/hardware/interfaces/usb/1.2/ |
D | IUsb.hal | 30 * presence detection algorithm. Calling enableContaminantPresenceDetection 38 * @param enable true Enable contaminant presence detection algorithm. 39 * false Disable contaminant presence detection algorithm. 46 * presence protection algorithm. Calling 50 * Used to enable/disable contaminant presence protection algorithm. 57 * change in the status of contaminant presence protection algorithm.
|
/hardware/libhardware/include/hardware/ |
D | keymaster1.h | 150 keymaster_algorithm_t algorithm, 169 keymaster_algorithm_t algorithm, 188 keymaster_algorithm_t algorithm, 207 keymaster_algorithm_t algorithm, 225 keymaster_algorithm_t algorithm,
|
/hardware/interfaces/drm/1.3/vts/functional/ |
D | drm_hal_test.cpp | 43 const hidl_string& algorithm{"RSASSA-PSS-SHA1"}; in TEST_P() local 47 sessionId, algorithm, message, wrappedKey, in TEST_P()
|
/hardware/interfaces/security/keymint/support/ |
D | remote_prov_utils.cpp | 166 CoseKeyAlgorithm algorithm; in constructCoseKey() local 173 algorithm = (eekId.empty()) ? EDDSA : ECDH_ES_HKDF_256; in constructCoseKey() 179 algorithm = (eekId.empty()) ? ES256 : ECDH_ES_HKDF_256; in constructCoseKey() 190 .add(CoseKey::ALGORITHM, algorithm) in constructCoseKey() 320 auto& algorithm = parsedProtParams->asMap()->get(ALGORITHM); in verifyAndParseCoseSign1Cwt() local 321 if (!algorithm || !algorithm->asInt() || in verifyAndParseCoseSign1Cwt() 322 (algorithm->asInt()->value() != EDDSA && algorithm->asInt()->value() != ES256)) { in verifyAndParseCoseSign1Cwt() 338 if (algorithm->asInt()->value() == EDDSA) { in verifyAndParseCoseSign1Cwt()
|
/hardware/interfaces/drm/aidl/android/hardware/drm/ |
D | IDrmPlugin.aidl | 613 void setCipherAlgorithm(in byte[] sessionId, in String algorithm); in setCipherAlgorithm() argument 641 void setMacAlgorithm(in byte[] sessionId, in String algorithm); in setMacAlgorithm() argument 721 in byte[] sessionId, in String algorithm, in byte[] message, in signRSA() argument
|
/hardware/interfaces/drm/aidl/aidl_api/android.hardware.drm/1/android/hardware/drm/ |
D | IDrmPlugin.aidl | 67 void setCipherAlgorithm(in byte[] sessionId, in String algorithm); in setCipherAlgorithm() argument 69 void setMacAlgorithm(in byte[] sessionId, in String algorithm); in setMacAlgorithm() argument 74 byte[] signRSA(in byte[] sessionId, in String algorithm, in byte[] message, in byte[] wrappedkey); in signRSA() argument
|
/hardware/interfaces/drm/aidl/aidl_api/android.hardware.drm/current/android/hardware/drm/ |
D | IDrmPlugin.aidl | 67 void setCipherAlgorithm(in byte[] sessionId, in String algorithm); in setCipherAlgorithm() argument 69 void setMacAlgorithm(in byte[] sessionId, in String algorithm); in setMacAlgorithm() argument 74 byte[] signRSA(in byte[] sessionId, in String algorithm, in byte[] message, in byte[] wrappedkey); in signRSA() argument
|
/hardware/interfaces/drm/1.0/vts/functional/ |
D | drm_hal_clearkey_test.cpp | 594 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local 595 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P() 605 hidl_string algorithm; in TEST_P() local 606 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P() 616 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local 617 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P() 626 hidl_string algorithm = "HmacSHA256"; in TEST_P() local 627 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P() 637 hidl_string algorithm; in TEST_P() local 638 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P() [all …]
|
D | drm_hal_vendor_test.cpp | 690 hidl_string algorithm; in TEST_P() local 691 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P() 703 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local 704 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P() 718 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local 719 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P() 732 hidl_string algorithm; in TEST_P() local 733 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P() 745 hidl_string algorithm = "HmacSHA256"; in TEST_P() local 746 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P() [all …]
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | KeyMintAidlTestBase.cpp | 298 auto algorithm = key_desc.GetTagValue(TAG_ALGORITHM); in GenerateKey() local 299 EXPECT_TRUE(algorithm); in GenerateKey() 300 if (algorithm && in GenerateKey() 301 (algorithm.value() == Algorithm::RSA || algorithm.value() == Algorithm::EC)) { in GenerateKey() 371 auto algorithm = key_desc.GetTagValue(TAG_ALGORITHM); in ImportKey() local 372 EXPECT_TRUE(algorithm); in ImportKey() 373 if (algorithm && in ImportKey() 374 (algorithm.value() == Algorithm::RSA || algorithm.value() == Algorithm::EC)) { in ImportKey() 419 auto algorithm = allAuths.GetTagValue(TAG_ALGORITHM); in ImportWrappedKey() local 420 EXPECT_TRUE(algorithm); in ImportWrappedKey() [all …]
|
D | SecureElementProvisioningTest.cpp | 80 const auto& algorithm = protMap->asMap()->get(cppcose::ALGORITHM); in validateMacedRootOfTrust() local 81 ASSERT_TRUE(algorithm); in validateMacedRootOfTrust() 82 ASSERT_TRUE(algorithm->asInt()); in validateMacedRootOfTrust() 83 ASSERT_EQ(algorithm->asInt()->value(), cppcose::HMAC_256); in validateMacedRootOfTrust()
|
D | KeyMintAidlTestBase.h | 299 vector<uint32_t> ValidKeySizes(Algorithm algorithm); 300 vector<uint32_t> InvalidKeySizes(Algorithm algorithm); 302 vector<BlockMode> ValidBlockModes(Algorithm algorithm); 303 vector<PaddingMode> ValidPaddingModes(Algorithm algorithm, BlockMode blockMode); 304 vector<PaddingMode> InvalidPaddingModes(Algorithm algorithm, BlockMode blockMode);
|
/hardware/interfaces/drm/1.0/default/ |
D | DrmPlugin.cpp | 252 const hidl_vec<uint8_t>& sessionId, const hidl_string& algorithm) { in setCipherAlgorithm() argument 255 String8(algorithm.c_str())); in setCipherAlgorithm() 260 const hidl_vec<uint8_t>& sessionId, const hidl_string& algorithm) { in setMacAlgorithm() argument 263 String8(algorithm.c_str())); in setMacAlgorithm() 312 const hidl_string& algorithm, const hidl_vec<uint8_t>& message, in signRSA() argument 317 String8(algorithm.c_str()), toVector(message), toVector(wrappedKey), in signRSA()
|
D | DrmPlugin.h | 104 const hidl_string& algorithm) override; 107 const hidl_string& algorithm) override; 126 const hidl_string& algorithm, const hidl_vec<uint8_t>& message,
|
/hardware/interfaces/drm/1.0/ |
D | IDrmPlugin.hal | 369 * Set the cipher algorithm to be used for the specified session. 372 * @param algorithm the algorithm to use. The string conforms to JCA 374 * example algorithm is "AES/CBC/PKCS5Padding". 378 * if the HAL is in a state where the algorithm cannot be set. 380 setCipherAlgorithm(SessionId sessionId, string algorithm) 384 * Set the MAC algorithm to be used for computing hashes in a session. 387 * @param algorithm the algorithm to use. The string conforms to JCA 389 * algorithm string is "HmacSHA256". 393 * if the HAL is in a state where the algorithm cannot be set. 395 setMacAlgorithm(SessionId sessionId, string algorithm) [all …]
|
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/current/android/hardware/security/keymint/ |
D | KeyParameterValue.aidl | 39 android.hardware.security.keymint.Algorithm algorithm;
|
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/2/android/hardware/security/keymint/ |
D | KeyParameterValue.aidl | 39 android.hardware.security.keymint.Algorithm algorithm;
|
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/1/android/hardware/security/keymint/ |
D | KeyParameterValue.aidl | 39 android.hardware.security.keymint.Algorithm algorithm;
|
/hardware/interfaces/security/keymint/aidl/android/hardware/security/keymint/ |
D | KeyParameterValue.aidl | 37 Algorithm algorithm;
|
/hardware/interfaces/keymaster/4.0/vts/performance/ |
D | Benchmark.cpp | 138 bool GenerateKey(Algorithm algorithm, int keySize, Digest digest = Digest::NONE, in GenerateKey() argument 147 .Authorization(TAG_ALGORITHM, algorithm) 154 if (algorithm == Algorithm::RSA) { 196 optional<Algorithm> algorithm = getAlgorithm(transform); in GenerateKey() local 197 if (!algorithm) { in GenerateKey() 202 return GenerateKey(*algorithm, keySize, getDigest(transform), getPadding(transform, sign), in GenerateKey()
|
/hardware/interfaces/security/keymint/aidl/vts/performance/ |
D | KeyMintBenchmark.cpp | 155 std::optional<Algorithm> algorithm = getAlgorithm(transform); in GenerateKey() local 156 if (!algorithm) { in GenerateKey() 168 .Authorization(TAG_ALGORITHM, algorithm.value()) in GenerateKey() 178 if (algorithm == Algorithm::HMAC) { in GenerateKey() 181 if (algorithm == Algorithm::RSA) { in GenerateKey() 185 if (algorithm == Algorithm::EC) { in GenerateKey()
|
/hardware/interfaces/keymaster/4.0/support/ |
D | key_param_output.cpp | 54 return os << param.f.algorithm; in operator <<()
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | attestation_record.cpp | 62 ASN1_INTEGER* algorithm; member 89 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.maskedTag()), 228 copyAuthTag(record->algorithm, TAG_ALGORITHM, auth_list); in extract_auth_list()
|
D | keymaster_tags.h | 217 MAKE_TAG_ENUM_VALUE_ACCESSOR(TAG_ALGORITHM, f.algorithm) 356 inline const char* stringify(Algorithm algorithm) { 357 switch (algorithm) {
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | KeymasterHidlTest.h | 210 std::vector<uint32_t> ValidKeySizes(Algorithm algorithm); 211 std::vector<uint32_t> InvalidKeySizes(Algorithm algorithm);
|