/system/security/keystore2/src/ |
D | remote_provisioning.rs | 72 tag: Tag::ALGORITHM, in is_asymmetric_key() 75 tag: Tag::ALGORITHM, in is_asymmetric_key()
|
D | sw_keyblob.rs | 64 get_tag_value(&combined, Tag::ALGORITHM).ok_or_else(|| bloberr!("No algorithm found!"))?; in export_key() 430 Tag::ALGORITHM => KeyParameterValue::Algorithm(Algorithm(val)), in deserialize_params() 669 KeyParameter { tag: Tag::ALGORITHM, value: KPV::Algorithm(Algorithm::AES) }, in test_key_new_from_serialized() 728 KeyParameter { tag: Tag::ALGORITHM, value: KPV::Algorithm(Algorithm::EC) }, in test_key_new_from_serialized() 771 tag: Tag::ALGORITHM, in test_key_new_from_serialized() 887 KeyParameter { tag: Tag::ALGORITHM, value: KPV::Algorithm(Algorithm::RSA) }, in test_key_new_from_serialized()
|
D | key_parameter.rs | 825 #[key_param(tag = ALGORITHM, field = Algorithm)] 1103 Tag::ALGORITHM => return KmKeyParameterValue::Algorithm(Default::default()), in get_field_by_tag_type() 1195 assert_eq!(key_parameter.get_tag(), Tag::ALGORITHM); in test_key_parameter() 1230 Tag::ALGORITHM.0, in test_new_from_sql_enum_i32() 1235 assert_eq!(Tag::ALGORITHM, key_param.get_tag()); in test_new_from_sql_enum_i32() 1408 insert_into_keyparameter(&db, 1, Tag::ALGORITHM.0, &Null, 1)?; in test_invalid_conversion_from_sql()
|
D | security_level.rs | 490 match params.iter().find(|kp| kp.tag == Tag::ALGORITHM) { in add_required_parameters() 665 .find(|p| p.tag == Tag::ALGORITHM) in import_key() 1104 tag: Tag::ALGORITHM, in test_rkpd_attestation_key_upgrade()
|
D | utils.rs | 203 kp.tag == Tag::ALGORITHM in import_keyblob_and_perform_op()
|
D | enforcements.rs | 439 if kp.get_tag() == Tag::ALGORITHM in authorize_create()
|
/system/keymaster/android_keymaster/ |
D | remote_provisioning_utils.cpp | 27 using cppcose::ALGORITHM; 158 auto& algo = protectedMap->asMap()->get(ALGORITHM); in validateAndExtractPubkeys() 201 .add(ALGORITHM, ECDH_ES_HKDF_256) in buildCertReqRecipients()
|
D | android_keymaster.cpp | 411 .add(CoseKey::ALGORITHM, ES256) in GenerateRkpKey()
|
/system/keymaster/cppcose/ |
D | cppcose.cpp | 241 .add(cppbor::Map().add(ALGORITHM, HMAC_256).canonicalize().encode()) in generateCoseMac0Mac() 260 .add(cppbor::Map().add(ALGORITHM, HMAC_256).canonicalize().encode()) in constructCoseMac0() 285 auto& algo = protectedMap->asMap()->get(ALGORITHM); in verifyAndParseCoseMac0() 338 bytevec protParms = protectedParams.add(ALGORITHM, ES256).canonicalize().encode(); in constructECDSACoseSign1() 351 bytevec protParms = protectedParams.add(ALGORITHM, EDDSA).canonicalize().encode(); in constructCoseSign1() 389 auto& algorithm = parsedProtParams->asMap()->get(ALGORITHM); in verifyAndParseCoseSign1() 476 .add(ALGORITHM, AES_GCM_256) in constructCoseEncrypt() 520 auto& algorithm = parsedProtParms->asMap()->get(ALGORITHM); in getSenderPubKeyFromCoseEncrypt() 599 auto& algorithm = parsedProtParams->asMap()->get(ALGORITHM); in decryptCoseEncrypt()
|
/system/security/ondevice-signing/ |
D | KeystoreHmacKey.cpp | 69 algo.tag = Tag::ALGORITHM; in createKey() 160 algo.tag = Tag::ALGORITHM; in getVerifyOpParameters() 181 algo.tag = Tag::ALGORITHM; in getSignOpParameters()
|
D | KeystoreKey.cpp | 76 algo.tag = Tag::ALGORITHM; in createKey() 272 algo.tag = Tag::ALGORITHM; in getSignOpParameters()
|
/system/security/keystore2/src/km_compat/ |
D | lib.rs | 89 tag: Tag::ALGORITHM, in generate_rsa_key() 164 tag: Tag::ALGORITHM, in test_import_key() 218 tag: Tag::ALGORITHM, in generate_aes_key() 418 tag: Tag::ALGORITHM, in test_get_key_characteristics()
|
D | km_compat_type_conversion.h | 463 case KMV1::Tag::ALGORITHM: in convertKeyParameterToLegacy() 779 case V4_0::Tag::ALGORITHM: in convertKeyParameterFromLegacy()
|
/system/keymaster/include/keymaster/cppcose/ |
D | cppcose.h | 72 ALGORITHM = 1, enumerator 142 ALGORITHM = 3, enumerator 164 !key->checkIntValue(CoseKey::ALGORITHM, expectedAlgorithm) || in parse()
|
/system/security/keystore2/test_utils/ |
D | key_generations.rs | 64 Tag::ALGORITHM, 931 &KeyParameter { tag: Tag::ALGORITHM, value: KeyParameterValue::Algorithm(Algorithm::RSA) } in import_rsa_2048_key() 994 &KeyParameter { tag: Tag::ALGORITHM, value: KeyParameterValue::Algorithm(Algorithm::EC) } in import_ec_p_256_key() 1046 &KeyParameter { tag: Tag::ALGORITHM, value: KeyParameterValue::Algorithm(Algorithm::AES) } in import_aes_key() 1106 tag: Tag::ALGORITHM, in import_3des_key() 1165 &KeyParameter { tag: Tag::ALGORITHM, value: KeyParameterValue::Algorithm(Algorithm::HMAC) } in import_hmac_key()
|
D | authorizations.rs | 55 self.0.push(KeyParameter { tag: Tag::ALGORITHM, value: KeyParameterValue::Algorithm(a) }); in algorithm()
|
/system/hardware/interfaces/wifi/keystore/1.0/default/ |
D | keystore.cpp | 234 if (element.keyParameter.tag == KMV1::Tag::ALGORITHM) { in keyStore2Sign() 252 .tag = KMV1::Tag::ALGORITHM, in keyStore2Sign()
|
/system/keymaster/contexts/ |
D | pure_soft_remote_provisioning_context.cpp | 142 .add(CoseKey::ALGORITHM, EDDSA) in GenerateBcc()
|
/system/keymaster/ng/ |
D | KeyMintUtils.cpp | 34 return KeyParameter{Tag::ALGORITHM, KeyParameterValue::make<KeyParameterValue::algorithm>( in kmEnumParam2Aidl()
|
/system/security/keystore/ |
D | keystore_cli_v2.cpp | 161 return a.keyParameter.tag == keymint::Tag::ALGORITHM && in verifyEncryptionKeyAttributes() 202 return a.keyParameter.tag == keymint::Tag::ALGORITHM && in verifyAuthenticationKeyAttributes() 589 (a.keyParameter.tag == keymint::Tag::ALGORITHM || in TestKey()
|
/system/keymaster/ng/include/ |
D | keymaster_tags.h | 167 DECLARE_TYPED_TAG(ALGORITHM);
|
/system/security/keystore-engine/ |
D | keystore2_engine.cpp | 209 .tag = KMV1::Tag::ALGORITHM, in keystore2_sign()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | attestation_record.h | 244 ALGORITHM = convert_to_eat_claim(KM_TAG_ALGORITHM), enumerator
|
/system/keymint/hal/src/ |
D | hal.rs | 255 KeyParam::Algorithm(v) => (Tag::ALGORITHM, KeyParameterValue::Algorithm(v.innto())), in fromm() 514 keymint::Tag::Tag::ALGORITHM => { in try_fromm()
|
/system/keymaster/km_openssl/ |
D | attestation_record.cpp | 325 submod->add(EatClaim::ALGORITHM, get_uint32_value(entry)); in build_eat_submod() 1632 case EatClaim::ALGORITHM: in parse_submod_values()
|