/system/keymaster/km_openssl/ |
H A D | symmetric_key.cpp | 33 keymaster_error_t SymmetricKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 41 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) || 45 keymaster_error_t error = validate_algorithm_specific_new_key_params(key_description); 60 return blob_maker_.CreateKeyBlob(key_description, KM_ORIGIN_GENERATED, key_material, key_blob, 64 keymaster_error_t SymmetricKeyFactory::ImportKey(const AuthorizationSet& key_description, argument 73 AuthorizationSet authorizations(key_description); 82 keymaster_error_t error = validate_algorithm_specific_new_key_params(key_description);
|
H A D | rsa_key_factory.cpp | 52 keymaster_error_t RsaKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 59 const AuthorizationSet& authorizations(key_description); 103 keymaster_error_t RsaKeyFactory::ImportKey(const AuthorizationSet& key_description, argument 116 UpdateImportKeyDescription(key_description, input_key_material_format, input_key_material, 124 keymaster_error_t RsaKeyFactory::UpdateImportKeyDescription(const AuthorizationSet& key_description, argument 143 updated_description->Reinitialize(key_description);
|
H A D | ec_key_factory.cpp | 44 keymaster_error_t EcKeyFactory::GetCurveAndSize(const AuthorizationSet& key_description, argument 47 if (!key_description.GetTagValue(TAG_EC_CURVE, curve)) { 49 if (!key_description.GetTagValue(TAG_KEY_SIZE, key_size_bits)) { 63 if (key_description.GetTagValue(TAG_KEY_SIZE, &tag_key_size_bits) && 74 keymaster_error_t EcKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 81 AuthorizationSet authorizations(key_description); 127 keymaster_error_t EcKeyFactory::ImportKey(const AuthorizationSet& key_description, argument 139 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 147 keymaster_error_t EcKeyFactory::UpdateImportKeyDescription(const AuthorizationSet& key_description, argument 165 updated_description->Reinitialize(key_description); [all...] |
/system/keymaster/legacy_support/ |
H A D | ec_keymaster0_key.cpp | 36 keymaster_error_t EcdsaKeymaster0KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 44 return super::GenerateKey(key_description, key_blob, hw_enforced, sw_enforced); 48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); 64 return blob_maker_.CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob, 69 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, 76 return super::ImportKey(key_description, input_key_material_format, input_key_material, 82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 68 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
|
H A D | rsa_keymaster0_key.cpp | 36 keymaster_error_t RsaKeymaster0KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 44 if (!key_description.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) { 50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { 66 return blob_maker_.CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob, 71 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, 81 UpdateImportKeyDescription(key_description, input_key_material_format, input_key_material, 70 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
|
H A D | ec_keymaster1_key.cpp | 41 static void UpdateToWorkAroundUnsupportedDigests(const AuthorizationSet& key_description, argument 45 for (const keymaster_key_param_t& entry : key_description) { 64 keymaster_error_t EcdsaKeymaster1KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 69 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy); 73 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); 76 } else if (!key_description.Contains(TAG_KEY_SIZE, key_size)) { 83 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, 87 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy); 82 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
|
H A D | rsa_keymaster1_key.cpp | 40 static void UpdateToWorkAroundUnsupportedDigests(const AuthorizationSet& key_description, argument 46 for (const keymaster_key_param_t& entry : key_description) { 82 keymaster_error_t RsaKeymaster1KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 87 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy); 92 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, 96 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy); 91 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
|
H A D | keymaster1_engine.cpp | 78 keymaster_error_t Keymaster1Engine::GenerateKey(const AuthorizationSet& key_description, argument 86 keymaster_error_t error = keymaster1_device_->generate_key(keymaster1_device_, &key_description, 98 keymaster_error_t Keymaster1Engine::ImportKey(const AuthorizationSet& key_description, argument 110 keymaster_error_t error = keymaster1_device_->import_key(keymaster1_device_, &key_description,
|
H A D | keymaster1_legacy_support.cpp | 160 const AuthorizationSet& key_description) const { 163 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) { 170 for (auto& entry : key_description) 173 if (requiresSoftwareDigesting(algorithm, purpose, key_description, device_digests_)) 181 const AuthProxy& key_description) const { 184 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) { 191 for (auto& entry : key_description) 194 if (requiresSoftwareDigesting(algorithm, purpose, key_description, device_digests_)) 204 const AuthorizationSet& key_description, 207 if (legacy_support_.RequiresSoftwareDigesting(key_description)) { 203 GenerateKey( const AuthorizationSet& key_description, KeymasterKeyBlob* key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument [all...] |
H A D | keymaster_passthrough_engine.cpp | 85 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 89 keymaster_error_t ImportKey(const AuthorizationSet& key_description, 212 TKeymasterPassthroughEngine<keymaster1_device_t>::GenerateKey(const AuthorizationSet& key_description, argument 220 keymaster_error_t error = km_device_->generate_key(km_device_, &key_description, 235 TKeymasterPassthroughEngine<keymaster2_device_t>::GenerateKey(const AuthorizationSet& key_description, argument 243 keymaster_error_t error = km_device_->generate_key(km_device_, &key_description, 258 TKeymasterPassthroughEngine<keymaster1_device_t>::ImportKey(const AuthorizationSet& key_description, argument 270 keymaster_error_t error = km_device_->import_key(km_device_, &key_description, 287 TKeymasterPassthroughEngine<keymaster2_device_t>::ImportKey(const AuthorizationSet& key_description, argument 299 keymaster_error_t error = km_device_->import_key(km_device_, &key_description, [all...] |
/system/keymaster/include/keymaster/legacy_support/ |
H A D | keymaster1_legacy_support.h | 47 bool RequiresSoftwareDigesting(const AuthorizationSet& key_description) const; 48 bool RequiresSoftwareDigesting(const AuthProxy& key_description) const; 69 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, argument 72 if (legacy_support_.RequiresSoftwareDigesting(key_description)) { 73 return software_digest_factory_.GenerateKey(key_description, key_blob, hw_enforced, 76 return passthrough_factory_.GenerateKey(key_description, key_blob, hw_enforced, 81 keymaster_error_t ImportKey(const AuthorizationSet& key_description, argument 86 if (legacy_support_.RequiresSoftwareDigesting(key_description)) { 87 return software_digest_factory_.ImportKey(key_description, input_key_material_format, 91 return passthrough_factory_.ImportKey(key_description, input_key_material_forma [all...] |
/system/keymaster/contexts/ |
H A D | keymaster1_passthrough_context.cpp | 213 keymaster_error_t Keymaster1PassthroughContext::CreateKeyBlob(const AuthorizationSet& key_description, argument 219 keymaster_error_t error = SetKeyBlobAuthorizations(key_description, origin, os_version_, 225 error = BuildHiddenAuthorizations(key_description, &hidden, softwareRootOfTrust);
|
H A D | pure_soft_keymaster_context.cpp | 108 keymaster_error_t PureSoftKeymasterContext::CreateKeyBlob(const AuthorizationSet& key_description, argument 114 keymaster_error_t error = SetKeyBlobAuthorizations(key_description, origin, os_version_, 120 error = BuildHiddenAuthorizations(key_description, &hidden, softwareRootOfTrust);
|
H A D | soft_keymaster_context.cpp | 155 static keymaster_error_t SetAuthorizations(const AuthorizationSet& key_description, argument 161 for (auto& entry : key_description) { 196 keymaster_error_t SoftKeymasterContext::CreateKeyBlob(const AuthorizationSet& key_description, argument 202 keymaster_error_t error = SetAuthorizations(key_description, origin, os_version_, 208 error = BuildHiddenAuthorizations(key_description, &hidden, root_of_trust_);
|
/system/keymaster/key_blob_utils/ |
H A D | software_keyblobs.cpp | 262 keymaster_error_t SetKeyBlobAuthorizations(const AuthorizationSet& key_description, argument 268 for (auto& entry : key_description) {
|
/system/keymaster/android_keymaster/ |
H A D | android_keymaster.cpp | 224 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) || 231 response->error = factory->GenerateKey(request.key_description, &key_blob, 437 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) || 443 response->error = factory->ImportKey(request.key_description, request.key_format, 490 AuthorizationSet key_description; local 495 request.masking_key, &key_description, &key_format, &secret_key); 501 int sid_idx = key_description.find(TAG_USER_SECURE_ID); 503 uint8_t sids = key_description[sid_idx].long_integer; 504 if (!key_description.erase(sid_idx)) { 509 key_description [all...] |
/system/keymaster/include/keymaster/ |
H A D | android_keymaster_messages.h | 269 size_t SerializedSize() const override { return key_description.SerializedSize(); } 271 return key_description.Serialize(buf, end); 274 return key_description.Deserialize(buf_ptr, end); 277 AuthorizationSet key_description; member in struct:keymaster::GenerateKeyRequest 467 AuthorizationSet key_description; member in struct:keymaster::ImportKeyRequest
|