/system/keymaster/ |
H A D | ecdsa_keymaster1_operation.cpp | 50 AuthorizationSet begin_params(input_params); 51 int pos = begin_params.find(TAG_DIGEST); 54 begin_params[pos].enumerated = KM_DIGEST_NONE; 57 &begin_params, nullptr /* out_params */, &operation_handle_); 100 const AuthorizationSet& begin_params, 103 if (!GetAndValidateDigest(begin_params, key, &digest, error)) 99 CreateOperation(const Key& key, const AuthorizationSet& begin_params, keymaster_error_t* error) argument
|
H A D | ecdsa_operation.cpp | 32 const AuthorizationSet& begin_params, 47 if (!GetAndValidateDigest(begin_params, key, &digest, error)) 31 CreateOperation(const Key& key, const AuthorizationSet& begin_params, keymaster_error_t* error) argument
|
H A D | keymaster1_engine.h | 60 : op_handle(0), begin_params(params), key_material(blob), error(KM_ERROR_OK), 64 AuthorizationSet begin_params; member in struct:keymaster::Keymaster1Engine::KeyData
|
H A D | operation.cpp | 88 bool OperationFactory::GetAndValidatePadding(const AuthorizationSet& begin_params, const Key& key, argument 92 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { 93 LOG_E("%d padding modes specified in begin params", begin_params.GetTagCount(TAG_PADDING)); 113 bool OperationFactory::GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key, argument 117 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) { 118 LOG_E("%d digests specified in begin params", begin_params.GetTagCount(TAG_DIGEST));
|
H A D | rsa_keymaster1_operation.cpp | 49 AuthorizationSet begin_params(input_params); 50 int pos = begin_params.find(TAG_DIGEST); 53 begin_params[pos].enumerated = KM_DIGEST_NONE; 55 pos = begin_params.find(TAG_PADDING); 58 switch (begin_params[pos].enumerated) { 63 begin_params[pos].enumerated = KM_PAD_NONE; 73 &begin_params, nullptr /* out_params */, &operation_handle_); 116 const AuthorizationSet& begin_params, 119 if (!GetAndValidateDigest(begin_params, key, &digest, error)) 123 if (!GetAndValidatePadding(begin_params, ke 115 CreateOperation(const Key& key, const AuthorizationSet& begin_params, keymaster_error_t* error) argument [all...] |
H A D | hmac_operation.cpp | 37 const AuthorizationSet& begin_params, 47 if (begin_params.GetTagValue(TAG_MAC_LENGTH, &mac_length_bits)) { 63 begin_params.GetTagCount(TAG_DIGEST)); 36 CreateOperation(const Key& key, const AuthorizationSet& begin_params, keymaster_error_t* error) argument
|
H A D | rsa_operation.cpp | 66 const AuthorizationSet& begin_params, 69 if (!GetAndValidatePadding(begin_params, key, &padding, error)) 76 if (require_digest && !GetAndValidateDigest(begin_params, key, &digest, error)) 98 const AuthorizationSet& begin_params, 100 UniquePtr<RsaOperation> op(RsaOperationFactory::CreateRsaOperation(key, begin_params, error)); 65 CreateRsaOperation(const Key& key, const AuthorizationSet& begin_params, keymaster_error_t* error) argument 97 CreateRsaOperation(const Key& key, const AuthorizationSet& begin_params, keymaster_error_t* error) argument
|
H A D | aes_operation.cpp | 51 static keymaster_error_t GetAndValidateGcmTagLength(const AuthorizationSet& begin_params, argument 55 if (!begin_params.GetTagValue(TAG_MAC_LENGTH, &tag_length_bits)) { 79 const AuthorizationSet& begin_params, 95 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) { 96 LOG_E("%d block modes specified in begin params", begin_params.GetTagCount(TAG_BLOCK_MODE)); 111 *error = GetAndValidateGcmTagLength(begin_params, key.authorizations(), &tag_length); 118 if (!GetAndValidatePadding(begin_params, key, &padding, error)) { 78 CreateOperation(const Key& key, const AuthorizationSet& begin_params, keymaster_error_t* error) argument
|
H A D | android_keymaster_test_utils.cpp | 364 const AuthorizationSet& begin_params, 367 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, begin_out_params)); 379 const string& signature, const AuthorizationSet& begin_params, 382 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, output_params)); 472 AuthorizationSet begin_params(client_params()), output_params; 473 begin_params.push_back(TAG_PADDING, padding); 476 ProcessMessage(KM_PURPOSE_ENCRYPT, message, begin_params, update_params, &output_params); 503 AuthorizationSet begin_params(client_params()), output_params; 504 begin_params.push_back(TAG_PADDING, padding); 505 begin_params 363 ProcessMessage(keymaster_purpose_t purpose, const string& message, const AuthorizationSet& begin_params, const AuthorizationSet& update_params, AuthorizationSet* begin_out_params) argument 378 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature, const AuthorizationSet& begin_params, const AuthorizationSet& update_params, AuthorizationSet* output_params) argument 537 EncryptMessageWithParams(const string& message, const AuthorizationSet& begin_params, const AuthorizationSet& update_params, AuthorizationSet* output_params) argument [all...] |