/packages/modules/Virtualization/libs/bssl/tests/ |
D | hkdf_test.rs | 19 use bssl_avf::{hkdf, Digester, Result}; 36 assert_eq!(OKM, hkdf::<L>(&IKM, &SALT, &INFO, Digester::sha256())?.as_slice()); in rfc5869_test_case_1() 75 assert_eq!(OKM, hkdf::<L>(&IKM, &SALT, &INFO, Digester::sha256())?.as_slice()); in rfc5869_test_case_2() 93 assert_eq!(OKM, hkdf::<L>(&IKM, &SALT, &INFO, Digester::sha256())?.as_slice()); in rfc5869_test_case_3()
|
D | eckey_test.rs | 15 use bssl_avf::{sha256, ApiName, Digester, EcKey, EcdsaError, Error, PKey, Result}; 86 let digester = Digester::sha256(); in ecdsa_p256_signing_and_verification_succeed() 102 let digester = Digester::sha384(); in ecdsa_p384_signing_and_verification_succeed() 125 let err = pkey.verify(&signature, MESSAGE1, Some(Digester::sha256())).unwrap_err(); in verifying_ecdsa_p256_signed_with_a_different_key_fails()
|
/packages/modules/Virtualization/libs/bssl/src/ |
D | hmac.rs | 17 use crate::digest::Digester; 25 hmac::<SHA256_DIGEST_LENGTH>(key, data, Digester::sha256()) 35 digester: Digester, in hmac() argument
|
D | hkdf.rs | 17 use crate::digest::Digester; 31 digester: Digester, in hkdf() argument
|
D | digest.rs | 32 pub struct Digester(pub(crate) &'static EVP_MD); struct 34 impl Digester { implementation
|
D | evp.rs | 18 use crate::digest::{Digester, DigesterContext}; 173 digester: Option<Digester>, in verify() argument
|
D | lib.rs | 42 pub use digest::Digester;
|
/packages/modules/Virtualization/service_vm/requests/src/ |
D | keyblob.rs | 19 use bssl_avf::{hkdf, rand_bytes, Aead, AeadContext, Digester, AES_GCM_NONCE_LENGTH}; 73 let kek = hkdf::<32>(kek_secret, &kek_salt, KEK_INFO, Digester::sha512())?; in new() 84 let kek = hkdf::<32>(kek_secret, &self.kek_salt, KEK_INFO, Digester::sha512())?; in decrypt_private_key()
|
D | client_vm.rs | 22 use bssl_avf::{rand_bytes, sha256, Digester, EcKey, PKey}; 195 if Digester::sha512().digest(expected_root_digest)? == vendor_partition.code_hash { in validate_vendor_partition_code_hash_if_exists() 248 if Digester::sha512().digest(&code_hash)? == actual_code_hash { in matches_any_kernel_code_hash()
|
D | dice.rs | 20 use bssl_avf::{ed25519_verify, Digester, EcKey}; 244 iana::Algorithm::ES256 => Digester::sha256(), in verify() 245 iana::Algorithm::ES384 => Digester::sha384(), in verify()
|
/packages/modules/Virtualization/libs/apkverify/src/ |
D | sigutil.rs | 87 let digester = Digester { message_digest: signature_algorithm_id.new_message_digest() }; in compute_digest() 151 struct Digester { struct 155 impl Digester { argument
|
/packages/modules/Virtualization/pvmfw/src/ |
D | instance.rs | 21 use bssl_avf::{self, hkdf, Aead, AeadContext, Digester}; 93 let key = hkdf::<32>(secret, /* salt= */ &[], b"vm-instance", Digester::sha512())?; in aead_ctx_from_secret()
|
D | main.rs | 45 use bssl_avf::Digester; 280 let salt = Digester::sha512() in salt_from_instance_id()
|