Searched defs:purpose (Results 1 - 25 of 37) sorted by relevance

12

/system/keymaster/km_openssl/
H A Daes_operation.h40 AesOperationFactory(keymaster_purpose_t purpose) : BlockCipherOperationFactory(purpose) {} argument
H A Dtriple_des_operation.h40 TripleDesOperationFactory(keymaster_purpose_t purpose) : BlockCipherOperationFactory(purpose) {} argument
H A Drsa_key.cpp35 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { argument
36 switch (purpose) {
53 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) { argument
54 switch (purpose) {
H A Dhmac_operation.h27 HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest,
56 virtual KeyType registry_key() const { return KeyType(KM_ALGORITHM_HMAC, purpose()); }
63 virtual keymaster_purpose_t purpose() const = 0;
67 keymaster_purpose_t purpose() const { return KM_PURPOSE_SIGN; } function in class:keymaster::HmacSignOperationFactory
71 keymaster_purpose_t purpose() const { return KM_PURPOSE_VERIFY; } function in class:keymaster::HmacVerifyOperationFactory
H A Dblock_cipher_operation.h48 BlockCipherOperationFactory(keymaster_purpose_t purpose) : purpose_(purpose) {} argument
71 BlockCipherEvpOperation(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode,
H A Dhmac_operation.cpp48 if (purpose() == KM_PURPOSE_VERIFY) {
54 if (purpose() == KM_PURPOSE_SIGN) {
69 move(key), purpose(), digest, mac_length_bits / 8, min_mac_length_bits / 8));
88 HmacOperation::HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest, argument
90 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()), error_(KM_ERROR_OK),
123 if (purpose == KM_PURPOSE_SIGN) {
174 switch (purpose()) {
H A Dblock_cipher_operation.cpp144 BlockCipherEvpOperation::BlockCipherEvpOperation(keymaster_purpose_t purpose, argument
149 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()), block_mode_(block_mode),
/system/security/keystore/
H A Doperation_proto_handler.cpp31 void determinePurpose(KeyPurpose purpose, OperationConfig* operationConfig) { argument
32 switch (purpose) {
107 determinePurpose(op.purpose, &operationConfig);
H A Doperation_struct.h39 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_),
48 KeyPurpose purpose; member in struct:keystore::Operation
H A Doperation.cpp27 sp<IBinder> OperationMap::addOperation(uint64_t handle, uint64_t keyid, KeyPurpose purpose, argument
32 mMap.emplace(token, Operation(handle, keyid, purpose, dev, std::move(characteristics), appToken,
H A Dauth_token_table.cpp96 inline bool is_secret_key_operation(Algorithm algorithm, KeyPurpose purpose) { argument
98 if (purpose == KeyPurpose::SIGN || purpose == KeyPurpose::DECRYPT) return true;
102 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info, KeyPurpose purpose) { argument
104 return is_secret_key_operation(algorithm, purpose) &&
108 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info, KeyPurpose purpose) { argument
110 return is_secret_key_operation(algorithm, purpose) && key_info.find(Tag::AUTH_TIMEOUT) == -1;
114 KeyPurpose purpose, uint64_t op_handle,
116 if (!KeyRequiresAuthentication(key_info, purpose)) return AUTH_NOT_REQUIRED;
124 if (KeyRequiresAuthPerOperation(key_info, purpose))
113 FindAuthorization(const AuthorizationSet& key_info, KeyPurpose purpose, uint64_t op_handle, const HardwareAuthToken** found) argument
[all...]
/system/keymaster/include/keymaster/km_openssl/
H A Decdsa_operation.h33 keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key)
34 : Operation(purpose, move(hw_enforced), move(sw_enforced)), digest_(digest),
85 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_EC, purpose()); }
90 virtual keymaster_purpose_t purpose() const = 0;
98 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; }
108 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; }
32 EcdsaOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) argument
H A Drsa_operation.h37 keymaster_purpose_t purpose, keymaster_digest_t digest,
39 : Operation(purpose, move(hw_enforced), move(sw_enforced)), rsa_key_(key),
77 keymaster_purpose_t purpose, keymaster_digest_t digest,
141 keymaster_purpose_t purpose, keymaster_digest_t digest,
143 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, padding, key) {}
187 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_RSA, purpose()); }
188 virtual keymaster_purpose_t purpose() const = 0;
232 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; }
245 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; }
258 keymaster_purpose_t purpose() cons
36 RsaOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument
140 RsaCryptOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument
[all...]
/system/keymaster/legacy_support/
H A Dkeymaster_passthrough_operation.h38 explicit KeymasterPassthroughOperation(keymaster_purpose_t purpose, argument
40 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()),
50 rc = km_device_->begin(km_device_, purpose(), &key_blob_, &input_params, &out_params,
96 keymaster_purpose_t purpose,
98 : key_type_(algorithm, purpose), km_device_(km_device) {}
109 key_type_.purpose, km_device_, std::move(key)));
95 KeymasterPassthroughOperationFactory(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const KeymasterDeviceType* km_device) argument
H A Decdsa_keymaster1_operation.h32 EcdsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument
33 : purpose_(purpose), operation_handle_(0), engine_(engine) {}
60 wrapped_operation_(super::purpose(), engine) {
62 assert(super::purpose() != KM_PURPOSE_VERIFY);
63 assert(super::purpose() != KM_PURPOSE_ENCRYPT);
106 EcdsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument
107 : purpose_(purpose), engine_(engine) {}
H A Drsa_keymaster1_operation.h32 RsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument
33 : purpose_(purpose), operation_handle_(0), engine_(engine) {}
60 wrapped_operation_(super::purpose(), engine) {
62 assert(super::purpose() != KM_PURPOSE_VERIFY);
63 assert(super::purpose() != KM_PURPOSE_ENCRYPT);
106 RsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument
107 : purpose_(purpose), engine_(engine) {}
H A Dkeymaster1_legacy_support.cpp57 keymaster_purpose_t purpose,
59 auto key = std::make_pair(algorithm, purpose);
64 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length);
86 for (auto purpose : sig_purposes) {
89 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all);
98 for (auto purpose : crypt_purposes) {
101 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all);
120 keymaster_purpose_t purpose,
123 auto supported_digests = digest_map.find(std::make_pair(algorithm, purpose));
125 // Invalid algorith/purpose pai
56 add_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, Keymaster1LegacySupport::DigestMap* map, bool* supports_all) argument
119 findUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const T& params, const Keymaster1LegacySupport::DigestMap& digest_map) argument
138 requiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const T& params, const Keymaster1LegacySupport::DigestMap& digest_map) argument
153 LOG(DEBUG) << "Requested digest(s) supported for algorithm " << algorithm << " and purpose " << purpose; local
172 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); local
193 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); local
[all...]
/system/core/trusty/keymaster/
H A Dtrusty_keymaster_main.cpp138 static bool do_operation(TrustyKeymasterDevice* device, keymaster_purpose_t purpose, argument
147 keymaster_error_t error = device->begin(purpose, key, &param_set, nullptr, &op_handle);
H A Dtrusty_keymaster_device.cpp463 keymaster_error_t TrustyKeymasterDevice::begin(keymaster_purpose_t purpose, argument
485 request.purpose = purpose;
723 keymaster_purpose_t purpose,
728 return convert_device(dev)->begin(purpose, key, in_params, out_params, operation_handle);
722 begin(const keymaster2_device_t* dev, keymaster_purpose_t purpose, const keymaster_key_blob_t* key, const keymaster_key_param_set_t* in_params, keymaster_key_param_set_t* out_params, keymaster_operation_handle_t* operation_handle) argument
/system/keymaster/include/keymaster/
H A Doperation.h43 : algorithm(alg), purpose(purp) {}
46 keymaster_purpose_t purpose; member in struct:keymaster::OperationFactory::KeyType
49 return algorithm == rhs.algorithm && purpose == rhs.purpose;
91 explicit Operation(keymaster_purpose_t purpose, AuthorizationSet&& hw_enforced, argument
93 : purpose_(purpose), hw_enforced_(move(hw_enforced)), sw_enforced_(move(sw_enforced)) {}
99 keymaster_purpose_t purpose() const { return purpose_; } function in class:keymaster::Operation
H A Dattestation_record.h56 ASN1_INTEGER_SET* purpose; member in struct:keymaster::km_auth_list
95 ASN1_EXP_SET_OF_OPT(KM_AUTH_LIST, purpose, ASN1_INTEGER, TAG_PURPOSE.masked_tag()),
/system/keymaster/android_keymaster/
H A Dkeymaster_enforcement.cpp81 static keymaster_error_t authorized_purpose(const keymaster_purpose_t purpose, argument
83 switch (purpose) {
89 if (auth_set.Contains(TAG_PURPOSE, purpose))
98 inline bool is_origination_purpose(keymaster_purpose_t purpose) { argument
99 return purpose == KM_PURPOSE_ENCRYPT || purpose == KM_PURPOSE_SIGN;
102 inline bool is_usage_purpose(keymaster_purpose_t purpose) { argument
103 return purpose == KM_PURPOSE_DECRYPT || purpose == KM_PURPOSE_VERIFY;
116 keymaster_error_t KeymasterEnforcement::AuthorizeOperation(const keymaster_purpose_t purpose, argument
192 AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid, const AuthProxy& auth_set, const AuthorizationSet& operation_params) argument
[all...]
H A Dandroid_keymaster.cpp116 keymaster_purpose_t purpose,
122 const OperationFactory* factory = context.GetOperationFactory(algorithm, purpose);
135 GetSupported(*context_, request.algorithm, request.purpose,
141 GetSupported(*context_, request.algorithm, request.purpose,
147 GetSupported(*context_, request.algorithm, request.purpose, &OperationFactory::SupportedDigests,
275 OperationFactory* factory = key_factory->GetOperationFactory(request.purpose);
288 request.purpose, key_id, operation->authorizations(), request.additional_params,
314 operation->purpose(), operation->key_id(), operation->authorizations(),
343 operation->purpose(), operation->key_id(), operation->authorizations(),
115 GetSupported(const KeymasterContext& context, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const T* (OperationFactory::*get_supported_method)(size_t* count) const, SupportedResponse<T>* response) argument
/system/keymaster/tests/
H A Dkeymaster_enforcement_test.cpp35 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, argument
39 purpose, keyid, auth_set, empty_set, 0 /* op_handle */, true /* is_begin_operation */);
/system/vold/
H A DKeymaster.cpp178 KeymasterOperation Keymaster::begin(km::KeyPurpose purpose, const std::string& key, argument
194 auto error = mDevice->begin(purpose, keyBlob, inParams.hidl_data(), authToken, hidlCb);

Completed in 4165 milliseconds

12