Searched refs:digests (Results 1 - 8 of 8) sorted by relevance
/frameworks/base/core/java/android/content/pm/ |
H A D | EphemeralResolveInfo.java | 122 * Helper class to generate and store each of the digests and prefixes 127 * hash prefixes. For example, "a.b.c.d.e" generates digests for 155 ArrayList<byte[]> digests = new ArrayList<>(); 161 digests.add(digest.digest(hostBytes)); 167 digests.add(digest.digest(host.getBytes())); 170 digests.add(digest.digest(hostBytes)); 175 digests.add(digest.digest(hostBytes)); 183 return digests.toArray(new byte[digests.size()][]);
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | KeyProperties.java | 618 public static @DigestEnum String[] allFromKeymaster(@NonNull Collection<Integer> digests) { argument 619 if (digests.isEmpty()) { 622 String[] result = new String[digests.size()]; 624 for (int digest : digests) { 632 public static int[] allToKeymaster(@Nullable @DigestEnum String[] digests) { argument 633 if ((digests == null) || (digests.length == 0)) { 636 int[] result = new int[digests.length]; 638 for (@DigestEnum String digest : digests) {
|
H A D | KeyProtection.java | 124 * digests. The use of the public key is unrestricted. Both the private and the public key must 189 * using any padding schemes and digests. Both the private and the public key must export their key 236 @KeyProperties.DigestEnum String[] digests, 251 mDigests = ArrayUtils.cloneIfNotEmpty(digests); 583 public Builder setDigests(@KeyProperties.DigestEnum String... digests) { argument 584 mDigests = ArrayUtils.cloneIfNotEmpty(digests); 229 KeyProtection( Date keyValidityStart, Date keyValidityForOriginationEnd, Date keyValidityForConsumptionEnd, @KeyProperties.PurposeEnum int purposes, @KeyProperties.EncryptionPaddingEnum String[] encryptionPaddings, @KeyProperties.SignaturePaddingEnum String[] signaturePaddings, @KeyProperties.DigestEnum String[] digests, @KeyProperties.BlockModeEnum String[] blockModes, boolean randomizedEncryptionRequired, boolean userAuthenticationRequired, int userAuthenticationValidityDurationSeconds, boolean userAuthenticationValidWhileOnBody, boolean invalidatedByBiometricEnrollment) argument
|
H A D | KeyInfo.java | 98 @KeyProperties.DigestEnum String[] digests, 117 mDigests = ArrayUtils.cloneIfNotEmpty(ArrayUtils.nullToEmpty(digests)); 88 KeyInfo(String keystoreKeyAlias, boolean insideSecureHardware, @KeyProperties.OriginEnum int origin, int keySize, Date keyValidityStart, Date keyValidityForOriginationEnd, Date keyValidityForConsumptionEnd, @KeyProperties.PurposeEnum int purposes, @KeyProperties.EncryptionPaddingEnum String[] encryptionPaddings, @KeyProperties.SignaturePaddingEnum String[] signaturePaddings, @KeyProperties.DigestEnum String[] digests, @KeyProperties.BlockModeEnum String[] blockModes, boolean userAuthenticationRequired, int userAuthenticationValidityDurationSeconds, boolean userAuthenticationRequirementEnforcedBySecureHardware, boolean userAuthenticationValidWhileOnBody, boolean invalidatedByBiometricEnrollment) argument
|
H A D | KeyGenParameterSpec.java | 141 * scheme with SHA-256 or SHA-512 digests. The use of the public key is unrestricted. 167 * OAEP encryption padding scheme with SHA-256 or SHA-512 digests. The use of the public key is 282 @KeyProperties.DigestEnum String[] digests, 326 mDigests = ArrayUtils.cloneIfNotEmpty(digests); 845 * Sets the set of digests algorithms (e.g., {@code SHA-256}, {@code SHA-384}) with which 863 public Builder setDigests(@KeyProperties.DigestEnum String... digests) { argument 864 mDigests = ArrayUtils.cloneIfNotEmpty(digests); 269 KeyGenParameterSpec( String keyStoreAlias, int uid, int keySize, AlgorithmParameterSpec spec, X500Principal certificateSubject, BigInteger certificateSerialNumber, Date certificateNotBefore, Date certificateNotAfter, Date keyValidityStart, Date keyValidityForOriginationEnd, Date keyValidityForConsumptionEnd, @KeyProperties.PurposeEnum int purposes, @KeyProperties.DigestEnum String[] digests, @KeyProperties.EncryptionPaddingEnum String[] encryptionPaddings, @KeyProperties.SignaturePaddingEnum String[] signaturePaddings, @KeyProperties.BlockModeEnum String[] blockModes, boolean randomizedEncryptionRequired, boolean userAuthenticationRequired, int userAuthenticationValidityDurationSeconds, byte[] attestationChallenge, boolean uniqueIdIncluded, boolean userAuthenticationValidWhileOnBody, boolean invalidatedByBiometricEnrollment) argument
|
H A D | AndroidKeyStoreSecretKeyFactorySpi.java | 92 @KeyProperties.DigestEnum String[] digests; 145 digests = KeyProperties.Digest.allFromKeymaster( 197 digests,
|
/frameworks/base/core/java/android/util/apk/ |
H A D | ApkSignatureSchemeV2Verifier.java | 238 throw new SecurityException("No content digests found"); 325 ByteBuffer digests = getLengthPrefixedSlice(signedData); 328 while (digests.hasRemaining()) { 331 ByteBuffer digest = getLengthPrefixedSlice(digests); 347 "Signature algorithms don't match between digests and signatures records"); 397 throw new SecurityException("No digests provided"); 460 // chunks (uint32 little-endian) and the concatenation of digests of chunks of all 499 // TODO: Compute digests of chunks in parallel when beneficial. This requires some research 982 * Feeds the specified region of this source's data into the provided digests. Each digest 1103 // In the future, it may be necessary to compute digests o [all...] |
/frameworks/base/ |
H A D | compiled-classes-phone | 6167 com.android.org.bouncycastle.crypto.digests.AndroidDigestFactory 6168 com.android.org.bouncycastle.crypto.digests.AndroidDigestFactoryInterface 6169 com.android.org.bouncycastle.crypto.digests.AndroidDigestFactoryOpenSSL 6170 com.android.org.bouncycastle.crypto.digests.OpenSSLDigest 6171 com.android.org.bouncycastle.crypto.digests.OpenSSLDigest$SHA1
|
Completed in 206 milliseconds