Searched refs:purpose (Results 1 - 25 of 88) sorted by relevance

1234

/system/keymaster/km_openssl/
H A Drsa_key.cpp35 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { argument
36 switch (purpose) {
53 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) { argument
54 switch (purpose) {
H A Dhmac_operation.h27 HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest,
56 virtual KeyType registry_key() const { return KeyType(KM_ALGORITHM_HMAC, purpose()); }
63 virtual keymaster_purpose_t purpose() const = 0;
67 keymaster_purpose_t purpose() const { return KM_PURPOSE_SIGN; } function in class:keymaster::HmacSignOperationFactory
71 keymaster_purpose_t purpose() const { return KM_PURPOSE_VERIFY; } function in class:keymaster::HmacVerifyOperationFactory
H A Daes_operation.h40 AesOperationFactory(keymaster_purpose_t purpose) : BlockCipherOperationFactory(purpose) {} argument
H A Dtriple_des_operation.h40 TripleDesOperationFactory(keymaster_purpose_t purpose) : BlockCipherOperationFactory(purpose) {} argument
H A Dtriple_des_key.cpp33 OperationFactory* TripleDesKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const {
34 switch (purpose) {
H A Dhmac_operation.cpp48 if (purpose() == KM_PURPOSE_VERIFY) {
54 if (purpose() == KM_PURPOSE_SIGN) {
69 move(key), purpose(), digest, mac_length_bits / 8, min_mac_length_bits / 8));
88 HmacOperation::HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest, argument
90 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()), error_(KM_ERROR_OK),
123 if (purpose == KM_PURPOSE_SIGN) {
174 switch (purpose()) {
H A Daes_key.cpp33 OperationFactory* AesKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const {
34 switch (purpose) {
H A Dhmac_key.cpp31 OperationFactory* HmacKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const {
32 switch (purpose) {
/system/keymaster/legacy_support/
H A Dkeymaster1_legacy_support.cpp57 keymaster_purpose_t purpose,
59 auto key = std::make_pair(algorithm, purpose);
64 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length);
86 for (auto purpose : sig_purposes) {
89 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all);
98 for (auto purpose : crypt_purposes) {
101 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all);
120 keymaster_purpose_t purpose,
123 auto supported_digests = digest_map.find(std::make_pair(algorithm, purpose));
125 // Invalid algorith/purpose pai
56 add_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, Keymaster1LegacySupport::DigestMap* map, bool* supports_all) argument
119 findUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const T& params, const Keymaster1LegacySupport::DigestMap& digest_map) argument
138 requiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const T& params, const Keymaster1LegacySupport::DigestMap& digest_map) argument
153 LOG(DEBUG) << "Requested digest(s) supported for algorithm " << algorithm << " and purpose " << purpose; local
172 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); local
193 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); local
[all...]
H A Decdsa_keymaster1_operation.h32 EcdsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument
33 : purpose_(purpose), operation_handle_(0), engine_(engine) {}
60 wrapped_operation_(super::purpose(), engine) {
62 assert(super::purpose() != KM_PURPOSE_VERIFY);
63 assert(super::purpose() != KM_PURPOSE_ENCRYPT);
106 EcdsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument
107 : purpose_(purpose), engine_(engine) {}
H A Drsa_keymaster1_operation.h32 RsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument
33 : purpose_(purpose), operation_handle_(0), engine_(engine) {}
60 wrapped_operation_(super::purpose(), engine) {
62 assert(super::purpose() != KM_PURPOSE_VERIFY);
63 assert(super::purpose() != KM_PURPOSE_ENCRYPT);
106 RsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument
107 : purpose_(purpose), engine_(engine) {}
H A Dkeymaster_passthrough_operation.h38 explicit KeymasterPassthroughOperation(keymaster_purpose_t purpose, argument
40 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()),
50 rc = km_device_->begin(km_device_, purpose(), &key_blob_, &input_params, &out_params,
96 keymaster_purpose_t purpose,
98 : key_type_(algorithm, purpose), km_device_(km_device) {}
109 key_type_.purpose, km_device_, std::move(key)));
95 KeymasterPassthroughOperationFactory(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const KeymasterDeviceType* km_device) argument
/system/keymaster/include/keymaster/
H A Doperation.h43 : algorithm(alg), purpose(purp) {}
46 keymaster_purpose_t purpose; member in struct:keymaster::OperationFactory::KeyType
49 return algorithm == rhs.algorithm && purpose == rhs.purpose;
91 explicit Operation(keymaster_purpose_t purpose, AuthorizationSet&& hw_enforced, argument
93 : purpose_(purpose), hw_enforced_(move(hw_enforced)), sw_enforced_(move(sw_enforced)) {}
99 keymaster_purpose_t purpose() const { return purpose_; } function in class:keymaster::Operation
H A Dsoft_keymaster_device.h89 bool FindUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose,
92 bool RequiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose,
114 keymaster_purpose_t purpose,
119 keymaster_purpose_t purpose,
124 keymaster_purpose_t purpose,
161 static keymaster_error_t begin(const keymaster1_device_t* dev, keymaster_purpose_t purpose,
218 static keymaster_error_t begin(const keymaster2_device_t* dev, keymaster_purpose_t purpose,
/system/keymaster/include/keymaster/km_openssl/
H A Drsa_key.h35 bool SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding);
36 bool SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest);
H A Decdsa_operation.h33 keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key)
34 : Operation(purpose, move(hw_enforced), move(sw_enforced)), digest_(digest),
85 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_EC, purpose()); }
90 virtual keymaster_purpose_t purpose() const = 0;
98 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; }
108 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; }
32 EcdsaOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) argument
H A Drsa_operation.h37 keymaster_purpose_t purpose, keymaster_digest_t digest,
39 : Operation(purpose, move(hw_enforced), move(sw_enforced)), rsa_key_(key),
77 keymaster_purpose_t purpose, keymaster_digest_t digest,
141 keymaster_purpose_t purpose, keymaster_digest_t digest,
143 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, padding, key) {}
187 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_RSA, purpose()); }
188 virtual keymaster_purpose_t purpose() const = 0;
232 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; }
245 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; }
258 keymaster_purpose_t purpose() cons
36 RsaOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument
140 RsaCryptOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument
[all...]
H A Dhmac_key.h40 OperationFactory* GetOperationFactory(keymaster_purpose_t purpose) const override;
/system/security/keystore/
H A Dauth_token_table.cpp96 inline bool is_secret_key_operation(Algorithm algorithm, KeyPurpose purpose) { argument
98 if (purpose == KeyPurpose::SIGN || purpose == KeyPurpose::DECRYPT) return true;
102 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info, KeyPurpose purpose) { argument
104 return is_secret_key_operation(algorithm, purpose) &&
108 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info, KeyPurpose purpose) { argument
110 return is_secret_key_operation(algorithm, purpose) && key_info.find(Tag::AUTH_TIMEOUT) == -1;
114 KeyPurpose purpose, uint64_t op_handle,
116 if (!KeyRequiresAuthentication(key_info, purpose)) return AUTH_NOT_REQUIRED;
124 if (KeyRequiresAuthPerOperation(key_info, purpose))
113 FindAuthorization(const AuthorizationSet& key_info, KeyPurpose purpose, uint64_t op_handle, const HardwareAuthToken** found) argument
[all...]
H A Dkey_config.proto55 repeated string purpose = 10;
H A Doperation_config.proto55 // What purpose is this operation serving? Encrypt, decrypt, sign verify?
56 optional string purpose = 10;
H A Doperation_struct.h39 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_),
48 KeyPurpose purpose; member in struct:keystore::Operation
H A Dkeymaster_enforcement.cpp85 static ErrorCode authorized_purpose(const KeyPurpose purpose, const AuthorizationSet& auth_set) { argument
86 switch (purpose) {
91 if (auth_set.Contains(TAG_PURPOSE, purpose)) return ErrorCode::OK;
99 inline bool is_origination_purpose(KeyPurpose purpose) { argument
100 return purpose == KeyPurpose::ENCRYPT || purpose == KeyPurpose::SIGN;
103 inline bool is_usage_purpose(KeyPurpose purpose) { argument
104 return purpose == KeyPurpose::DECRYPT || purpose == KeyPurpose::VERIFY;
117 ErrorCode KeymasterEnforcement::AuthorizeOperation(const KeyPurpose purpose, cons argument
192 AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid, const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, NullOr<const HardwareAuthToken&> auth_token) argument
[all...]
H A Doperation_proto_handler.cpp31 void determinePurpose(KeyPurpose purpose, OperationConfig* operationConfig) { argument
32 switch (purpose) {
107 determinePurpose(op.purpose, &operationConfig);
/system/keymaster/android_keymaster/
H A Dkeymaster_enforcement.cpp81 static keymaster_error_t authorized_purpose(const keymaster_purpose_t purpose, argument
83 switch (purpose) {
89 if (auth_set.Contains(TAG_PURPOSE, purpose))
98 inline bool is_origination_purpose(keymaster_purpose_t purpose) { argument
99 return purpose == KM_PURPOSE_ENCRYPT || purpose == KM_PURPOSE_SIGN;
102 inline bool is_usage_purpose(keymaster_purpose_t purpose) { argument
103 return purpose == KM_PURPOSE_DECRYPT || purpose == KM_PURPOSE_VERIFY;
116 keymaster_error_t KeymasterEnforcement::AuthorizeOperation(const keymaster_purpose_t purpose, argument
192 AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid, const AuthProxy& auth_set, const AuthorizationSet& operation_params) argument
[all...]

Completed in 213 milliseconds

1234