Searched defs:purpose (Results 26 - 37 of 37) sorted by relevance

12

/system/keymaster/km_openssl/
H A Drsa_operation.cpp68 bool require_digest = (purpose() == KM_PURPOSE_SIGN || purpose() == KM_PURPOSE_VERIFY ||
147 switch (purpose()) {
229 keymaster_purpose_t purpose, keymaster_digest_t digest,
231 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, padding, key) {
227 RsaDigestingOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument
/system/keymaster/ng/
H A DAndroidKeymaster3Device.cpp420 Return<void> AndroidKeymaster3Device::begin(KeyPurpose purpose, const hidl_vec<uint8_t>& key, argument
424 request.purpose = legacy_enum_conversion(purpose);
H A DAndroidKeymaster4Device.cpp479 Return<void> AndroidKeymaster4Device::begin(KeyPurpose purpose, const hidl_vec<uint8_t>& key, argument
485 request.purpose = legacy_enum_conversion(purpose);
/system/security/keystore/
H A Dkeymaster_enforcement.cpp85 static ErrorCode authorized_purpose(const KeyPurpose purpose, const AuthorizationSet& auth_set) { argument
86 switch (purpose) {
91 if (auth_set.Contains(TAG_PURPOSE, purpose)) return ErrorCode::OK;
99 inline bool is_origination_purpose(KeyPurpose purpose) { argument
100 return purpose == KeyPurpose::ENCRYPT || purpose == KeyPurpose::SIGN;
103 inline bool is_usage_purpose(KeyPurpose purpose) { argument
104 return purpose == KeyPurpose::DECRYPT || purpose == KeyPurpose::VERIFY;
117 ErrorCode KeymasterEnforcement::AuthorizeOperation(const KeyPurpose purpose, cons argument
192 AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid, const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, NullOr<const HardwareAuthToken&> auth_token) argument
[all...]
H A Dkeystore_client_impl.cpp151 bool KeystoreClientImpl::oneShotOperation(KeyPurpose purpose, const std::string& key_name, argument
158 auto result = beginOperation(purpose, key_name, input_parameters, output_parameters, &handle);
277 KeystoreClientImpl::beginOperation(KeyPurpose purpose, const std::string& key_name, argument
284 token, key_name16, (int)purpose, true /*pruneable*/,
H A Dlegacy_keymaster_device_wrapper.cpp431 Return<void> LegacyKeymasterDeviceWrapper::begin(KeyPurpose purpose, const hidl_vec<uint8_t>& key, argument
446 auto rc = keymaster_device_->begin(keymaster_device_, legacy_enum_conversion(purpose), &kmKey,
H A Dkey_store_service.cpp1192 Status KeyStoreService::begin(const sp<IBinder>& appToken, const String16& name, int32_t purpose, argument
1196 auto keyPurpose = static_cast<KeyPurpose>(purpose);
1432 op.purpose, op.keyid, key_auths, params.getParameters(), authToken, op.handle,
1493 op.purpose, op.keyid, key_auths, params.getParameters(), authToken, op.handle,
2050 KeyPurpose purpose, bool failOnTokenMissing) {
2058 allCharacteristics, static_cast<KeyPurpose>(purpose), handle, &authToken);
2110 std::tie(rc, found) = getAuthToken(op.characteristics, op.handle, op.purpose);
2167 KeyPurpose purpose) {
2176 begin(appToken, name, static_cast<int32_t>(purpose), true,
2049 getAuthToken(const KeyCharacteristics& characteristics, uint64_t handle, KeyPurpose purpose, bool failOnTokenMissing) argument
2163 doLegacySignVerify(const String16& name, const hidl_vec<uint8_t>& data, hidl_vec<uint8_t>* out, const hidl_vec<uint8_t>& signature, KeyPurpose purpose) argument
/system/vold/
H A DKeyStorage.cpp202 km::KeyPurpose purpose, const km::AuthorizationSet& keyParams,
212 auto opHandle = keymaster.begin(purpose, kmKey, inParams, authToken, outParams);
201 begin(Keymaster& keymaster, const std::string& dir, km::KeyPurpose purpose, const km::AuthorizationSet& keyParams, const km::AuthorizationSet& opParams, const km::HardwareAuthToken& authToken, km::AuthorizationSet* outParams) argument
/system/keymaster/contexts/
H A Dsoft_keymaster_device.cpp110 keymaster_purpose_t purpose,
112 auto key = std::make_pair(algorithm, purpose);
117 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length);
138 for (auto purpose : sig_purposes) {
141 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all);
150 for (auto purpose : crypt_purposes) {
153 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all);
443 keymaster_purpose_t purpose,
454 return km1_dev->get_supported_block_modes(km1_dev, algorithm, purpose, modes, modes_length);
458 request.purpose
109 add_digests(keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, SoftKeymasterDevice::DigestMap* map, bool* supports_all) argument
441 get_supported_block_modes(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_block_mode_t** modes, size_t* modes_length) argument
477 get_supported_padding_modes(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_padding_t** modes, size_t* modes_length) argument
513 get_supported_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_digest_t** digests, size_t* digests_length) argument
666 FindUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const AuthorizationSet& params, keymaster_digest_t* unsupported) const argument
688 RequiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const AuthorizationSet& params) const argument
729 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); local
1199 begin(const keymaster1_device_t* dev, keymaster_purpose_t purpose, const keymaster_key_blob_t* key, const keymaster_key_param_set_t* in_params, keymaster_key_param_set_t* out_params, keymaster_operation_handle_t* operation_handle) argument
1272 begin(const keymaster2_device_t* dev, keymaster_purpose_t purpose, const keymaster_key_blob_t* key, const keymaster_key_param_set_t* in_params, keymaster_key_param_set_t* out_params, keymaster_operation_handle_t* operation_handle) argument
[all...]
/system/keymaster/include/keymaster/
H A Dandroid_keymaster_messages.h172 return append_uint32_to_buf(buf, end, purpose);
176 copy_uint32_from_buf(buf_ptr, end, &purpose);
180 keymaster_purpose_t purpose; member in struct:keymaster::SupportedByAlgorithmAndPurposeRequest
344 keymaster_purpose_t purpose; member in struct:keymaster::BeginOperationRequest
/system/keymaster/tests/
H A Dandroid_keymaster_test_utils.cpp236 keymaster_error_t Keymaster2Test::BeginOperation(keymaster_purpose_t purpose) { argument
240 device()->begin(device(), purpose, &blob_, &in_params, &out_params, &op_handle_);
246 keymaster_error_t Keymaster2Test::BeginOperation(keymaster_purpose_t purpose, argument
251 device()->begin(device(), purpose, &blob_, &input_set, &out_params, &op_handle_);
361 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message) { argument
362 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, client_params(), NULL /* output_params */));
369 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, argument
373 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, begin_out_params));
380 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, argument
384 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_param
391 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature) argument
659 CheckTripleDesTestVector(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode, keymaster_padding_t padding_mode, const string& key, const string& iv, const string& input, const string& expected_output) argument
774 get_supported_block_modes(const struct keymaster1_device* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_block_mode_t** modes, size_t* modes_length) argument
782 get_supported_padding_modes(const struct keymaster1_device* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_padding_t** modes, size_t* modes_length) argument
791 get_supported_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_digest_t** digests, size_t* digests_length) argument
879 begin(const keymaster1_device_t* dev, keymaster_purpose_t purpose, const keymaster_key_blob_t* key, const keymaster_key_param_set_t* in_params, keymaster_key_param_set_t* out_params, keymaster_operation_handle_t* operation_handle) argument
[all...]
H A Dandroid_keymaster_test.cpp1881 keymaster_error_t BeginOperation(keymaster_purpose_t purpose, argument
1884 req.purpose = purpose;
1911 string ProcessMessage(keymaster_purpose_t purpose, const string& message, argument
1913 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params));
3487 const keymaster_purpose_t purpose; member in struct:keymaster::test::TripleDesTestVector
3644 CheckTripleDesTestVector(test.purpose, test.block_mode, test.padding_mode,

Completed in 191 milliseconds

12