't match the chosen algorithm. */ 162 if (h.hash_size != algorithm->hash_len) { 199 avb_error("Unknown algorithm.\n"); 218 algorithm->padding, 219 algorithm->padding_len) [all...] |
| /external/boringssl/src/crypto/evp/ |
| p_ed25519_asn1.c | 80 CBB spki, algorithm, oid, key_bitstring; local 82 !CBB_add_asn1(&spki, &algorithm, CBS_ASN1_SEQUENCE) || 83 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 131 CBB pkcs8, algorithm, oid, private_key, inner; local 134 !CBB_add_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) || 135 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) ||
|
| /external/vboot_reference/futility/ |
| cmd_vbutil_firmware.c | 230 printf(" Data key algorithm: %" PRIu64 " %s\n", data_key->algorithm, 231 (data_key->algorithm < 233 algorithm] : "(invalid)")); 262 printf(" Kernel key algorithm: %" PRIu64 " %s\n", 263 kernel_subkey->algorithm, 264 (kernel_subkey->algorithm < kNumAlgorithms ? 265 algo_strings[kernel_subkey->algorithm] : "(invalid)"));
|
| cmd_show.c | 49 printf("%sAlgorithm: %" PRIu64 " %s\n", sp, pubkey->algorithm, 50 (pubkey->algorithm < kNumAlgorithms ? 51 algo_strings[pubkey->algorithm] : "(invalid)")); 82 printf(" Data key algorithm: %" PRIu64 " %s\n", data_key->algorithm, 83 (data_key->algorithm < kNumAlgorithms 84 ? algo_strings[data_key->algorithm] 113 key.algorithm = *(typeof(key.algorithm) *)state->my_area->buf; 116 alg_okay = key.algorithm < kNumAlgorithms [all...] |
| /frameworks/av/drm/mediadrm/plugins/clearkey/ |
| DrmPlugin.h | 161 const Vector<uint8_t>& sessionId, const String8& algorithm) { 162 if (sessionId.size() == 0 || algorithm.size() == 0) { 169 const Vector<uint8_t>& sessionId, const String8& algorithm) { 170 if (sessionId.size() == 0 || algorithm.size() == 0) { 232 const String8& algorithm, 236 if (sessionId.size() == 0 || algorithm.size() == 0 ||
|
| /external/boringssl/src/crypto/pkcs8/ |
| pkcs8.c | 337 CBB algorithm, oid, param, salt_cbb; local 338 if (!CBB_add_asn1(out, &algorithm, CBS_ASN1_SEQUENCE) || 339 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 341 !CBB_add_asn1(&algorithm, ¶m, CBS_ASN1_SEQUENCE) || 353 int pkcs8_pbe_decrypt(uint8_t **out, size_t *out_len, CBS *algorithm, 362 if (!CBS_get_asn1(algorithm, &obj, CBS_ASN1_OBJECT)) { 379 if (!suite->decrypt_init(suite, &ctx, pass, pass_len, algorithm)) { 415 CBS epki, algorithm, ciphertext; local 417 !CBS_get_asn1(&epki, &algorithm, CBS_ASN1_SEQUENCE) || 426 if (!pkcs8_pbe_decrypt(&out, &out_len, &algorithm, pass, pass_len [all...] |
| /external/webrtc/webrtc/base/ |
| sslidentity_unittest.cc | 115 const std::string& algorithm, 122 rv = identity->certificate().ComputeDigest(algorithm, digest, 129 rv = identity->certificate().ComputeDigest(algorithm, digest1, 137 void TestDigestForGeneratedCert(const std::string& algorithm, 143 TestDigestHelper(digest[0], identity_rsa1_.get(), algorithm, expected_len); 144 TestDigestHelper(digest[1], identity_rsa2_.get(), algorithm, expected_len); 145 TestDigestHelper(digest[2], identity_ecdsa1_.get(), algorithm, 147 TestDigestHelper(digest[3], identity_ecdsa2_.get(), algorithm, 160 void TestDigestForFixedCert(const std::string& algorithm, 169 rv = test_cert_->ComputeDigest(algorithm, digest, sizeof(digest) [all...] |
| /frameworks/base/keystore/java/android/security/keystore/ |
| KeyProperties.java | 172 @NonNull @KeyAlgorithmEnum String algorithm) { 173 if (KEY_ALGORITHM_EC.equalsIgnoreCase(algorithm)) { 175 } else if (KEY_ALGORITHM_RSA.equalsIgnoreCase(algorithm)) { 178 throw new IllegalArgumentException("Unsupported key algorithm: " + algorithm); 192 "Unsupported key algorithm: " + keymasterAlgorithm); 197 @NonNull @KeyAlgorithmEnum String algorithm) { 198 if (KEY_ALGORITHM_AES.equalsIgnoreCase(algorithm)) { 200 } else if (algorithm.toUpperCase(Locale.US).startsWith("HMAC")) { 204 "Unsupported secret key algorithm: " + algorithm) [all...] |
| /libcore/ojluni/src/main/java/java/security/ |
| Security.java | 208 * Gets a specified property for an algorithm. The algorithm name 211 * Java Cryptography Architecture Standard Algorithm Name Documentation</a> 212 * for information about standard algorithm names. 214 * One possible use is by specialized algorithm parsers, which may map 218 * @param algName the algorithm name. 226 * Provider in order to determine how to parse algorithm-specific 227 * parameters. Use the new provider-based and algorithm-independent 412 * algorithm or type. For example, a digital signature service is 413 * always associated with a particular algorithm (e.g., DSA) [all...] |
| /external/conscrypt/libcore-stub/src/main/java/libcore/java/security/ |
| StandardNames.java | 61 * Java ™ Cryptography Architecture Standard Algorithm Name Documentation 95 * A map from algorithm type (e.g. Cipher) to a set of algorithms (e.g. AES, DES, ...) 109 private static void provide(String type, String algorithm) { 115 assertTrue("Duplicate " + type + " " + algorithm, 116 algorithms.add(algorithm.toUpperCase(Locale.ROOT))); 118 private static void unprovide(String type, String algorithm) { 121 assertTrue(algorithm, algorithms.remove(algorithm.toUpperCase(Locale.ROOT))); 126 private static void provideCipherModes(String algorithm, String newModes[]) { 127 HashSet<String> modes = CIPHER_MODES.get(algorithm); [all...] |
| /external/python/cpython2/Lib/test/ |
| test_hashlib.py | 56 for algorithm in self.supported_hash_names: 57 algorithms.add(algorithm.lower()) 59 for algorithm in algorithms: 60 self.constructors_to_test[algorithm] = set() 62 # For each algorithm, test the direct constructor and the use 63 # of hashlib.new given the algorithm name. 64 for algorithm, constructors in self.constructors_to_test.items(): 65 constructors.add(getattr(hashlib, algorithm)) 66 def _test_algorithm_via_hashlib_new(data=None, _alg=algorithm): 78 for algorithm, constructors in self.constructors_to_test.items() [all...] |
| /prebuilts/gdb/darwin-x86/lib/python2.7/test/ |
| test_hashlib.py | 54 for algorithm in self.supported_hash_names: 55 algorithms.add(algorithm.lower()) 57 for algorithm in algorithms: 58 self.constructors_to_test[algorithm] = set() 60 # For each algorithm, test the direct constructor and the use 61 # of hashlib.new given the algorithm name. 62 for algorithm, constructors in self.constructors_to_test.items(): 63 constructors.add(getattr(hashlib, algorithm)) 64 def _test_algorithm_via_hashlib_new(data=None, _alg=algorithm): 76 for algorithm, constructors in self.constructors_to_test.items() [all...] |
| /prebuilts/gdb/linux-x86/lib/python2.7/test/ |
| test_hashlib.py | 54 for algorithm in self.supported_hash_names: 55 algorithms.add(algorithm.lower()) 57 for algorithm in algorithms: 58 self.constructors_to_test[algorithm] = set() 60 # For each algorithm, test the direct constructor and the use 61 # of hashlib.new given the algorithm name. 62 for algorithm, constructors in self.constructors_to_test.items(): 63 constructors.add(getattr(hashlib, algorithm)) 64 def _test_algorithm_via_hashlib_new(data=None, _alg=algorithm): 76 for algorithm, constructors in self.constructors_to_test.items() [all...] |
| /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
| test_hashlib.py | 54 for algorithm in self.supported_hash_names: 55 algorithms.add(algorithm.lower()) 57 for algorithm in algorithms: 58 self.constructors_to_test[algorithm] = set() 60 # For each algorithm, test the direct constructor and the use 61 # of hashlib.new given the algorithm name. 62 for algorithm, constructors in self.constructors_to_test.items(): 63 constructors.add(getattr(hashlib, algorithm)) 64 def _test_algorithm_via_hashlib_new(data=None, _alg=algorithm): 76 for algorithm, constructors in self.constructors_to_test.items() [all...] |
| /prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
| test_hashlib.py | 54 for algorithm in self.supported_hash_names: 55 algorithms.add(algorithm.lower()) 57 for algorithm in algorithms: 58 self.constructors_to_test[algorithm] = set() 60 # For each algorithm, test the direct constructor and the use 61 # of hashlib.new given the algorithm name. 62 for algorithm, constructors in self.constructors_to_test.items(): 63 constructors.add(getattr(hashlib, algorithm)) 64 def _test_algorithm_via_hashlib_new(data=None, _alg=algorithm): 76 for algorithm, constructors in self.constructors_to_test.items() [all...] |
| /frameworks/base/core/java/android/security/net/config/ |
| NetworkSecurityTrustManager.java | 131 for (String algorithm : pinAlgorithms) { 132 MessageDigest md = digestMap.get(algorithm); 135 md = MessageDigest.getInstance(algorithm); 139 digestMap.put(algorithm, md); 141 if (pinSet.pins.contains(new Pin(algorithm, md.digest(encodedSPKI)))) {
|
| /device/linaro/bootloader/edk2/SecurityPkg/Library/Tpm2CommandLib/ |
| Tpm2Session.c | 52 @param[in] Symmetric The algorithm and key size for parameter encryption.
53 @param[in] AuthHash Hash algorithm to use for the session.
104 WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16 (Symmetric->algorithm));
106 switch (Symmetric->algorithm) {
133 DEBUG ((EFI_D_ERROR, "Tpm2StartAuthSession - Symmetric->algorithm - %x\n", Symmetric->algorithm));
|
| /external/avb/test/ |
| avb_unittest_util.h | 72 const std::string& algorithm, 77 if (algorithm == "") { 78 signing_options = " --algorithm NONE "; 80 signing_options = std::string(" --algorithm ") + algorithm + " --key " +
|
| /external/nist-sip/java/gov/nist/core/net/ |
| SslNetworkLayer.java | 72 String algorithm = KeyManagerFactory.getDefaultAlgorithm();
local 73 TrustManagerFactory tmFactory = TrustManagerFactory.getInstance(algorithm);
74 KeyManagerFactory kmFactory = KeyManagerFactory.getInstance(algorithm);
|
| /external/vboot_reference/tests/ |
| run_vbutil_tests.sh | 25 --algorithm $algonum 67 echo -e "For ${COL_YELLOW}signing algorithm \ 69 and ${COL_YELLOW}data key algorithm RSA-${datakeylen}/\ 81 --algorithm $signing_algonum 92 --algorithm $signing_algonum 176 # Test for various combinations of firmware signing algorithm and 177 # kernel signing algorithm
|
| vb20_rsa_padding_tests.c | 36 k2->sig_alg = vb2_crypto_to_signature(key->algorithm); 37 k2->hash_alg = vb2_crypto_to_hash(key->algorithm); 141 // TODO: why is test key algorithm wrong? 142 key->algorithm = 0;
|
| /external/wycheproof/java/com/google/security/wycheproof/testcases/ |
| DhiesTest.java | 43 // - BouncyCastle knows an algorithm IES. Is this the same as DHIES? 46 // through the JCA interface. BC does not register and algorithm such as 91 // The algorithm isn't supported - even better! 119 // The algorithm isn't supported - even better! 138 * Tries to detect if an algorithm is using ECB. Unfortunately, many JCE algorithms use ECB if no 142 public void testNotEcb(String algorithm) throws Exception { 145 dhies = Cipher.getInstance(algorithm); 147 // This test is called with short algorithm names such as just "DHIES". 150 System.out.println("No implementation for:" + algorithm);
|
| /frameworks/av/media/libmedia/include/media/ |
| IDrm.h | 90 String8 const &algorithm) = 0; 93 String8 const &algorithm) = 0; 119 String8 const &algorithm,
|
| /libcore/ojluni/src/main/java/sun/security/util/ |
| SignatureFileVerifier.java | 226 private MessageDigest getDigest(String algorithm) throws SignatureException { 227 // check that algorithm is not restricted 228 if (!JAR_DISABLED_CHECK.permits(DIGEST_PRIMITIVE_SET, algorithm, null)) { 231 "Disabled algorithm used: " + algorithm); 238 MessageDigest digest = createdDigests.get(algorithm); 242 digest = MessageDigest.getInstance(algorithm); 243 createdDigests.put(algorithm, digest); 366 String algorithm = key.substring(0, key.length()-16); local 370 MessageDigest digest = getDigest(algorithm); 409 String algorithm = local 485 String algorithm = key.substring(0, key.length()-7); local [all...] |