Searched defs:key_description (Results 1 - 17 of 17) sorted by relevance

/system/keymaster/km_openssl/
H A Dsymmetric_key.cpp33 keymaster_error_t SymmetricKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
41 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) ||
45 keymaster_error_t error = validate_algorithm_specific_new_key_params(key_description);
60 return blob_maker_.CreateKeyBlob(key_description, KM_ORIGIN_GENERATED, key_material, key_blob,
64 keymaster_error_t SymmetricKeyFactory::ImportKey(const AuthorizationSet& key_description, argument
73 AuthorizationSet authorizations(key_description);
82 keymaster_error_t error = validate_algorithm_specific_new_key_params(key_description);
H A Drsa_key_factory.cpp52 keymaster_error_t RsaKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
59 const AuthorizationSet& authorizations(key_description);
103 keymaster_error_t RsaKeyFactory::ImportKey(const AuthorizationSet& key_description, argument
116 UpdateImportKeyDescription(key_description, input_key_material_format, input_key_material,
124 keymaster_error_t RsaKeyFactory::UpdateImportKeyDescription(const AuthorizationSet& key_description, argument
143 updated_description->Reinitialize(key_description);
H A Dec_key_factory.cpp44 keymaster_error_t EcKeyFactory::GetCurveAndSize(const AuthorizationSet& key_description, argument
47 if (!key_description.GetTagValue(TAG_EC_CURVE, curve)) {
49 if (!key_description.GetTagValue(TAG_KEY_SIZE, key_size_bits)) {
63 if (key_description.GetTagValue(TAG_KEY_SIZE, &tag_key_size_bits) &&
74 keymaster_error_t EcKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
81 AuthorizationSet authorizations(key_description);
127 keymaster_error_t EcKeyFactory::ImportKey(const AuthorizationSet& key_description, argument
139 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
147 keymaster_error_t EcKeyFactory::UpdateImportKeyDescription(const AuthorizationSet& key_description, argument
165 updated_description->Reinitialize(key_description);
[all...]
/system/keymaster/legacy_support/
H A Dec_keymaster0_key.cpp36 keymaster_error_t EcdsaKeymaster0KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
44 return super::GenerateKey(key_description, key_blob, hw_enforced, sw_enforced);
48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size);
64 return blob_maker_.CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob,
69 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format,
76 return super::ImportKey(key_description, input_key_material_format, input_key_material,
82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size);
68 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
H A Drsa_keymaster0_key.cpp36 keymaster_error_t RsaKeymaster0KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
44 if (!key_description.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) {
50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) {
66 return blob_maker_.CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob,
71 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format,
81 UpdateImportKeyDescription(key_description, input_key_material_format, input_key_material,
70 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
H A Dec_keymaster1_key.cpp41 static void UpdateToWorkAroundUnsupportedDigests(const AuthorizationSet& key_description, argument
45 for (const keymaster_key_param_t& entry : key_description) {
64 keymaster_error_t EcdsaKeymaster1KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
69 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy);
73 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size);
76 } else if (!key_description.Contains(TAG_KEY_SIZE, key_size)) {
83 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format,
87 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy);
82 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
H A Drsa_keymaster1_key.cpp40 static void UpdateToWorkAroundUnsupportedDigests(const AuthorizationSet& key_description, argument
46 for (const keymaster_key_param_t& entry : key_description) {
82 keymaster_error_t RsaKeymaster1KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument
87 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy);
92 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format,
96 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy);
91 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
H A Dkeymaster1_engine.cpp78 keymaster_error_t Keymaster1Engine::GenerateKey(const AuthorizationSet& key_description, argument
86 keymaster_error_t error = keymaster1_device_->generate_key(keymaster1_device_, &key_description,
98 keymaster_error_t Keymaster1Engine::ImportKey(const AuthorizationSet& key_description, argument
110 keymaster_error_t error = keymaster1_device_->import_key(keymaster1_device_, &key_description,
H A Dkeymaster1_legacy_support.cpp160 const AuthorizationSet& key_description) const {
163 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) {
170 for (auto& entry : key_description)
173 if (requiresSoftwareDigesting(algorithm, purpose, key_description, device_digests_))
181 const AuthProxy& key_description) const {
184 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) {
191 for (auto& entry : key_description)
194 if (requiresSoftwareDigesting(algorithm, purpose, key_description, device_digests_))
204 const AuthorizationSet& key_description,
207 if (legacy_support_.RequiresSoftwareDigesting(key_description)) {
203 GenerateKey( const AuthorizationSet& key_description, KeymasterKeyBlob* key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
[all...]
H A Dkeymaster_passthrough_engine.cpp85 keymaster_error_t GenerateKey(const AuthorizationSet& key_description,
89 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
212 TKeymasterPassthroughEngine<keymaster1_device_t>::GenerateKey(const AuthorizationSet& key_description, argument
220 keymaster_error_t error = km_device_->generate_key(km_device_, &key_description,
235 TKeymasterPassthroughEngine<keymaster2_device_t>::GenerateKey(const AuthorizationSet& key_description, argument
243 keymaster_error_t error = km_device_->generate_key(km_device_, &key_description,
258 TKeymasterPassthroughEngine<keymaster1_device_t>::ImportKey(const AuthorizationSet& key_description, argument
270 keymaster_error_t error = km_device_->import_key(km_device_, &key_description,
287 TKeymasterPassthroughEngine<keymaster2_device_t>::ImportKey(const AuthorizationSet& key_description, argument
299 keymaster_error_t error = km_device_->import_key(km_device_, &key_description,
[all...]
/system/keymaster/include/keymaster/legacy_support/
H A Dkeymaster1_legacy_support.h47 bool RequiresSoftwareDigesting(const AuthorizationSet& key_description) const;
48 bool RequiresSoftwareDigesting(const AuthProxy& key_description) const;
69 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, argument
72 if (legacy_support_.RequiresSoftwareDigesting(key_description)) {
73 return software_digest_factory_.GenerateKey(key_description, key_blob, hw_enforced,
76 return passthrough_factory_.GenerateKey(key_description, key_blob, hw_enforced,
81 keymaster_error_t ImportKey(const AuthorizationSet& key_description, argument
86 if (legacy_support_.RequiresSoftwareDigesting(key_description)) {
87 return software_digest_factory_.ImportKey(key_description, input_key_material_format,
91 return passthrough_factory_.ImportKey(key_description, input_key_material_forma
[all...]
/system/keymaster/contexts/
H A Dkeymaster1_passthrough_context.cpp213 keymaster_error_t Keymaster1PassthroughContext::CreateKeyBlob(const AuthorizationSet& key_description, argument
219 keymaster_error_t error = SetKeyBlobAuthorizations(key_description, origin, os_version_,
225 error = BuildHiddenAuthorizations(key_description, &hidden, softwareRootOfTrust);
H A Dpure_soft_keymaster_context.cpp108 keymaster_error_t PureSoftKeymasterContext::CreateKeyBlob(const AuthorizationSet& key_description, argument
114 keymaster_error_t error = SetKeyBlobAuthorizations(key_description, origin, os_version_,
120 error = BuildHiddenAuthorizations(key_description, &hidden, softwareRootOfTrust);
H A Dsoft_keymaster_context.cpp155 static keymaster_error_t SetAuthorizations(const AuthorizationSet& key_description, argument
161 for (auto& entry : key_description) {
196 keymaster_error_t SoftKeymasterContext::CreateKeyBlob(const AuthorizationSet& key_description, argument
202 keymaster_error_t error = SetAuthorizations(key_description, origin, os_version_,
208 error = BuildHiddenAuthorizations(key_description, &hidden, root_of_trust_);
/system/keymaster/key_blob_utils/
H A Dsoftware_keyblobs.cpp262 keymaster_error_t SetKeyBlobAuthorizations(const AuthorizationSet& key_description, argument
268 for (auto& entry : key_description) {
/system/keymaster/android_keymaster/
H A Dandroid_keymaster.cpp224 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
231 response->error = factory->GenerateKey(request.key_description, &key_blob,
437 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) ||
443 response->error = factory->ImportKey(request.key_description, request.key_format,
490 AuthorizationSet key_description; local
495 request.masking_key, &key_description, &key_format, &secret_key);
501 int sid_idx = key_description.find(TAG_USER_SECURE_ID);
503 uint8_t sids = key_description[sid_idx].long_integer;
504 if (!key_description.erase(sid_idx)) {
509 key_description
[all...]
/system/keymaster/include/keymaster/
H A Dandroid_keymaster_messages.h269 size_t SerializedSize() const override { return key_description.SerializedSize(); }
271 return key_description.Serialize(buf, end);
274 return key_description.Deserialize(buf_ptr, end);
277 AuthorizationSet key_description; member in struct:keymaster::GenerateKeyRequest
467 AuthorizationSet key_description; member in struct:keymaster::ImportKeyRequest

Completed in 181 milliseconds