/frameworks/av/drm/libmediadrm/ |
H A D | Drm.cpp | 641 String8 const &algorithm) { 654 return mPlugin->setCipherAlgorithm(sessionId, algorithm); 658 String8 const &algorithm) { 671 return mPlugin->setMacAlgorithm(sessionId, algorithm); 754 String8 const &algorithm, 774 return mPlugin->signRSA(sessionId, algorithm, message, wrappedKey, signature); 640 setCipherAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 657 setMacAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 753 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument
|
H A D | DrmHal.cpp | 797 String8 const &algorithm) { 807 toHidlString(algorithm)); 812 String8 const &algorithm) { 822 toHidlString(algorithm)); 933 String8 const &algorithm, Vector<uint8_t> const &message, 950 toHidlString(algorithm), toHidlVec(message), toHidlVec(wrappedKey), 796 setCipherAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 811 setMacAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 932 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument
|
H A D | IDrm.cpp | 398 String8 const &algorithm) { 403 data.writeString8(algorithm); 412 String8 const &algorithm) { 417 data.writeString8(algorithm); 511 String8 const &algorithm, 519 data.writeString8(algorithm); 832 String8 algorithm = data.readString8(); local 833 reply->writeInt32(setCipherAlgorithm(sessionId, algorithm)); 842 String8 algorithm = data.readString8(); local 843 reply->writeInt32(setMacAlgorithm(sessionId, algorithm)); 397 setCipherAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 411 setMacAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 510 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument 908 String8 algorithm = data.readString8(); local [all...] |
/frameworks/av/drm/mediadrm/plugins/clearkey/ |
H A D | DrmPlugin.h | 167 const Vector<uint8_t>& sessionId, const String8& algorithm) { 168 if (sessionId.size() == 0 || algorithm.size() == 0) { 175 const Vector<uint8_t>& sessionId, const String8& algorithm) { 176 if (sessionId.size() == 0 || algorithm.size() == 0) { 238 const String8& algorithm, 242 if (sessionId.size() == 0 || algorithm.size() == 0 || 166 setCipherAlgorithm( const Vector<uint8_t>& sessionId, const String8& algorithm) argument 174 setMacAlgorithm( const Vector<uint8_t>& sessionId, const String8& algorithm) argument 236 signRSA( const Vector<uint8_t>& sessionId, const String8& algorithm, const Vector<uint8_t>& message, const Vector<uint8_t>& wrappedKey, Vector<uint8_t>& signature) argument
|
/frameworks/av/drm/mediadrm/plugins/mock/ |
H A D | MockDrmCryptoPlugin.cpp | 513 String8 const &algorithm) 517 ALOGD("MockDrmPlugin::setCipherAlgorithm(sessionId=%s, algorithm=%s)", 518 vectorToString(sessionId).string(), algorithm.string()); 526 if (algorithm == "AES/CBC/NoPadding") { 533 String8 const &algorithm) 537 ALOGD("MockDrmPlugin::setMacAlgorithm(sessionId=%s, algorithm=%s)", 538 vectorToString(sessionId).string(), algorithm.string()); 546 if (algorithm == "HmacSHA256") { 705 String8 const &algorithm, 711 ALOGD("MockDrmPlugin::signRSA(sessionId=%s, algorithm 512 setCipherAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 532 setMacAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 704 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument [all...] |
/frameworks/base/core/java/android/net/ |
H A D | IpSecAlgorithm.java | 25 * IpSecAlgorithm specifies a single algorithm that can be applied to an IpSec Transform. Refer to 40 * MD5 HMAC Authentication/Integrity Algorithm. This algorithm is not recommended for use in new 48 * SHA1 HMAC Authentication/Integrity Algorithm. This algorithm is not recommended for use in 92 * algorithm 94 * @param algorithm type for IpSec. 97 public IpSecAlgorithm(String algorithm, byte[] key) { argument 98 this(algorithm, key, key.length * 8); 103 * algorithm 105 * @param algoName precise name of the algorithm to be used. 112 throw new IllegalArgumentException("Unknown algorithm o [all...] |
/frameworks/base/core/java/android/net/http/ |
H A D | SslCertificate.java | 267 private static String getDigest(X509Certificate x509Certificate, String algorithm) { argument 273 MessageDigest md = MessageDigest.getInstance(algorithm);
|
/frameworks/base/core/java/android/security/net/config/ |
H A D | Pin.java | 37 public static boolean isSupportedDigestAlgorithm(String algorithm) { argument 40 return "SHA-256".equalsIgnoreCase(algorithm); 46 public static int getDigestLength(String algorithm) { argument 47 if ("SHA-256".equalsIgnoreCase(algorithm)) { 50 throw new IllegalArgumentException("Unsupported digest algorithm: " + algorithm);
|
/frameworks/base/core/java/android/text/ |
H A D | TextDirectionHeuristics.java | 41 new TextDirectionHeuristicInternal(null /* no algorithm */, false); 47 new TextDirectionHeuristicInternal(null /* no algorithm */, true); 131 * Computes the text direction based on an algorithm. Subclasses implement 132 * {@link #defaultIsRtl} to handle cases where the algorithm cannot determine the 138 public TextDirectionHeuristicImpl(TextDirectionAlgorithm algorithm) { argument 139 mAlgorithm = algorithm; 178 private TextDirectionHeuristicInternal(TextDirectionAlgorithm algorithm, argument 180 super(algorithm); 191 * Interface for an algorithm to guess the direction of a paragraph of text. 195 * Returns whether the range of text is RTL according to the algorithm [all...] |
/frameworks/base/core/java/android/webkit/ |
H A D | TokenBindingService.java | 50 * The algorithm that is used to generate the key pair. 82 * If no key pair exists, WebView chooses an algorithm from the list, in 85 * The user can pass a null if any algorithm is acceptable. 88 * @param algorithm The list of algorithms. Can be null. An 94 String[] algorithm, 93 getKey(Uri origin, String[] algorithm, ValueCallback<TokenBindingKey> callback) argument
|
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
H A D | SSLSocketFactory.java | 183 String algorithm, 192 if (algorithm == null) { 193 algorithm = TLS; 203 this.sslcontext = SSLContext.getInstance(algorithm); 182 SSLSocketFactory( String algorithm, final KeyStore keystore, final String keystorePassword, final KeyStore truststore, final SecureRandom random, final HostNameResolver nameResolver) argument
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | DefaultHttpClientTest.java | 131 private void authenticateDigestAlgorithm(String algorithm) throws Exception { argument 134 + "algorithm=" + algorithm;
|
/frameworks/base/keystore/java/android/security/ |
H A D | KeyChain.java | 525 * specific {@code PrivateKey} type indicated by {@code algorithm} (e.g., 529 @NonNull @KeyProperties.KeyAlgorithmEnum String algorithm) { 530 final String algUpper = algorithm.toUpperCase(Locale.US); 537 * {@code PrivateKey} of the given {@code algorithm} to the device once 556 @NonNull @KeyProperties.KeyAlgorithmEnum String algorithm) { 557 if (!isKeyAlgorithmSupported(algorithm)) { 561 return KeyStore.getInstance().isHardwareBacked(algorithm); 528 isKeyAlgorithmSupported( @onNull @eyProperties.KeyAlgorithmEnum String algorithm) argument 555 isBoundKeyAlgorithm( @onNull @eyProperties.KeyAlgorithmEnum String algorithm) argument
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreBCWorkaroundProvider.java | 230 private void putMacImpl(String algorithm, String implClass) { argument 231 put("Mac." + algorithm, implClass); 232 put("Mac." + algorithm + " SupportedKeyClasses", KEYSTORE_SECRET_KEY_CLASS_NAME); 246 private void putSignatureImpl(String algorithm, String implClass) { argument 247 put("Signature." + algorithm, implClass); 248 put("Signature." + algorithm + " SupportedKeyClasses",
|
H A D | AndroidKeyStoreKey.java | 31 public AndroidKeyStoreKey(String alias, int uid, String algorithm) { argument 34 mAlgorithm = algorithm;
|
H A D | AndroidKeyStorePrivateKey.java | 28 public AndroidKeyStorePrivateKey(String alias, int uid, String algorithm) { argument 29 super(alias, uid, algorithm);
|
H A D | AndroidKeyStoreProvider.java | 126 private void putSecretKeyFactoryImpl(String algorithm) { argument 127 put("SecretKeyFactory." + algorithm, PACKAGE_NAME + ".AndroidKeyStoreSecretKeyFactorySpi"); 130 private void putKeyFactoryImpl(String algorithm) { argument 131 put("KeyFactory." + algorithm, PACKAGE_NAME + ".AndroidKeyStoreKeyFactorySpi"); 193 throw new ProviderException("Unsupported Android Keystore public key algorithm: " 209 throw new ProviderException("Unsupported Android Keystore public key algorithm: " 237 throw new UnrecoverableKeyException("Key algorithm unknown"); 288 throw new UnrecoverableKeyException("Key algorithm unknown"); 297 // JCA key algorithm name.
|
H A D | AndroidKeyStorePublicKey.java | 31 public AndroidKeyStorePublicKey(String alias, int uid, String algorithm, byte[] x509EncodedForm) { argument 32 super(alias, uid, algorithm);
|
H A D | AndroidKeyStoreSecretKey.java | 28 public AndroidKeyStoreSecretKey(String alias, int uid, String algorithm) { argument 29 super(alias, uid, algorithm);
|
H A D | KeyProperties.java | 172 @NonNull @KeyAlgorithmEnum String algorithm) { 173 if (KEY_ALGORITHM_EC.equalsIgnoreCase(algorithm)) { 175 } else if (KEY_ALGORITHM_RSA.equalsIgnoreCase(algorithm)) { 178 throw new IllegalArgumentException("Unsupported key algorithm: " + algorithm); 192 "Unsupported key algorithm: " + keymasterAlgorithm); 197 @NonNull @KeyAlgorithmEnum String algorithm) { 198 if (KEY_ALGORITHM_AES.equalsIgnoreCase(algorithm)) { 200 } else if (algorithm.toUpperCase(Locale.US).startsWith("HMAC")) { 204 "Unsupported secret key algorithm 171 toKeymasterAsymmetricKeyAlgorithm( @onNull @eyAlgorithmEnum String algorithm) argument 196 toKeymasterSecretKeyAlgorithm( @onNull @eyAlgorithmEnum String algorithm) argument 241 toKeymasterDigest(@onNull @eyAlgorithmEnum String algorithm) argument [all...] |
/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 1036 @NonNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm); 1039 @NonNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm); 1096 * Encrypt data using the CryptoSession's cipher algorithm 1109 * Decrypt data using the CryptoSessions's cipher algorithm 1122 * Sign data using the CryptoSessions's mac algorithm. 1133 * Verify a signature using the CryptoSessions's mac algorithm. Return true 1155 * @param cipherAlgorithm the algorithm to use for encryption and 1156 * decryption ciphers. The algorithm string conforms to JCA Standard 1159 * @param macAlgorithm the algorithm to use for sign and verify 1160 * The algorithm strin 1035 setCipherAlgorithmNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm) argument 1038 setMacAlgorithmNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm) argument 1291 signRSANative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm, @NonNull byte[] wrappedKey, @NonNull byte[] message) argument 1307 signRSA( @onNull byte[] sessionId, @NonNull String algorithm, @NonNull byte[] wrappedKey, @NonNull byte[] message) argument [all...] |
/frameworks/base/media/jni/ |
H A D | android_media_MediaDrm.cpp | 1258 "algorithm String is null"); 1263 String8 algorithm = JStringToString8(env, jalgorithm); local 1265 status_t err = drm->setCipherAlgorithm(sessionId, algorithm); 1267 throwExceptionAsNecessary(env, err, "Failed to set cipher algorithm"); 1282 "algorithm String is null"); 1287 String8 algorithm = JStringToString8(env, jalgorithm); local 1289 status_t err = drm->setMacAlgorithm(sessionId, algorithm); 1291 throwExceptionAsNecessary(env, err, "Failed to set mac algorithm"); 1432 String8 algorithm = JStringToString8(env, jalgorithm); local 1437 status_t err = drm->signRSA(sessionId, algorithm, messag [all...] |
/frameworks/base/media/lib/signer/java/com/android/mediadrm/signer/ |
H A D | MediaDrmSigner.java | 128 * @param algorithm the signing algorithm to use, e.g. "PKCS1-BlockType1" 134 String algorithm, byte[] wrappedKey, byte[] message) { 135 return drm.signRSA(sessionId, algorithm, wrappedKey, message); 133 signRSA(MediaDrm drm, byte[] sessionId, String algorithm, byte[] wrappedKey, byte[] message) argument
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | BackupManagerService.java | 208 // Historical and current algorithm names 1673 private SecretKey buildPasswordKey(String algorithm, String pw, byte[] salt, int rounds) { argument 1674 return buildCharArrayKey(algorithm, pw.toCharArray(), salt, rounds); 1677 private SecretKey buildCharArrayKey(String algorithm, char[] pwArray, byte[] salt, int rounds) { argument 1679 SecretKeyFactory keyFactory = SecretKeyFactory.getInstance(algorithm); 1690 private String buildPasswordHash(String algorithm, String pw, byte[] salt, int rounds) { argument 1691 SecretKey key = buildPasswordKey(algorithm, pw, salt, rounds); 1719 private byte[] makeKeyChecksum(String algorithm, byte[] pwBytes, byte[] salt, int rounds) { argument 1725 Key checksum = buildCharArrayKey(algorithm, mkAsChar, salt, rounds); 1736 boolean passwordMatchesSaved(String algorithm, Strin argument 7335 attemptMasterKeyDecryption(String algorithm, byte[] userSalt, byte[] ckSalt, int rounds, String userIvHex, String masterKeyBlobHex, InputStream rawInStream, boolean doLog) argument [all...] |
/frameworks/data-binding/prebuilds/1.0-rc0/ |
H A D | databinding-studio-bundle.jar | META-INF/ META-INF/MANIFEST.MF android/ android/databinding/ android/databinding/Bindable.class Bindable. ... |