/system/keymaster/km_openssl/ |
H A D | rsa_key.cpp | 35 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { argument 36 switch (purpose) { 53 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) { argument 54 switch (purpose) {
|
H A D | hmac_operation.h | 27 HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest, 56 virtual KeyType registry_key() const { return KeyType(KM_ALGORITHM_HMAC, purpose()); } 63 virtual keymaster_purpose_t purpose() const = 0; 67 keymaster_purpose_t purpose() const { return KM_PURPOSE_SIGN; } function in class:keymaster::HmacSignOperationFactory 71 keymaster_purpose_t purpose() const { return KM_PURPOSE_VERIFY; } function in class:keymaster::HmacVerifyOperationFactory
|
H A D | aes_operation.h | 40 AesOperationFactory(keymaster_purpose_t purpose) : BlockCipherOperationFactory(purpose) {} argument
|
H A D | triple_des_operation.h | 40 TripleDesOperationFactory(keymaster_purpose_t purpose) : BlockCipherOperationFactory(purpose) {} argument
|
H A D | triple_des_key.cpp | 33 OperationFactory* TripleDesKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { 34 switch (purpose) {
|
H A D | hmac_operation.cpp | 48 if (purpose() == KM_PURPOSE_VERIFY) { 54 if (purpose() == KM_PURPOSE_SIGN) { 69 move(key), purpose(), digest, mac_length_bits / 8, min_mac_length_bits / 8)); 88 HmacOperation::HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest, argument 90 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()), error_(KM_ERROR_OK), 123 if (purpose == KM_PURPOSE_SIGN) { 174 switch (purpose()) {
|
H A D | aes_key.cpp | 33 OperationFactory* AesKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { 34 switch (purpose) {
|
H A D | hmac_key.cpp | 31 OperationFactory* HmacKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { 32 switch (purpose) {
|
/system/keymaster/legacy_support/ |
H A D | keymaster1_legacy_support.cpp | 57 keymaster_purpose_t purpose, 59 auto key = std::make_pair(algorithm, purpose); 64 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); 86 for (auto purpose : sig_purposes) { 89 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); 98 for (auto purpose : crypt_purposes) { 101 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); 120 keymaster_purpose_t purpose, 123 auto supported_digests = digest_map.find(std::make_pair(algorithm, purpose)); 125 // Invalid algorith/purpose pai 56 add_digests(const keymaster1_device_t* dev, keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, Keymaster1LegacySupport::DigestMap* map, bool* supports_all) argument 119 findUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const T& params, const Keymaster1LegacySupport::DigestMap& digest_map) argument 138 requiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const T& params, const Keymaster1LegacySupport::DigestMap& digest_map) argument 153 LOG(DEBUG) << "Requested digest(s) supported for algorithm " << algorithm << " and purpose " << purpose; local 172 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); local 193 keymaster_purpose_t purpose = static_cast<keymaster_purpose_t>(entry.enumerated); local [all...] |
H A D | ecdsa_keymaster1_operation.h | 32 EcdsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument 33 : purpose_(purpose), operation_handle_(0), engine_(engine) {} 60 wrapped_operation_(super::purpose(), engine) { 62 assert(super::purpose() != KM_PURPOSE_VERIFY); 63 assert(super::purpose() != KM_PURPOSE_ENCRYPT); 106 EcdsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument 107 : purpose_(purpose), engine_(engine) {}
|
H A D | rsa_keymaster1_operation.h | 32 RsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument 33 : purpose_(purpose), operation_handle_(0), engine_(engine) {} 60 wrapped_operation_(super::purpose(), engine) { 62 assert(super::purpose() != KM_PURPOSE_VERIFY); 63 assert(super::purpose() != KM_PURPOSE_ENCRYPT); 106 RsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) argument 107 : purpose_(purpose), engine_(engine) {}
|
H A D | keymaster_passthrough_operation.h | 38 explicit KeymasterPassthroughOperation(keymaster_purpose_t purpose, argument 40 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()), 50 rc = km_device_->begin(km_device_, purpose(), &key_blob_, &input_params, &out_params, 96 keymaster_purpose_t purpose, 98 : key_type_(algorithm, purpose), km_device_(km_device) {} 109 key_type_.purpose, km_device_, std::move(key))); 95 KeymasterPassthroughOperationFactory(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, const KeymasterDeviceType* km_device) argument
|
/system/keymaster/include/keymaster/ |
H A D | operation.h | 43 : algorithm(alg), purpose(purp) {} 46 keymaster_purpose_t purpose; member in struct:keymaster::OperationFactory::KeyType 49 return algorithm == rhs.algorithm && purpose == rhs.purpose; 91 explicit Operation(keymaster_purpose_t purpose, AuthorizationSet&& hw_enforced, argument 93 : purpose_(purpose), hw_enforced_(move(hw_enforced)), sw_enforced_(move(sw_enforced)) {} 99 keymaster_purpose_t purpose() const { return purpose_; } function in class:keymaster::Operation
|
H A D | soft_keymaster_device.h | 89 bool FindUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, 92 bool RequiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, 114 keymaster_purpose_t purpose, 119 keymaster_purpose_t purpose, 124 keymaster_purpose_t purpose, 161 static keymaster_error_t begin(const keymaster1_device_t* dev, keymaster_purpose_t purpose, 218 static keymaster_error_t begin(const keymaster2_device_t* dev, keymaster_purpose_t purpose,
|
/system/keymaster/include/keymaster/km_openssl/ |
H A D | rsa_key.h | 35 bool SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding); 36 bool SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest);
|
H A D | ecdsa_operation.h | 33 keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) 34 : Operation(purpose, move(hw_enforced), move(sw_enforced)), digest_(digest), 85 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_EC, purpose()); } 90 virtual keymaster_purpose_t purpose() const = 0; 98 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } 108 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; } 32 EcdsaOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) argument
|
H A D | rsa_operation.h | 37 keymaster_purpose_t purpose, keymaster_digest_t digest, 39 : Operation(purpose, move(hw_enforced), move(sw_enforced)), rsa_key_(key), 77 keymaster_purpose_t purpose, keymaster_digest_t digest, 141 keymaster_purpose_t purpose, keymaster_digest_t digest, 143 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, padding, key) {} 187 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_RSA, purpose()); } 188 virtual keymaster_purpose_t purpose() const = 0; 232 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } 245 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; } 258 keymaster_purpose_t purpose() cons 36 RsaOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument 140 RsaCryptOperation(AuthorizationSet&& hw_enforced, AuthorizationSet&& sw_enforced, keymaster_purpose_t purpose, keymaster_digest_t digest, keymaster_padding_t padding, EVP_PKEY* key) argument [all...] |
H A D | hmac_key.h | 40 OperationFactory* GetOperationFactory(keymaster_purpose_t purpose) const override;
|
/system/security/keystore/ |
H A D | auth_token_table.cpp | 96 inline bool is_secret_key_operation(Algorithm algorithm, KeyPurpose purpose) { argument 98 if (purpose == KeyPurpose::SIGN || purpose == KeyPurpose::DECRYPT) return true; 102 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info, KeyPurpose purpose) { argument 104 return is_secret_key_operation(algorithm, purpose) && 108 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info, KeyPurpose purpose) { argument 110 return is_secret_key_operation(algorithm, purpose) && key_info.find(Tag::AUTH_TIMEOUT) == -1; 114 KeyPurpose purpose, uint64_t op_handle, 116 if (!KeyRequiresAuthentication(key_info, purpose)) return AUTH_NOT_REQUIRED; 124 if (KeyRequiresAuthPerOperation(key_info, purpose)) 113 FindAuthorization(const AuthorizationSet& key_info, KeyPurpose purpose, uint64_t op_handle, const HardwareAuthToken** found) argument [all...] |
H A D | key_config.proto | 55 repeated string purpose = 10;
|
H A D | operation_config.proto | 55 // What purpose is this operation serving? Encrypt, decrypt, sign verify? 56 optional string purpose = 10;
|
H A D | operation_struct.h | 39 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_), 48 KeyPurpose purpose; member in struct:keystore::Operation
|
H A D | keymaster_enforcement.cpp | 85 static ErrorCode authorized_purpose(const KeyPurpose purpose, const AuthorizationSet& auth_set) { argument 86 switch (purpose) { 91 if (auth_set.Contains(TAG_PURPOSE, purpose)) return ErrorCode::OK; 99 inline bool is_origination_purpose(KeyPurpose purpose) { argument 100 return purpose == KeyPurpose::ENCRYPT || purpose == KeyPurpose::SIGN; 103 inline bool is_usage_purpose(KeyPurpose purpose) { argument 104 return purpose == KeyPurpose::DECRYPT || purpose == KeyPurpose::VERIFY; 117 ErrorCode KeymasterEnforcement::AuthorizeOperation(const KeyPurpose purpose, cons argument 192 AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid, const AuthorizationSet& auth_set, const AuthorizationSet& operation_params, NullOr<const HardwareAuthToken&> auth_token) argument [all...] |
H A D | operation_proto_handler.cpp | 31 void determinePurpose(KeyPurpose purpose, OperationConfig* operationConfig) { argument 32 switch (purpose) { 107 determinePurpose(op.purpose, &operationConfig);
|
/system/keymaster/android_keymaster/ |
H A D | keymaster_enforcement.cpp | 81 static keymaster_error_t authorized_purpose(const keymaster_purpose_t purpose, argument 83 switch (purpose) { 89 if (auth_set.Contains(TAG_PURPOSE, purpose)) 98 inline bool is_origination_purpose(keymaster_purpose_t purpose) { argument 99 return purpose == KM_PURPOSE_ENCRYPT || purpose == KM_PURPOSE_SIGN; 102 inline bool is_usage_purpose(keymaster_purpose_t purpose) { argument 103 return purpose == KM_PURPOSE_DECRYPT || purpose == KM_PURPOSE_VERIFY; 116 keymaster_error_t KeymasterEnforcement::AuthorizeOperation(const keymaster_purpose_t purpose, argument 192 AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid, const AuthProxy& auth_set, const AuthorizationSet& operation_params) argument [all...] |