/system/keymaster/legacy_support/ |
H A D | ec_keymaster1_key.cpp | 41 static void UpdateToWorkAroundUnsupportedDigests(const AuthorizationSet& key_description, argument 45 for (const keymaster_key_param_t& entry : key_description) { 64 keymaster_error_t EcdsaKeymaster1KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 69 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy); 73 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); 76 } else if (!key_description.Contains(TAG_KEY_SIZE, key_size)) { 83 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, 87 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy); 82 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
|
H A D | keymaster1_legacy_support.cpp | 160 const AuthorizationSet& key_description) const { 163 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) { 170 for (auto& entry : key_description) 173 if (requiresSoftwareDigesting(algorithm, purpose, key_description, device_digests_)) 181 const AuthProxy& key_description) const { 184 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) { 191 for (auto& entry : key_description) 194 if (requiresSoftwareDigesting(algorithm, purpose, key_description, device_digests_)) 204 const AuthorizationSet& key_description, 207 if (legacy_support_.RequiresSoftwareDigesting(key_description)) { 203 GenerateKey( const AuthorizationSet& key_description, KeymasterKeyBlob* key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument [all...] |
H A D | rsa_keymaster0_key.cpp | 36 keymaster_error_t RsaKeymaster0KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 44 if (!key_description.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) { 50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { 66 return blob_maker_.CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob, 71 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, 81 UpdateImportKeyDescription(key_description, input_key_material_format, input_key_material, 70 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
|
H A D | rsa_keymaster1_key.cpp | 40 static void UpdateToWorkAroundUnsupportedDigests(const AuthorizationSet& key_description, argument 46 for (const keymaster_key_param_t& entry : key_description) { 82 keymaster_error_t RsaKeymaster1KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 87 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy); 92 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, 96 UpdateToWorkAroundUnsupportedDigests(key_description, &key_params_copy); 91 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
|
H A D | ec_keymaster0_key.cpp | 36 keymaster_error_t EcdsaKeymaster0KeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 44 return super::GenerateKey(key_description, key_blob, hw_enforced, sw_enforced); 48 keymaster_error_t error = GetCurveAndSize(key_description, &ec_curve, &key_size); 64 return blob_maker_.CreateKeyBlob(key_description, KM_ORIGIN_UNKNOWN, key_material, key_blob, 69 const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, 76 return super::ImportKey(key_description, input_key_material_format, input_key_material, 82 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 68 ImportKey( const AuthorizationSet& key_description, keymaster_key_format_t input_key_material_format, const KeymasterKeyBlob& input_key_material, KeymasterKeyBlob* output_key_blob, AuthorizationSet* hw_enforced, AuthorizationSet* sw_enforced) const argument
|
H A D | keymaster_passthrough_engine.cpp | 85 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 89 keymaster_error_t ImportKey(const AuthorizationSet& key_description, 212 TKeymasterPassthroughEngine<keymaster1_device_t>::GenerateKey(const AuthorizationSet& key_description, argument 220 keymaster_error_t error = km_device_->generate_key(km_device_, &key_description, 235 TKeymasterPassthroughEngine<keymaster2_device_t>::GenerateKey(const AuthorizationSet& key_description, argument 243 keymaster_error_t error = km_device_->generate_key(km_device_, &key_description, 258 TKeymasterPassthroughEngine<keymaster1_device_t>::ImportKey(const AuthorizationSet& key_description, argument 270 keymaster_error_t error = km_device_->import_key(km_device_, &key_description, 287 TKeymasterPassthroughEngine<keymaster2_device_t>::ImportKey(const AuthorizationSet& key_description, argument 299 keymaster_error_t error = km_device_->import_key(km_device_, &key_description, [all...] |
/system/keymaster/include/keymaster/legacy_support/ |
H A D | keymaster1_legacy_support.h | 47 bool RequiresSoftwareDigesting(const AuthorizationSet& key_description) const; 48 bool RequiresSoftwareDigesting(const AuthProxy& key_description) const; 69 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, argument 72 if (legacy_support_.RequiresSoftwareDigesting(key_description)) { 73 return software_digest_factory_.GenerateKey(key_description, key_blob, hw_enforced, 76 return passthrough_factory_.GenerateKey(key_description, key_blob, hw_enforced, 81 keymaster_error_t ImportKey(const AuthorizationSet& key_description, argument 86 if (legacy_support_.RequiresSoftwareDigesting(key_description)) { 87 return software_digest_factory_.ImportKey(key_description, input_key_material_format, 91 return passthrough_factory_.ImportKey(key_description, input_key_material_forma [all...] |
H A D | keymaster_passthrough_key.h | 43 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 46 return engine_->GenerateKey(key_description, key_blob, hw_enforced, sw_enforced); 49 keymaster_error_t ImportKey(const AuthorizationSet& key_description, 54 return engine_->ImportKey(key_description, input_key_material_format, input_key_material,
|
H A D | ec_keymaster0_key.h | 40 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 44 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
|
H A D | ec_keymaster1_key.h | 44 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 48 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
|
H A D | keymaster_passthrough_engine.h | 43 virtual keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 47 virtual keymaster_error_t ImportKey(const AuthorizationSet& key_description,
|
H A D | rsa_keymaster0_key.h | 40 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 44 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
|
H A D | rsa_keymaster1_key.h | 45 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 49 keymaster_error_t ImportKey(const AuthorizationSet& key_description,
|
/system/keymaster/include/keymaster/km_openssl/ |
H A D | ec_key_factory.h | 37 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 40 keymaster_error_t ImportKey(const AuthorizationSet& key_description, 50 keymaster_error_t UpdateImportKeyDescription(const AuthorizationSet& key_description, 62 static keymaster_error_t GetCurveAndSize(const AuthorizationSet& key_description,
|
H A D | rsa_key_factory.h | 34 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 37 keymaster_error_t ImportKey(const AuthorizationSet& key_description, 53 keymaster_error_t UpdateImportKeyDescription(const AuthorizationSet& key_description,
|
H A D | symmetric_key.h | 37 keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 40 keymaster_error_t ImportKey(const AuthorizationSet& key_description, 60 validate_algorithm_specific_new_key_params(const AuthorizationSet& key_description) const = 0;
|
H A D | hmac_key.h | 48 const AuthorizationSet& key_description) const override;
|
/system/keymaster/km_openssl/ |
H A D | aes_key.cpp | 73 const AuthorizationSet& key_description) const { 74 if (key_description.Contains(TAG_BLOCK_MODE, KM_MODE_GCM)) { 76 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length)) 86 if (key_description.find(TAG_MIN_MAC_LENGTH) != -1) {
|
H A D | hmac_key.cpp | 65 const AuthorizationSet& key_description) const { 67 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) 71 if (!key_description.GetTagValue(TAG_DIGEST, &digest)) { 72 LOG_E("%d digests specified for HMAC key", key_description.GetTagCount(TAG_DIGEST));
|
H A D | symmetric_key.cpp | 33 keymaster_error_t SymmetricKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 41 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) || 45 keymaster_error_t error = validate_algorithm_specific_new_key_params(key_description); 60 return blob_maker_.CreateKeyBlob(key_description, KM_ORIGIN_GENERATED, key_material, key_blob, 64 keymaster_error_t SymmetricKeyFactory::ImportKey(const AuthorizationSet& key_description, argument 73 AuthorizationSet authorizations(key_description); 82 keymaster_error_t error = validate_algorithm_specific_new_key_params(key_description);
|
H A D | triple_des_key.cpp | 59 const AuthorizationSet& key_description) const { 60 if (key_description.Contains(TAG_MIN_MAC_LENGTH)) return KM_ERROR_INVALID_TAG;
|
H A D | ec_key_factory.cpp | 44 keymaster_error_t EcKeyFactory::GetCurveAndSize(const AuthorizationSet& key_description, argument 47 if (!key_description.GetTagValue(TAG_EC_CURVE, curve)) { 49 if (!key_description.GetTagValue(TAG_KEY_SIZE, key_size_bits)) { 63 if (key_description.GetTagValue(TAG_KEY_SIZE, &tag_key_size_bits) && 74 keymaster_error_t EcKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 81 AuthorizationSet authorizations(key_description); 127 keymaster_error_t EcKeyFactory::ImportKey(const AuthorizationSet& key_description, argument 139 key_description, input_key_material_format, input_key_material, &authorizations, &key_size); 147 keymaster_error_t EcKeyFactory::UpdateImportKeyDescription(const AuthorizationSet& key_description, argument 165 updated_description->Reinitialize(key_description); [all...] |
H A D | rsa_key_factory.cpp | 52 keymaster_error_t RsaKeyFactory::GenerateKey(const AuthorizationSet& key_description, argument 59 const AuthorizationSet& authorizations(key_description); 103 keymaster_error_t RsaKeyFactory::ImportKey(const AuthorizationSet& key_description, argument 116 UpdateImportKeyDescription(key_description, input_key_material_format, input_key_material, 124 keymaster_error_t RsaKeyFactory::UpdateImportKeyDescription(const AuthorizationSet& key_description, argument 143 updated_description->Reinitialize(key_description);
|
/system/keymaster/include/keymaster/ |
H A D | soft_key_factory.h | 37 virtual keymaster_error_t CreateKeyBlob(const AuthorizationSet& key_description,
|
H A D | key_factory.h | 40 virtual keymaster_error_t GenerateKey(const AuthorizationSet& key_description, 44 virtual keymaster_error_t ImportKey(const AuthorizationSet& key_description,
|