Home
last modified time | relevance | path

Searched refs:Digest (Results 1 – 16 of 16) sorted by relevance

/hardware/interfaces/keymaster/3.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp775 string MacMessage(const string& message, Digest digest, size_t mac_length) { in MacMessage()
779 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length)); in MacMessage()
782 void CheckHmacTestVector(const string& key, const string& message, Digest digest, in CheckHmacTestVector()
790 .Digest(digest), in CheckHmacTestVector()
1133 .Digest(Digest::NONE) in TEST_F()
1181 .Digest(Digest::NONE) in TEST_F()
1211 .Digest(Digest::NONE))); in TEST_F()
1222 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(190).Digest(Digest::NONE))); in TEST_F()
1236 .Digest(Digest::NONE))) in TEST_F()
1244 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(size).Digest(Digest::NONE))) in TEST_F()
[all …]
Dopenssl_utils.h34 inline const EVP_MD* openssl_digest(android::hardware::keymaster::V3_0::Digest digest) { in openssl_digest()
36 case android::hardware::keymaster::V3_0::Digest::NONE: in openssl_digest()
38 case android::hardware::keymaster::V3_0::Digest::MD5: in openssl_digest()
40 case android::hardware::keymaster::V3_0::Digest::SHA1: in openssl_digest()
42 case android::hardware::keymaster::V3_0::Digest::SHA_2_224: in openssl_digest()
44 case android::hardware::keymaster::V3_0::Digest::SHA_2_256: in openssl_digest()
46 case android::hardware::keymaster::V3_0::Digest::SHA_2_384: in openssl_digest()
48 case android::hardware::keymaster::V3_0::Digest::SHA_2_512: in openssl_digest()
Dkeymaster_tags.h336 inline const char* stringify(Digest digest) {
338 case Digest::NONE:
340 case Digest::MD5:
342 case Digest::SHA1:
344 case Digest::SHA_2_224:
346 case Digest::SHA_2_256:
348 case Digest::SHA_2_384:
350 case Digest::SHA_2_512:
Dauthorization_set.h291 AuthorizationSetBuilder& Digest(std::initializer_list<Digest> digests);
299 template <typename... T> AuthorizationSetBuilder& Digest(T&&... a) { in Digest() function
300 return Digest({std::forward<T>(a)...}); in Digest()
388 Authorization(TAG_DIGEST, Digest::NONE); in NoDigestOrPadding()
405 AuthorizationSetBuilder::Digest(std::initializer_list<V3_0::Digest> digests) { in Digest() function
Dkey_param_output.h40 ::std::ostream& operator<<(::std::ostream& os, Digest value);
Dkey_param_output.cpp42 ::std::ostream& operator<<(::std::ostream& os, Digest value) { in operator <<()
/hardware/interfaces/keymaster/4.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp530 .Digest(Digest::NONE) in TEST_F()
565 .Digest(Digest::NONE) in TEST_F()
583 .Digest(Digest::NONE) in TEST_F()
614 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(key_size).Digest(Digest::NONE), in TEST_F()
646 .Digest(Digest::NONE))); in TEST_F()
662 .Digest(Digest::NONE))); in TEST_F()
676 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(key_size).Digest(Digest::NONE), in TEST_F()
681 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(190).Digest(Digest::NONE))); in TEST_F()
697 .Digest(Digest::NONE))); in TEST_F()
709 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(size).Digest(Digest::NONE))) in TEST_F()
[all …]
DKeymasterHidlTest.cpp464 string KeymasterHidlTest::MacMessage(const string& message, Digest digest, size_t mac_length) { in MacMessage()
468 AuthorizationSetBuilder().Digest(digest).Authorization(TAG_MAC_LENGTH, mac_length)); in MacMessage()
471 void KeymasterHidlTest::CheckHmacTestVector(const string& key, const string& message, Digest digest, in CheckHmacTestVector()
479 .Digest(digest), in CheckHmacTestVector()
717 std::vector<Digest> KeymasterHidlTest::ValidDigests(bool withNone, bool withMD5) { in ValidDigests()
722 return {Digest::NONE, Digest::MD5, Digest::SHA1, in ValidDigests()
723 Digest::SHA_2_224, Digest::SHA_2_256, Digest::SHA_2_384, in ValidDigests()
724 Digest::SHA_2_512}; in ValidDigests()
726 return {Digest::NONE, Digest::SHA1, Digest::SHA_2_224, in ValidDigests()
727 Digest::SHA_2_256, Digest::SHA_2_384, Digest::SHA_2_512}; in ValidDigests()
[all …]
DKeymasterHidlTest.h177 string MacMessage(const string& message, Digest digest, size_t mac_length);
179 void CheckHmacTestVector(const string& key, const string& message, Digest digest,
222 std::vector<Digest> ValidDigests(bool withNone, bool withMD5);
223 std::vector<Digest> InvalidDigests();
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/
Dopenssl_utils.h40 inline const EVP_MD* openssl_digest(android::hardware::keymaster::V4_0::Digest digest) { in openssl_digest()
42 case android::hardware::keymaster::V4_0::Digest::NONE: in openssl_digest()
44 case android::hardware::keymaster::V4_0::Digest::MD5: in openssl_digest()
46 case android::hardware::keymaster::V4_0::Digest::SHA1: in openssl_digest()
48 case android::hardware::keymaster::V4_0::Digest::SHA_2_224: in openssl_digest()
50 case android::hardware::keymaster::V4_0::Digest::SHA_2_256: in openssl_digest()
52 case android::hardware::keymaster::V4_0::Digest::SHA_2_384: in openssl_digest()
54 case android::hardware::keymaster::V4_0::Digest::SHA_2_512: in openssl_digest()
Dauthorization_set.h291 AuthorizationSetBuilder& Digest(std::vector<Digest> digests);
299 AuthorizationSetBuilder& Digest(T&&... a) { in Digest() function
300 return Digest({std::forward<T>(a)...}); in Digest()
Dkey_param_output.h36 inline ::std::ostream& operator<<(::std::ostream& os, Digest value) {
/hardware/interfaces/keymaster/4.0/support/
Dauthorization_set.cpp534 Authorization(TAG_DIGEST, Digest::NONE); in NoDigestOrPadding()
562 AuthorizationSetBuilder& AuthorizationSetBuilder::Digest(std::vector<V4_0::Digest> digests) { in Digest() function in android::hardware::keymaster::V4_0::AuthorizationSetBuilder
/hardware/interfaces/keymaster/3.0/
Dtypes.hal45 DIGEST = TagType:ENUM_REP | 5, /** Digest. */
204 enum Digest : uint32_t {
382 Digest digest;
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal436 * IKeymasterDevice implementations must support all Digest values (see types.hal) for RSA
982 * verifying, Digest::NONE is specified for the digest. No digest is necessary for unpadded
985 * o PaddingMode::RSA_PKCS1_1_5_SIGN padding requires a digest. The digest may be Digest::NONE,
995 * o PaddingMode::RSA_PSS padding requires a digest, which may not be Digest::NONE. If
996 * Digest::NONE is specified, the begin() must return ErrorCode::INCOMPATIBLE_DIGEST. In
1001 * o PaddingMode::RSA_OAEP padding requires a digest, which may not be Digest::NONE. If
1002 * Digest::NONE is specified, begin() must return ErrorCode::INCOMPATIBLE_DIGEST. The OAEP
1134 * For signing and verification operations with Digest::NONE, this method must accept the entire
1143 * For signing and verification operations with Digest::NONE, this method must accept the entire
Dtypes.hal113 * values are defined by the Digest enum.
921 enum Digest : uint32_t {
1146 Digest digest;