Searched refs:key_description (Results 1 - 25 of 29) sorted by relevance

12

/system/keymaster/
H A Daes_key.cpp72 const AuthorizationSet& key_description) const {
73 if (key_description.Contains(TAG_BLOCK_MODE, KM_MODE_GCM)) {
75 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length))
85 if (key_description.find(TAG_MIN_MAC_LENGTH) != -1) {
H A Dhmac_key.cpp65 const AuthorizationSet& key_description) const {
67 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits))
71 if (!key_description.GetTagValue(TAG_DIGEST, &digest)) {
72 LOG_E("%d digests specified for HMAC key", key_description.GetTagCount(TAG_DIGEST));
H A Dec_keymaster0_key.cpp36 keymaster_error_t EcdsaKeymaster0KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
44 return super::GenerateKey(key_description, key_blob, hw_enforced, sw_enforced);
48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size);
64 return context_->CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob,
69 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format,
76 return super::ImportKey(key_description, input_key_material_format, input_key_material,
82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
68 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
H A Dsymmetric_key.cpp34 keymaster_error_t SymmetricKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
42 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) ||
46 keymaster_error_t error = validate_algorithm_specific_new_key_params(key_description);
61 return context_->CreateKeyBlob(key_description, KM_ORIGIN_GENERATED, key_material, key_blob,
65 keymaster_error_t SymmetricKeyFactory::ImportKey(const AuthorizationSet& key_description, argument
74 AuthorizationSet authorizations(key_description);
83 keymaster_error_t error = validate_algorithm_specific_new_key_params(key_description);
H A Dec_keymaster1_key.cpp41 static void UpdateToWorkAroundUnsupportedDigests(const AuthorizationSet& key_description, argument
45 for (const keymaster_key_param_t& entry : key_description) {
64 keymaster_error_t EcdsaKeymaster1KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
69 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy);
74 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format,
78 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy);
73 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
H A Drsa_keymaster0_key.cpp36 keymaster_error_t RsaKeymaster0KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
44 if (!key_description.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) {
50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
66 return context_->CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob,
71 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format,
81 UpdateImportKeyDescription(key_description, input_key_material_format, input_key_material,
70 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
H A Drsa_keymaster1_key.cpp43 static void UpdateToWorkAroundUnsupportedDigests(const AuthorizationSet& key_description, argument
49 for (const keymaster_key_param_t& entry : key_description) {
85 keymaster_error_t RsaKeymaster1KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
90 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy);
95 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format,
99 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy);
94 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
H A Dsymmetric_key.h32 keymaster_error_t GenerateKey(const AuthorizationSet& key_description,
35 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
49 validate_algorithm_specific_new_key_params(const AuthorizationSet& key_description) const = 0;
H A Dec_key_factory.cpp44 keymaster_error_t EcKeyFactory::GetCurveAndSize(const AuthorizationSet& key_description, argument
47 if (!key_description.GetTagValue(TAG_EC_CURVE, curve)) {
49 if (!key_description.GetTagValue(TAG_KEY_SIZE, key_size_bits)) {
63 if (key_description.GetTagValue(TAG_KEY_SIZE, &tag_key_size_bits) &&
74 keymaster_error_t EcKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
81 AuthorizationSet authorizations(key_description);
127 keymaster_error_t EcKeyFactory::ImportKey(const AuthorizationSet& key_description, argument
139 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
147 keymaster_error_t EcKeyFactory::UpdateImportKeyDescription(const AuthorizationSet& key_description, argument
165 updated_description->Reinitialize(key_description);
[all...]
H A Drsa_key_factory.cpp52 keymaster_error_t RsaKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
59 AuthorizationSet authorizations(key_description);
99 keymaster_error_t RsaKeyFactory::ImportKey(const AuthorizationSet& key_description, argument
112 UpdateImportKeyDescription(key_description, input_key_material_format, input_key_material,
120 keymaster_error_t RsaKeyFactory::UpdateImportKeyDescription(const AuthorizationSet& key_description, argument
139 updated_description->Reinitialize(key_description);
H A Dec_keymaster0_key.h41 keymaster_error_t GenerateKey(const AuthorizationSet& key_description,
45 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
H A Dec_keymaster1_key.h45 keymaster_error_t GenerateKey(const AuthorizationSet& key_description,
49 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
H A Drsa_keymaster0_key.h41 keymaster_error_t GenerateKey(const AuthorizationSet& key_description,
45 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
H A Drsa_keymaster1_key.h45 keymaster_error_t GenerateKey(const AuthorizationSet& key_description,
49 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
H A Daes_key.h48 const AuthorizationSet& key_description) const override;
H A Dhmac_key.h44 const AuthorizationSet& key_description) const override;
H A Dkeymaster1_engine.h46 keymaster_error_t GenerateKey(const AuthorizationSet& key_description,
50 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
H A Dkeymaster1_engine.cpp79 keymaster_error_t Keymaster1Engine::GenerateKey(const AuthorizationSet& key_description, argument
87 keymaster_error_t error = keymaster1_device_->generate_key(keymaster1_device_, &key_description,
99 keymaster_error_t Keymaster1Engine::ImportKey(const AuthorizationSet& key_description, argument
111 keymaster_error_t error = keymaster1_device_->import_key(keymaster1_device_, &key_description,
H A Dandroid_keymaster.cpp194 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
201 response->error = factory->GenerateKey(request.key_description, &key_blob,
428 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
434 response->error = factory->ImportKey(request.key_description, request.key_format,
H A Dandroid_keymaster_messages_test.cpp133 req.key_description.Reinitialize(params, array_length(params));
135 EXPECT_EQ(deserialized->key_description, req.key_description);
387 msg.key_description.Reinitialize(params, array_length(params));
392 EXPECT_EQ(msg.key_description, deserialized->key_description);
H A Dsoft_keymaster_device.cpp708 const AuthorizationSet& key_description) const {
714 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) {
719 for (auto& entry : key_description)
722 if (RequiresSoftwareDigesting(algorithm, purpose, key_description))
742 request.key_description.Reinitialize(*params);
745 if (km1_dev && !sk_dev->KeyRequiresSoftwareDigesting(request.key_description))
792 request.key_description.Reinitialize(*params);
795 if (km1_dev && !sk_dev->KeyRequiresSoftwareDigesting(request.key_description)) {
926 request.key_description.Reinitialize(*params);
929 if (km1_dev && !sk_dev->KeyRequiresSoftwareDigesting(request.key_description))
[all...]
/system/keymaster/include/keymaster/
H A Dec_key_factory.h34 keymaster_error_t GenerateKey(const AuthorizationSet& key_description,
37 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
47 keymaster_error_t UpdateImportKeyDescription(const AuthorizationSet& key_description,
59 static keymaster_error_t GetCurveAndSize(const AuthorizationSet& key_description,
H A Drsa_key_factory.h31 keymaster_error_t GenerateKey(const AuthorizationSet& key_description,
34 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
50 keymaster_error_t UpdateImportKeyDescription(const AuthorizationSet& key_description,
H A Dkey_factory.h40 virtual keymaster_error_t GenerateKey(const AuthorizationSet& key_description,
44 virtual keymaster_error_t ImportKey(const AuthorizationSet& key_description,
H A Dkeymaster_context.h103 virtual keymaster_error_t CreateKeyBlob(const AuthorizationSet& key_description,

Completed in 321 milliseconds

12