/system/keymaster/tests/ |
D | authorization_set_test.cpp | 30 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), in TEST() 31 Authorization(TAG_PURPOSE, KM_PURPOSE_VERIFY), in TEST() 32 Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA), in TEST() 33 Authorization(TAG_USER_ID, 7), in TEST() 34 Authorization(TAG_USER_AUTH_TYPE, HW_AUTH_PASSWORD), in TEST() 35 Authorization(TAG_APPLICATION_ID, "my_app", 6), in TEST() 36 Authorization(TAG_KEY_SIZE, 256), in TEST() 37 Authorization(TAG_AUTH_TIMEOUT, 300), in TEST() 45 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), in TEST() 46 Authorization(TAG_PURPOSE, KM_PURPOSE_VERIFY), in TEST() [all …]
|
D | keymaster_enforcement_test.cpp | 81 sign_param = Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN); in KeymasterBaseTest() 110 Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA), in TEST_F() 111 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), in TEST_F() 112 Authorization(TAG_NO_AUTH_REQUIRED), in TEST_F() 113 Authorization(TAG_ACTIVE_DATETIME, future_time), in TEST_F() 128 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), in TEST_F() 129 Authorization(TAG_ACTIVE_DATETIME, past_time), in TEST_F() 141 Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA), in TEST_F() 142 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), in TEST_F() 143 Authorization(TAG_ORIGINATION_EXPIRE_DATETIME, past_time), in TEST_F() [all …]
|
D | attestation_record_test.cpp | 91 .Authorization(TAG_OS_VERSION, 60000) in TEST() 92 .Authorization(TAG_OS_PATCHLEVEL, 201512) in TEST() 93 .Authorization(TAG_INCLUDE_UNIQUE_ID)); in TEST() 95 .Authorization(TAG_ACTIVE_DATETIME, 10) in TEST() 96 .Authorization(TAG_CREATION_DATETIME, 10) in TEST() 97 .Authorization(TAG_APPLICATION_ID, "fake_app_id", 19) in TEST() 98 .Authorization(TAG_APPLICATION_DATA, "fake_app_data", 12)); in TEST() 104 .Authorization(TAG_ATTESTATION_CHALLENGE, "fake_challenge", 14) in TEST() 105 .Authorization(TAG_ATTESTATION_APPLICATION_ID, "fake_attest_app_id", 18)); in TEST() 172 .Authorization(TAG_OS_VERSION, 60000) in TEST() [all …]
|
D | ecies_kem_test.cpp | 44 .Authorization(TAG_EC_CURVE, curve) in TEST() 45 .Authorization(TAG_KDF, KM_KDF_RFC5869_SHA256) in TEST() 46 .Authorization(TAG_ECIES_SINGLE_HASH_MODE) in TEST() 47 .Authorization(TAG_KEY_SIZE, kKeyLen)); in TEST()
|
D | nist_curve_key_exchange_test.cpp | 42 AuthorizationSetBuilder().Authorization(TAG_EC_CURVE, curve)); in TEST() 80 AuthorizationSetBuilder().Authorization(TAG_EC_CURVE, curve)); in TEST() 112 AuthorizationSetBuilder().Authorization(TAG_EC_CURVE, curve)); in TEST()
|
D | android_keymaster_messages_test.cpp | 68 Authorization(TAG_PURPOSE, KM_PURPOSE_SIGN), 69 Authorization(TAG_PURPOSE, KM_PURPOSE_VERIFY), 70 Authorization(TAG_ALGORITHM, KM_ALGORITHM_RSA), 71 Authorization(TAG_USER_ID, 7), 72 Authorization(TAG_USER_AUTH_TYPE, HW_AUTH_PASSWORD), 73 Authorization(TAG_APPLICATION_ID, "app_id", 6), 74 Authorization(TAG_AUTH_TIMEOUT, 300), 298 msg.output_params.push_back(Authorization(TAG_NONCE, "foo", 3)); in TEST()
|
D | android_keymaster_test_utils.cpp | 668 .Authorization(TAG_MIN_MAC_LENGTH, expected_mac.size() * 8) in CheckHmacTestVector() 681 .Authorization(TAG_BLOCK_MODE, KM_MODE_CTR) in CheckAesCtrTestVector() 682 .Authorization(TAG_CALLER_NONCE) in CheckAesCtrTestVector() 702 .Authorization(TAG_BLOCK_MODE, block_mode) in CheckTripleDesTestVector() 704 if (iv.size()) authset.Authorization(TAG_CALLER_NONCE); in CheckTripleDesTestVector()
|
/system/keymaster/ng/include/ |
D | authorization_set.h | 186 push_back(Authorization(tag, std::forward<Value>(val)...)); in push_back() 214 AuthorizationSetBuilder& Authorization(TagType ttag, ValueType&&... value) { in Authorization() function 220 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const uint8_t* data, in Authorization() function 229 AuthorizationSetBuilder& Authorization(TypedTag<TagType::BYTES, tag> ttag, const char* data, in Authorization() function 231 return Authorization(ttag, reinterpret_cast<const uint8_t*>(data), data_length); in Authorization() 249 AuthorizationSetBuilder& Digest(Digest digest) { return Authorization(TAG_DIGEST, digest); } in Digest() 252 return Authorization(TAG_PADDING, padding); in Padding() 258 Authorization(TAG_ALGORITHM, Algorithm::RSA); in RsaKey() 259 Authorization(TAG_KEY_SIZE, key_size); in RsaKey() 260 Authorization(TAG_RSA_PUBLIC_EXPONENT, public_exponent); in RsaKey() [all …]
|
/system/keymaster/include/keymaster/ |
D | authorization_set.h | 392 return push_back(Authorization(tag, val)); in push_back() 399 return push_back(Authorization(tag)); in push_back() 431 return push_back(Authorization(tag, val)); in push_back() 436 return push_back(Authorization(tag, bytes, bytes_len)); in push_back() 487 AuthorizationSetBuilder& Authorization(TagType tag, ValueType value) { in Authorization() function 493 AuthorizationSetBuilder& Authorization(TypedTag<KM_BOOL, Tag> tag) { in Authorization() function 499 AuthorizationSetBuilder& Authorization(TypedTag<KM_INVALID, Tag> tag) { in Authorization() function 507 AuthorizationSetBuilder& Authorization(TypedTag<KM_BYTES, Tag> tag, const uint8_t* data, in Authorization() function 514 AuthorizationSetBuilder& Authorization(TypedTag<KM_BYTES, Tag> tag, const char* data, in Authorization() function 516 return Authorization(tag, reinterpret_cast<const uint8_t*>(data), data_length); in Authorization() [all …]
|
D | keymaster_tags.h | 222 inline keymaster_key_param_t Authorization(TypedTag<KM_BOOL, Tag> tag) { 227 inline keymaster_key_param_t Authorization(TypedTag<KM_UINT, Tag> tag, uint32_t value) { 232 inline keymaster_key_param_t Authorization(TypedTag<KM_UINT_REP, Tag> tag, uint32_t value) { 237 inline keymaster_key_param_t Authorization(TypedTag<KM_ULONG, Tag> tag, uint64_t value) { 242 inline keymaster_key_param_t Authorization(TypedTag<KM_ULONG_REP, Tag> tag, uint64_t value) { 247 inline keymaster_key_param_t Authorization(TypedTag<KM_DATE, Tag> tag, uint64_t value) { 252 inline keymaster_key_param_t Authorization(TypedTag<KM_BYTES, Tag> tag, const void* bytes, 258 inline keymaster_key_param_t Authorization(TypedTag<KM_BYTES, Tag> tag, 264 inline keymaster_key_param_t Authorization(TypedTag<KM_BIGNUM, Tag> tag, const void* bytes, 270 inline keymaster_key_param_t Authorization(TypedTag<KM_BIGNUM, Tag> tag, [all …]
|
/system/security/keystore/ |
D | keystore_cli_v2.cpp | 119 bool isHardwareEnforced(const ks2::Authorization& a) { in isHardwareEnforced() 124 void PrintTags(const std::vector<ks2::Authorization>& characteristics, bool printHardwareEnforced) { in PrintTags() 132 void PrintKeyCharacteristics(const std::vector<ks2::Authorization>& characteristics) { in PrintKeyCharacteristics() 145 bool verifyEncryptionKeyAttributes(const std::vector<ks2::Authorization> authorizations) { in verifyEncryptionKeyAttributes() 149 std::any_of(authorizations.begin(), authorizations.end(), [&](const ks2::Authorization& a) { in verifyEncryptionKeyAttributes() 158 std::any_of(authorizations.begin(), authorizations.end(), [&](const ks2::Authorization& a) { in verifyEncryptionKeyAttributes() 167 std::any_of(authorizations.begin(), authorizations.end(), [&](const ks2::Authorization& a) { in verifyEncryptionKeyAttributes() 176 std::any_of(authorizations.begin(), authorizations.end(), [&](const ks2::Authorization& a) { in verifyEncryptionKeyAttributes() 186 bool verifyAuthenticationKeyAttributes(const std::vector<ks2::Authorization> authorizations) { in verifyAuthenticationKeyAttributes() 190 std::any_of(authorizations.begin(), authorizations.end(), [&](const ks2::Authorization& a) { in verifyAuthenticationKeyAttributes() [all …]
|
/system/hardware/interfaces/keystore2/aidl/android/system/keystore2/ |
D | KeyMetadata.aidl | 20 import android.system.keystore2.Authorization; 49 Authorization[] authorizations;
|
D | Authorization.aidl | 24 parcelable Authorization {
|
/system/keymaster/km_openssl/ |
D | attestation_record.cpp | 1610 set_builder->Authorization( in parse_submod_values() 1615 set_builder->Authorization( in parse_submod_values() 1620 set_builder->Authorization(TAG_USER_AUTH_TYPE, static_cast<hw_authenticator_type_t>( in parse_submod_values() 1625 set_builder->Authorization( in parse_submod_values() 1630 set_builder->Authorization(TAG_PURPOSE, in parse_submod_values() 1637 set_builder->Authorization(TAG_PADDING, in parse_submod_values() 1644 set_builder->Authorization( in parse_submod_values() 1651 set_builder->Authorization(TAG_BLOCK_MODE, in parse_submod_values() 1658 set_builder->Authorization(TAG_KEY_SIZE, value_item->asInt()->value()); in parse_submod_values() 1662 set_builder->Authorization(TAG_AUTH_TIMEOUT, value_item->asInt()->value()); in parse_submod_values() [all …]
|
/system/keymaster/contexts/ |
D | pure_soft_keymaster_context.cpp | 425 .Authorization(TAG_PURPOSE, KM_PURPOSE_WRAP) in UnwrapKey() 471 .Authorization(TAG_BLOCK_MODE, KM_MODE_GCM) in UnwrapKey() 472 .Authorization(TAG_NONCE, iv) in UnwrapKey() 473 .Authorization(TAG_MIN_MAC_LENGTH, 128) in UnwrapKey() 480 .Authorization(TAG_BLOCK_MODE, KM_MODE_GCM) in UnwrapKey() 481 .Authorization(TAG_NONCE, iv) in UnwrapKey() 482 .Authorization(TAG_MAC_LENGTH, 128) in UnwrapKey() 523 .Authorization(TAG_ASSOCIATED_DATA, wrapped_key_description.data, in UnwrapKey()
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/1/android/system/keystore2/ |
D | Authorization.aidl | 37 parcelable Authorization {
|
D | KeyMetadata.aidl | 40 android.system.keystore2.Authorization[] authorizations;
|
/system/hardware/interfaces/keystore2/aidl/aidl_api/android.system.keystore2/current/android/system/keystore2/ |
D | Authorization.aidl | 37 parcelable Authorization {
|
D | KeyMetadata.aidl | 40 android.system.keystore2.Authorization[] authorizations;
|
/system/vold/ |
D | KeyStorage.cpp | 131 paramsWithRollback.Authorization(km::TAG_ROLLBACK_RESISTANCE); in generateKeymasterKey() 147 .Authorization(km::TAG_APPLICATION_ID, appId) in generateKeyStorageKey() 148 .Authorization(km::TAG_NO_AUTH_REQUIRED); in generateKeyStorageKey() 158 paramBuilder.Authorization(km::TAG_STORAGE_KEY); in generateWrappedStorageKey() 179 .Authorization(km::TAG_APPLICATION_ID, appId); in beginParams() 383 .Authorization(km::TAG_ROLLBACK_RESISTANCE) in encryptWithKeymasterKey() 384 .Authorization(km::TAG_PURPOSE, km::KeyPurpose::ENCRYPT); in encryptWithKeymasterKey() 412 .Authorization(km::TAG_NONCE, nonce) in decryptWithKeymasterKey() 413 .Authorization(km::TAG_ROLLBACK_RESISTANCE) in decryptWithKeymasterKey() 414 .Authorization(km::TAG_PURPOSE, km::KeyPurpose::DECRYPT); in decryptWithKeymasterKey()
|
/system/security/keystore2/src/ |
D | utils.rs | 30 Authorization::Authorization, KeyDescriptor::KeyDescriptor, 184 ) -> Vec<Authorization> { in key_parameters_to_authorizations() argument
|
/system/keymaster/android_keymaster/ |
D | keymaster_configuration.cpp | 114 .Authorization(keymaster::TAG_OS_VERSION, os_version) in ConfigureDevice() 115 .Authorization(keymaster::TAG_OS_PATCHLEVEL, os_patchlevel)); in ConfigureDevice()
|
D | android_keymaster.cpp | 104 Authorization(TAG_PURPOSE, KM_PURPOSE_ATTEST_KEY), 105 Authorization(TAG_ALGORITHM, KM_ALGORITHM_EC), Authorization(TAG_KEY_SIZE, 256), 106 Authorization(TAG_DIGEST, KM_DIGEST_SHA_2_256), Authorization(TAG_EC_CURVE, KM_EC_CURVE_P_256), 107 Authorization(TAG_NO_AUTH_REQUIRED), 109 Authorization(TAG_CERTIFICATE_NOT_BEFORE, 0), Authorization(TAG_CERTIFICATE_NOT_AFTER, 0)};
|
/system/security/keystore/tests/ |
D | auth_token_table_test.cpp | 78 builder.Authorization(TAG_USER_AUTH_TYPE, HardwareAuthenticatorType::PASSWORD) in make_set() 79 .Authorization(TAG_USER_SECURE_ID, rsid); in make_set() 81 if (timeout != 0) builder.Authorization(TAG_AUTH_TIMEOUT, timeout); in make_set() 282 AuthorizationSetBuilder().Authorization(TAG_NO_AUTH_REQUIRED), KeyPurpose::SIGN, in TEST()
|
/system/hardware/interfaces/wifi/keystore/1.0/vts/functional/ |
D | VtsHalWifiKeystoreV1_0TargetTest.cpp | 161 .Authorization(keymint::TAG_BLOCK_MODE, keymint::BlockMode::CBC) in generateKey() 162 .Authorization(keymint::TAG_NO_AUTH_REQUIRED); in generateKey()
|