/system/keymaster/ |
H A D | aes_key.cpp | 72 const AuthorizationSet& key_description) const { 73 if (key_description.Contains(TAG_BLOCK_MODE, KM_MODE_GCM)) { 75 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length)) 85 if (key_description.find(TAG_MIN_MAC_LENGTH) != -1) {
|
H A D | hmac_key.cpp | 65 const AuthorizationSet& key_description) const { 67 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) 71 if (!key_description.GetTagValue(TAG_DIGEST, &digest)) { 72 LOG_E("%d digests specified for HMAC key", key_description.GetTagCount(TAG_DIGEST));
|
H A D | ec_keymaster0_key.cpp | 36 keymaster_error_t EcdsaKeymaster0KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 44 return super::GenerateKey(key_description, key_blob, hw_enforced, sw_enforced); 48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); 64 return context_->CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob, 69 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, 76 return super::ImportKey(key_description, input_key_material_format, input_key_material, 82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 68 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
|
H A D | symmetric_key.cpp | 34 keymaster_error_t SymmetricKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 42 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) || 46 keymaster_error_t error = validate_algorithm_specific_new_key_params(key_description); 61 return context_->CreateKeyBlob(key_description, KM_ORIGIN_GENERATED, key_material, key_blob, 65 keymaster_error_t SymmetricKeyFactory::ImportKey(const AuthorizationSet& key_description, argument 74 AuthorizationSet authorizations(key_description); 83 keymaster_error_t error = validate_algorithm_specific_new_key_params(key_description);
|
H A D | ec_keymaster1_key.cpp | 41 static void UpdateToWorkAroundUnsupportedDigests(const AuthorizationSet& key_description, argument 45 for (const keymaster_key_param_t& entry : key_description) { 64 keymaster_error_t EcdsaKeymaster1KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 69 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy); 74 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, 78 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy); 73 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
|
H A D | rsa_keymaster0_key.cpp | 36 keymaster_error_t RsaKeymaster0KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 44 if (!key_description.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) { 50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { 66 return context_->CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob, 71 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, 81 UpdateImportKeyDescription(key_description, input_key_material_format, input_key_material, 70 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
|
H A D | rsa_keymaster1_key.cpp | 43 static void UpdateToWorkAroundUnsupportedDigests(const AuthorizationSet& key_description, argument 49 for (const keymaster_key_param_t& entry : key_description) { 85 keymaster_error_t RsaKeymaster1KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 90 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy); 95 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, 99 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy); 94 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
|
H A D | symmetric_key.h | 32 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 35 keymaster_error_t ImportKey(const AuthorizationSet& key_description, 49 validate_algorithm_specific_new_key_params(const AuthorizationSet& key_description) const = 0;
|
H A D | ec_key_factory.cpp | 44 keymaster_error_t EcKeyFactory::GetCurveAndSize(const AuthorizationSet& key_description, argument 47 if (!key_description.GetTagValue(TAG_EC_CURVE, curve)) { 49 if (!key_description.GetTagValue(TAG_KEY_SIZE, key_size_bits)) { 63 if (key_description.GetTagValue(TAG_KEY_SIZE, &tag_key_size_bits) && 74 keymaster_error_t EcKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 81 AuthorizationSet authorizations(key_description); 127 keymaster_error_t EcKeyFactory::ImportKey(const AuthorizationSet& key_description, argument 139 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 147 keymaster_error_t EcKeyFactory::UpdateImportKeyDescription(const AuthorizationSet& key_description, argument 165 updated_description->Reinitialize(key_description); [all...] |
H A D | rsa_key_factory.cpp | 52 keymaster_error_t RsaKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 59 AuthorizationSet authorizations(key_description); 99 keymaster_error_t RsaKeyFactory::ImportKey(const AuthorizationSet& key_description, argument 112 UpdateImportKeyDescription(key_description, input_key_material_format, input_key_material, 120 keymaster_error_t RsaKeyFactory::UpdateImportKeyDescription(const AuthorizationSet& key_description, argument 139 updated_description->Reinitialize(key_description);
|
H A D | ec_keymaster0_key.h | 41 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 45 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
|
H A D | ec_keymaster1_key.h | 45 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 49 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
|
H A D | rsa_keymaster0_key.h | 41 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 45 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
|
H A D | rsa_keymaster1_key.h | 45 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 49 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
|
H A D | aes_key.h | 48 const AuthorizationSet& key_description) const override;
|
H A D | hmac_key.h | 44 const AuthorizationSet& key_description) const override;
|
H A D | keymaster1_engine.h | 46 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 50 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
|
H A D | keymaster1_engine.cpp | 79 keymaster_error_t Keymaster1Engine::GenerateKey(const AuthorizationSet& key_description, argument 87 keymaster_error_t error = keymaster1_device_->generate_key(keymaster1_device_, &key_description, 99 keymaster_error_t Keymaster1Engine::ImportKey(const AuthorizationSet& key_description, argument 111 keymaster_error_t error = keymaster1_device_->import_key(keymaster1_device_, &key_description,
|
H A D | android_keymaster.cpp | 194 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) || 201 response->error = factory->GenerateKey(request.key_description, &key_blob, 428 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) || 434 response->error = factory->ImportKey(request.key_description, request.key_format,
|
H A D | android_keymaster_messages_test.cpp | 133 req.key_description.Reinitialize(params, array_length(params)); 135 EXPECT_EQ(deserialized->key_description, req.key_description); 387 msg.key_description.Reinitialize(params, array_length(params)); 392 EXPECT_EQ(msg.key_description, deserialized->key_description);
|
H A D | soft_keymaster_device.cpp | 708 const AuthorizationSet& key_description) const { 714 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) { 719 for (auto& entry : key_description) 722 if (RequiresSoftwareDigesting(algorithm, purpose, key_description)) 742 request.key_description.Reinitialize(*params); 745 if (km1_dev && !sk_dev->KeyRequiresSoftwareDigesting(request.key_description)) 792 request.key_description.Reinitialize(*params); 795 if (km1_dev && !sk_dev->KeyRequiresSoftwareDigesting(request.key_description)) { 926 request.key_description.Reinitialize(*params); 929 if (km1_dev && !sk_dev->KeyRequiresSoftwareDigesting(request.key_description)) [all...] |
/system/keymaster/include/keymaster/ |
H A D | ec_key_factory.h | 34 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 37 keymaster_error_t ImportKey(const AuthorizationSet& key_description, 47 keymaster_error_t UpdateImportKeyDescription(const AuthorizationSet& key_description, 59 static keymaster_error_t GetCurveAndSize(const AuthorizationSet& key_description,
|
H A D | rsa_key_factory.h | 31 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 34 keymaster_error_t ImportKey(const AuthorizationSet& key_description, 50 keymaster_error_t UpdateImportKeyDescription(const AuthorizationSet& key_description,
|
H A D | key_factory.h | 40 virtual keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 44 virtual keymaster_error_t ImportKey(const AuthorizationSet& key_description,
|
H A D | keymaster_context.h | 103 virtual keymaster_error_t CreateKeyBlob(const AuthorizationSet& key_description,
|