/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 775 string MacMessage(const string& message, Digest digest, size_t mac_length) { in MacMessage() 779 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length)); in MacMessage() 782 void CheckHmacTestVector(const string& key, const string& message, Digest digest, in CheckHmacTestVector() 790 .Digest(digest), in CheckHmacTestVector() 1133 .Digest(Digest::NONE) in TEST_F() 1181 .Digest(Digest::NONE) in TEST_F() 1211 .Digest(Digest::NONE))); in TEST_F() 1222 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(190).Digest(Digest::NONE))); in TEST_F() 1236 .Digest(Digest::NONE))) in TEST_F() 1244 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(size).Digest(Digest::NONE))) in TEST_F() [all …]
|
D | openssl_utils.h | 34 inline const EVP_MD* openssl_digest(android::hardware::keymaster::V3_0::Digest digest) { in openssl_digest() 36 case android::hardware::keymaster::V3_0::Digest::NONE: in openssl_digest() 38 case android::hardware::keymaster::V3_0::Digest::MD5: in openssl_digest() 40 case android::hardware::keymaster::V3_0::Digest::SHA1: in openssl_digest() 42 case android::hardware::keymaster::V3_0::Digest::SHA_2_224: in openssl_digest() 44 case android::hardware::keymaster::V3_0::Digest::SHA_2_256: in openssl_digest() 46 case android::hardware::keymaster::V3_0::Digest::SHA_2_384: in openssl_digest() 48 case android::hardware::keymaster::V3_0::Digest::SHA_2_512: in openssl_digest()
|
D | keymaster_tags.h | 336 inline const char* stringify(Digest digest) { 338 case Digest::NONE: 340 case Digest::MD5: 342 case Digest::SHA1: 344 case Digest::SHA_2_224: 346 case Digest::SHA_2_256: 348 case Digest::SHA_2_384: 350 case Digest::SHA_2_512:
|
D | authorization_set.h | 291 AuthorizationSetBuilder& Digest(std::initializer_list<Digest> digests); 299 template <typename... T> AuthorizationSetBuilder& Digest(T&&... a) { in Digest() function 300 return Digest({std::forward<T>(a)...}); in Digest() 388 Authorization(TAG_DIGEST, Digest::NONE); in NoDigestOrPadding() 405 AuthorizationSetBuilder::Digest(std::initializer_list<V3_0::Digest> digests) { in Digest() function
|
D | key_param_output.h | 40 ::std::ostream& operator<<(::std::ostream& os, Digest value);
|
D | key_param_output.cpp | 42 ::std::ostream& operator<<(::std::ostream& os, Digest value) { in operator <<()
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 530 .Digest(Digest::NONE) in TEST_F() 565 .Digest(Digest::NONE) in TEST_F() 583 .Digest(Digest::NONE) in TEST_F() 614 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(key_size).Digest(Digest::NONE), in TEST_F() 646 .Digest(Digest::NONE))); in TEST_F() 662 .Digest(Digest::NONE))); in TEST_F() 676 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(key_size).Digest(Digest::NONE), in TEST_F() 681 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(190).Digest(Digest::NONE))); in TEST_F() 697 .Digest(Digest::NONE))); in TEST_F() 709 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(size).Digest(Digest::NONE))) in TEST_F() [all …]
|
D | KeymasterHidlTest.cpp | 464 string KeymasterHidlTest::MacMessage(const string& message, Digest digest, size_t mac_length) { in MacMessage() 468 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length)); in MacMessage() 471 void KeymasterHidlTest::CheckHmacTestVector(const string& key, const string& message, Digest digest, in CheckHmacTestVector() 479 .Digest(digest), in CheckHmacTestVector() 717 std::vector<Digest> KeymasterHidlTest::ValidDigests(bool withNone, bool withMD5) { in ValidDigests() 722 return {Digest::NONE, Digest::MD5, Digest::SHA1, in ValidDigests() 723 Digest::SHA_2_224, Digest::SHA_2_256, Digest::SHA_2_384, in ValidDigests() 724 Digest::SHA_2_512}; in ValidDigests() 726 return {Digest::NONE, Digest::SHA1, Digest::SHA_2_224, in ValidDigests() 727 Digest::SHA_2_256, Digest::SHA_2_384, Digest::SHA_2_512}; in ValidDigests() [all …]
|
D | KeymasterHidlTest.h | 177 string MacMessage(const string& message, Digest digest, size_t mac_length); 179 void CheckHmacTestVector(const string& key, const string& message, Digest digest, 222 std::vector<Digest> ValidDigests(bool withNone, bool withMD5); 223 std::vector<Digest> InvalidDigests();
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | openssl_utils.h | 40 inline const EVP_MD* openssl_digest(android::hardware::keymaster::V4_0::Digest digest) { in openssl_digest() 42 case android::hardware::keymaster::V4_0::Digest::NONE: in openssl_digest() 44 case android::hardware::keymaster::V4_0::Digest::MD5: in openssl_digest() 46 case android::hardware::keymaster::V4_0::Digest::SHA1: in openssl_digest() 48 case android::hardware::keymaster::V4_0::Digest::SHA_2_224: in openssl_digest() 50 case android::hardware::keymaster::V4_0::Digest::SHA_2_256: in openssl_digest() 52 case android::hardware::keymaster::V4_0::Digest::SHA_2_384: in openssl_digest() 54 case android::hardware::keymaster::V4_0::Digest::SHA_2_512: in openssl_digest()
|
D | authorization_set.h | 291 AuthorizationSetBuilder& Digest(std::vector<Digest> digests); 299 AuthorizationSetBuilder& Digest(T&&... a) { in Digest() function 300 return Digest({std::forward<T>(a)...}); in Digest()
|
D | key_param_output.h | 36 inline ::std::ostream& operator<<(::std::ostream& os, Digest value) {
|
/hardware/interfaces/keymaster/4.0/support/ |
D | authorization_set.cpp | 534 Authorization(TAG_DIGEST, Digest::NONE); in NoDigestOrPadding() 562 AuthorizationSetBuilder& AuthorizationSetBuilder::Digest(std::vector<V4_0::Digest> digests) { in Digest() function in android::hardware::keymaster::V4_0::AuthorizationSetBuilder
|
/hardware/interfaces/keymaster/3.0/ |
D | types.hal | 45 DIGEST = TagType:ENUM_REP | 5, /** Digest. */ 204 enum Digest : uint32_t { 382 Digest digest;
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 436 * IKeymasterDevice implementations must support all Digest values (see types.hal) for RSA 982 * verifying, Digest::NONE is specified for the digest. No digest is necessary for unpadded 985 * o PaddingMode::RSA_PKCS1_1_5_SIGN padding requires a digest. The digest may be Digest::NONE, 995 * o PaddingMode::RSA_PSS padding requires a digest, which may not be Digest::NONE. If 996 * Digest::NONE is specified, the begin() must return ErrorCode::INCOMPATIBLE_DIGEST. In 1001 * o PaddingMode::RSA_OAEP padding requires a digest, which may not be Digest::NONE. If 1002 * Digest::NONE is specified, begin() must return ErrorCode::INCOMPATIBLE_DIGEST. The OAEP 1134 * For signing and verification operations with Digest::NONE, this method must accept the entire 1143 * For signing and verification operations with Digest::NONE, this method must accept the entire
|
D | types.hal | 113 * values are defined by the Digest enum. 921 enum Digest : uint32_t { 1146 Digest digest;
|