Searched refs:digests (Results 1 - 7 of 7) sorted by relevance

/frameworks/base/keystore/java/android/security/keystore/
H A DKeyProperties.java618 public static @DigestEnum String[] allFromKeymaster(@NonNull Collection<Integer> digests) { argument
619 if (digests.isEmpty()) {
622 String[] result = new String[digests.size()];
624 for (int digest : digests) {
632 public static int[] allToKeymaster(@Nullable @DigestEnum String[] digests) { argument
633 if ((digests == null) || (digests.length == 0)) {
636 int[] result = new int[digests.length];
638 for (@DigestEnum String digest : digests) {
H A DKeyProtection.java124 * digests. The use of the public key is unrestricted. Both the private and the public key must
189 * using any padding schemes and digests. Both the private and the public key must export their key
236 @KeyProperties.DigestEnum String[] digests,
251 mDigests = ArrayUtils.cloneIfNotEmpty(digests);
583 public Builder setDigests(@KeyProperties.DigestEnum String... digests) { argument
584 mDigests = ArrayUtils.cloneIfNotEmpty(digests);
229 KeyProtection( Date keyValidityStart, Date keyValidityForOriginationEnd, Date keyValidityForConsumptionEnd, @KeyProperties.PurposeEnum int purposes, @KeyProperties.EncryptionPaddingEnum String[] encryptionPaddings, @KeyProperties.SignaturePaddingEnum String[] signaturePaddings, @KeyProperties.DigestEnum String[] digests, @KeyProperties.BlockModeEnum String[] blockModes, boolean randomizedEncryptionRequired, boolean userAuthenticationRequired, int userAuthenticationValidityDurationSeconds, boolean userAuthenticationValidWhileOnBody, boolean invalidatedByBiometricEnrollment) argument
H A DKeyInfo.java98 @KeyProperties.DigestEnum String[] digests,
117 mDigests = ArrayUtils.cloneIfNotEmpty(ArrayUtils.nullToEmpty(digests));
88 KeyInfo(String keystoreKeyAlias, boolean insideSecureHardware, @KeyProperties.OriginEnum int origin, int keySize, Date keyValidityStart, Date keyValidityForOriginationEnd, Date keyValidityForConsumptionEnd, @KeyProperties.PurposeEnum int purposes, @KeyProperties.EncryptionPaddingEnum String[] encryptionPaddings, @KeyProperties.SignaturePaddingEnum String[] signaturePaddings, @KeyProperties.DigestEnum String[] digests, @KeyProperties.BlockModeEnum String[] blockModes, boolean userAuthenticationRequired, int userAuthenticationValidityDurationSeconds, boolean userAuthenticationRequirementEnforcedBySecureHardware, boolean userAuthenticationValidWhileOnBody, boolean invalidatedByBiometricEnrollment) argument
H A DKeyGenParameterSpec.java141 * scheme with SHA-256 or SHA-512 digests. The use of the public key is unrestricted.
167 * OAEP encryption padding scheme with SHA-256 or SHA-512 digests. The use of the public key is
282 @KeyProperties.DigestEnum String[] digests,
326 mDigests = ArrayUtils.cloneIfNotEmpty(digests);
846 * Sets the set of digests algorithms (e.g., {@code SHA-256}, {@code SHA-384}) with which
864 public Builder setDigests(@KeyProperties.DigestEnum String... digests) { argument
865 mDigests = ArrayUtils.cloneIfNotEmpty(digests);
269 KeyGenParameterSpec( String keyStoreAlias, int uid, int keySize, AlgorithmParameterSpec spec, X500Principal certificateSubject, BigInteger certificateSerialNumber, Date certificateNotBefore, Date certificateNotAfter, Date keyValidityStart, Date keyValidityForOriginationEnd, Date keyValidityForConsumptionEnd, @KeyProperties.PurposeEnum int purposes, @KeyProperties.DigestEnum String[] digests, @KeyProperties.EncryptionPaddingEnum String[] encryptionPaddings, @KeyProperties.SignaturePaddingEnum String[] signaturePaddings, @KeyProperties.BlockModeEnum String[] blockModes, boolean randomizedEncryptionRequired, boolean userAuthenticationRequired, int userAuthenticationValidityDurationSeconds, byte[] attestationChallenge, boolean uniqueIdIncluded, boolean userAuthenticationValidWhileOnBody, boolean invalidatedByBiometricEnrollment) argument
H A DAndroidKeyStoreSecretKeyFactorySpi.java92 @KeyProperties.DigestEnum String[] digests;
145 digests = KeyProperties.Digest.allFromKeymaster(
197 digests,
/frameworks/base/core/java/android/util/apk/
H A DApkSignatureSchemeV2Verifier.java238 throw new SecurityException("No content digests found");
325 ByteBuffer digests = getLengthPrefixedSlice(signedData);
328 while (digests.hasRemaining()) {
331 ByteBuffer digest = getLengthPrefixedSlice(digests);
347 "Signature algorithms don't match between digests and signatures records");
397 throw new SecurityException("No digests provided");
460 // chunks (uint32 little-endian) and the concatenation of digests of chunks of all
499 // TODO: Compute digests of chunks in parallel when beneficial. This requires some research
982 * Feeds the specified region of this source's data into the provided digests. Each digest
1103 // In the future, it may be necessary to compute digests o
[all...]
/frameworks/base/
H A Dcompiled-classes-phone6167 com.android.org.bouncycastle.crypto.digests.AndroidDigestFactory
6168 com.android.org.bouncycastle.crypto.digests.AndroidDigestFactoryInterface
6169 com.android.org.bouncycastle.crypto.digests.AndroidDigestFactoryOpenSSL
6170 com.android.org.bouncycastle.crypto.digests.OpenSSLDigest
6171 com.android.org.bouncycastle.crypto.digests.OpenSSLDigest$SHA1

Completed in 123 milliseconds