/system/security/mls/mls-rs-crypto-boringssl/src/ |
D | hash.rs | 19 use mls_rs_core::crypto::CipherSuite; 44 pub fn new(cipher_suite: CipherSuite) -> Result<Self, HashError> { in new() 46 CipherSuite::CURVE25519_AES128 in new() 47 | CipherSuite::P256_AES128 in new() 48 | CipherSuite::CURVE25519_CHACHA => Ok(Hash::Sha256), in new() 49 CipherSuite::P384_AES256 => Ok(Hash::Sha384), in new() 50 CipherSuite::CURVE448_AES256 in new() 51 | CipherSuite::CURVE448_CHACHA in new() 52 | CipherSuite::P521_AES256 => Ok(Hash::Sha512), in new() 81 use mls_rs_core::crypto::CipherSuite; [all …]
|
D | eddsa.rs | 18 use mls_rs_core::crypto::{CipherSuite, SignaturePublicKey, SignatureSecretKey}; 75 pub fn new(cipher_suite: CipherSuite) -> Option<Self> { in new() 171 use mls_rs_core::crypto::{CipherSuite, SignaturePublicKey, SignatureSecretKey}; 175 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_AES128).unwrap(); in signature_key_generate() 191 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_CHACHA).unwrap(); in signature_key_derive_public() 200 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_CHACHA).unwrap(); in signature_key_derive_public_invalid_key() 217 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_AES128).unwrap(); in sign_verify() 230 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_AES128).unwrap(); in sign_invalid_key() 244 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_AES128).unwrap(); in verify_invalid_key() 262 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_AES128).unwrap(); in verify_invalid_sig() [all …]
|
D | ecdh.rs | 18 use mls_rs_core::crypto::{CipherSuite, HpkePublicKey, HpkeSecretKey}; 67 pub fn new(cipher_suite: CipherSuite) -> Option<Self> { in new() 160 use mls_rs_core::crypto::{CipherSuite, HpkePublicKey, HpkeSecretKey}; 176 let x25519 = Ecdh::new(CipherSuite::CURVE25519_AES128).unwrap(); in dh() 182 let x25519 = Ecdh::new(CipherSuite::CURVE25519_AES128).unwrap(); in dh_invalid_key() 219 let x25519 = Ecdh::new(CipherSuite::CURVE25519_CHACHA).unwrap(); in to_public() 228 let x25519 = Ecdh::new(CipherSuite::CURVE25519_CHACHA).unwrap(); in to_public_invalid_key() 237 let x25519 = Ecdh::new(CipherSuite::CURVE25519_AES128).unwrap(); in generate() 249 let x25519 = Ecdh::new(CipherSuite::CURVE25519_AES128).unwrap(); in public_key_validate() 258 let x25519 = Ecdh::new(CipherSuite::CURVE25519_AES128).unwrap(); in public_key_validate_invalid_key() [all …]
|
D | hpke.rs | 19 CipherSuite, HpkeCiphertext, HpkeContextR, HpkeContextS, HpkePublicKey, HpkeSecretKey, 98 pub fn new(cipher_suite: CipherSuite, dh: DH, kdf: KDF) -> Option<Self> { in new() argument 220 pub struct Hpke(pub CipherSuite); 224 pub fn new(cipher_suite: CipherSuite) -> Self { in new() 283 fn cipher_suite_to_params(cipher_suite: CipherSuite) -> Result<hpke::Params, HpkeError> { in cipher_suite_to_params() 285 CipherSuite::CURVE25519_AES128 => Ok(hpke::Params::new( in cipher_suite_to_params() 290 CipherSuite::CURVE25519_CHACHA => Ok(hpke::Params::new( in cipher_suite_to_params() 307 CipherSuite, HpkeContextR, HpkeContextS, HpkePublicKey, HpkeSecretKey, 313 fn hpke_suite_id(cipher_suite: CipherSuite) -> Vec<u8> { in hpke_suite_id() 325 let cipher_suite = CipherSuite::CURVE25519_AES128; in kdf_labeled_extract() [all …]
|
D | kdf.rs | 19 use mls_rs_core::crypto::CipherSuite; 68 pub fn new(cipher_suite: CipherSuite) -> Option<Self> { in new() 146 use mls_rs_core::crypto::CipherSuite; 160 let kdf = Kdf::new(CipherSuite::CURVE25519_AES128).unwrap(); in sha256() 176 let kdf = Kdf::new(CipherSuite::CURVE448_CHACHA).unwrap(); in sha512() 183 let kdf = Kdf::new(CipherSuite::CURVE25519_AES128).unwrap(); in sha256_extract_short_ikm() 192 let kdf = Kdf::new(CipherSuite::CURVE25519_AES128).unwrap(); in sha256_expand_short_prk() 203 let kdf = Kdf::new(CipherSuite::CURVE25519_AES128).unwrap(); in sha256_expand_long_okm() 212 let kdf = Kdf::new(CipherSuite::CURVE448_CHACHA).unwrap(); in sha512_extract_short_ikm() 221 let kdf = Kdf::new(CipherSuite::CURVE448_CHACHA).unwrap(); in sha512_expand_short_prk() [all …]
|
D | lib.rs | 28 CipherSuite, CipherSuiteProvider, CryptoProvider, HpkeCiphertext, HpkePublicKey, HpkeSecretKey, 77 pub enabled_cipher_suites: Vec<CipherSuite>, 87 pub fn with_enabled_cipher_suites(enabled_cipher_suites: Vec<CipherSuite>) -> Self { in with_enabled_cipher_suites() 92 pub fn all_supported_cipher_suites() -> Vec<CipherSuite> { in all_supported_cipher_suites() 93 vec![CipherSuite::CURVE25519_AES128, CipherSuite::CURVE25519_CHACHA] in all_supported_cipher_suites() 106 fn supported_cipher_suites(&self) -> Vec<CipherSuite> { in supported_cipher_suites() argument 112 cipher_suite: CipherSuite, in cipher_suite_provider() argument 135 cipher_suite: CipherSuite, 151 pub fn new(cipher_suite: CipherSuite, kem: KEM, kdf: KDF, aead: AEAD) -> Option<Self> { in new() argument 183 fn cipher_suite(&self) -> CipherSuite { in cipher_suite() argument [all …]
|
D | aead.rs | 18 use mls_rs_core::crypto::CipherSuite; 78 pub fn new(cipher_suite: CipherSuite) -> Option<Self> { in new() 194 use mls_rs_core::crypto::CipherSuite; 199 CipherSuite::CURVE25519_AES128, in get_aeads() 200 CipherSuite::CURVE25519_CHACHA, in get_aeads() 201 CipherSuite::CURVE448_AES256, in get_aeads()
|
/system/security/identity/ |
D | Credential.h | 38 using ::android::hardware::identity::CipherSuite; 48 Credential(CipherSuite cipherSuite, const string& dataPath, const string& credentialName, 96 CipherSuite cipherSuite_;
|
D | CredentialStore.cpp | 148 new Credential(CipherSuite(cipherSuite), dataPath_, credentialName, callingUid, hwInfo_, in getCredentialCommon() 168 hal_->createPresentationSession(CipherSuite(cipherSuite), &halPresentationSession); in createPresentationSession()
|
D | Session.h | 40 using ::android::hardware::identity::CipherSuite;
|
D | Credential.cpp | 70 Credential::Credential(CipherSuite cipherSuite, const std::string& dataPath, in Credential()
|