/libcore/ojluni/src/main/java/java/security/ |
SecureRandom.java | 62 * number generator (PRNG), which means they use a deterministic algorithm 88 * The SHA1PRNG algorithm from the Crypto provider has been deprecated as it was insecure, and also 128 * The algorithm name of null if unknown. 133 private String algorithm; field in class:SecureRandom 140 * default random number algorithm. 146 * Provider that supports a SecureRandom (RNG) algorithm is returned. 147 * If none of the Providers support a RNG algorithm, 155 * Java Cryptography Architecture Standard Algorithm Name Documentation</a> 156 * for information about standard RNG algorithm names. 177 * default random number algorithm [all...] |
MessageDigest.java | 40 * message digest algorithm, such as SHA-1 or SHA-256. 88 * <th>Algorithm</th> 123 * Java Cryptography Architecture Standard Algorithm Name Documentation. 141 private String algorithm; field in class:MessageDigest 152 * Creates a message digest with the specified algorithm name. 154 * @param algorithm the standard name of the digest algorithm. 157 * Java Cryptography Architecture Standard Algorithm Name Documentation</a> 158 * for information about standard algorithm names. 160 protected MessageDigest(String algorithm) { [all...] |
KeyFactory.java | 74 * <th>Algorithm</th> 105 * Java Cryptography Architecture Standard Algorithm Name Documentation. 124 // The algorithm associated with this key factory 125 private final String algorithm; field in class:KeyFactory 145 * @param algorithm the name of the algorithm 149 String algorithm) { 152 this.algorithm = algorithm; 155 private KeyFactory(String algorithm) throws NoSuchAlgorithmException [all...] |
/libcore/ojluni/src/main/java/javax/crypto/ |
Mac.java | 42 * (MAC) algorithm. 60 * <th>Algorithm</th> 147 * Java Cryptography Architecture Standard Algorithm Name Documentation. 173 // The name of the MAC algorithm. 174 private final String algorithm; field in class:Mac 180 // When only the algorithm is specified, we want to allow the Mac provider for that 181 // algorithm to change if multiple providers exist and they support different subsets of 203 * @param algorithm the algorithm 205 protected Mac(MacSpi macSpi, Provider provider, String algorithm) { [all...] |
KeyGenerator.java | 47 * <p>There are two ways to generate a key: in an algorithm-independent 48 * manner, and in an algorithm-specific manner. 52 * <li><b>Algorithm-Independent Initialization</b> 66 * algorithm-independent <code>init</code> methods, it is up to the 67 * provider what to do about the algorithm-specific parameters (if any) to be 70 * <li><b>Algorithm-Specific Initialization</b> 71 * <p>For situations where a set of algorithm-specific parameters already 90 * <th>Algorithm</th> 157 * Java Cryptography Architecture Standard Algorithm Name Documentation. 188 // The algorithm 189 private final String algorithm; field in class:KeyGenerator [all...] |
/libcore/ojluni/src/main/java/sun/security/util/ |
AbstractAlgorithmConstraints.java | 35 * The class contains common functionality for algorithm constraints classes. 46 // Get algorithm constraints from the specified security property. 77 static boolean checkAlgorithm(String[] algorithms, String algorithm, 79 if (algorithm == null || algorithm.length() == 0) { 80 throw new IllegalArgumentException("No algorithm name specified"); 90 if (item.equalsIgnoreCase(algorithm)) { 94 // decompose the algorithm into sub-elements 96 elements = decomposer.decompose(algorithm); 99 // check the items of the algorithm [all...] |
/external/vboot_reference/host/lib/ |
host_key.c | 23 VbPrivateKey* PrivateKeyReadPem(const char* filename, uint64_t algorithm) { 29 if (algorithm >= kNumAlgorithms) { 30 VBDEBUG(("%s() called with invalid algorithm!\n", __FUNCTION__)); 48 /* Store key and algorithm in our struct */ 55 key->algorithm = algorithm; 90 if (1 != fwrite(&key->algorithm, sizeof(key->algorithm), 1, f)) { 128 key->algorithm = *(typeof(key->algorithm) *)buffer [all...] |
/external/guava/guava-tests/benchmark/com/google/common/hash/ |
MessageDigestCreationBenchmark.java | 33 private String algorithm; field in class:MessageDigestCreationBenchmark 38 md = MessageDigest.getInstance(algorithm); 44 retValue ^= MessageDigest.getInstance(algorithm).getDigestLength();
|
/external/squashfs-tools/squashfs-tools/ |
lzo_wrapper.h | 39 (s)->algorithm = inswap_le32((s)->algorithm); \ 57 int algorithm; member in struct:lzo_comp_opts
|
lzo_wrapper.c | 43 /* default LZO compression algorithm and compression level */ 44 static int algorithm = SQUASHFS_LZO1X_999; variable 72 fprintf(stderr, "lzo: -Xalgorithm missing algorithm\n"); 73 fprintf(stderr, "lzo: -Xalgorithm <algorithm>\n"); 79 algorithm = i; 84 fprintf(stderr, "lzo: -Xalgorithm unrecognised algorithm\n"); 111 fprintf(stderr, "lzo: compression algorithm should be one of:\n"); 123 * In this case the LZO algorithm may not be known until after the 133 * LZO1X_999 algorithm 136 if(algorithm != SQUASHFS_LZO1X_999) [all...] |
/external/vboot_reference/futility/ |
cmd_vbutil_key.c | 34 {"algorithm", 1, 0, OPT_ALGORITHM}, 53 " --algorithm <number> " 54 "Signing algorithm to use with key:\n", progname); 70 static int Pack(const char *infile, const char *outfile, uint64_t algorithm, 81 pubkey = PublicKeyReadKeyb(infile, algorithm, version); 91 privkey = PrivateKeyReadPem(infile, algorithm); 119 printf("Algorithm: %" PRIu64 " %s\n", pubkey->algorithm, 120 (pubkey->algorithm < kNumAlgorithms ? 121 algo_strings[pubkey->algorithm] : "(invalid)")) 172 uint64_t algorithm = kNumAlgorithms; local [all...] |
/external/vboot_reference/tests/ |
vb2_firmware_tests.sh | 28 --key ${TESTKEY_DIR}/key_rsa8192.keyb --algorithm 11 30 --key ${TESTKEY_DIR}/key_rsa4096.keyb --algorithm 7 32 --key ${TESTKEY_DIR}/key_rsa2048.keyb --algorithm 4
|
/external/vboot_reference/utility/ |
verify_data.c | 52 int i, algorithm, sig_len; local 59 fprintf(stderr, "Usage: %s <algorithm> <key file> <signature file>" 61 fprintf(stderr, "where <algorithm> depends on the signature algorithm" 68 algorithm = atoi(argv[1]); 69 if (algorithm >= kNumAlgorithms) { 70 fprintf(stderr, "Invalid Algorithm!\n"); 74 sig_len = siglen_map[algorithm]; 77 (digest = DigestFile(argv[4], algorithm))) { 78 if (RSAVerify(key, signature, sig_len, algorithm, digest)) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
BaseAlgorithmParameterGeneratorSpi.java | 20 protected final AlgorithmParameters createParametersInstance(String algorithm) 23 return helper.createAlgorithmParameters(algorithm);
|
/external/libchrome/crypto/ |
symmetric_key_nss.cc | 20 SymmetricKey* SymmetricKey::GenerateRandomKey(Algorithm algorithm, 22 DCHECK_EQ(AES, algorithm); 45 SymmetricKey* SymmetricKey::DeriveKeyFromPassword(Algorithm algorithm, 54 if (algorithm == AES) { 75 algorithm == AES ? SEC_OID_AES_256_CBC : SEC_OID_HMAC_SHA1; 98 SymmetricKey* SymmetricKey::Import(Algorithm algorithm, 102 if (algorithm == AES) [all...] |
/frameworks/base/services/backup/java/com/android/server/backup/utils/ |
PasswordUtils.java | 45 * @param algorithm - key generation algorithm. 51 public static SecretKey buildPasswordKey(String algorithm, String pw, byte[] salt, int rounds) { 52 return buildCharArrayKey(algorithm, pw.toCharArray(), salt, rounds); 59 * @param algorithm - key generation algorithm. 65 public static String buildPasswordHash(String algorithm, String pw, byte[] salt, int rounds) { 66 SecretKey key = buildPasswordKey(algorithm, pw, salt, rounds); 105 * @param algorithm - key generation algorithm [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
SpiEngUtils.java | 41 * Verification: is algorithm supported or not 43 * @param algorithm 47 public static Provider isSupport(String algorithm, String service) { 50 .concat(algorithm));
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
MessageDigest2Test.java | 67 for (String algorithm : algorithms) { 68 MessageDigestStub md = new MessageDigestStub(algorithm); 69 assertEquals(algorithm, md.getAlgorithm()); 81 for (String algorithm : e.getValue()) { 82 MessageDigest d1 = MessageDigest.getInstance(algorithm, e.getKey().getName()); 91 assertTrue("cloned hash differs from original for algorithm " + algorithm, 243 for (String algorithm : e.getValue()) { 244 MessageDigest digest = MessageDigest.getInstance(algorithm, e.getKey().getName()); 256 for (String algorithm : e.getValue()) 445 String algorithm = (String) key; local [all...] |
/external/conscrypt/common/src/main/java/org/conscrypt/ |
CryptoUpcalls.java | 48 private static ArrayList<Provider> getExternalProviders(String algorithm) { 50 for (Provider p : Security.getProviders(algorithm)) { 56 System.err.println("Could not find external provider for algorithm: " + algorithm); 62 // Get the raw signature algorithm for this key type. 63 String algorithm; local 64 // Hint: Algorithm names come from: 72 algorithm = "NONEwithRSA"; 74 algorithm = "NONEwithECDSA"; 85 signature = Signature.getInstance(algorithm); [all...] |
/external/conscrypt/openjdk-integ-tests/src/test/java/libcore/javax/net/ssl/ |
TrustManagerFactoryTest.java | 66 private static boolean supportsManagerFactoryParameters(String algorithm) { 67 return (StandardNames.IS_RI && algorithm.equals("PKIX")); 72 String algorithm = TrustManagerFactory.getDefaultAlgorithm(); local 73 assertEquals(StandardNames.TRUST_MANAGER_FACTORY_DEFAULT, algorithm); 74 TrustManagerFactory tmf = TrustManagerFactory.getInstance(algorithm); 201 String algorithm = service.getAlgorithm(); local 203 TrustManagerFactory tmf = TrustManagerFactory.getInstance(algorithm); 204 assertEquals(algorithm, tmf.getAlgorithm()); 209 TrustManagerFactory tmf = TrustManagerFactory.getInstance(algorithm, provider); 210 assertEquals(algorithm, tmf.getAlgorithm()) 247 String algorithm = service.getAlgorithm(); local 271 String algorithm = TrustManagerFactory.getDefaultAlgorithm(); local 305 String algorithm = "RSA"; local [all...] |
/libcore/luni/src/test/java/libcore/javax/net/ssl/ |
TrustManagerFactoryTest.java | 57 private static boolean supportsManagerFactoryParameters(String algorithm) { 58 return (StandardNames.IS_RI && algorithm.equals("PKIX")); 62 String algorithm = TrustManagerFactory.getDefaultAlgorithm(); local 63 assertEquals(StandardNames.TRUST_MANAGER_FACTORY_DEFAULT, algorithm); 64 TrustManagerFactory tmf = TrustManagerFactory.getInstance(algorithm); 185 String algorithm = service.getAlgorithm(); local 187 TrustManagerFactory tmf = TrustManagerFactory.getInstance(algorithm); 188 assertEquals(algorithm, tmf.getAlgorithm()); 193 TrustManagerFactory tmf = TrustManagerFactory.getInstance(algorithm, 195 assertEquals(algorithm, tmf.getAlgorithm()) 231 String algorithm = service.getAlgorithm(); local 254 String algorithm = TrustManagerFactory.getDefaultAlgorithm(); local 284 String algorithm = "RSA"; local [all...] |
/external/deqp/framework/delibs/decpp/ |
deMemPool.cpp | 26 #include <algorithm>
|
/external/libcxx/test/std/algorithms/alg.modifying.operations/alg.generate/ |
generate.pass.cpp | 10 // <algorithm> 18 #include <algorithm>
|
/external/libcxx/test/std/algorithms/alg.modifying.operations/alg.random.sample/ |
sample.fail.cpp | 12 // <algorithm> 20 #include <algorithm> 37 // expected-error@algorithm:* {{static_assert failed "SampleIterator must meet the requirements of RandomAccessIterator"}} 38 // expected-error@algorithm:* 2 {{does not provide a subscript operator}} 39 // expected-error@algorithm:* {{invalid operands}}
|
/external/libcxx/test/std/algorithms/alg.nonmodifying/alg.count/ |
count.pass.cpp | 10 // <algorithm> 17 #include <algorithm>
|