/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 757 string MacMessage(const string& message, Digest digest, size_t mac_length) { in MacMessage() 761 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length)); in MacMessage() 764 void CheckHmacTestVector(const string& key, const string& message, Digest digest, in CheckHmacTestVector() 772 .Digest(digest), in CheckHmacTestVector() 1102 .Digest(Digest::NONE) in TEST_P() 1150 .Digest(Digest::NONE) in TEST_P() 1180 .Digest(Digest::NONE))); in TEST_P() 1191 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(190).Digest(Digest::NONE))); in TEST_P() 1205 .Digest(Digest::NONE))) in TEST_P() 1213 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(size).Digest(Digest::NONE))) in TEST_P() [all …]
|
D | openssl_utils.h | 34 inline const EVP_MD* openssl_digest(android::hardware::keymaster::V3_0::Digest digest) { in openssl_digest() 36 case android::hardware::keymaster::V3_0::Digest::NONE: in openssl_digest() 38 case android::hardware::keymaster::V3_0::Digest::MD5: in openssl_digest() 40 case android::hardware::keymaster::V3_0::Digest::SHA1: in openssl_digest() 42 case android::hardware::keymaster::V3_0::Digest::SHA_2_224: in openssl_digest() 44 case android::hardware::keymaster::V3_0::Digest::SHA_2_256: in openssl_digest() 46 case android::hardware::keymaster::V3_0::Digest::SHA_2_384: in openssl_digest() 48 case android::hardware::keymaster::V3_0::Digest::SHA_2_512: in openssl_digest()
|
D | keymaster_tags.h | 336 inline const char* stringify(Digest digest) { 338 case Digest::NONE: 340 case Digest::MD5: 342 case Digest::SHA1: 344 case Digest::SHA_2_224: 346 case Digest::SHA_2_256: 348 case Digest::SHA_2_384: 350 case Digest::SHA_2_512:
|
D | authorization_set.h | 291 AuthorizationSetBuilder& Digest(std::initializer_list<Digest> digests); 299 template <typename... T> AuthorizationSetBuilder& Digest(T&&... a) { in Digest() function 300 return Digest({std::forward<T>(a)...}); in Digest() 388 Authorization(TAG_DIGEST, Digest::NONE); in NoDigestOrPadding() 405 AuthorizationSetBuilder::Digest(std::initializer_list<V3_0::Digest> digests) { in Digest() function
|
D | key_param_output.h | 40 ::std::ostream& operator<<(::std::ostream& os, Digest value);
|
D | key_param_output.cpp | 42 ::std::ostream& operator<<(::std::ostream& os, Digest value) { in operator <<()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 540 .Digest(Digest::NONE) in TEST_P() 576 .Digest(Digest::NONE) in TEST_P() 607 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(key_size).Digest(Digest::NONE), in TEST_P() 638 .Digest(Digest::NONE))); in TEST_P() 652 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(key_size).Digest(Digest::NONE), in TEST_P() 657 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(190).Digest(Digest::NONE))); in TEST_P() 673 .Digest(Digest::NONE))); in TEST_P() 685 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(size).Digest(Digest::NONE))) in TEST_P() 698 Digest digest; in TEST_P() 700 digest = Digest::SHA_2_256; in TEST_P() [all …]
|
D | KeymasterHidlTest.cpp | 439 string KeymasterHidlTest::MacMessage(const string& message, Digest digest, size_t mac_length) { in MacMessage() 443 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length)); in MacMessage() 446 void KeymasterHidlTest::CheckHmacTestVector(const string& key, const string& message, Digest digest, in CheckHmacTestVector() 454 .Digest(digest), in CheckHmacTestVector() 710 std::vector<Digest> KeymasterHidlTest::ValidDigests(bool withNone, bool withMD5) { in ValidDigests() 716 return {Digest::NONE, Digest::MD5, Digest::SHA1, in ValidDigests() 717 Digest::SHA_2_224, Digest::SHA_2_256, Digest::SHA_2_384, in ValidDigests() 718 Digest::SHA_2_512}; in ValidDigests() 720 return {Digest::NONE, Digest::SHA1, Digest::SHA_2_224, in ValidDigests() 721 Digest::SHA_2_256, Digest::SHA_2_384, Digest::SHA_2_512}; in ValidDigests() [all …]
|
D | KeymasterHidlTest.h | 167 string MacMessage(const string& message, Digest digest, size_t mac_length); 169 void CheckHmacTestVector(const string& key, const string& message, Digest digest, 214 std::vector<Digest> ValidDigests(bool withNone, bool withMD5); 215 std::vector<Digest> InvalidDigests();
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | openssl_utils.h | 42 inline const EVP_MD* openssl_digest(android::hardware::keymaster::V4_0::Digest digest) { in openssl_digest() 44 case android::hardware::keymaster::V4_0::Digest::NONE: in openssl_digest() 46 case android::hardware::keymaster::V4_0::Digest::MD5: in openssl_digest() 48 case android::hardware::keymaster::V4_0::Digest::SHA1: in openssl_digest() 50 case android::hardware::keymaster::V4_0::Digest::SHA_2_224: in openssl_digest() 52 case android::hardware::keymaster::V4_0::Digest::SHA_2_256: in openssl_digest() 54 case android::hardware::keymaster::V4_0::Digest::SHA_2_384: in openssl_digest() 56 case android::hardware::keymaster::V4_0::Digest::SHA_2_512: in openssl_digest()
|
D | authorization_set.h | 291 AuthorizationSetBuilder& Digest(std::vector<Digest> digests); 299 AuthorizationSetBuilder& Digest(T&&... a) { in Digest() function 300 return Digest({std::forward<T>(a)...}); in Digest()
|
D | key_param_output.h | 36 inline ::std::ostream& operator<<(::std::ostream& os, Digest value) {
|
/hardware/interfaces/keymaster/4.1/vts/functional/ |
D | Keymaster4_1HidlTest.h | 75 .Digest(Digest::SHA_2_256) in CreateTestKeys() 86 .Digest(Digest::NONE) in CreateTestKeys() 97 .Digest(Digest::SHA_2_256) in CreateTestKeys() 126 AuthorizationSetBuilder().Digest(Digest::NONE).Padding(PaddingMode::NONE)); in UseRsaKey() 133 AuthorizationSetBuilder().Digest(Digest::SHA_2_256)); in UseEcdsaKey()
|
D | DeviceUniqueAttestationTest.cpp | 164 .Digest(Digest::SHA_2_256) in TEST_P() 181 .Digest(Digest::SHA_2_256) in TEST_P() 200 .Digest(Digest::SHA_2_256) in TEST_P() 228 .Digest(Digest::SHA_2_256) in TEST_P() 242 .Digest(Digest::SHA_2_256) in TEST_P() 269 .Digest(Digest::SHA_2_256) in TEST_P()
|
/hardware/interfaces/keymaster/4.0/vts/performance/ |
D | Benchmark.cpp | 138 bool GenerateKey(Algorithm algorithm, int keySize, Digest digest = Digest::NONE, in GenerateKey() 148 .Digest(digest) 216 .Digest(getDigest(transform)); in getOperationParams() 374 Digest getDigest(string transform) { in getDigest() 376 return Digest::MD5; in getDigest() 379 return Digest::SHA1; in getDigest() 381 return Digest::SHA_2_224; in getDigest() 383 return Digest::SHA_2_256; in getDigest() 385 return Digest::SHA_2_384; in getDigest() 387 return Digest::SHA_2_512; in getDigest() [all …]
|
/hardware/interfaces/keymaster/4.1/support/include/keymasterV4_1/ |
D | keymaster_tags.h | 28 using V4_0::Digest;
|
/hardware/interfaces/keymaster/4.0/support/ |
D | authorization_set.cpp | 534 Authorization(TAG_DIGEST, Digest::NONE); in NoDigestOrPadding() 562 AuthorizationSetBuilder& AuthorizationSetBuilder::Digest(std::vector<V4_0::Digest> digests) { in Digest() function in android::hardware::keymaster::V4_0::AuthorizationSetBuilder
|
/hardware/interfaces/keymaster/3.0/ |
D | types.hal | 45 DIGEST = TagType:ENUM_REP | 5, /** Digest. */ 204 enum Digest : uint32_t { 382 Digest digest;
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 436 * IKeymasterDevice implementations must support all Digest values (see types.hal) for RSA 982 * verifying, Digest::NONE is specified for the digest. No digest is necessary for unpadded 985 * o PaddingMode::RSA_PKCS1_1_5_SIGN padding requires a digest. The digest may be Digest::NONE, 995 * o PaddingMode::RSA_PSS padding requires a digest, which may not be Digest::NONE. If 996 * Digest::NONE is specified, the begin() must return ErrorCode::INCOMPATIBLE_DIGEST. In 1001 * o PaddingMode::RSA_OAEP padding requires a digest, which may not be Digest::NONE. If 1002 * Digest::NONE is specified, begin() must return ErrorCode::INCOMPATIBLE_DIGEST. The OAEP 1132 * For signing and verification operations with Digest::NONE, this method must accept the entire 1141 * For signing and verification operations with Digest::NONE, this method must accept the entire
|
D | types.hal | 113 * values are defined by the Digest enum. 921 enum Digest : uint32_t { 1146 Digest digest;
|