/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStorePrivateKey.java | 28 public AndroidKeyStorePrivateKey(String alias, int uid, String algorithm) { argument 29 super(alias, uid, algorithm);
|
H A D | AndroidKeyStoreSecretKey.java | 28 public AndroidKeyStoreSecretKey(String alias, int uid, String algorithm) { argument 29 super(alias, uid, algorithm);
|
H A D | AndroidKeyStorePublicKey.java | 31 public AndroidKeyStorePublicKey(String alias, int uid, String algorithm, byte[] x509EncodedForm) { argument 32 super(alias, uid, algorithm);
|
H A D | AndroidKeyStoreBCWorkaroundProvider.java | 230 private void putMacImpl(String algorithm, String implClass) { argument 231 put("Mac." + algorithm, implClass); 232 put("Mac." + algorithm + " SupportedKeyClasses", KEYSTORE_SECRET_KEY_CLASS_NAME); 246 private void putSignatureImpl(String algorithm, String implClass) { argument 247 put("Signature." + algorithm, implClass); 248 put("Signature." + algorithm + " SupportedKeyClasses",
|
H A D | AndroidKeyStoreKey.java | 31 public AndroidKeyStoreKey(String alias, int uid, String algorithm) { argument 34 mAlgorithm = algorithm;
|
H A D | AndroidKeyStoreProvider.java | 126 private void putSecretKeyFactoryImpl(String algorithm) { argument 127 put("SecretKeyFactory." + algorithm, PACKAGE_NAME + ".AndroidKeyStoreSecretKeyFactorySpi"); 130 private void putKeyFactoryImpl(String algorithm) { argument 131 put("KeyFactory." + algorithm, PACKAGE_NAME + ".AndroidKeyStoreKeyFactorySpi"); 193 throw new ProviderException("Unsupported Android Keystore public key algorithm: " 209 throw new ProviderException("Unsupported Android Keystore public key algorithm: " 237 throw new UnrecoverableKeyException("Key algorithm unknown"); 288 throw new UnrecoverableKeyException("Key algorithm unknown"); 297 // JCA key algorithm name.
|
H A D | KeyProperties.java | 172 @NonNull @KeyAlgorithmEnum String algorithm) { 173 if (KEY_ALGORITHM_EC.equalsIgnoreCase(algorithm)) { 175 } else if (KEY_ALGORITHM_RSA.equalsIgnoreCase(algorithm)) { 178 throw new IllegalArgumentException("Unsupported key algorithm: " + algorithm); 192 "Unsupported key algorithm: " + keymasterAlgorithm); 197 @NonNull @KeyAlgorithmEnum String algorithm) { 198 if (KEY_ALGORITHM_AES.equalsIgnoreCase(algorithm)) { 200 } else if (algorithm.toUpperCase(Locale.US).startsWith("HMAC")) { 204 "Unsupported secret key algorithm 171 toKeymasterAsymmetricKeyAlgorithm( @onNull @eyAlgorithmEnum String algorithm) argument 196 toKeymasterSecretKeyAlgorithm( @onNull @eyAlgorithmEnum String algorithm) argument 241 toKeymasterDigest(@onNull @eyAlgorithmEnum String algorithm) argument [all...] |
/frameworks/base/core/java/android/security/net/config/ |
H A D | Pin.java | 37 public static boolean isSupportedDigestAlgorithm(String algorithm) { argument 40 return "SHA-256".equalsIgnoreCase(algorithm); 46 public static int getDigestLength(String algorithm) { argument 47 if ("SHA-256".equalsIgnoreCase(algorithm)) { 50 throw new IllegalArgumentException("Unsupported digest algorithm: " + algorithm);
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | DefaultHttpClientTest.java | 125 private void authenticateDigestAlgorithm(String algorithm) throws Exception { argument 128 + "algorithm=" + algorithm;
|
/frameworks/base/core/java/android/webkit/ |
H A D | TokenBindingService.java | 50 * The algorithm that is used to generate the key pair. 82 * If no key pair exists, WebView chooses an algorithm from the list, in 85 * The user can pass a null if any algorithm is acceptable. 88 * @param algorithm The list of algorithms. Can be null. An 94 String[] algorithm, 93 getKey(Uri origin, String[] algorithm, ValueCallback<TokenBindingKey> callback) argument
|
/frameworks/base/media/lib/signer/java/com/android/mediadrm/signer/ |
H A D | MediaDrmSigner.java | 128 * @param algorithm the signing algorithm to use, e.g. "PKCS1-BlockType1" 134 String algorithm, byte[] wrappedKey, byte[] message) { 135 return drm.signRSA(sessionId, algorithm, wrappedKey, message); 133 signRSA(MediaDrm drm, byte[] sessionId, String algorithm, byte[] wrappedKey, byte[] message) argument
|
/frameworks/base/core/java/android/text/ |
H A D | TextDirectionHeuristics.java | 41 new TextDirectionHeuristicInternal(null /* no algorithm */, false); 47 new TextDirectionHeuristicInternal(null /* no algorithm */, true); 131 * Computes the text direction based on an algorithm. Subclasses implement 132 * {@link #defaultIsRtl} to handle cases where the algorithm cannot determine the 138 public TextDirectionHeuristicImpl(TextDirectionAlgorithm algorithm) { argument 139 mAlgorithm = algorithm; 178 private TextDirectionHeuristicInternal(TextDirectionAlgorithm algorithm, argument 180 super(algorithm); 191 * Interface for an algorithm to guess the direction of a paragraph of text. 195 * Returns whether the range of text is RTL according to the algorithm [all...] |
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
H A D | SSLSocketFactory.java | 183 String algorithm, 192 if (algorithm == null) { 193 algorithm = TLS; 203 this.sslcontext = SSLContext.getInstance(algorithm); 182 SSLSocketFactory( String algorithm, final KeyStore keystore, final String keystorePassword, final KeyStore truststore, final SecureRandom random, final HostNameResolver nameResolver) argument
|
/frameworks/support/v4/java/android/support/v4/text/ |
H A D | TextDirectionHeuristicsCompat.java | 34 new TextDirectionHeuristicInternal(null /* no algorithm */, false); 40 new TextDirectionHeuristicInternal(null /* no algorithm */, true); 107 * Computes the text direction based on an algorithm. Subclasses implement 108 * {@link #defaultIsRtl} to handle cases where the algorithm cannot determine the 114 public TextDirectionHeuristicImpl(TextDirectionAlgorithm algorithm) { argument 115 mAlgorithm = algorithm; 154 private TextDirectionHeuristicInternal(TextDirectionAlgorithm algorithm, argument 156 super(algorithm); 167 * Interface for an algorithm to guess the direction of a paragraph of text. 171 * Returns whether the range of text is RTL according to the algorithm [all...] |
/frameworks/av/drm/mediadrm/plugins/clearkey/ |
H A D | DrmPlugin.h | 153 const Vector<uint8_t>& sessionId, const String8& algorithm) { 155 UNUSED(algorithm); 160 const Vector<uint8_t>& sessionId, const String8& algorithm) { 162 UNUSED(algorithm); 221 const String8& algorithm, 226 UNUSED(algorithm); 152 setCipherAlgorithm( const Vector<uint8_t>& sessionId, const String8& algorithm) argument 159 setMacAlgorithm( const Vector<uint8_t>& sessionId, const String8& algorithm) argument 219 signRSA( const Vector<uint8_t>& sessionId, const String8& algorithm, const Vector<uint8_t>& message, const Vector<uint8_t>& wrappedKey, Vector<uint8_t>& signature) argument
|
/frameworks/base/core/java/android/net/http/ |
H A D | SslCertificate.java | 267 private static String getDigest(X509Certificate x509Certificate, String algorithm) { argument 273 MessageDigest md = MessageDigest.getInstance(algorithm);
|
/frameworks/base/keystore/java/android/security/ |
H A D | KeyChain.java | 462 * specific {@code PrivateKey} type indicated by {@code algorithm} (e.g., 466 @NonNull @KeyProperties.KeyAlgorithmEnum String algorithm) { 467 final String algUpper = algorithm.toUpperCase(Locale.US); 474 * {@code PrivateKey} of the given {@code algorithm} to the device once 493 @NonNull @KeyProperties.KeyAlgorithmEnum String algorithm) { 494 if (!isKeyAlgorithmSupported(algorithm)) { 498 return KeyStore.getInstance().isHardwareBacked(algorithm); 465 isKeyAlgorithmSupported( @onNull @eyProperties.KeyAlgorithmEnum String algorithm) argument 492 isBoundKeyAlgorithm( @onNull @eyProperties.KeyAlgorithmEnum String algorithm) argument
|
/frameworks/av/drm/libmediadrm/ |
H A D | Drm.cpp | 633 String8 const &algorithm) { 646 return mPlugin->setCipherAlgorithm(sessionId, algorithm); 650 String8 const &algorithm) { 663 return mPlugin->setMacAlgorithm(sessionId, algorithm); 746 String8 const &algorithm, 766 return mPlugin->signRSA(sessionId, algorithm, message, wrappedKey, signature); 632 setCipherAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 649 setMacAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 745 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument
|
/frameworks/av/drm/mediadrm/plugins/mock/ |
H A D | MockDrmCryptoPlugin.cpp | 512 String8 const &algorithm) 516 ALOGD("MockDrmPlugin::setCipherAlgorithm(sessionId=%s, algorithm=%s)", 517 vectorToString(sessionId).string(), algorithm.string()); 525 if (algorithm == "AES/CBC/NoPadding") { 532 String8 const &algorithm) 536 ALOGD("MockDrmPlugin::setMacAlgorithm(sessionId=%s, algorithm=%s)", 537 vectorToString(sessionId).string(), algorithm.string()); 545 if (algorithm == "HmacSHA256") { 704 String8 const &algorithm, 710 ALOGD("MockDrmPlugin::signRSA(sessionId=%s, algorithm 511 setCipherAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 531 setMacAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 703 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument [all...] |
/frameworks/av/media/libmedia/ |
H A D | IDrm.cpp | 396 String8 const &algorithm) { 401 data.writeString8(algorithm); 410 String8 const &algorithm) { 415 data.writeString8(algorithm); 509 String8 const &algorithm, 517 data.writeString8(algorithm); 830 String8 algorithm = data.readString8(); local 831 reply->writeInt32(setCipherAlgorithm(sessionId, algorithm)); 840 String8 algorithm = data.readString8(); local 841 reply->writeInt32(setMacAlgorithm(sessionId, algorithm)); 395 setCipherAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 409 setMacAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 508 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument 906 String8 algorithm = data.readString8(); local [all...] |
/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 1025 @NonNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm); 1028 @NonNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm); 1085 * Encrypt data using the CryptoSession's cipher algorithm 1098 * Decrypt data using the CryptoSessions's cipher algorithm 1111 * Sign data using the CryptoSessions's mac algorithm. 1122 * Verify a signature using the CryptoSessions's mac algorithm. Return true 1144 * @param cipherAlgorithm the algorithm to use for encryption and 1145 * decryption ciphers. The algorithm string conforms to JCA Standard 1148 * @param macAlgorithm the algorithm to use for sign and verify 1149 * The algorithm strin 1024 setCipherAlgorithmNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm) argument 1027 setMacAlgorithmNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm) argument 1280 signRSANative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm, @NonNull byte[] wrappedKey, @NonNull byte[] message) argument 1296 signRSA( @onNull byte[] sessionId, @NonNull String algorithm, @NonNull byte[] wrappedKey, @NonNull byte[] message) argument [all...] |
/frameworks/base/media/jni/ |
H A D | android_media_MediaDrm.cpp | 1249 "algorithm String is null"); 1254 String8 algorithm = JStringToString8(env, jalgorithm); local 1256 status_t err = drm->setCipherAlgorithm(sessionId, algorithm); 1258 throwExceptionAsNecessary(env, err, "Failed to set cipher algorithm"); 1273 "algorithm String is null"); 1278 String8 algorithm = JStringToString8(env, jalgorithm); local 1280 status_t err = drm->setMacAlgorithm(sessionId, algorithm); 1282 throwExceptionAsNecessary(env, err, "Failed to set mac algorithm"); 1423 String8 algorithm = JStringToString8(env, jalgorithm); local 1428 status_t err = drm->signRSA(sessionId, algorithm, messag [all...] |
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | BackupManagerService.java | 187 // Historical and current algorithm names 1549 private SecretKey buildPasswordKey(String algorithm, String pw, byte[] salt, int rounds) { argument 1550 return buildCharArrayKey(algorithm, pw.toCharArray(), salt, rounds); 1553 private SecretKey buildCharArrayKey(String algorithm, char[] pwArray, byte[] salt, int rounds) { argument 1555 SecretKeyFactory keyFactory = SecretKeyFactory.getInstance(algorithm); 1566 private String buildPasswordHash(String algorithm, String pw, byte[] salt, int rounds) { argument 1567 SecretKey key = buildPasswordKey(algorithm, pw, salt, rounds); 1595 private byte[] makeKeyChecksum(String algorithm, byte[] pwBytes, byte[] salt, int rounds) { argument 1601 Key checksum = buildCharArrayKey(algorithm, mkAsChar, salt, rounds); 1612 boolean passwordMatchesSaved(String algorithm, Strin argument 6701 attemptMasterKeyDecryption(String algorithm, byte[] userSalt, byte[] ckSalt, int rounds, String userIvHex, String masterKeyBlobHex, InputStream rawInStream, boolean doLog) argument [all...] |
/frameworks/data-binding/prebuilds/1.0-rc0/ |
H A D | databinding-studio-bundle.jar | META-INF/ META-INF/MANIFEST.MF android/ android/databinding/ android/databinding/Bindable.class Bindable. ... |