/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStorePrivateKey.java | 28 public AndroidKeyStorePrivateKey(String alias, int uid, String algorithm) { argument 29 super(alias, uid, algorithm);
|
H A D | AndroidKeyStoreSecretKey.java | 28 public AndroidKeyStoreSecretKey(String alias, int uid, String algorithm) { argument 29 super(alias, uid, algorithm);
|
H A D | AndroidKeyStorePublicKey.java | 31 public AndroidKeyStorePublicKey(String alias, int uid, String algorithm, byte[] x509EncodedForm) { argument 32 super(alias, uid, algorithm);
|
H A D | AndroidKeyStoreBCWorkaroundProvider.java | 230 private void putMacImpl(String algorithm, String implClass) { argument 231 put("Mac." + algorithm, implClass); 232 put("Mac." + algorithm + " SupportedKeyClasses", KEYSTORE_SECRET_KEY_CLASS_NAME); 246 private void putSignatureImpl(String algorithm, String implClass) { argument 247 put("Signature." + algorithm, implClass); 248 put("Signature." + algorithm + " SupportedKeyClasses",
|
H A D | AndroidKeyStoreKey.java | 31 public AndroidKeyStoreKey(String alias, int uid, String algorithm) { argument 34 mAlgorithm = algorithm;
|
H A D | AndroidKeyStoreProvider.java | 126 private void putSecretKeyFactoryImpl(String algorithm) { argument 127 put("SecretKeyFactory." + algorithm, PACKAGE_NAME + ".AndroidKeyStoreSecretKeyFactorySpi"); 130 private void putKeyFactoryImpl(String algorithm) { argument 131 put("KeyFactory." + algorithm, PACKAGE_NAME + ".AndroidKeyStoreKeyFactorySpi"); 193 throw new ProviderException("Unsupported Android Keystore public key algorithm: " 209 throw new ProviderException("Unsupported Android Keystore public key algorithm: " 237 throw new UnrecoverableKeyException("Key algorithm unknown"); 288 throw new UnrecoverableKeyException("Key algorithm unknown"); 297 // JCA key algorithm name.
|
H A D | KeyProperties.java | 172 @NonNull @KeyAlgorithmEnum String algorithm) { 173 if (KEY_ALGORITHM_EC.equalsIgnoreCase(algorithm)) { 175 } else if (KEY_ALGORITHM_RSA.equalsIgnoreCase(algorithm)) { 178 throw new IllegalArgumentException("Unsupported key algorithm: " + algorithm); 192 "Unsupported key algorithm: " + keymasterAlgorithm); 197 @NonNull @KeyAlgorithmEnum String algorithm) { 198 if (KEY_ALGORITHM_AES.equalsIgnoreCase(algorithm)) { 200 } else if (algorithm.toUpperCase(Locale.US).startsWith("HMAC")) { 204 "Unsupported secret key algorithm 171 toKeymasterAsymmetricKeyAlgorithm( @onNull @eyAlgorithmEnum String algorithm) argument 196 toKeymasterSecretKeyAlgorithm( @onNull @eyAlgorithmEnum String algorithm) argument 241 toKeymasterDigest(@onNull @eyAlgorithmEnum String algorithm) argument [all...] |
/frameworks/base/core/java/android/security/net/config/ |
H A D | Pin.java | 37 public static boolean isSupportedDigestAlgorithm(String algorithm) { argument 40 return "SHA-256".equalsIgnoreCase(algorithm); 46 public static int getDigestLength(String algorithm) { argument 47 if ("SHA-256".equalsIgnoreCase(algorithm)) { 50 throw new IllegalArgumentException("Unsupported digest algorithm: " + algorithm);
|
/frameworks/base/core/java/android/webkit/ |
H A D | TokenBindingService.java | 50 * The algorithm that is used to generate the key pair. 82 * If no key pair exists, WebView chooses an algorithm from the list, in 85 * The user can pass a null if any algorithm is acceptable. 88 * @param algorithm The list of algorithms. Can be null. An 94 String[] algorithm, 93 getKey(Uri origin, String[] algorithm, ValueCallback<TokenBindingKey> callback) argument
|
/frameworks/base/core/tests/coretests/src/android/net/http/ |
H A D | DefaultHttpClientTest.java | 131 private void authenticateDigestAlgorithm(String algorithm) throws Exception { argument 134 + "algorithm=" + algorithm;
|
/frameworks/base/core/java/android/net/ |
H A D | IpSecAlgorithm.java | 25 * IpSecAlgorithm specifies a single algorithm that can be applied to an IpSec Transform. Refer to 40 * MD5 HMAC Authentication/Integrity Algorithm. This algorithm is not recommended for use in new 48 * SHA1 HMAC Authentication/Integrity Algorithm. This algorithm is not recommended for use in 92 * algorithm 94 * @param algorithm type for IpSec. 97 public IpSecAlgorithm(String algorithm, byte[] key) { argument 98 this(algorithm, key, key.length * 8); 103 * algorithm 105 * @param algoName precise name of the algorithm to be used. 112 throw new IllegalArgumentException("Unknown algorithm o [all...] |
/frameworks/base/media/lib/signer/java/com/android/mediadrm/signer/ |
H A D | MediaDrmSigner.java | 128 * @param algorithm the signing algorithm to use, e.g. "PKCS1-BlockType1" 134 String algorithm, byte[] wrappedKey, byte[] message) { 135 return drm.signRSA(sessionId, algorithm, wrappedKey, message); 133 signRSA(MediaDrm drm, byte[] sessionId, String algorithm, byte[] wrappedKey, byte[] message) argument
|
/frameworks/base/services/backup/java/com/android/server/backup/utils/ |
H A D | PasswordUtils.java | 45 * @param algorithm - key generation algorithm. 51 public static SecretKey buildPasswordKey(String algorithm, String pw, byte[] salt, int rounds) { argument 52 return buildCharArrayKey(algorithm, pw.toCharArray(), salt, rounds); 59 * @param algorithm - key generation algorithm. 65 public static String buildPasswordHash(String algorithm, String pw, byte[] salt, int rounds) { argument 66 SecretKey key = buildPasswordKey(algorithm, pw, salt, rounds); 105 * @param algorithm - key generation algorithm 111 makeKeyChecksum(String algorithm, byte[] pwBytes, byte[] salt, int rounds) argument 122 buildCharArrayKey(String algorithm, char[] pwArray, byte[] salt, int rounds) argument [all...] |
/frameworks/base/core/java/android/text/ |
H A D | TextDirectionHeuristics.java | 41 new TextDirectionHeuristicInternal(null /* no algorithm */, false); 47 new TextDirectionHeuristicInternal(null /* no algorithm */, true); 131 * Computes the text direction based on an algorithm. Subclasses implement 132 * {@link #defaultIsRtl} to handle cases where the algorithm cannot determine the 138 public TextDirectionHeuristicImpl(TextDirectionAlgorithm algorithm) { argument 139 mAlgorithm = algorithm; 178 private TextDirectionHeuristicInternal(TextDirectionAlgorithm algorithm, argument 180 super(algorithm); 191 * Interface for an algorithm to guess the direction of a paragraph of text. 195 * Returns whether the range of text is RTL according to the algorithm [all...] |
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
H A D | SSLSocketFactory.java | 183 String algorithm, 192 if (algorithm == null) { 193 algorithm = TLS; 203 this.sslcontext = SSLContext.getInstance(algorithm); 182 SSLSocketFactory( String algorithm, final KeyStore keystore, final String keystorePassword, final KeyStore truststore, final SecureRandom random, final HostNameResolver nameResolver) argument
|
/frameworks/support/compat/java/android/support/v4/text/ |
H A D | TextDirectionHeuristicsCompat.java | 34 new TextDirectionHeuristicInternal(null /* no algorithm */, false); 40 new TextDirectionHeuristicInternal(null /* no algorithm */, true); 107 * Computes the text direction based on an algorithm. Subclasses implement 108 * {@link #defaultIsRtl} to handle cases where the algorithm cannot determine the 114 public TextDirectionHeuristicImpl(TextDirectionAlgorithm algorithm) { argument 115 mAlgorithm = algorithm; 154 TextDirectionHeuristicInternal(TextDirectionAlgorithm algorithm, argument 156 super(algorithm); 167 * Interface for an algorithm to guess the direction of a paragraph of text. 171 * Returns whether the range of text is RTL according to the algorithm [all...] |
/frameworks/av/drm/mediadrm/plugins/clearkey/ |
H A D | DrmPlugin.h | 161 const Vector<uint8_t>& sessionId, const String8& algorithm) { 162 if (sessionId.size() == 0 || algorithm.size() == 0) { 169 const Vector<uint8_t>& sessionId, const String8& algorithm) { 170 if (sessionId.size() == 0 || algorithm.size() == 0) { 232 const String8& algorithm, 236 if (sessionId.size() == 0 || algorithm.size() == 0 || 160 setCipherAlgorithm( const Vector<uint8_t>& sessionId, const String8& algorithm) argument 168 setMacAlgorithm( const Vector<uint8_t>& sessionId, const String8& algorithm) argument 230 signRSA( const Vector<uint8_t>& sessionId, const String8& algorithm, const Vector<uint8_t>& message, const Vector<uint8_t>& wrappedKey, Vector<uint8_t>& signature) argument
|
/frameworks/base/core/java/android/net/http/ |
H A D | SslCertificate.java | 267 private static String getDigest(X509Certificate x509Certificate, String algorithm) { argument 273 MessageDigest md = MessageDigest.getInstance(algorithm);
|
/frameworks/base/keystore/java/android/security/ |
H A D | KeyChain.java | 525 * specific {@code PrivateKey} type indicated by {@code algorithm} (e.g., 529 @NonNull @KeyProperties.KeyAlgorithmEnum String algorithm) { 530 final String algUpper = algorithm.toUpperCase(Locale.US); 537 * {@code PrivateKey} of the given {@code algorithm} to the device once 556 @NonNull @KeyProperties.KeyAlgorithmEnum String algorithm) { 557 if (!isKeyAlgorithmSupported(algorithm)) { 561 return KeyStore.getInstance().isHardwareBacked(algorithm); 528 isKeyAlgorithmSupported( @onNull @eyProperties.KeyAlgorithmEnum String algorithm) argument 555 isBoundKeyAlgorithm( @onNull @eyProperties.KeyAlgorithmEnum String algorithm) argument
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | BackupPasswordManager.java | 39 * @see PasswordUtils for the hashing algorithm. 149 * Returns {@code true} if should try salting using the older PBKDF algorithm. 197 * older version, attempts hashing using the older algorithm. 210 * @param algorithm The algorithm used to hash passwords. 214 private boolean passwordMatchesSaved(String algorithm, String candidatePassword) { argument 222 algorithm, candidatePassword, mPasswordSalt, PasswordUtils.PBKDF2_HASH_ROUNDS);
|
/frameworks/base/services/backup/java/com/android/server/backup/restore/ |
H A D | PerformAdbRestoreTask.java | 313 private static InputStream attemptMasterKeyDecryption(String decryptPassword, String algorithm, argument 322 .buildPasswordKey(algorithm, decryptPassword, userSalt, 348 byte[] calculatedCk = PasswordUtils.makeKeyChecksum(algorithm, mk, ckSalt, 378 Slog.e(TAG, "Needed decryption algorithm unavailable!");
|
/frameworks/av/drm/libmediadrm/ |
H A D | IDrm.cpp | 398 String8 const &algorithm) { 403 data.writeString8(algorithm); 412 String8 const &algorithm) { 417 data.writeString8(algorithm); 511 String8 const &algorithm, 519 data.writeString8(algorithm); 837 String8 algorithm = data.readString8(); local 838 reply->writeInt32(setCipherAlgorithm(sessionId, algorithm)); 847 String8 algorithm = data.readString8(); local 848 reply->writeInt32(setMacAlgorithm(sessionId, algorithm)); 397 setCipherAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 411 setMacAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 510 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument 913 String8 algorithm = data.readString8(); local [all...] |
H A D | DrmHal.cpp | 843 String8 const &algorithm) { 853 toHidlString(algorithm)); 858 String8 const &algorithm) { 868 toHidlString(algorithm)); 979 String8 const &algorithm, Vector<uint8_t> const &message, 996 toHidlString(algorithm), toHidlVec(message), toHidlVec(wrappedKey), 842 setCipherAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 857 setMacAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 978 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument
|
/frameworks/av/drm/mediadrm/plugins/mock/ |
H A D | MockDrmCryptoPlugin.cpp | 513 String8 const &algorithm) 517 ALOGD("MockDrmPlugin::setCipherAlgorithm(sessionId=%s, algorithm=%s)", 518 vectorToString(sessionId).string(), algorithm.string()); 526 if (algorithm == "AES/CBC/NoPadding") { 533 String8 const &algorithm) 537 ALOGD("MockDrmPlugin::setMacAlgorithm(sessionId=%s, algorithm=%s)", 538 vectorToString(sessionId).string(), algorithm.string()); 546 if (algorithm == "HmacSHA256") { 705 String8 const &algorithm, 711 ALOGD("MockDrmPlugin::signRSA(sessionId=%s, algorithm 512 setCipherAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 532 setMacAlgorithm(Vector<uint8_t> const &sessionId, String8 const &algorithm) argument 704 signRSA(Vector<uint8_t> const &sessionId, String8 const &algorithm, Vector<uint8_t> const &message, Vector<uint8_t> const &wrappedKey, Vector<uint8_t> &signature) argument [all...] |
/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 1036 @NonNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm); 1039 @NonNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm); 1096 * Encrypt data using the CryptoSession's cipher algorithm 1109 * Decrypt data using the CryptoSessions's cipher algorithm 1122 * Sign data using the CryptoSessions's mac algorithm. 1133 * Verify a signature using the CryptoSessions's mac algorithm. Return true 1155 * @param cipherAlgorithm the algorithm to use for encryption and 1156 * decryption ciphers. The algorithm string conforms to JCA Standard 1159 * @param macAlgorithm the algorithm to use for sign and verify 1160 * The algorithm strin 1035 setCipherAlgorithmNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm) argument 1038 setMacAlgorithmNative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm) argument 1291 signRSANative( @onNull MediaDrm drm, @NonNull byte[] sessionId, @NonNull String algorithm, @NonNull byte[] wrappedKey, @NonNull byte[] message) argument 1307 signRSA( @onNull byte[] sessionId, @NonNull String algorithm, @NonNull byte[] wrappedKey, @NonNull byte[] message) argument [all...] |