/system/keymaster/km_openssl/ |
H A D | aes_operation.h | 40 AesOperationFactory(keymaster_purpose_t purpose) : BlockCipherOperationFactory(purpose) {} argument
|
H A D | triple_des_operation.h | 40 TripleDesOperationFactory(keymaster_purpose_t purpose) : BlockCipherOperationFactory(purpose) {} argument
|
H A D | rsa_key.cpp | 35 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { argument 36 switch (purpose) { 53 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) { argument 54 switch (purpose) {
|
H A D | hmac_operation.h | 27 HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest, 56 virtual KeyType registry_key() const { return KeyType(KM_ALGORITHM_HMAC, purpose()); } 63 virtual keymaster_purpose_t purpose() const = 0; 67 keymaster_purpose_t purpose() const { return KM_PURPOSE_SIGN; } function in class:keymaster::HmacSignOperationFactory 71 keymaster_purpose_t purpose() const { return KM_PURPOSE_VERIFY; } function in class:keymaster::HmacVerifyOperationFactory
|
H A D | block_cipher_operation.h | 48 BlockCipherOperationFactory(keymaster_purpose_t purpose) : purpose_(purpose) {} argument 71 BlockCipherEvpOperation(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode,
|
H A D | hmac_operation.cpp | 48 if (purpose() == KM_PURPOSE_VERIFY) { 54 if (purpose() == KM_PURPOSE_SIGN) { 69 move(key), purpose(), digest, mac_length_bits / 8, min_mac_length_bits / 8)); 88 HmacOperation::HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest, argument 90 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()), error_(KM_ERROR_OK), 123 if (purpose == KM_PURPOSE_SIGN) { 174 switch (purpose()) {
|
H A D | block_cipher_operation.cpp | 144 BlockCipherEvpOperation::BlockCipherEvpOperation(keymaster_purpose_t purpose, argument 149 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()), block_mode_(block_mode),
|
/system/security/keystore/ |
H A D | operation_proto_handler.cpp | 31 void determinePurpose(KeyPurpose purpose, OperationConfig* operationConfig) { argument 32 switch (purpose) { 107 determinePurpose(op.purpose, &operationConfig);
|
H A D | operation_struct.h | 39 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_), 48 KeyPurpose purpose; member in struct:keystore::Operation
|
H A D | operation.cpp | 27 sp<IBinder> OperationMap::addOperation(uint64_t handle, uint64_t keyid, KeyPurpose purpose, argument 32 mMap.emplace(token, Operation(handle, keyid, purpose, dev, std::move(characteristics), appToken,
|
H A D | auth_token_table.cpp | 96 inline bool is_secret_key_operation(Algorithm algorithm, KeyPurpose purpose) { argument 98 if (purpose == KeyPurpose::SIGN || purpose == KeyPurpose::DECRYPT) return true; 102 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info, KeyPurpose purpose) { argument 104 return is_secret_key_operation(algorithm, purpose) && 108 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info, KeyPurpose purpose) { argument 110 return is_secret_key_operation(algorithm, purpose) && key_info.find(Tag::AUTH_TIMEOUT) == -1; 114 KeyPurpose purpose, uint64_t op_handle, 116 if (!KeyRequiresAuthentication(key_info, purpose)) return AUTH_NOT_REQUIRED; 124 if (KeyRequiresAuthPerOperation(key_info, purpose)) 113 FindAuthorization(const AuthorizationSet& key_info, KeyPurpose purpose, uint64_t op_handle, const HardwareAuthToken** found) argument [all...] |
/system/keymaster/include/keymaster/km_openssl/ |
H A D | ecdsa_operation.h | 33 keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) 34 : Operation(purpose, move(hw_enforced), move(sw_enforced)), digest_(digest), 85 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_EC, purpose()); } 90 virtual keymaster_purpose_t purpose() const = 0; 98 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } 108 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; } 32 EcdsaOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) argument
|
H A D | rsa_operation.h | 37 keymaster_purpose_t purpose, keymaster_digest_t digest, 39 : Operation(purpose, move(hw_enforced), move(sw_enforced)), rsa_key_(key), 77 keymaster_purpose_t purpose, keymaster_digest_t digest, 141 keymaster_purpose_t purpose, keymaster_digest_t digest, 143 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, padding, key) {} 187 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_RSA, purpose()); } 188 virtual keymaster_purpose_t purpose() const = 0; 232 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } 245 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; } 258 keymaster_purpose_t purpose() cons 36 RsaOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument 140 RsaCryptOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument [all...] |
/system/keymaster/legacy_support/ |
H A D | keymaster_passthrough_operation.h | 38 explicit KeymasterPassthroughOperation(keymaster_purpose_t purpose, argument 40 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()), 50 rc = km_device_->begin(km_device_, purpose(), &key_blob_, &input_params, &out_params, 96 keymaster_purpose_t purpose, 98 : key_type_(algorithm, purpose), km_device_(km_device) {} 109 key_type_.purpose, km_device_, std::move(key))); 95 KeymasterPassthroughOperationFactory(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const KeymasterDeviceType* km_device) argument
|
H A D | ecdsa_keymaster1_operation.h | 32 EcdsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument 33 : purpose_(purpose), operation_handle_(0), engine_(engine) {} 60 wrapped_operation_(super::purpose(), engine) { 62 assert(super::purpose() != KM_PURPOSE_VERIFY); 63 assert(super::purpose() != KM_PURPOSE_ENCRYPT); 106 EcdsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument 107 : purpose_(purpose), engine_(engine) {}
|
H A D | rsa_keymaster1_operation.h | 32 RsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument 33 : purpose_(purpose), operation_handle_(0), engine_(engine) {} 60 wrapped_operation_(super::purpose(), engine) { 62 assert(super::purpose() != KM_PURPOSE_VERIFY); 63 assert(super::purpose() != KM_PURPOSE_ENCRYPT); 106 RsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument 107 : purpose_(purpose), engine_(engine) {}
|
H A D | keymaster1_legacy_support.cpp | 57 keymaster_purpose_t purpose, 59 auto key = std::make_pair(algorithm, purpose); 64 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); 86 for (auto purpose : sig_purposes) { 89 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); 98 for (auto purpose : crypt_purposes) { 101 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); 120 keymaster_purpose_t purpose, 123 auto supported_digests = digest_map.find(std::make_pair(algorithm, purpose)); 125 // Invalid algorith/purpose pai 56 add_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, Keymaster1LegacySupport::DigestMap* map, bool* supports_all) argument 119 findUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const T& params, const Keymaster1LegacySupport::DigestMap& digest_map) argument 138 requiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const T& params, const Keymaster1LegacySupport::DigestMap& digest_map) argument 153 LOG(DEBUG) << "Requested digest(s) supported for algorithm " << algorithm << " and purpose " << purpose; local 172 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); local 193 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); local [all...] |
/system/core/trusty/keymaster/ |
H A D | trusty_keymaster_main.cpp | 138 static bool do_operation(TrustyKeymasterDevice* device, keymaster_purpose_t purpose, argument 147 keymaster_error_t error = device->begin(purpose, key, ¶m_set, nullptr, &op_handle);
|
H A D | trusty_keymaster_device.cpp | 463 keymaster_error_t TrustyKeymasterDevice::begin(keymaster_purpose_t purpose, argument 485 request.purpose = purpose; 723 keymaster_purpose_t purpose, 728 return convert_device(dev)->begin(purpose, key, in_params, out_params, operation_handle); 722 begin(const keymaster2_device_t* dev, keymaster_purpose_t purpose, const keymaster_key_blob_t* key, const keymaster_key_param_set_t* in_params, keymaster_key_param_set_t* out_params, keymaster_operation_handle_t* operation_handle) argument
|
/system/keymaster/include/keymaster/ |
H A D | operation.h | 43 : algorithm(alg), purpose(purp) {} 46 keymaster_purpose_t purpose; member in struct:keymaster::OperationFactory::KeyType 49 return algorithm == rhs.algorithm && purpose == rhs.purpose; 91 explicit Operation(keymaster_purpose_t purpose, AuthorizationSet&& hw_enforced, argument 93 : purpose_(purpose), hw_enforced_(move(hw_enforced)), sw_enforced_(move(sw_enforced)) {} 99 keymaster_purpose_t purpose() const { return purpose_; } function in class:keymaster::Operation
|
H A D | attestation_record.h | 56 ASN1_INTEGER_SET* purpose; member in struct:keymaster::km_auth_list 95 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, purpose, ASN1_INTEGER, TAG_PURPOSE.masked_tag()),
|
/system/keymaster/android_keymaster/ |
H A D | keymaster_enforcement.cpp | 81 static keymaster_error_t authorized_purpose(const keymaster_purpose_t purpose, argument 83 switch (purpose) { 89 if (auth_set.Contains(TAG_PURPOSE, purpose)) 98 inline bool is_origination_purpose(keymaster_purpose_t purpose) { argument 99 return purpose == KM_PURPOSE_ENCRYPT || purpose == KM_PURPOSE_SIGN; 102 inline bool is_usage_purpose(keymaster_purpose_t purpose) { argument 103 return purpose == KM_PURPOSE_DECRYPT || purpose == KM_PURPOSE_VERIFY; 116 keymaster_error_t KeymasterEnforcement::AuthorizeOperation(const keymaster_purpose_t purpose, argument 192 AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid, const AuthProxy& auth_set, const AuthorizationSet& operation_params) argument [all...] |
H A D | android_keymaster.cpp | 116 keymaster_purpose_t purpose, 122 const OperationFactory* factory = context.GetOperationFactory(algorithm, purpose); 135 GetSupported(*context_, request.algorithm, request.purpose, 141 GetSupported(*context_, request.algorithm, request.purpose, 147 GetSupported(*context_, request.algorithm, request.purpose, &OperationFactory::SupportedDigests, 275 OperationFactory* factory = key_factory->GetOperationFactory(request.purpose); 288 request.purpose, key_id, operation->authorizations(), request.additional_params, 314 operation->purpose(), operation->key_id(), operation->authorizations(), 343 operation->purpose(), operation->key_id(), operation->authorizations(), 115 GetSupported(const KeymasterContext& context, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const T* (OperationFactory::*get_supported_method)(size_t* count) const, SupportedResponse<T>* response) argument
|
/system/keymaster/tests/ |
H A D | keymaster_enforcement_test.cpp | 35 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, argument 39 purpose, keyid, auth_set, empty_set, 0 /* op_handle */, true /* is_begin_operation */);
|
/system/vold/ |
H A D | Keymaster.cpp | 178 KeymasterOperation Keymaster::begin(km::KeyPurpose purpose, const std::string& key, argument 194 auto error = mDevice->begin(purpose, keyBlob, inParams.hidl_data(), authToken, hidlCb);
|