/system/keymaster/km_openssl/ |
H A D | rsa_operation.cpp | 68 bool require_digest = (purpose() == KM_PURPOSE_SIGN || purpose() == KM_PURPOSE_VERIFY || 147 switch (purpose()) { 229 keymaster_purpose_t purpose, keymaster_digest_t digest, 231 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, padding, key) { 227 RsaDigestingOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument
|
/system/keymaster/ng/ |
H A D | AndroidKeymaster3Device.cpp | 420 Return<void> AndroidKeymaster3Device::begin(KeyPurpose purpose, const hidl_vec<uint8_t>& key, argument 424 request.purpose = legacy_enum_conversion(purpose);
|
H A D | AndroidKeymaster4Device.cpp | 479 Return<void> AndroidKeymaster4Device::begin(KeyPurpose purpose, const hidl_vec<uint8_t>& key, argument 485 request.purpose = legacy_enum_conversion(purpose);
|
/system/security/keystore/ |
H A D | keymaster_enforcement.cpp | 85 static ErrorCode authorized_purpose(const KeyPurpose purpose, const AuthorizationSet& auth_set) { argument 86 switch (purpose) { 91 if (auth_set.Contains(TAG_PURPOSE, purpose)) return ErrorCode::OK; 99 inline bool is_origination_purpose(KeyPurpose purpose) { argument 100 return purpose == KeyPurpose::ENCRYPT || purpose == KeyPurpose::SIGN; 103 inline bool is_usage_purpose(KeyPurpose purpose) { argument 104 return purpose == KeyPurpose::DECRYPT || purpose == KeyPurpose::VERIFY; 117 ErrorCode KeymasterEnforcement::AuthorizeOperation(const KeyPurpose purpose, cons argument 192 AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid, const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, NullOr<const HardwareAuthToken&> auth_token) argument [all...] |
H A D | keystore_client_impl.cpp | 151 bool KeystoreClientImpl::oneShotOperation(KeyPurpose purpose, const std::string& key_name, argument 158 auto result = beginOperation(purpose, key_name, input_parameters, output_parameters, &handle); 277 KeystoreClientImpl::beginOperation(KeyPurpose purpose, const std::string& key_name, argument 284 token, key_name16, (int)purpose, true /*pruneable*/,
|
H A D | legacy_keymaster_device_wrapper.cpp | 431 Return<void> LegacyKeymasterDeviceWrapper::begin(KeyPurpose purpose, const hidl_vec<uint8_t>& key, argument 446 auto rc = keymaster_device_->begin(keymaster_device_, legacy_enum_conversion(purpose), &kmKey,
|
H A D | key_store_service.cpp | 1192 Status KeyStoreService::begin(const sp<IBinder>& appToken, const String16& name, int32_t purpose, argument 1196 auto keyPurpose = static_cast<KeyPurpose>(purpose); 1432 op.purpose, op.keyid, key_auths, params.getParameters(), authToken, op.handle, 1493 op.purpose, op.keyid, key_auths, params.getParameters(), authToken, op.handle, 2050 KeyPurpose purpose, bool failOnTokenMissing) { 2058 allCharacteristics, static_cast<KeyPurpose>(purpose), handle, &authToken); 2110 std::tie(rc, found) = getAuthToken(op.characteristics, op.handle, op.purpose); 2167 KeyPurpose purpose) { 2176 begin(appToken, name, static_cast<int32_t>(purpose), true, 2049 getAuthToken(const KeyCharacteristics& characteristics, uint64_t handle, KeyPurpose purpose, bool failOnTokenMissing) argument 2163 doLegacySignVerify(const String16& name, const hidl_vec<uint8_t>& data, hidl_vec<uint8_t>* out, const hidl_vec<uint8_t>& signature, KeyPurpose purpose) argument
|
/system/vold/ |
H A D | KeyStorage.cpp | 202 km::KeyPurpose purpose, const km::AuthorizationSet& keyParams, 212 auto opHandle = keymaster.begin(purpose, kmKey, inParams, authToken, outParams); 201 begin(Keymaster& keymaster, const std::string& dir, km::KeyPurpose purpose, const km::AuthorizationSet& keyParams, const km::AuthorizationSet& opParams, const km::HardwareAuthToken& authToken, km::AuthorizationSet* outParams) argument
|
/system/keymaster/contexts/ |
H A D | soft_keymaster_device.cpp | 110 keymaster_purpose_t purpose, 112 auto key = std::make_pair(algorithm, purpose); 117 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); 138 for (auto purpose : sig_purposes) { 141 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); 150 for (auto purpose : crypt_purposes) { 153 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); 443 keymaster_purpose_t purpose, 454 return km1_dev->get_supported_block_modes(km1_dev, algorithm, purpose, modes, modes_length); 458 request.purpose 109 add_digests(keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, SoftKeymasterDevice::DigestMap* map, bool* supports_all) argument 441 get_supported_block_modes(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_block_mode_t** modes, size_t* modes_length) argument 477 get_supported_padding_modes(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_padding_t** modes, size_t* modes_length) argument 513 get_supported_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_digest_t** digests, size_t* digests_length) argument 666 FindUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const AuthorizationSet& params, keymaster_digest_t* unsupported) const argument 688 RequiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const AuthorizationSet& params) const argument 729 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); local 1199 begin(const keymaster1_device_t* dev, keymaster_purpose_t purpose, const keymaster_key_blob_t* key, const keymaster_key_param_set_t* in_params, keymaster_key_param_set_t* out_params, keymaster_operation_handle_t* operation_handle) argument 1272 begin(const keymaster2_device_t* dev, keymaster_purpose_t purpose, const keymaster_key_blob_t* key, const keymaster_key_param_set_t* in_params, keymaster_key_param_set_t* out_params, keymaster_operation_handle_t* operation_handle) argument [all...] |
/system/keymaster/include/keymaster/ |
H A D | android_keymaster_messages.h | 172 return append_uint32_to_buf(buf, end, purpose); 176 copy_uint32_from_buf(buf_ptr, end, &purpose); 180 keymaster_purpose_t purpose; member in struct:keymaster::SupportedByAlgorithmAndPurposeRequest 344 keymaster_purpose_t purpose; member in struct:keymaster::BeginOperationRequest
|
/system/keymaster/tests/ |
H A D | android_keymaster_test_utils.cpp | 236 keymaster_error_t Keymaster2Test::BeginOperation(keymaster_purpose_t purpose) { argument 240 device()->begin(device(), purpose, &blob_, &in_params, &out_params, &op_handle_); 246 keymaster_error_t Keymaster2Test::BeginOperation(keymaster_purpose_t purpose, argument 251 device()->begin(device(), purpose, &blob_, &input_set, &out_params, &op_handle_); 361 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message) { argument 362 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, client_params(), NULL /* output_params */)); 369 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, argument 373 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, begin_out_params)); 380 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, argument 384 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_param 391 ProcessMessage(keymaster_purpose_t purpose, const string& message, const string& signature) argument 659 CheckTripleDesTestVector(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode, keymaster_padding_t padding_mode, const string& key, const string& iv, const string& input, const string& expected_output) argument 774 get_supported_block_modes(const struct keymaster1_device* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_block_mode_t** modes, size_t* modes_length) argument 782 get_supported_padding_modes(const struct keymaster1_device* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_padding_t** modes, size_t* modes_length) argument 791 get_supported_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, keymaster_digest_t** digests, size_t* digests_length) argument 879 begin(const keymaster1_device_t* dev, keymaster_purpose_t purpose, const keymaster_key_blob_t* key, const keymaster_key_param_set_t* in_params, keymaster_key_param_set_t* out_params, keymaster_operation_handle_t* operation_handle) argument [all...] |
H A D | android_keymaster_test.cpp | 1881 keymaster_error_t BeginOperation(keymaster_purpose_t purpose, argument 1884 req.purpose = purpose; 1911 string ProcessMessage(keymaster_purpose_t purpose, const string& message, argument 1913 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params)); 3487 const keymaster_purpose_t purpose; member in struct:keymaster::test::TripleDesTestVector 3644 CheckTripleDesTestVector(test.purpose, test.block_mode, test.padding_mode,
|