Searched defs:digests (Results 1 - 5 of 5) sorted by relevance
/frameworks/base/services/core/java/com/android/server/net/watchlist/ |
H A D | HarmfulDigests.java | 29 * Helper class to store all harmful digests in memory. 36 HarmfulDigests(List<byte[]> digests) { argument 38 final int size = digests.size(); 40 tmpDigestSet.add(HexDump.toHexString(digests.get(i)));
|
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | KeyInfo.java | 100 @KeyProperties.DigestEnum String[] digests, 121 mDigests = ArrayUtils.cloneIfNotEmpty(ArrayUtils.nullToEmpty(digests)); 90 KeyInfo(String keystoreKeyAlias, boolean insideSecureHardware, @KeyProperties.OriginEnum int origin, int keySize, Date keyValidityStart, Date keyValidityForOriginationEnd, Date keyValidityForConsumptionEnd, @KeyProperties.PurposeEnum int purposes, @KeyProperties.EncryptionPaddingEnum String[] encryptionPaddings, @KeyProperties.SignaturePaddingEnum String[] signaturePaddings, @KeyProperties.DigestEnum String[] digests, @KeyProperties.BlockModeEnum String[] blockModes, boolean userAuthenticationRequired, int userAuthenticationValidityDurationSeconds, boolean userAuthenticationRequirementEnforcedBySecureHardware, boolean userAuthenticationValidWhileOnBody, boolean trustedUserPresenceRequired, boolean invalidatedByBiometricEnrollment, boolean userConfirmationRequired) argument
|
H A D | KeyProperties.java | 640 public static @DigestEnum String[] allFromKeymaster(@NonNull Collection<Integer> digests) { argument 641 if (digests.isEmpty()) { 644 String[] result = new String[digests.size()]; 646 for (int digest : digests) { 654 public static int[] allToKeymaster(@Nullable @DigestEnum String[] digests) { argument 655 if ((digests == null) || (digests.length == 0)) { 658 int[] result = new int[digests.length]; 660 for (@DigestEnum String digest : digests) {
|
H A D | KeyProtection.java | 126 * digests. The use of the public key is unrestricted. Both the private and the public key must 191 * using any padding schemes and digests. Both the private and the public key must export their key 244 @KeyProperties.DigestEnum String[] digests, 265 mDigests = ArrayUtils.cloneIfNotEmpty(digests); 694 public Builder setDigests(@KeyProperties.DigestEnum String... digests) { argument 695 mDigests = ArrayUtils.cloneIfNotEmpty(digests); 237 KeyProtection( Date keyValidityStart, Date keyValidityForOriginationEnd, Date keyValidityForConsumptionEnd, @KeyProperties.PurposeEnum int purposes, @KeyProperties.EncryptionPaddingEnum String[] encryptionPaddings, @KeyProperties.SignaturePaddingEnum String[] signaturePaddings, @KeyProperties.DigestEnum String[] digests, @KeyProperties.BlockModeEnum String[] blockModes, boolean randomizedEncryptionRequired, boolean userAuthenticationRequired, int userAuthenticationValidityDurationSeconds, boolean userPresenceRequred, boolean userAuthenticationValidWhileOnBody, boolean invalidatedByBiometricEnrollment, long boundToSecureUserId, boolean criticalToDeviceEncryption, boolean userConfirmationRequired, boolean unlockedDeviceRequired, boolean isStrongBoxBacked) argument
|
H A D | KeyGenParameterSpec.java | 143 * scheme with SHA-256 or SHA-512 digests. The use of the public key is unrestricted. 169 * OAEP encryption padding scheme with SHA-256 or SHA-512 digests. The use of the public key is 288 @KeyProperties.DigestEnum String[] digests, 336 mDigests = ArrayUtils.cloneIfNotEmpty(digests); 959 * Sets the set of digests algorithms (e.g., {@code SHA-256}, {@code SHA-384}) with which 977 public Builder setDigests(@KeyProperties.DigestEnum String... digests) { argument 978 mDigests = ArrayUtils.cloneIfNotEmpty(digests); 275 KeyGenParameterSpec( String keyStoreAlias, int uid, int keySize, AlgorithmParameterSpec spec, X500Principal certificateSubject, BigInteger certificateSerialNumber, Date certificateNotBefore, Date certificateNotAfter, Date keyValidityStart, Date keyValidityForOriginationEnd, Date keyValidityForConsumptionEnd, @KeyProperties.PurposeEnum int purposes, @KeyProperties.DigestEnum String[] digests, @KeyProperties.EncryptionPaddingEnum String[] encryptionPaddings, @KeyProperties.SignaturePaddingEnum String[] signaturePaddings, @KeyProperties.BlockModeEnum String[] blockModes, boolean randomizedEncryptionRequired, boolean userAuthenticationRequired, int userAuthenticationValidityDurationSeconds, boolean userPresenceRequired, byte[] attestationChallenge, boolean uniqueIdIncluded, boolean userAuthenticationValidWhileOnBody, boolean invalidatedByBiometricEnrollment, boolean isStrongBoxBacked, boolean userConfirmationRequired, boolean unlockedDeviceRequired) argument
|
Completed in 40 milliseconds