Home
last modified time | relevance | path

Searched refs:algorithm (Results 1 – 25 of 51) sorted by relevance

123

/hardware/interfaces/usb/1.2/
DIUsb.hal30 * presence detection algorithm. Calling enableContaminantPresenceDetection
38 * @param enable true Enable contaminant presence detection algorithm.
39 * false Disable contaminant presence detection algorithm.
46 * presence protection algorithm. Calling
50 * Used to enable/disable contaminant presence protection algorithm.
57 * change in the status of contaminant presence protection algorithm.
/hardware/libhardware/include/hardware/
Dkeymaster1.h150 keymaster_algorithm_t algorithm,
169 keymaster_algorithm_t algorithm,
188 keymaster_algorithm_t algorithm,
207 keymaster_algorithm_t algorithm,
225 keymaster_algorithm_t algorithm,
/hardware/interfaces/drm/1.3/vts/functional/
Ddrm_hal_test.cpp43 const hidl_string& algorithm{"RSASSA-PSS-SHA1"}; in TEST_P() local
47 sessionId, algorithm, message, wrappedKey, in TEST_P()
/hardware/interfaces/security/keymint/support/
Dremote_prov_utils.cpp166 CoseKeyAlgorithm algorithm; in constructCoseKey() local
173 algorithm = (eekId.empty()) ? EDDSA : ECDH_ES_HKDF_256; in constructCoseKey()
179 algorithm = (eekId.empty()) ? ES256 : ECDH_ES_HKDF_256; in constructCoseKey()
190 .add(CoseKey::ALGORITHM, algorithm) in constructCoseKey()
320 auto& algorithm = parsedProtParams->asMap()->get(ALGORITHM); in verifyAndParseCoseSign1Cwt() local
321 if (!algorithm || !algorithm->asInt() || in verifyAndParseCoseSign1Cwt()
322 (algorithm->asInt()->value() != EDDSA && algorithm->asInt()->value() != ES256)) { in verifyAndParseCoseSign1Cwt()
338 if (algorithm->asInt()->value() == EDDSA) { in verifyAndParseCoseSign1Cwt()
/hardware/interfaces/drm/aidl/android/hardware/drm/
DIDrmPlugin.aidl613 void setCipherAlgorithm(in byte[] sessionId, in String algorithm); in setCipherAlgorithm() argument
641 void setMacAlgorithm(in byte[] sessionId, in String algorithm); in setMacAlgorithm() argument
721 in byte[] sessionId, in String algorithm, in byte[] message, in signRSA() argument
/hardware/interfaces/drm/aidl/aidl_api/android.hardware.drm/1/android/hardware/drm/
DIDrmPlugin.aidl67 void setCipherAlgorithm(in byte[] sessionId, in String algorithm); in setCipherAlgorithm() argument
69 void setMacAlgorithm(in byte[] sessionId, in String algorithm); in setMacAlgorithm() argument
74 byte[] signRSA(in byte[] sessionId, in String algorithm, in byte[] message, in byte[] wrappedkey); in signRSA() argument
/hardware/interfaces/drm/aidl/aidl_api/android.hardware.drm/current/android/hardware/drm/
DIDrmPlugin.aidl67 void setCipherAlgorithm(in byte[] sessionId, in String algorithm); in setCipherAlgorithm() argument
69 void setMacAlgorithm(in byte[] sessionId, in String algorithm); in setMacAlgorithm() argument
74 byte[] signRSA(in byte[] sessionId, in String algorithm, in byte[] message, in byte[] wrappedkey); in signRSA() argument
/hardware/interfaces/drm/1.0/vts/functional/
Ddrm_hal_clearkey_test.cpp594 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local
595 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P()
605 hidl_string algorithm; in TEST_P() local
606 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P()
616 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local
617 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P()
626 hidl_string algorithm = "HmacSHA256"; in TEST_P() local
627 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P()
637 hidl_string algorithm; in TEST_P() local
638 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P()
[all …]
Ddrm_hal_vendor_test.cpp690 hidl_string algorithm; in TEST_P() local
691 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P()
703 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local
704 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P()
718 hidl_string algorithm = "AES/CBC/NoPadding"; in TEST_P() local
719 Status status = drmPlugin->setCipherAlgorithm(session, algorithm); in TEST_P()
732 hidl_string algorithm; in TEST_P() local
733 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P()
745 hidl_string algorithm = "HmacSHA256"; in TEST_P() local
746 Status status = drmPlugin->setMacAlgorithm(session, algorithm); in TEST_P()
[all …]
/hardware/interfaces/security/keymint/aidl/vts/functional/
DKeyMintAidlTestBase.cpp298 auto algorithm = key_desc.GetTagValue(TAG_ALGORITHM); in GenerateKey() local
299 EXPECT_TRUE(algorithm); in GenerateKey()
300 if (algorithm && in GenerateKey()
301 (algorithm.value() == Algorithm::RSA || algorithm.value() == Algorithm::EC)) { in GenerateKey()
371 auto algorithm = key_desc.GetTagValue(TAG_ALGORITHM); in ImportKey() local
372 EXPECT_TRUE(algorithm); in ImportKey()
373 if (algorithm && in ImportKey()
374 (algorithm.value() == Algorithm::RSA || algorithm.value() == Algorithm::EC)) { in ImportKey()
419 auto algorithm = allAuths.GetTagValue(TAG_ALGORITHM); in ImportWrappedKey() local
420 EXPECT_TRUE(algorithm); in ImportWrappedKey()
[all …]
DSecureElementProvisioningTest.cpp80 const auto& algorithm = protMap->asMap()->get(cppcose::ALGORITHM); in validateMacedRootOfTrust() local
81 ASSERT_TRUE(algorithm); in validateMacedRootOfTrust()
82 ASSERT_TRUE(algorithm->asInt()); in validateMacedRootOfTrust()
83 ASSERT_EQ(algorithm->asInt()->value(), cppcose::HMAC_256); in validateMacedRootOfTrust()
DKeyMintAidlTestBase.h299 vector<uint32_t> ValidKeySizes(Algorithm algorithm);
300 vector<uint32_t> InvalidKeySizes(Algorithm algorithm);
302 vector<BlockMode> ValidBlockModes(Algorithm algorithm);
303 vector<PaddingMode> ValidPaddingModes(Algorithm algorithm, BlockMode blockMode);
304 vector<PaddingMode> InvalidPaddingModes(Algorithm algorithm, BlockMode blockMode);
/hardware/interfaces/drm/1.0/default/
DDrmPlugin.cpp252 const hidl_vec<uint8_t>& sessionId, const hidl_string& algorithm) { in setCipherAlgorithm() argument
255 String8(algorithm.c_str())); in setCipherAlgorithm()
260 const hidl_vec<uint8_t>& sessionId, const hidl_string& algorithm) { in setMacAlgorithm() argument
263 String8(algorithm.c_str())); in setMacAlgorithm()
312 const hidl_string& algorithm, const hidl_vec<uint8_t>& message, in signRSA() argument
317 String8(algorithm.c_str()), toVector(message), toVector(wrappedKey), in signRSA()
DDrmPlugin.h104 const hidl_string& algorithm) override;
107 const hidl_string& algorithm) override;
126 const hidl_string& algorithm, const hidl_vec<uint8_t>& message,
/hardware/interfaces/drm/1.0/
DIDrmPlugin.hal369 * Set the cipher algorithm to be used for the specified session.
372 * @param algorithm the algorithm to use. The string conforms to JCA
374 * example algorithm is "AES/CBC/PKCS5Padding".
378 * if the HAL is in a state where the algorithm cannot be set.
380 setCipherAlgorithm(SessionId sessionId, string algorithm)
384 * Set the MAC algorithm to be used for computing hashes in a session.
387 * @param algorithm the algorithm to use. The string conforms to JCA
389 * algorithm string is "HmacSHA256".
393 * if the HAL is in a state where the algorithm cannot be set.
395 setMacAlgorithm(SessionId sessionId, string algorithm)
[all …]
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/current/android/hardware/security/keymint/
DKeyParameterValue.aidl39 android.hardware.security.keymint.Algorithm algorithm;
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/2/android/hardware/security/keymint/
DKeyParameterValue.aidl39 android.hardware.security.keymint.Algorithm algorithm;
/hardware/interfaces/security/keymint/aidl/aidl_api/android.hardware.security.keymint/1/android/hardware/security/keymint/
DKeyParameterValue.aidl39 android.hardware.security.keymint.Algorithm algorithm;
/hardware/interfaces/security/keymint/aidl/android/hardware/security/keymint/
DKeyParameterValue.aidl37 Algorithm algorithm;
/hardware/interfaces/keymaster/4.0/vts/performance/
DBenchmark.cpp138 bool GenerateKey(Algorithm algorithm, int keySize, Digest digest = Digest::NONE, in GenerateKey() argument
147 .Authorization(TAG_ALGORITHM, algorithm)
154 if (algorithm == Algorithm::RSA) {
196 optional<Algorithm> algorithm = getAlgorithm(transform); in GenerateKey() local
197 if (!algorithm) { in GenerateKey()
202 return GenerateKey(*algorithm, keySize, getDigest(transform), getPadding(transform, sign), in GenerateKey()
/hardware/interfaces/security/keymint/aidl/vts/performance/
DKeyMintBenchmark.cpp155 std::optional<Algorithm> algorithm = getAlgorithm(transform); in GenerateKey() local
156 if (!algorithm) { in GenerateKey()
168 .Authorization(TAG_ALGORITHM, algorithm.value()) in GenerateKey()
178 if (algorithm == Algorithm::HMAC) { in GenerateKey()
181 if (algorithm == Algorithm::RSA) { in GenerateKey()
185 if (algorithm == Algorithm::EC) { in GenerateKey()
/hardware/interfaces/keymaster/4.0/support/
Dkey_param_output.cpp54 return os << param.f.algorithm; in operator <<()
/hardware/interfaces/keymaster/3.0/vts/functional/
Dattestation_record.cpp62 ASN1_INTEGER* algorithm; member
89 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.maskedTag()),
228 copyAuthTag(record->algorithm, TAG_ALGORITHM, auth_list); in extract_auth_list()
Dkeymaster_tags.h217 MAKE_TAG_ENUM_VALUE_ACCESSOR(TAG_ALGORITHM, f.algorithm)
356 inline const char* stringify(Algorithm algorithm) {
357 switch (algorithm) {
/hardware/interfaces/keymaster/4.0/vts/functional/
DKeymasterHidlTest.h210 std::vector<uint32_t> ValidKeySizes(Algorithm algorithm);
211 std::vector<uint32_t> InvalidKeySizes(Algorithm algorithm);

123