/system/keymaster/include/keymaster/ |
attestation_record.h | 57 ASN1_INTEGER* algorithm; member in struct:keymaster::km_auth_list 96 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.masked_tag()),
|
android_keymaster_messages.h | 146 return append_uint32_to_buf(buf, end, algorithm); 149 return copy_uint32_from_buf(buf_ptr, end, &algorithm); 152 keymaster_algorithm_t algorithm; member in struct:keymaster::SupportedByAlgorithmRequest 171 buf = append_uint32_to_buf(buf, end, algorithm); 175 return copy_uint32_from_buf(buf_ptr, end, &algorithm) && 179 keymaster_algorithm_t algorithm; member in struct:keymaster::SupportedByAlgorithmAndPurposeRequest [all...] |
/external/conscrypt/common/src/main/java/org/conscrypt/ |
SSLParametersImpl.java | 84 // Endpoint identification algorithm (e.g., HTTPS) 455 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local 456 KeyManagerFactory kmf = KeyManagerFactory.getInstance(algorithm); 523 String algorithm = TrustManagerFactory.getDefaultAlgorithm(); local 524 TrustManagerFactory tmf = TrustManagerFactory.getInstance(algorithm);
|
/external/libchrome/crypto/ |
signature_verifier_unittest.cc | 19 // is signed), signature, and algorithm come from the certificate of 147 // algorithm AlgorithmIdentifier, 151 // algorithm 1051 static const uint8_t algorithm[] = { local [all...] |
/external/tensorflow/tensorflow/core/kernels/ |
mkl_maxpooling_op.cc | 26 #include <algorithm> 28 using mkldnn::algorithm; 164 dnnAlgorithm_t algorithm = dnnAlgorithmPoolingMax; local 169 &prim_pooling_fwd, primAttr, algorithm, lt_user_input, 342 dnnAlgorithm_t algorithm = dnnAlgorithmPoolingMax; local 347 &prim_pooling_fwd, primAttr, algorithm, lt_input_user, 354 &prim_pooling_bwd, primAttr, algorithm, lt_input_user, 552 prop_kind::forward, algorithm::pooling_max, 665 prop_kind::forward, algorithm::pooling_max, original_input_md, 678 algorithm::pooling_max, output_dnn_data.GetUsrMemDesc() [all...] |
/hardware/interfaces/drm/1.0/vts/functional/ |
drm_hal_clearkey_test.cpp | 720 hidl_string algorithm = "AES/CBC/NoPadding"; local 721 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 727 * Setting an empty algorithm should return BAD_VALUE 731 hidl_string algorithm; local 732 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 738 * Setting a cipher algorithm with no session returns BAD_VALUE 742 hidl_string algorithm = "AES/CBC/NoPadding"; local 743 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 752 hidl_string algorithm = "HmacSHA256"; local 753 Status status = drmPlugin->setMacAlgorithm(session, algorithm); 763 hidl_string algorithm; local 774 hidl_string algorithm = "HmacSHA256"; local 849 hidl_string algorithm = "RSASSA-PSS-SHA1"; local [all...] |
drm_hal_vendor_test.cpp | 845 * Test that setting an invalid cipher algorithm returns 851 hidl_string algorithm; local 852 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 858 * Test that setting a cipher algorithm with no session returns 864 hidl_string algorithm = "AES/CBC/NoPadding"; local 865 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 870 * Test that setting a valid cipher algorithm returns 872 * vendor modules support this algorithm, but they must 879 hidl_string algorithm = "AES/CBC/NoPadding"; local 880 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); 893 hidl_string algorithm; local 906 hidl_string algorithm = "HmacSHA256"; local 920 hidl_string algorithm = "HmacSHA256"; local 988 hidl_string algorithm; local [all...] |
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
SSLServerSocketTest.java | 400 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local 401 KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(algorithm);
|
HandshakeCompletedEventTest.java | 545 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local 546 KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(algorithm);
|
SSLSocketTest.java | 597 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local 598 KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(algorithm);
|
/libcore/luni/src/test/java/libcore/java/security/ |
KeyPairGeneratorTest.java | 154 String algorithm = service.getAlgorithm(); local 157 if ("DH".equals(algorithm)) { 163 KeyPairGenerator kpg1 = KeyPairGenerator.getInstance(algorithm); 164 assertEquals(algorithm, kpg1.getAlgorithm()); 171 KeyPairGenerator kpg2 = KeyPairGenerator.getInstance(algorithm, provider); 172 assertEquals(algorithm, kpg2.getAlgorithm()); 180 KeyPairGenerator kpg3 = KeyPairGenerator.getInstance(algorithm, 182 assertEquals(algorithm, kpg3.getAlgorithm()); 189 throw new Exception("Problem testing KeyPairGenerator." + algorithm, e); 196 private static void putKeySize(String algorithm, int keySize) 243 String algorithm = kpg.getAlgorithm(); local [all...] |
/libcore/ojluni/src/main/java/java/security/ |
Signature.java | 50 * of a digital signature algorithm. Digital signatures are used for 53 * <p> The signature algorithm can be, among others, the NIST standard 54 * DSA, using DSA and SHA-1. The DSA algorithm using the 55 * SHA-1 message digest algorithm can be specified as {@code SHA1withDSA}. 57 * algorithm, so the signing algorithm could be specified as, for example, 59 * The algorithm name must be specified, as there is no default. 104 * <th>Algorithm</th> 243 * Java Cryptography Architecture Standard Algorithm Name Documentation. 264 * The algorithm for this signature object 268 private String algorithm; field in class:Signature [all...] |
/system/keymaster/contexts/ |
soft_keymaster_device.cpp | 26 #include <algorithm> 109 static keymaster_error_t add_digests(keymaster1_device_t* dev, keymaster_algorithm_t algorithm, 112 auto key = std::make_pair(algorithm, purpose); 117 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); 137 for (auto algorithm : sig_algorithms) 141 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); 149 for (auto algorithm : crypt_algorithms) 153 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); 442 keymaster_algorithm_t algorithm, 454 return km1_dev->get_supported_block_modes(km1_dev, algorithm, purpose, modes, modes_length) 1220 keymaster_algorithm_t algorithm = KM_ALGORITHM_AES; local [all...] |
/cts/libs/testserver/src/android/webkit/cts/ |
TestWebServer.java | 540 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local 541 KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(algorithm);
|
CtsTestServer.java | 909 String algorithm = KeyManagerFactory.getDefaultAlgorithm(); local [all...] |
/cts/tests/security/src/android/keystore/cts/ |
AuthorizationList.java | 47 // Algorithm values. 165 private Integer algorithm; field in class:AuthorizationList 216 algorithm = Asn1Utils.getIntegerFromAsn1(value); 312 public static String algorithmToString(int algorithm) { 313 switch (algorithm) { 401 return algorithm; 580 if (algorithm != null) { 581 s.append("\nAlgorithm: ").append(algorithmToString(algorithm));
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/bc/ |
BcKeyStoreSpi.java | 421 String algorithm = dIn.readUTF(); local 437 return new SecretKeySpec(enc, algorithm); 449 return helper.createKeyFactory(algorithm).generatePrivate(spec); 451 return helper.createKeyFactory(algorithm).generatePublic(spec); 453 return helper.createSecretKeyFactory(algorithm).generateSecret(spec); 465 String algorithm, 475 SecretKeyFactory keyFact = helper.createSecretKeyFactory(algorithm); 478 Cipher cipher = helper.createCipher(algorithm);
|
/external/syslinux/gpxe/src/include/gpxe/ |
net80211.h | 128 /** An 802.11 data encryption algorithm */ 552 * into a suitable input to the encryption algorithm, and for WPA and 685 * copy of the static definition plus whatever space the algorithm has 691 /** The cryptographic algorithm implemented */ 692 enum net80211_crypto_alg algorithm; member in struct:net80211_crypto 765 /** Private data for the algorithm to store key and state info */ [all...] |
/frameworks/av/drm/libmediadrm/ |
IDrm.cpp | 526 String8 const &algorithm) { 531 data.writeString8(algorithm); 540 String8 const &algorithm) { 545 data.writeString8(algorithm); 639 String8 const &algorithm, 647 data.writeString8(algorithm); 1047 String8 algorithm = data.readString8(); local 1057 String8 algorithm = data.readString8(); local 1123 String8 algorithm = data.readString8(); local [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreSpi.java | 332 throw new KeyStoreException("Unsupported key algorithm: " + keyAlgorithm); 640 // JCA HMAC key algorithm implies a digest (e.g., HmacSHA256 key algorithm 644 // only implied by key algorithm. 649 "HMAC key algorithm digest unknown for key algorithm " 655 // exactly one digest, the one implied by key algorithm. 664 + " supported for HMAC key algorithm " + key.getAlgorithm()); 668 // Key algorithm does not imply a digest. 759 String algorithm = parts[0]; local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 188 final String algorithm = "DESede/CBC/PKCS5Padding"; local 190 Cipher cipher = Cipher.getInstance(algorithm); 191 assertTrue("Cipher algorithm does not match", cipher.getAlgorithm() 192 .equals(algorithm)); 199 final String algorithm = "DESede/CBC/PKCS5Padding"; local 201 Cipher cipher = Cipher.getInstance(algorithm); [all...] |
/prebuilts/tools/common/m2/repository/org/eclipse/aether/aether-spi/1.0.2.v20150114/ |
aether-spi-1.0.2.v20150114.jar | |
/prebuilts/tools/common/m2/repository/com/sun/xml/fastinfoset/FastInfoset/1.2.13/ |
FastInfoset-1.2.13.jar | |
/prebuilts/jdk/jdk8/darwin-x86/jre/lib/ext/ |
sunpkcs11.jar | |
/prebuilts/jdk/jdk8/linux-x86/jre/lib/ext/ |
sunpkcs11.jar | |