/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | authorization_set.h | 268 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent); 269 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 271 AuthorizationSetBuilder& AesKey(uint32_t key_size); 272 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 274 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent); 275 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent); 276 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size); 278 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size); 314 inline AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, in RsaKey() argument 317 Authorization(TAG_KEY_SIZE, key_size); in RsaKey() [all …]
|
D | keymaster_hidl_hal_test.cpp | 1128 for (auto key_size : {1024, 2048, 3072, 4096}) { in TEST_F() 1132 .RsaSigningKey(key_size, 3) in TEST_F() 1149 EXPECT_TRUE(crypto_params.Contains(TAG_KEY_SIZE, key_size)); in TEST_F() 1176 for (auto key_size : {224, 256, 384, 521}) { in TEST_F() 1180 .EcdsaSigningKey(key_size) in TEST_F() 1195 EXPECT_TRUE(crypto_params.Contains(TAG_KEY_SIZE, key_size)); in TEST_F() 1277 constexpr size_t key_size = 128; in TEST_F() local 1279 .HmacKey(key_size) in TEST_F() 1293 EXPECT_TRUE(teeEnforced.Contains(TAG_KEY_SIZE, key_size)); in TEST_F() 1298 EXPECT_TRUE(teeEnforced.Contains(TAG_KEY_SIZE, key_size)); in TEST_F() [all …]
|
D | attestation_record.cpp | 63 ASN1_INTEGER* key_size; member 90 ASN1_EXP_OPT(KM_AUTH_LIST, key_size, ASN1_INTEGER, TAG_KEY_SIZE.maskedTag()), 235 copyAuthTag(record->key_size, TAG_KEY_SIZE, auth_list); in extract_auth_list()
|
/hardware/interfaces/keymaster/4.0/support/ |
D | authorization_set.cpp | 419 AuthorizationSetBuilder& AuthorizationSetBuilder::RsaKey(uint32_t key_size, in RsaKey() argument 422 Authorization(TAG_KEY_SIZE, key_size); in RsaKey() 427 AuthorizationSetBuilder& AuthorizationSetBuilder::EcdsaKey(uint32_t key_size) { in EcdsaKey() argument 429 Authorization(TAG_KEY_SIZE, key_size); in EcdsaKey() 439 AuthorizationSetBuilder& AuthorizationSetBuilder::AesKey(uint32_t key_size) { in AesKey() argument 441 return Authorization(TAG_KEY_SIZE, key_size); in AesKey() 444 AuthorizationSetBuilder& AuthorizationSetBuilder::TripleDesKey(uint32_t key_size) { in TripleDesKey() argument 446 return Authorization(TAG_KEY_SIZE, key_size); in TripleDesKey() 449 AuthorizationSetBuilder& AuthorizationSetBuilder::HmacKey(uint32_t key_size) { in HmacKey() argument 451 Authorization(TAG_KEY_SIZE, key_size); in HmacKey() [all …]
|
D | attestation_record.cpp | 64 ASN1_INTEGER* key_size; member 90 ASN1_EXP_OPT(KM_AUTH_LIST, key_size, ASN1_INTEGER, TAG_KEY_SIZE.maskedTag()), 232 copyAuthTag(record->key_size, TAG_KEY_SIZE, auth_list); in extract_auth_list()
|
/hardware/interfaces/keymaster/4.0/support/include/keymasterV4_0/ |
D | authorization_set.h | 257 AuthorizationSetBuilder& RsaKey(uint32_t key_size, uint64_t public_exponent); 258 AuthorizationSetBuilder& EcdsaKey(uint32_t key_size); 260 AuthorizationSetBuilder& AesKey(uint32_t key_size); 261 AuthorizationSetBuilder& TripleDesKey(uint32_t key_size); 262 AuthorizationSetBuilder& HmacKey(uint32_t key_size); 264 AuthorizationSetBuilder& RsaSigningKey(uint32_t key_size, uint64_t public_exponent); 265 AuthorizationSetBuilder& RsaEncryptionKey(uint32_t key_size, uint64_t public_exponent); 266 AuthorizationSetBuilder& EcdsaSigningKey(uint32_t key_size); 268 AuthorizationSetBuilder& AesEncryptionKey(uint32_t key_size); 269 AuthorizationSetBuilder& TripleDesEncryptionKey(uint32_t key_size);
|
/hardware/libhardware/include/hardware/ |
D | keymaster_common.h | 133 uint32_t key_size; member
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 379 for (auto key_size : ValidKeySizes(Algorithm::RSA)) { in TEST_F() local 383 .RsaSigningKey(key_size, 3) in TEST_F() 400 EXPECT_TRUE(crypto_params.Contains(TAG_KEY_SIZE, key_size)) in TEST_F() 401 << "Key size " << key_size << "missing"; in TEST_F() 414 for (auto key_size : InvalidKeySizes(Algorithm::RSA)) { in TEST_F() local 418 .RsaSigningKey(key_size, 3) in TEST_F() 445 for (auto key_size : ValidKeySizes(Algorithm::EC)) { in TEST_F() local 450 GenerateKey(AuthorizationSetBuilder().EcdsaSigningKey(key_size).Digest(Digest::NONE), in TEST_F() 464 EXPECT_TRUE(crypto_params.Contains(TAG_KEY_SIZE, key_size)) in TEST_F() 465 << "Key size " << key_size << "missing"; in TEST_F() [all …]
|