/hardware/interfaces/security/keymint/support/ |
D | authorization_set.cpp | 222 AuthorizationSetBuilder& AuthorizationSetBuilder::Digest(std::vector<keymint::Digest> digests) { in Digest() argument 223 for (auto digest : digests) { in Digest() 230 const std::vector<android::hardware::security::keymint::Digest>& digests) { in OaepMGFDigest() argument 231 for (auto digest : digests) { in OaepMGFDigest()
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | authorization_set.h | 291 AuthorizationSetBuilder& Digest(std::initializer_list<Digest> digests); 405 AuthorizationSetBuilder::Digest(std::initializer_list<V3_0::Digest> digests) { in Digest() argument 406 for (auto digest : digests) { in Digest()
|
D | keymaster_hidl_hal_test.cpp | 2132 auto digests = { in TEST_P() local 2143 .Digest(digests)); in TEST_P() 2149 for (auto digest : digests) { in TEST_P() 2653 auto digests = {Digest::MD5, Digest::SHA1, Digest::SHA_2_224, in TEST_P() local 2661 .Digest(digests))); in TEST_P() 2665 for (auto digest : digests) { in TEST_P()
|
/hardware/interfaces/security/keymint/support/include/keymint_support/ |
D | authorization_set.h | 299 AuthorizationSetBuilder& OaepMGFDigest(const std::vector<Digest>& digests); 300 AuthorizationSetBuilder& Digest(std::vector<Digest> digests);
|
/hardware/libhardware/modules/sensors/dynamic_sensor/HidUtils/ |
D | HidParser.cpp | 293 std::ostream& operator<<(std::ostream &os, const HidParser::DigestVector &digests) { in operator <<() argument 294 for (const auto &i : digests) { in operator <<()
|
/hardware/libhardware/include_all/hardware/ |
D | keymaster1.h | 190 keymaster_digest_t** digests,
|
/hardware/libhardware/include/hardware/ |
D | keymaster1.h | 190 keymaster_digest_t** digests,
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | authorization_set.h | 293 AuthorizationSetBuilder& Digest(std::vector<Digest> digests);
|
/hardware/interfaces/keymaster/4.0/support/ |
D | authorization_set.cpp | 562 AuthorizationSetBuilder& AuthorizationSetBuilder::Digest(std::vector<V4_0::Digest> digests) { in Digest() argument 563 for (auto digest : digests) { in Digest()
|
/hardware/interfaces/security/rkp/aidl/android/hardware/security/keymint/ |
D | generateCertificateRequestV2.cddl | 90 ; for DICE, which specifies all digests are 64 bytes.
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | KeyMintTest.cpp | 3402 auto digests = (curve == EcCurve::CURVE_25519) in TEST_P() local 3409 .Digest(digests) in TEST_P() 3416 for (auto digest : digests) { in TEST_P() 5435 auto digests = ValidDigests(false /* withNone */, true /* withMD5 */); in TEST_P() local 5443 .Digest(digests) in TEST_P() 5452 for (auto digest : digests) { in TEST_P() 5563 auto digests = ValidDigests(false /* withNone */, true /* withMD5 */); in TEST_P() local 5567 .OaepMGFDigest(digests) in TEST_P() 5575 mgf1DigestsInAuths.reserve(digests.size()); in TEST_P() 5584 std::sort(digests.begin(), digests.end()); in TEST_P() [all …]
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 1757 auto digests = ValidDigests(true /* withNone */, false /* withMD5 */); in TEST_P() local 1765 .Digest(digests)); in TEST_P() 1771 for (auto digest : digests) { in TEST_P() 2485 auto digests = ValidDigests(false /* withNone */, true /* withMD5 */); in TEST_P() local 2492 .Digest(digests))); in TEST_P() 2496 for (auto digest : digests) { in TEST_P()
|
/hardware/interfaces/keymaster/3.0/ |
D | IKeymasterDevice.hal | 50 * devices launched initially with Android O or later must support all digests.
|
/hardware/interfaces/keymaster/4.0/ |
D | types.hal | 117 * is missing or the specified digest is not in the digests associated with the key, the
|
D | IKeymasterDevice.hal | 979 * There are some important interactions between padding modes and digests:
|