Home
last modified time | relevance | path

Searched +full:- +full:- +full:keyid +full:- +full:format (Results 1 – 25 of 161) sorted by relevance

1234567

/external/aws-sdk-java-v2/services/kms/target/generated-sources/sdk/software/amazon/awssdk/services/kms/model/
DSignResponse.java39 …kField<String> KEY_ID_FIELD = SdkField.<String> builder(MarshallingType.STRING).memberName("KeyId")
40 .getter(getter(SignResponse::keyId)).setter(setter(Builder::keyId))
41 ….traits(LocationTrait.builder().location(MarshallLocation.PAYLOAD).locationName("KeyId").build()).…
55 private final String keyId; field in SignResponse
63 this.keyId = builder.keyId; in SignResponse()
71 …* href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">key AR…
76 …"https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">key ARN</a>) …
79 public final String keyId() { in keyId() method in SignResponse
80 return keyId; in keyId()
97 * algorithms, this value is a DER-encoded object as defined by ANSI X9.62–2005 and <a
[all …]
/external/tink/tools/tinkey/src/main/java/com/google/crypto/tink/tinkey/
DTinkeyUtil.java7 // http://www.apache.org/licenses/LICENSE-2.0
100 int keyId) in manipulateKey() argument
107 manager = manager.delete(keyId); in manipulateKey()
110 manager = manager.destroy(keyId); in manipulateKey()
113 manager = manager.disable(keyId); in manipulateKey()
116 manager = manager.enable(keyId); in manipulateKey()
119 manager = manager.setPrimary(keyId); in manipulateKey()
161 * Writes the keyset managed by {@code handle} to {@code outputStream} with format {@code
217 while (read != -1) { in toByteArray()
253 * Checks that input or output format is valid. Only supported formats are {@code json} and {@code
[all …]
/external/tink/java_src/src/main/java/com/google/crypto/tink/monitoring/
DMonitoringKeysetInfo.java7 // http://www.apache.org/licenses/LICENSE-2.0
44 private final int keyId; field in MonitoringKeysetInfo.Entry
53 return keyId; in getKeyId()
64 private Entry(KeyStatus status, int keyId, String keyType, String keyPrefix) { in Entry() argument
66 this.keyId = keyId; in Entry()
78 && this.keyId == entry.keyId in equals()
85 return Objects.hash(status, keyId, keyType, keyPrefix); in hashCode()
90 return String.format( in toString()
91 "(status=%s, keyId=%s, keyType='%s', keyPrefix='%s')", in toString()
92 this.status, this.keyId, this.keyType, this.keyPrefix); in toString()
[all …]
/external/walt/android/WALT/app/src/main/java/org/chromium/latency/walt/
DUtils.java8 * http://www.apache.org/licenses/LICENSE-2.0
46 return 0.5 * (lst.get(len / 2) + lst.get(len / 2 - 1)); in median()
78 double dy = yp[ip] - yp[ip-1]; in interp()
79 double dx = xp[ip] - xp[ip-1]; in interp()
80 y[i] = yp[ip-1] + dy/dx * (x[i] - xp[ip-1]); in interp()
90 for (double v : a) sumsq += (v-m)*(v-m); in stdev()
116 public static String array2string(double[] a, String format) { in array2string() argument
120 sb.append(String.format(format, x)); in array2string()
150 * Simplified Java re-implementation or py/qslog/minimization.py.
163 …stddevs[i] = getShiftError(laserT, touchT, touchY, bestShift + shiftStep * i - shiftStep * steps /… in findBestShift()
[all …]
/external/tink/java_src/src/test/java/com/google/crypto/tink/hybrid/
DHybridTest.java7 // http://www.apache.org/licenses/LICENSE-2.0
102 GeneralSecurityException.class, () -> otherDecrypter.decrypt(ciphertext, contextInfo)); in createEncryptDecrypt()
106 assertThrows(GeneralSecurityException.class, () -> decrypter.decrypt(ciphertext, invalid)); in createEncryptDecrypt()
107 assertThrows(GeneralSecurityException.class, () -> decrypter.decrypt(invalid, contextInfo)); in createEncryptDecrypt()
108 assertThrows(GeneralSecurityException.class, () -> decrypter.decrypt(empty, contextInfo)); in createEncryptDecrypt()
114 // Keyset with one private key for HybridDecrypt, serialized in Tink's JSON format.
127 + " \"keyId\": 1885000158,"
133 // Keyset with the corresponding public key for HybridEncrypt, serialized in Tink's JSON format.
145 + " \"keyId\": 1885000158,"
183 + " \"keyId\": 1885000158,"
[all …]
/external/tink/java_src/src/test/java/com/google/crypto/tink/signature/
DSignatureTest.java7 // http://www.apache.org/licenses/LICENSE-2.0
85 GeneralSecurityException.class, () -> otherVerifier.verify(sig, data)); in createSignVerify()
89 assertThrows(GeneralSecurityException.class, () -> verifier.verify(sig, invalid)); in createSignVerify()
90 assertThrows(GeneralSecurityException.class, () -> verifier.verify(invalid, data)); in createSignVerify()
91 assertThrows(GeneralSecurityException.class, () -> verifier.verify(empty, data)); in createSignVerify()
95 // Keyset with one private key for PublicKeySign, serialized in Tink's JSON format.
109 + " \"keyId\": 775870498,"
115 // Keyset with the corresponding public key for PublicKeyVerify, serialized in Tink's JSON format.
128 + " \"keyId\": 775870498,"
166 + " \"keyId\": 775870498,"
[all …]
/external/tink/java_src/src/main/java/com/google/crypto/tink/integration/android/
DAndroidKeysetManager.java7 // http://www.apache.org/licenses/LICENSE-2.0
55 * // One-time operations, should be done when the application is starting up.
103 * Keystore is unreliable on certain devices. Tink runs a self-test to detect such problems and
110 * full-disk encryption or file-based encryption, which provide strong security protection against
117 * <p>The master key URI must start with {@code android-keystore://}. The remaining of the URI is
122 * <p>This class is thread-safe.
145 * <p>This class is thread-safe.
184 * android-keystore://}.
262 String.format( in readKeysetFromPrefs()
285 // pref filesystem operations. To control access to this global state in multi-threaded in build()
[all …]
DAndroidKeystoreKmsClient.java7 // http://www.apache.org/licenses/LICENSE-2.0
54 public static final String PREFIX = "android-keystore://";
167 * <p>Since Android Keystore is somewhat unreliable, a self-test is done against the key. This
174 String.format( in getAead()
185 String keyId = Validators.validateKmsKeyUriAndRemovePrefix(PREFIX, keyUri); in deleteKey() local
186 this.keyStore.deleteEntry(keyId); in deleteKey()
191 String keyId = Validators.validateKmsKeyUriAndRemovePrefix(PREFIX, keyUri); in hasKey() local
193 return this.keyStore.containsAlias(keyId); in hasKey()
203 return this.keyStore.containsAlias(keyId); in hasKey()
219 * <p>Generates AES256-GCM keys.
[all …]
/external/tink/go/core/registry/
Dcustom_key_manager_test.go7 // http://www.apache.org/licenses/LICENSE-2.0
67 return nil, fmt.Errorf("invalid key format")
70 return nil, fmt.Errorf("invalid key format")
101 format := &wrapperspb.StringValue{
104 serializedFormat, err := proto.Marshal(format)
106 tinkerror.Fail(fmt.Sprintf("failed to marshal key format: %s", err))
116 func aesGCM128KeyToKeysetHandle(rawAESKey []byte, keyID uint32, prefixType tinkpb.OutputPrefixType)…
131 PrimaryKeyId: keyID,
136 KeyId: keyID,
271 // a new, non-customKeyManager key.
[all …]
/external/tink/go/core/cryptofmt/
Dcryptofmt.go7 // http://www.apache.org/licenses/LICENSE-2.0
18 // format of ciphertexts and signatures.
33 // The prefix starts with \x00 and followed by a 4-byte key id.
39 // The prefix starts with \x01 and followed by a 4-byte key id.
52 // primitive obtained from key. The prefix can be either empty (for RAW-type
53 // prefix), or consists of a 1-byte indicator of the type of the prefix,
58 return createOutputPrefix(LegacyPrefixSize, LegacyStartByte, key.KeyId), nil
60 return createOutputPrefix(TinkPrefixSize, TinkStartByte, key.KeyId), nil
68 func createOutputPrefix(size int, startByte byte, keyID uint32) string {
71 binary.BigEndian.PutUint32(prefix[1:], keyID)
/external/autotest/server/hosts/
Dcros_label.py3 # Use of this source code is governed by a BSD-style license that can be
27 # pylint: disable=missing-docstring
39 @returns: LsbOutput with the result of parsing the /etc/lsb-release output
41 release_info = utils.parse_cmd_output('cat /etc/lsb-release',
71 """Determine the correct brand_code (aka RLZ-code) for the device."""
80 cros_config_cmd = 'cros_config / brand-code'
93 working_bluetooth_btpeer:[1-4] will be assigned depending on the number of
138 self.ver = host.run('gsctool -a -f', ignore_status=True)
161 _NAME = 'cr50-rw-keyid'
164 """Get the keyid of the given region."""
[all …]
/external/python/google-api-python-client/docs/dyn/
Dandroidenterprise_v1.serviceaccountkeys.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Dfirebaseappcheck_v1beta.projects.apps.deviceCheckConfig.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
Dprivateca_v1.projects.locations.caPools.certificates.html8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
16 font-size: 13px;
21 font-size: 26px;
22 margin-bottom: 1em;
26 font-size: 24px;
27 margin-bottom: 1em;
[all …]
/external/tink/go/hybrid/
Dhybrid_factory_test.go7 // http://www.apache.org/licenses/LICENSE-2.0
23 "github.com/google/go-cmp/cmp"
24 "github.com/google/go-cmp/cmp/cmpopts"
80 privKeyset := testutil.NewKeyset(privKeys[0].KeyId, privKeys)
158 format := commonpb.EcPointFormat_UNCOMPRESSED
161 privProto, err := testutil.GenerateECIESAEADHKDFPrivateKey(curve, hash, format, dek, salt)
163 …t.Fatalf("testutil.GenerateECIESAEADHKDFPrivateKey(curve, hash, format, dek, salt) failed: %s", er…
195 client := fakemonitoring.NewClient("fake-client")
247 KeyID: pubHandle.KeysetInfo().GetPrimaryKeyId(),
259 KeyID: privHandle.KeysetInfo().GetPrimaryKeyId(),
[all …]
/external/tink/java_src/src/test/java/com/google/crypto/tink/custom/
DCustomAeadKeyManagerTest.java7 // http://www.apache.org/licenses/LICENSE-2.0
116 StringValue format = StringValue.of(AEAD_AES_128_GCM); in aesGcm128Parameters() local
119 .setValue(format.toByteString()) in aesGcm128Parameters()
127 byte[] rawAesKey, int keyId, OutputPrefixType outputPrefixType) in aesGcm128KeyToKeysetHandle() argument
139 .setKeyId(keyId) in aesGcm128KeyToKeysetHandle()
147 .setPrimaryKeyId(keyId) in aesGcm128KeyToKeysetHandle()
182 rawAesKey, /* keyId= */ 0x11223344, OutputPrefixType.RAW); in importExistingKey_decrypts()
192 int keyId = 0x11223344; in encryptAndDecryptWithTinkPrefix_success() local
194 MyCustomKeyManager.aesGcm128KeyToKeysetHandle(rawAesKey, keyId, OutputPrefixType.TINK); in encryptAndDecryptWithTinkPrefix_success()
203 // the first byte is always 0x01, and the next 4 bytes are the big-endian encoded key ID. in encryptAndDecryptWithTinkPrefix_success()
[all …]
/external/exoplayer/tree_15dc86382f17a24a3e881e52e31a810c1ea44b49/library/smoothstreaming/src/main/java/com/google/android/exoplayer2/source/smoothstreaming/manifest/
DSsManifestParser.java8 * http://www.apache.org/licenses/LICENSE-2.0
24 import com.google.android.exoplayer2.Format;
53 * @see <a href="http://msdn.microsoft.com/en-us/library/ee673436(v=vs.90).aspx">IIS Smooth
54 * Streaming Client Manifest Format</a>
144 skippingElementDepth--; in parse()
382 Format[] formats = streamElement.formats; in build()
475 byte[] keyId = Base64.decode(keyIdString, Base64.DEFAULT); in getProtectionElementKeyId()
476 swap(keyId, 0, 3); in getProtectionElementKeyId()
477 swap(keyId, 1, 2); in getProtectionElementKeyId()
478 swap(keyId, 4, 5); in getProtectionElementKeyId()
[all …]
/external/exoplayer/tree_8e57d3715f9092d5ec54ebe2e538f34bfcc34479/library/smoothstreaming/src/main/java/com/google/android/exoplayer2/source/smoothstreaming/manifest/
DSsManifestParser.java8 * http://www.apache.org/licenses/LICENSE-2.0
24 import com.google.android.exoplayer2.Format;
53 * @see <a href="http://msdn.microsoft.com/en-us/library/ee673436(v=vs.90).aspx">IIS Smooth
54 * Streaming Client Manifest Format</a>
144 skippingElementDepth--; in parse()
388 Format[] formats = streamElement.formats; in build()
481 byte[] keyId = Base64.decode(keyIdString, Base64.DEFAULT); in getProtectionElementKeyId()
482 swap(keyId, 0, 3); in getProtectionElementKeyId()
483 swap(keyId, 1, 2); in getProtectionElementKeyId()
484 swap(keyId, 4, 5); in getProtectionElementKeyId()
[all …]
/external/ltp/testcases/kernel/syscalls/keyctl/
Dkeyctl05.c1 // SPDX-License-Identifier: GPL-2.0-or-later
4 * Copyright (c) Linux Test Project, 2017-2024
13 * 1. Try to update a key of a type that has a ->preparse() method but not an
14 * ->update() method. Examples are the "asymmetric" and "dns_resolver" key
16 * "asymmetric" key type's ->free_preparse() method will dereference a
20 * need a specially-formatted payload and several kernel config options. We
41 * in DER format, generated using:
43 * openssl req -x509 -newkey rsa:512 -batch -nodes -outform der \
91 key_serial_t keyid; in test_update_nonupdatable() local
123 keyid = TST_RET; in test_update_nonupdatable()
[all …]
/external/tink/go/jwt/
Djwt_encoding.go7 // http://www.apache.org/licenses/LICENSE-2.0
29 // keyID returns the keyID in big endian format base64 encoded if the key output prefix is of type …
30 func keyID(keyID uint32, outPrefixType tpb.OutputPrefixType) *string { func
35 binary.BigEndian.PutUint32(buf, keyID)
99 // Expects the token to be in compact serialization format. The signature should be verified before…
144 ((c >= '0') && (c <= '9')) || ((c == '-') || (c == '_')))
/external/tink/java_src/src/test/java/com/google/crypto/tink/daead/
DDaeadTest.java7 // http://www.apache.org/licenses/LICENSE-2.0
64 () -> otherAead.decryptDeterministically(ciphertext, associatedData)); in createEncryptDecryptDeterministically()
69 GeneralSecurityException.class, () -> daead.decryptDeterministically(ciphertext, invalid)); in createEncryptDecryptDeterministically()
72 () -> daead.decryptDeterministically(invalid, associatedData)); in createEncryptDecryptDeterministically()
75 () -> daead.decryptDeterministically(empty, associatedData)); in createEncryptDecryptDeterministically()
85 // A keyset with one AEAD key, serialized in Tink's JSON format.
99 + " \"keyId\": 961932622,"
134 + " \"keyId\": 961932622,"
144 + " \"keyId\": 385749617,"
154 + " \"keyId\": 919668303,"
[all …]
/external/tink/java_src/src/test/java/com/google/crypto/tink/prf/
DPrfTest.java7 // http://www.apache.org/licenses/LICENSE-2.0
73 // A keyset with one MAC key, serialized in Tink's JSON format.
87 + " \"keyId\": 166506972,"
120 + " \"keyId\": 166506972,"
129 + " \"keyId\": 1781110497,"
140 + " \"keyId\": 1593211602,"
181 + " \"keyId\": 961932622,"
193 assertThrows(GeneralSecurityException.class, () -> handle.getPrimitive(Mac.class)); in getPrimitiveFromNonMacKeyset_throws()
/external/tink/java_src/src/test/java/com/google/crypto/tink/mac/
DMacTest.java7 // http://www.apache.org/licenses/LICENSE-2.0
78 assertThrows(GeneralSecurityException.class, () -> otherMac.verifyMac(tag, data)); in create_computeVerify()
82 assertThrows(GeneralSecurityException.class, () -> mac.verifyMac(invalid, data)); in create_computeVerify()
83 assertThrows(GeneralSecurityException.class, () -> mac.verifyMac(tag, invalid)); in create_computeVerify()
84 assertThrows(GeneralSecurityException.class, () -> mac.verifyMac(empty, data)); in create_computeVerify()
85 assertThrows(GeneralSecurityException.class, () -> mac.verifyMac(tag, empty)); in create_computeVerify()
142 // A keyset with one MAC key, serialized in Tink's JSON format.
155 + " \"keyId\": 207420876,"
187 + " \"keyId\": 207420876,"
196 + " \"keyId\": 2054715504,"
[all …]
/external/fsverity-utils/man/
Dfsverity.11 .\" SPDX-License-Identifier: MIT
5 .\" Use of this source code is governed by an MIT-style license that can be
8 .TH "FSVERITY" "1" "March 2024" "fsverity-utils v1.6" "User Commands"
13 fsverity - userspace utility for fs-verity
43 \f[B]fsverity\f[R] is a userspace utility for fs-verity.
44 fs-verity is a Linux kernel filesystem feature that does transparent on-demand
45 verification of the contents of read-only files using Merkle trees.
47 \f[B]fsverity\f[R] can enable fs-verity on files, retrieve the digests of
48 fs-verity files, and sign files for use with fs-verity (among other things).
53 For examples and more information about the fs-verity kernel feature, see the
[all …]
/external/tink/java_src/src/test/java/com/google/crypto/tink/aead/
DAeadTest.java7 // http://www.apache.org/licenses/LICENSE-2.0
83 GeneralSecurityException.class, () -> otherAead.decrypt(ciphertext, associatedData)); in createEncryptDecrypt()
87 assertThrows(GeneralSecurityException.class, () -> aead.decrypt(ciphertext, invalid)); in createEncryptDecrypt()
88 assertThrows(GeneralSecurityException.class, () -> aead.decrypt(invalid, associatedData)); in createEncryptDecrypt()
89 assertThrows(GeneralSecurityException.class, () -> aead.decrypt(empty, associatedData)); in createEncryptDecrypt()
94 // A keyset with one AEAD key, serialized in Tink's JSON format.
107 + " \"keyId\": 42818733,"
141 + " \"keyId\": 42818733,"
150 + " \"keyId\": 365202604,"
160 + " \"keyId\": 277095770,"
[all …]

1234567