Searched defs:digests (Results 1 - 4 of 4) sorted by relevance

/frameworks/base/keystore/java/android/security/keystore/
H A DKeyInfo.java98 @KeyProperties.DigestEnum String[] digests,
115 mDigests = ArrayUtils.cloneIfNotEmpty(ArrayUtils.nullToEmpty(digests));
88 KeyInfo(String keystoreKeyAlias, boolean insideSecureHardware, @KeyProperties.OriginEnum int origin, int keySize, Date keyValidityStart, Date keyValidityForOriginationEnd, Date keyValidityForConsumptionEnd, @KeyProperties.PurposeEnum int purposes, @KeyProperties.EncryptionPaddingEnum String[] encryptionPaddings, @KeyProperties.SignaturePaddingEnum String[] signaturePaddings, @KeyProperties.DigestEnum String[] digests, @KeyProperties.BlockModeEnum String[] blockModes, boolean userAuthenticationRequired, int userAuthenticationValidityDurationSeconds, boolean userAuthenticationRequirementEnforcedBySecureHardware) argument
H A DKeyProtection.java114 * digests. The use of public key is unrestricted, thus permitting signature verification using any
115 * digests. Both the private and the public key must export their key material via
145 * verification using any padding schemes and digests, and without user authentication. Both the
180 * using any padding schemes and digests. Both the private and the public key must export their key
225 @KeyProperties.DigestEnum String[] digests,
238 mDigests = ArrayUtils.cloneIfNotEmpty(digests);
537 public Builder setDigests(@KeyProperties.DigestEnum String... digests) { argument
538 mDigests = ArrayUtils.cloneIfNotEmpty(digests);
218 KeyProtection( Date keyValidityStart, Date keyValidityForOriginationEnd, Date keyValidityForConsumptionEnd, @KeyProperties.PurposeEnum int purposes, @KeyProperties.EncryptionPaddingEnum String[] encryptionPaddings, @KeyProperties.SignaturePaddingEnum String[] signaturePaddings, @KeyProperties.DigestEnum String[] digests, @KeyProperties.BlockModeEnum String[] blockModes, boolean randomizedEncryptionRequired, boolean userAuthenticationRequired, int userAuthenticationValidityDurationSeconds) argument
H A DKeyProperties.java618 public static @DigestEnum String[] allFromKeymaster(@NonNull Collection<Integer> digests) { argument
619 if (digests.isEmpty()) {
622 String[] result = new String[digests.size()];
624 for (int digest : digests) {
632 public static int[] allToKeymaster(@Nullable @DigestEnum String[] digests) { argument
633 if ((digests == null) || (digests.length == 0)) {
636 int[] result = new int[digests.length];
638 for (@DigestEnum String digest : digests) {
H A DKeyGenParameterSpec.java98 * permitting signature verification using any padding schemes and digests, and without user
131 * scheme with SHA-256 or SHA-512 digests. The use of public key is unrestricted, thus permitting
132 * signature verification using any padding schemes and digests.
158 * OAEP encryption padding scheme with SHA-256 or SHA-512 digests. The use of public key is
159 * unrestricted, thus permitting encryption using any padding schemes and digests.
267 @KeyProperties.DigestEnum String[] digests,
306 mDigests = ArrayUtils.cloneIfNotEmpty(digests);
727 * Sets the set of digests algorithms (e.g., {@code SHA-256}, {@code SHA-384}) with which
745 public Builder setDigests(@KeyProperties.DigestEnum String... digests) { argument
746 mDigests = ArrayUtils.cloneIfNotEmpty(digests);
255 KeyGenParameterSpec( String keyStoreAlias, int keySize, AlgorithmParameterSpec spec, X500Principal certificateSubject, BigInteger certificateSerialNumber, Date certificateNotBefore, Date certificateNotAfter, Date keyValidityStart, Date keyValidityForOriginationEnd, Date keyValidityForConsumptionEnd, @KeyProperties.PurposeEnum int purposes, @KeyProperties.DigestEnum String[] digests, @KeyProperties.EncryptionPaddingEnum String[] encryptionPaddings, @KeyProperties.SignaturePaddingEnum String[] signaturePaddings, @KeyProperties.BlockModeEnum String[] blockModes, boolean randomizedEncryptionRequired, boolean userAuthenticationRequired, int userAuthenticationValidityDurationSeconds) argument
[all...]

Completed in 121 milliseconds