/hardware/interfaces/security/rkp/aidl/android/hardware/security/keymint/ |
D | generateCertificateRequest.cddl | 7 protected: bstr .cbor { 11 payload: bstr .cbor SignatureKeyEd25519 / 12 bstr .cbor SignatureKeyP256, 13 signature: bstr ; PureEd25519(.cbor SignatureKeySignatureInput) / 21 -2 : bstr ; Ed25519 public key 28 -2 : bstr, ; X coordinate 29 -3 : bstr ; Y coordinate 34 body_protected: bstr .cbor { 1 : AlgorithmEdDSA / AlgorithmES256 }, 35 external_aad: bstr .size 0, 36 payload: bstr .cbor SignatureKeyEd25519 / [all …]
|
D | generateCertificateRequestV2.cddl | 29 challenge: bstr .size (0..64), ; Provided by the method parameters 30 bstr .cbor T, 36 protected: bstr .cbor { 1 : AlgorithmEdDSA / AlgorithmES256 / AlgorithmES384 }, 38 payload: bstr .cbor Data / nil, 39 signature: bstr ; PureEd25519(CDI_Leaf_Priv, SignedDataSigStruct<Data>) / 46 protected: bstr .cbor { 1 : AlgorithmEdDSA / AlgorithmES256 / AlgorithmES384 }, 47 external_aad: bstr .size 0, 48 payload: bstr .cbor Data / nil, 70 ; A bstr containing a DER-encoded X.509 certificate (RSA, NIST P-curve, or EdDSA) 71 X509Certificate = bstr [all …]
|
D | MacedPublicKey.cddl | 2 protected: bstr .cbor { 1 : 5}, ; Algorithm : HMAC-256 4 payload : bstr .cbor PublicKey, 5 tag : bstr ; HMAC-256(K_mac, MAC_structure) 10 protected : bstr .cbor { 1 : 5 }, 11 external_aad : bstr .size 0, 12 payload : bstr .cbor PublicKey
|
D | PublicKey.cddl | 9 -2 : bstr, ; X coordinate, big-endian 10 -3 : bstr, ; Y coordinate, big-endian
|
D | DeviceInfoV3.cddl | 10 "vbmeta_digest": bstr, ; Taken from the AVB values
|
D | DeviceInfoV2.cddl | 10 "vbmeta_digest": bstr, ; Taken from the AVB values
|
D | DeviceInfoV1.cddl | 10 ? "vbmeta_digest": bstr, ; Taken from the AVB values
|
/hardware/interfaces/security/authgraph/aidl/android/hardware/security/authgraph/ |
D | Arc.cddl | 17 protected : bstr .cbor ArcProtectedHeaders, 19 5 : bstr .size 12 ; IV 21 ciphertext : bstr ; Enc(K, bstr .cbor Payload, encoded ArcEncStruct) 31 ? -70004 : bstr .size 16, ; Nonce (a cryptographic random number of 16 bytes) used in key 40 ? -70010 : bstr .size 32 ; "session_id" computed during the key exchange protocol 59 -4770554 : bstr, ; "challenge" - is added to an arc that encrypts an auth key from a 65 IdentityEncoded = bstr .cbor Identity 94 ? -2 : bstr, ; x coordinate 95 ? -3 : bstr, ; y coordinate 96 -4 : bstr, ; private key (d) [all …]
|
D | SignedPubKey.cddl | 17 protected: bstr .cbor SignedPubKeyProtected, 19 payload: bstr .cbor PlainPubKey, 20 signature: bstr ; PureEd25519(privateKey, SignedPubKeySigStruct) / 32 protected: bstr SignedPubKeyProtected, 33 external_aad: bstr .size 0, 34 payload: bstr .cbor PlainPubKey,
|
D | SessionIdSignature.cddl | 17 protected: bstr .cbor SessionIdSignatureProtected, 20 signature: bstr ; PureEd25519(privateKey, SessionIdSignatureSigStruct) / 30 protected: bstr SessionIdSignatureProtected, 31 external_aad: bstr .size 0, 32 payload: bstr, ; session ID payload provided separately
|
D | ExplicitKeyDiceCertChain.cddl | 23 DiceCertChainInitialPayload = bstr .cbor PubKeyEd25519 24 / bstr .cbor PubKeyECDSA256 25 / bstr .cbor PubKeyECDSA384 ; subjectPublicKey
|
D | Identity.cddl | 18 cert_chain: bstr .cbor ExplicitKeyDiceCertChain, 19 policy: bstr .cbor DicePolicy / nil,
|
D | PlainPubKey.cddl | 22 -2 : bstr, ; X coordinate, big-endian 23 -3 : bstr ; Y coordinate, big-endian
|
D | DicePolicy.cddl | 33 value = bool / int / tstr / bstr
|
/hardware/interfaces/security/secretkeeper/aidl/android/hardware/security/secretkeeper/ |
D | SecretManagement.cddl | 11 protected: bstr .cbor { 13 4 : bstr ; key identifier set to session ID produced 17 5 : bstr .size 12 ; IV 19 ciphertext : bstr ; AES-GCM-256(Key, bstr .cbor Payload) 44 sealing_policy : bstr .cbor DicePolicy, 56 updated_sealing_policy : bstr .cbor DicePolicy / nil, 59 SecretId = bstr .size 64 ; Unique identifier of the secret. 60 Secret = bstr .size 32 ; The secret value. 67 RequestSeqNum = bstr .cbor uint ; Encoded in accordance with Core Deterministic Encoding 115 ResponseSeqNum = bstr .cbor uint ; Encoded in accordance with Core Deterministic Encoding
|
/hardware/nxp/keymint/KM200/ |
D | CborConverter.cpp | 96 Bstr bstr(val); in addKeyparameters() local 97 map.add(key, std::move(bstr)); in addKeyparameters() 143 const Bstr* bstr = pair.second.get()->asBstr(); in getKeyParameter() local 144 if (bstr == nullptr) return false; in getKeyParameter() 145 for (auto bchar : bstr->value()) { in getKeyParameter() 230 const Bstr* bstr = pair.second.get()->asBstr(); in getKeyParameter() local 231 if (bstr == nullptr) return false; in getKeyParameter() 232 keyParam.blob.data = bstr->value().data(); in getKeyParameter() 233 keyParam.blob.data_length = bstr->value().size(); in getKeyParameter() 299 const Bstr* bstr = strItem.get()->asBstr(); in getBinaryArray() local [all …]
|
/hardware/nxp/keymint/KM300/ |
D | CborConverter.cpp | 158 Bstr bstr(val); in addKeyparameters() local 159 map.add(key, std::move(bstr)); in addKeyparameters() 215 const Bstr* bstr = pair.second.get()->asBstr(); in getKeyParameter() local 216 if (bstr == nullptr) { in getKeyParameter() 219 for (auto bchar : bstr->value()) { in getKeyParameter() 315 const Bstr* bstr = pair.second.get()->asBstr(); in getKeyParameter() local 316 if (bstr == nullptr) return std::nullopt; in getKeyParameter() 317 keyParam.blob.data = bstr->value().data(); in getKeyParameter() 318 keyParam.blob.data_length = bstr->value().size(); in getKeyParameter() 371 const Bstr* bstr = strItem.value().get()->asBstr(); in getByteArrayVec() local [all …]
|
/hardware/interfaces/identity/support/src/ |
D | IdentityCredentialSupport.cpp | 2111 const cppbor::Bstr* bstr = valueItem->asBstr(); in coseSignGetX5Chain() local 2112 if (bstr != nullptr) { in coseSignGetX5Chain() 2113 return bstr->value(); in coseSignGetX5Chain() 2119 const cppbor::Bstr* bstr = ((*array)[m])->asBstr(); in coseSignGetX5Chain() local 2120 if (bstr == nullptr) { in coseSignGetX5Chain() 2124 const vector<uint8_t>& certValue = bstr->value(); in coseSignGetX5Chain()
|