Home
last modified time | relevance | path

Searched refs:CipherSuite (Results 1 – 11 of 11) sorted by relevance

/system/security/mls/mls-rs-crypto-boringssl/src/
Dhash.rs19 use mls_rs_core::crypto::CipherSuite;
44 pub fn new(cipher_suite: CipherSuite) -> Result<Self, HashError> { in new()
46 CipherSuite::CURVE25519_AES128 in new()
47 | CipherSuite::P256_AES128 in new()
48 | CipherSuite::CURVE25519_CHACHA => Ok(Hash::Sha256), in new()
49 CipherSuite::P384_AES256 => Ok(Hash::Sha384), in new()
50 CipherSuite::CURVE448_AES256 in new()
51 | CipherSuite::CURVE448_CHACHA in new()
52 | CipherSuite::P521_AES256 => Ok(Hash::Sha512), in new()
81 use mls_rs_core::crypto::CipherSuite;
[all …]
Deddsa.rs18 use mls_rs_core::crypto::{CipherSuite, SignaturePublicKey, SignatureSecretKey};
75 pub fn new(cipher_suite: CipherSuite) -> Option<Self> { in new()
171 use mls_rs_core::crypto::{CipherSuite, SignaturePublicKey, SignatureSecretKey};
175 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_AES128).unwrap(); in signature_key_generate()
191 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_CHACHA).unwrap(); in signature_key_derive_public()
200 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_CHACHA).unwrap(); in signature_key_derive_public_invalid_key()
217 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_AES128).unwrap(); in sign_verify()
230 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_AES128).unwrap(); in sign_invalid_key()
244 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_AES128).unwrap(); in verify_invalid_key()
262 let ed25519 = EdDsa::new(CipherSuite::CURVE25519_AES128).unwrap(); in verify_invalid_sig()
[all …]
Decdh.rs18 use mls_rs_core::crypto::{CipherSuite, HpkePublicKey, HpkeSecretKey};
67 pub fn new(cipher_suite: CipherSuite) -> Option<Self> { in new()
160 use mls_rs_core::crypto::{CipherSuite, HpkePublicKey, HpkeSecretKey};
176 let x25519 = Ecdh::new(CipherSuite::CURVE25519_AES128).unwrap(); in dh()
182 let x25519 = Ecdh::new(CipherSuite::CURVE25519_AES128).unwrap(); in dh_invalid_key()
219 let x25519 = Ecdh::new(CipherSuite::CURVE25519_CHACHA).unwrap(); in to_public()
228 let x25519 = Ecdh::new(CipherSuite::CURVE25519_CHACHA).unwrap(); in to_public_invalid_key()
237 let x25519 = Ecdh::new(CipherSuite::CURVE25519_AES128).unwrap(); in generate()
249 let x25519 = Ecdh::new(CipherSuite::CURVE25519_AES128).unwrap(); in public_key_validate()
258 let x25519 = Ecdh::new(CipherSuite::CURVE25519_AES128).unwrap(); in public_key_validate_invalid_key()
[all …]
Dhpke.rs19 CipherSuite, HpkeCiphertext, HpkeContextR, HpkeContextS, HpkePublicKey, HpkeSecretKey,
98 pub fn new(cipher_suite: CipherSuite, dh: DH, kdf: KDF) -> Option<Self> { in new() argument
220 pub struct Hpke(pub CipherSuite);
224 pub fn new(cipher_suite: CipherSuite) -> Self { in new()
283 fn cipher_suite_to_params(cipher_suite: CipherSuite) -> Result<hpke::Params, HpkeError> { in cipher_suite_to_params()
285 CipherSuite::CURVE25519_AES128 => Ok(hpke::Params::new( in cipher_suite_to_params()
290 CipherSuite::CURVE25519_CHACHA => Ok(hpke::Params::new( in cipher_suite_to_params()
307 CipherSuite, HpkeContextR, HpkeContextS, HpkePublicKey, HpkeSecretKey,
313 fn hpke_suite_id(cipher_suite: CipherSuite) -> Vec<u8> { in hpke_suite_id()
325 let cipher_suite = CipherSuite::CURVE25519_AES128; in kdf_labeled_extract()
[all …]
Dkdf.rs19 use mls_rs_core::crypto::CipherSuite;
68 pub fn new(cipher_suite: CipherSuite) -> Option<Self> { in new()
146 use mls_rs_core::crypto::CipherSuite;
160 let kdf = Kdf::new(CipherSuite::CURVE25519_AES128).unwrap(); in sha256()
176 let kdf = Kdf::new(CipherSuite::CURVE448_CHACHA).unwrap(); in sha512()
183 let kdf = Kdf::new(CipherSuite::CURVE25519_AES128).unwrap(); in sha256_extract_short_ikm()
192 let kdf = Kdf::new(CipherSuite::CURVE25519_AES128).unwrap(); in sha256_expand_short_prk()
203 let kdf = Kdf::new(CipherSuite::CURVE25519_AES128).unwrap(); in sha256_expand_long_okm()
212 let kdf = Kdf::new(CipherSuite::CURVE448_CHACHA).unwrap(); in sha512_extract_short_ikm()
221 let kdf = Kdf::new(CipherSuite::CURVE448_CHACHA).unwrap(); in sha512_expand_short_prk()
[all …]
Dlib.rs28 CipherSuite, CipherSuiteProvider, CryptoProvider, HpkeCiphertext, HpkePublicKey, HpkeSecretKey,
77 pub enabled_cipher_suites: Vec<CipherSuite>,
87 pub fn with_enabled_cipher_suites(enabled_cipher_suites: Vec<CipherSuite>) -> Self { in with_enabled_cipher_suites()
92 pub fn all_supported_cipher_suites() -> Vec<CipherSuite> { in all_supported_cipher_suites()
93 vec![CipherSuite::CURVE25519_AES128, CipherSuite::CURVE25519_CHACHA] in all_supported_cipher_suites()
106 fn supported_cipher_suites(&self) -> Vec<CipherSuite> { in supported_cipher_suites() argument
112 cipher_suite: CipherSuite, in cipher_suite_provider() argument
135 cipher_suite: CipherSuite,
151 pub fn new(cipher_suite: CipherSuite, kem: KEM, kdf: KDF, aead: AEAD) -> Option<Self> { in new() argument
183 fn cipher_suite(&self) -> CipherSuite { in cipher_suite() argument
[all …]
Daead.rs18 use mls_rs_core::crypto::CipherSuite;
78 pub fn new(cipher_suite: CipherSuite) -> Option<Self> { in new()
194 use mls_rs_core::crypto::CipherSuite;
199 CipherSuite::CURVE25519_AES128, in get_aeads()
200 CipherSuite::CURVE25519_CHACHA, in get_aeads()
201 CipherSuite::CURVE448_AES256, in get_aeads()
/system/security/identity/
DCredential.h38 using ::android::hardware::identity::CipherSuite;
48 Credential(CipherSuite cipherSuite, const string& dataPath, const string& credentialName,
96 CipherSuite cipherSuite_;
DCredentialStore.cpp148 new Credential(CipherSuite(cipherSuite), dataPath_, credentialName, callingUid, hwInfo_, in getCredentialCommon()
168 hal_->createPresentationSession(CipherSuite(cipherSuite), &halPresentationSession); in createPresentationSession()
DSession.h40 using ::android::hardware::identity::CipherSuite;
DCredential.cpp70 Credential::Credential(CipherSuite cipherSuite, const std::string& dataPath, in Credential()