| /external/aws-sdk-java-v2/services/kms/target/generated-sources/sdk/software/amazon/awssdk/services/kms/model/ |
| D | SignResponse.java | 39 …kField<String> KEY_ID_FIELD = SdkField.<String> builder(MarshallingType.STRING).memberName("KeyId") 40 .getter(getter(SignResponse::keyId)).setter(setter(Builder::keyId)) 41 ….traits(LocationTrait.builder().location(MarshallLocation.PAYLOAD).locationName("KeyId").build()).… 55 private final String keyId; field in SignResponse 63 this.keyId = builder.keyId; in SignResponse() 71 …* href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">key AR… 76 …"https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">key ARN</a>) … 79 public final String keyId() { in keyId() method in SignResponse 80 return keyId; in keyId() 97 * algorithms, this value is a DER-encoded object as defined by ANSI X9.62–2005 and <a [all …]
|
| /external/tink/tools/tinkey/src/main/java/com/google/crypto/tink/tinkey/ |
| D | TinkeyUtil.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 100 int keyId) in manipulateKey() argument 107 manager = manager.delete(keyId); in manipulateKey() 110 manager = manager.destroy(keyId); in manipulateKey() 113 manager = manager.disable(keyId); in manipulateKey() 116 manager = manager.enable(keyId); in manipulateKey() 119 manager = manager.setPrimary(keyId); in manipulateKey() 161 * Writes the keyset managed by {@code handle} to {@code outputStream} with format {@code 217 while (read != -1) { in toByteArray() 253 * Checks that input or output format is valid. Only supported formats are {@code json} and {@code [all …]
|
| /external/tink/java_src/src/main/java/com/google/crypto/tink/monitoring/ |
| D | MonitoringKeysetInfo.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 44 private final int keyId; field in MonitoringKeysetInfo.Entry 53 return keyId; in getKeyId() 64 private Entry(KeyStatus status, int keyId, String keyType, String keyPrefix) { in Entry() argument 66 this.keyId = keyId; in Entry() 78 && this.keyId == entry.keyId in equals() 85 return Objects.hash(status, keyId, keyType, keyPrefix); in hashCode() 90 return String.format( in toString() 91 "(status=%s, keyId=%s, keyType='%s', keyPrefix='%s')", in toString() 92 this.status, this.keyId, this.keyType, this.keyPrefix); in toString() [all …]
|
| /external/walt/android/WALT/app/src/main/java/org/chromium/latency/walt/ |
| D | Utils.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 46 return 0.5 * (lst.get(len / 2) + lst.get(len / 2 - 1)); in median() 78 double dy = yp[ip] - yp[ip-1]; in interp() 79 double dx = xp[ip] - xp[ip-1]; in interp() 80 y[i] = yp[ip-1] + dy/dx * (x[i] - xp[ip-1]); in interp() 90 for (double v : a) sumsq += (v-m)*(v-m); in stdev() 116 public static String array2string(double[] a, String format) { in array2string() argument 120 sb.append(String.format(format, x)); in array2string() 150 * Simplified Java re-implementation or py/qslog/minimization.py. 163 …stddevs[i] = getShiftError(laserT, touchT, touchY, bestShift + shiftStep * i - shiftStep * steps /… in findBestShift() [all …]
|
| /external/tink/java_src/src/test/java/com/google/crypto/tink/hybrid/ |
| D | HybridTest.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 102 GeneralSecurityException.class, () -> otherDecrypter.decrypt(ciphertext, contextInfo)); in createEncryptDecrypt() 106 assertThrows(GeneralSecurityException.class, () -> decrypter.decrypt(ciphertext, invalid)); in createEncryptDecrypt() 107 assertThrows(GeneralSecurityException.class, () -> decrypter.decrypt(invalid, contextInfo)); in createEncryptDecrypt() 108 assertThrows(GeneralSecurityException.class, () -> decrypter.decrypt(empty, contextInfo)); in createEncryptDecrypt() 114 // Keyset with one private key for HybridDecrypt, serialized in Tink's JSON format. 127 + " \"keyId\": 1885000158," 133 // Keyset with the corresponding public key for HybridEncrypt, serialized in Tink's JSON format. 145 + " \"keyId\": 1885000158," 183 + " \"keyId\": 1885000158," [all …]
|
| /external/tink/java_src/src/test/java/com/google/crypto/tink/signature/ |
| D | SignatureTest.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 85 GeneralSecurityException.class, () -> otherVerifier.verify(sig, data)); in createSignVerify() 89 assertThrows(GeneralSecurityException.class, () -> verifier.verify(sig, invalid)); in createSignVerify() 90 assertThrows(GeneralSecurityException.class, () -> verifier.verify(invalid, data)); in createSignVerify() 91 assertThrows(GeneralSecurityException.class, () -> verifier.verify(empty, data)); in createSignVerify() 95 // Keyset with one private key for PublicKeySign, serialized in Tink's JSON format. 109 + " \"keyId\": 775870498," 115 // Keyset with the corresponding public key for PublicKeyVerify, serialized in Tink's JSON format. 128 + " \"keyId\": 775870498," 166 + " \"keyId\": 775870498," [all …]
|
| /external/tink/java_src/src/main/java/com/google/crypto/tink/integration/android/ |
| D | AndroidKeysetManager.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 55 * // One-time operations, should be done when the application is starting up. 103 * Keystore is unreliable on certain devices. Tink runs a self-test to detect such problems and 110 * full-disk encryption or file-based encryption, which provide strong security protection against 117 * <p>The master key URI must start with {@code android-keystore://}. The remaining of the URI is 122 * <p>This class is thread-safe. 145 * <p>This class is thread-safe. 184 * android-keystore://}. 262 String.format( in readKeysetFromPrefs() 285 // pref filesystem operations. To control access to this global state in multi-threaded in build() [all …]
|
| D | AndroidKeystoreKmsClient.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 54 public static final String PREFIX = "android-keystore://"; 167 * <p>Since Android Keystore is somewhat unreliable, a self-test is done against the key. This 174 String.format( in getAead() 185 String keyId = Validators.validateKmsKeyUriAndRemovePrefix(PREFIX, keyUri); in deleteKey() local 186 this.keyStore.deleteEntry(keyId); in deleteKey() 191 String keyId = Validators.validateKmsKeyUriAndRemovePrefix(PREFIX, keyUri); in hasKey() local 193 return this.keyStore.containsAlias(keyId); in hasKey() 203 return this.keyStore.containsAlias(keyId); in hasKey() 219 * <p>Generates AES256-GCM keys. [all …]
|
| /external/tink/go/core/registry/ |
| D | custom_key_manager_test.go | 7 // http://www.apache.org/licenses/LICENSE-2.0 67 return nil, fmt.Errorf("invalid key format") 70 return nil, fmt.Errorf("invalid key format") 101 format := &wrapperspb.StringValue{ 104 serializedFormat, err := proto.Marshal(format) 106 tinkerror.Fail(fmt.Sprintf("failed to marshal key format: %s", err)) 116 func aesGCM128KeyToKeysetHandle(rawAESKey []byte, keyID uint32, prefixType tinkpb.OutputPrefixType)… 131 PrimaryKeyId: keyID, 136 KeyId: keyID, 271 // a new, non-customKeyManager key. [all …]
|
| /external/tink/go/core/cryptofmt/ |
| D | cryptofmt.go | 7 // http://www.apache.org/licenses/LICENSE-2.0 18 // format of ciphertexts and signatures. 33 // The prefix starts with \x00 and followed by a 4-byte key id. 39 // The prefix starts with \x01 and followed by a 4-byte key id. 52 // primitive obtained from key. The prefix can be either empty (for RAW-type 53 // prefix), or consists of a 1-byte indicator of the type of the prefix, 58 return createOutputPrefix(LegacyPrefixSize, LegacyStartByte, key.KeyId), nil 60 return createOutputPrefix(TinkPrefixSize, TinkStartByte, key.KeyId), nil 68 func createOutputPrefix(size int, startByte byte, keyID uint32) string { 71 binary.BigEndian.PutUint32(prefix[1:], keyID)
|
| /external/autotest/server/hosts/ |
| D | cros_label.py | 3 # Use of this source code is governed by a BSD-style license that can be 27 # pylint: disable=missing-docstring 39 @returns: LsbOutput with the result of parsing the /etc/lsb-release output 41 release_info = utils.parse_cmd_output('cat /etc/lsb-release', 71 """Determine the correct brand_code (aka RLZ-code) for the device.""" 80 cros_config_cmd = 'cros_config / brand-code' 93 working_bluetooth_btpeer:[1-4] will be assigned depending on the number of 138 self.ver = host.run('gsctool -a -f', ignore_status=True) 161 _NAME = 'cr50-rw-keyid' 164 """Get the keyid of the given region.""" [all …]
|
| /external/python/google-api-python-client/docs/dyn/ |
| D | androidenterprise_v1.serviceaccountkeys.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| D | firebaseappcheck_v1beta.projects.apps.deviceCheckConfig.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| D | privateca_v1.projects.locations.caPools.certificates.html | 8 font-weight: inherit; 9 font-style: inherit; 10 font-size: 100%; 11 font-family: inherit; 12 vertical-align: baseline; 16 font-size: 13px; 21 font-size: 26px; 22 margin-bottom: 1em; 26 font-size: 24px; 27 margin-bottom: 1em; [all …]
|
| /external/tink/go/hybrid/ |
| D | hybrid_factory_test.go | 7 // http://www.apache.org/licenses/LICENSE-2.0 23 "github.com/google/go-cmp/cmp" 24 "github.com/google/go-cmp/cmp/cmpopts" 80 privKeyset := testutil.NewKeyset(privKeys[0].KeyId, privKeys) 158 format := commonpb.EcPointFormat_UNCOMPRESSED 161 privProto, err := testutil.GenerateECIESAEADHKDFPrivateKey(curve, hash, format, dek, salt) 163 …t.Fatalf("testutil.GenerateECIESAEADHKDFPrivateKey(curve, hash, format, dek, salt) failed: %s", er… 195 client := fakemonitoring.NewClient("fake-client") 247 KeyID: pubHandle.KeysetInfo().GetPrimaryKeyId(), 259 KeyID: privHandle.KeysetInfo().GetPrimaryKeyId(), [all …]
|
| /external/tink/java_src/src/test/java/com/google/crypto/tink/custom/ |
| D | CustomAeadKeyManagerTest.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 116 StringValue format = StringValue.of(AEAD_AES_128_GCM); in aesGcm128Parameters() local 119 .setValue(format.toByteString()) in aesGcm128Parameters() 127 byte[] rawAesKey, int keyId, OutputPrefixType outputPrefixType) in aesGcm128KeyToKeysetHandle() argument 139 .setKeyId(keyId) in aesGcm128KeyToKeysetHandle() 147 .setPrimaryKeyId(keyId) in aesGcm128KeyToKeysetHandle() 182 rawAesKey, /* keyId= */ 0x11223344, OutputPrefixType.RAW); in importExistingKey_decrypts() 192 int keyId = 0x11223344; in encryptAndDecryptWithTinkPrefix_success() local 194 MyCustomKeyManager.aesGcm128KeyToKeysetHandle(rawAesKey, keyId, OutputPrefixType.TINK); in encryptAndDecryptWithTinkPrefix_success() 203 // the first byte is always 0x01, and the next 4 bytes are the big-endian encoded key ID. in encryptAndDecryptWithTinkPrefix_success() [all …]
|
| /external/exoplayer/tree_15dc86382f17a24a3e881e52e31a810c1ea44b49/library/smoothstreaming/src/main/java/com/google/android/exoplayer2/source/smoothstreaming/manifest/ |
| D | SsManifestParser.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 24 import com.google.android.exoplayer2.Format; 53 * @see <a href="http://msdn.microsoft.com/en-us/library/ee673436(v=vs.90).aspx">IIS Smooth 54 * Streaming Client Manifest Format</a> 144 skippingElementDepth--; in parse() 382 Format[] formats = streamElement.formats; in build() 475 byte[] keyId = Base64.decode(keyIdString, Base64.DEFAULT); in getProtectionElementKeyId() 476 swap(keyId, 0, 3); in getProtectionElementKeyId() 477 swap(keyId, 1, 2); in getProtectionElementKeyId() 478 swap(keyId, 4, 5); in getProtectionElementKeyId() [all …]
|
| /external/exoplayer/tree_8e57d3715f9092d5ec54ebe2e538f34bfcc34479/library/smoothstreaming/src/main/java/com/google/android/exoplayer2/source/smoothstreaming/manifest/ |
| D | SsManifestParser.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 24 import com.google.android.exoplayer2.Format; 53 * @see <a href="http://msdn.microsoft.com/en-us/library/ee673436(v=vs.90).aspx">IIS Smooth 54 * Streaming Client Manifest Format</a> 144 skippingElementDepth--; in parse() 388 Format[] formats = streamElement.formats; in build() 481 byte[] keyId = Base64.decode(keyIdString, Base64.DEFAULT); in getProtectionElementKeyId() 482 swap(keyId, 0, 3); in getProtectionElementKeyId() 483 swap(keyId, 1, 2); in getProtectionElementKeyId() 484 swap(keyId, 4, 5); in getProtectionElementKeyId() [all …]
|
| /external/ltp/testcases/kernel/syscalls/keyctl/ |
| D | keyctl05.c | 1 // SPDX-License-Identifier: GPL-2.0-or-later 4 * Copyright (c) Linux Test Project, 2017-2024 13 * 1. Try to update a key of a type that has a ->preparse() method but not an 14 * ->update() method. Examples are the "asymmetric" and "dns_resolver" key 16 * "asymmetric" key type's ->free_preparse() method will dereference a 20 * need a specially-formatted payload and several kernel config options. We 41 * in DER format, generated using: 43 * openssl req -x509 -newkey rsa:512 -batch -nodes -outform der \ 91 key_serial_t keyid; in test_update_nonupdatable() local 123 keyid = TST_RET; in test_update_nonupdatable() [all …]
|
| /external/tink/go/jwt/ |
| D | jwt_encoding.go | 7 // http://www.apache.org/licenses/LICENSE-2.0 29 // keyID returns the keyID in big endian format base64 encoded if the key output prefix is of type … 30 func keyID(keyID uint32, outPrefixType tpb.OutputPrefixType) *string { func 35 binary.BigEndian.PutUint32(buf, keyID) 99 // Expects the token to be in compact serialization format. The signature should be verified before… 144 ((c >= '0') && (c <= '9')) || ((c == '-') || (c == '_')))
|
| /external/tink/java_src/src/test/java/com/google/crypto/tink/daead/ |
| D | DaeadTest.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 64 () -> otherAead.decryptDeterministically(ciphertext, associatedData)); in createEncryptDecryptDeterministically() 69 GeneralSecurityException.class, () -> daead.decryptDeterministically(ciphertext, invalid)); in createEncryptDecryptDeterministically() 72 () -> daead.decryptDeterministically(invalid, associatedData)); in createEncryptDecryptDeterministically() 75 () -> daead.decryptDeterministically(empty, associatedData)); in createEncryptDecryptDeterministically() 85 // A keyset with one AEAD key, serialized in Tink's JSON format. 99 + " \"keyId\": 961932622," 134 + " \"keyId\": 961932622," 144 + " \"keyId\": 385749617," 154 + " \"keyId\": 919668303," [all …]
|
| /external/tink/java_src/src/test/java/com/google/crypto/tink/prf/ |
| D | PrfTest.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 73 // A keyset with one MAC key, serialized in Tink's JSON format. 87 + " \"keyId\": 166506972," 120 + " \"keyId\": 166506972," 129 + " \"keyId\": 1781110497," 140 + " \"keyId\": 1593211602," 181 + " \"keyId\": 961932622," 193 assertThrows(GeneralSecurityException.class, () -> handle.getPrimitive(Mac.class)); in getPrimitiveFromNonMacKeyset_throws()
|
| /external/tink/java_src/src/test/java/com/google/crypto/tink/mac/ |
| D | MacTest.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 78 assertThrows(GeneralSecurityException.class, () -> otherMac.verifyMac(tag, data)); in create_computeVerify() 82 assertThrows(GeneralSecurityException.class, () -> mac.verifyMac(invalid, data)); in create_computeVerify() 83 assertThrows(GeneralSecurityException.class, () -> mac.verifyMac(tag, invalid)); in create_computeVerify() 84 assertThrows(GeneralSecurityException.class, () -> mac.verifyMac(empty, data)); in create_computeVerify() 85 assertThrows(GeneralSecurityException.class, () -> mac.verifyMac(tag, empty)); in create_computeVerify() 142 // A keyset with one MAC key, serialized in Tink's JSON format. 155 + " \"keyId\": 207420876," 187 + " \"keyId\": 207420876," 196 + " \"keyId\": 2054715504," [all …]
|
| /external/fsverity-utils/man/ |
| D | fsverity.1 | 1 .\" SPDX-License-Identifier: MIT 5 .\" Use of this source code is governed by an MIT-style license that can be 8 .TH "FSVERITY" "1" "March 2024" "fsverity-utils v1.6" "User Commands" 13 fsverity - userspace utility for fs-verity 43 \f[B]fsverity\f[R] is a userspace utility for fs-verity. 44 fs-verity is a Linux kernel filesystem feature that does transparent on-demand 45 verification of the contents of read-only files using Merkle trees. 47 \f[B]fsverity\f[R] can enable fs-verity on files, retrieve the digests of 48 fs-verity files, and sign files for use with fs-verity (among other things). 53 For examples and more information about the fs-verity kernel feature, see the [all …]
|
| /external/tink/java_src/src/test/java/com/google/crypto/tink/aead/ |
| D | AeadTest.java | 7 // http://www.apache.org/licenses/LICENSE-2.0 83 GeneralSecurityException.class, () -> otherAead.decrypt(ciphertext, associatedData)); in createEncryptDecrypt() 87 assertThrows(GeneralSecurityException.class, () -> aead.decrypt(ciphertext, invalid)); in createEncryptDecrypt() 88 assertThrows(GeneralSecurityException.class, () -> aead.decrypt(invalid, associatedData)); in createEncryptDecrypt() 89 assertThrows(GeneralSecurityException.class, () -> aead.decrypt(empty, associatedData)); in createEncryptDecrypt() 94 // A keyset with one AEAD key, serialized in Tink's JSON format. 107 + " \"keyId\": 42818733," 141 + " \"keyId\": 42818733," 150 + " \"keyId\": 365202604," 160 + " \"keyId\": 277095770," [all …]
|