/system/security/keystore2/tests/ |
D | keystore2_client_authorizations_tests.rs | 60 .algorithm(Algorithm::EC) in gen_key_including_unique_id() 166 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_active_datetime_test_success() 198 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_future_active_datetime_test_op_fail() 230 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_future_origination_expire_datetime_test_success() 262 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_origination_expire_datetime_test_op_fail() 456 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_early_boot_only_op_fail() 488 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_max_uses_per_boot() 530 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_usage_count_limit() 561 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_usage_count_limit_one() 591 .algorithm(Algorithm::EC) in keystore2_gen_non_attested_key_auth_usage_count_limit() [all …]
|
D | keystore2_client_keystore_engine_tests.rs | 79 .algorithm(Algorithm::EC) in generate_ec_key_and_grant_to_user() 114 assert!(matches!(algo, Algorithm::RSA | Algorithm::EC)); in generate_key_and_grant_to_user() 125 Algorithm::EC => generate_ec_key_and_grant_to_user( in generate_key_and_grant_to_user() 224 Algorithm::EC, in keystore2_perofrm_crypto_op_using_keystore2_engine_ec_key_success()
|
D | keystore2_client_device_unique_attestation_tests.rs | 55 .algorithm(Algorithm::EC) in generate_ec_key_device_unique_attested_with_id_attest() 169 .algorithm(Algorithm::EC) in keystore2_gen_key_device_unique_attest_with_default_sec_level_unimplemented() 206 .algorithm(Algorithm::EC) in keystore2_gen_ec_key_device_unique_attest_with_strongbox_sec_level_test_success() 308 .algorithm(Algorithm::EC) in keystore2_device_unique_attest_key_fails_with_invalid_attestation_id()
|
D | keystore2_client_attest_key_tests.rs | 53 for algo in [Algorithm::RSA, Algorithm::EC] { in keystore2_attest_rsa_signing_key_success() 101 for algo in [Algorithm::RSA, Algorithm::EC] { in keystore2_attest_rsa_encrypt_key_success() 150 for algo in [Algorithm::RSA, Algorithm::EC] { in keystore2_attest_ec_key_success() 287 .algorithm(Algorithm::EC) in keystore2_ec_attest_key_with_multi_purpose_fail() 574 generate_attested_key_with_device_attest_ids(Algorithm::EC); in keystore2_attest_ecdsa_attestation_id() 618 Algorithm::EC, in keystore2_attest_key_fails_with_invalid_attestation_id()
|
D | keystore2_client_ec_key_tests.rs | 254 .algorithm(Algorithm::EC) in keystore2_generate_ec_key_missing_curve() 290 .algorithm(Algorithm::EC) in keystore2_generate_ec_key_25519_multi_purpose()
|
D | keystore2_client_import_keys_tests.rs | 319 .algorithm(Algorithm::EC) in keystore2_import_ec_key_success() 349 .algorithm(Algorithm::EC) in keystore2_ec_import_key_fails_with_mismatch_curve_error()
|
/system/security/keystore2/aidl/android/security/metrics/ |
D | Algorithm.aidl | 32 EC = 3, enumConstant
|
/system/ca-certificates/files/ |
D | 41a3f684.0 | 22 … Issuer: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum EC-384 CA 26 … Subject: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum EC-384 CA
|
D | bdacca6f.0 | 65 AF:44:04:C2:41:7E:48:83:DB:4E:39:02:EC:EC:84:7A:E6:CE:C9:A4
|
D | fd08c599.0 | 61 84:18:CC:85:34:EC:BC:0C:94:94:2E:08:59:9C:C7:B2:10:4E:0A:08 78 SHA1 Fingerprint=8D:A7:F9:65:EC:5E:FC:37:91:0F:1C:6E:59:FD:C1:CC:6A:6E:DE:16
|
D | d59297b8.0 | 57 0A:85:A9:77:65:05:98:7C:40:81:F8:0F:97:2C:38:F1:0A:EC:3C:CF 78 SHA1 Fingerprint=5F:3B:8C:F2:F8:10:B3:7D:78:B4:CE:EC:19:19:C3:73:34:B9:C7:74
|
D | 31188b5e.0 | 83 SHA1 Fingerprint=31:43:64:9B:EC:CE:27:EC:ED:3A:3F:0B:8F:0D:E4:E8:91:DD:EE:CA
|
D | 89c02a45.0 | 53 SHA1 Fingerprint=9F:74:4E:9F:2B:4D:BA:EC:0F:31:2C:50:B6:56:3B:8E:2D:93:C3:11
|
D | d41b5e2a.0 | 42 D3:EC:C7:3A:65:6E:CC:E1:DA:76:9A:56:FB:9C:F3:86:6D:57:E5:81
|
D | 3afde786.0 | 51 SHA1 Fingerprint=EC:8A:39:6C:40:F0:2E:BC:42:75:D4:9F:AB:1C:1A:5B:67:BE:D2:9A
|
D | a716d4ed.0 | 45 7F:10:01:16:37:3A:A4:28:E4:50:F8:A4:F7:EC:6B:32:B6:FE:E9:8B
|
D | 2d9dafe4.0 | 86 47:B8:CD:FF:E5:6F:EE:F8:B2:EC:2F:4E:0E:F9:25:B0:8E:3C:6B:C3 119 SHA1 Fingerprint=DA:FA:F7:FA:66:84:EC:06:8F:14:50:BD:C7:C2:81:A5:BC:A9:64:57
|
D | e48193cf.0 | 77 SHA1 Fingerprint=F9:B5:B6:32:45:5F:9C:BE:EC:57:5F:80:DC:E9:6E:2C:C7:B2:78:B7
|
/system/security/keystore2/test_utils/ |
D | key_generations.rs | 544 .algorithm(Algorithm::EC) in generate_ec_p256_signing_key() 593 .algorithm(Algorithm::EC) in generate_ec_key() 792 assert!(algorithm == Algorithm::RSA || algorithm == Algorithm::EC); in generate_attestation_key() 838 .algorithm(Algorithm::EC) in generate_ec_attestation_key() 879 .algorithm(Algorithm::EC) in generate_ec_256_attested_key() 994 &KeyParameter { tag: Tag::ALGORITHM, value: KeyParameterValue::Algorithm(Algorithm::EC) } in import_ec_p_256_key() 1294 .algorithm(Algorithm::EC) in generate_ec_agree_key() 1353 assert!(algorithm == Algorithm::RSA || algorithm == Algorithm::EC); in generate_key_with_attest_id() 1356 if algorithm == Algorithm::EC { in generate_key_with_attest_id() 1359 .algorithm(Algorithm::EC) in generate_key_with_attest_id() [all …]
|
/system/security/keystore2/src/legacy_blob/test_utils/ |
D | legacy_blob_test_vectors.rs | 48 KeyParameter::new(KeyParameterValue::Algorithm(Algorithm::EC), SecurityLevel::KEYSTORE), in structured_test_params() 86 KeyParameterValue::Algorithm(Algorithm::EC), in structured_test_params_cache()
|
/system/apex/tests/testdata/apkinapex/com.android.apex.vendor.test/ |
D | com.android.apex.vendor.test.pem | 6 nNfUA3lGuFQ8KD4IA+Qt9N4MoPkxpa3/Pjp5rltYUv8WHQYhm6jtFZXQLHgJh/EC
|
/system/security/keystore2/src/ |
D | remote_provisioning.rs | 76 value: KeyParameterValue::Algorithm(Algorithm::EC) in is_asymmetric_key()
|
D | metrics_store.rs | 214 Algorithm::EC => MetricsAlgorithm::EC, in process_key_creation_event_stats() 294 if key_creation_with_general_info.algorithm == MetricsAlgorithm::EC { in process_key_creation_event_stats()
|
/system/keymint/common/src/keyblob/ |
D | keyblob.cddl | 49 ; An explicit EC key for a NIST curve is in the form of an ASN.1 DER encoding of a 51 ; An explicit EC key for curve 25519 is the raw key bytes.
|
/system/security/keystore2/src/km_compat/ |
D | slot_test.cpp | 61 KMV1::makeKeyParameter(KMV1::TAG_ALGORITHM, Algorithm::EC), in generateECSingingKey() 97 KMV1::makeKeyParameter(KMV1::TAG_ALGORITHM, Algorithm::EC), in generateAndBeginECDHKeyOperation()
|