/system/keymaster/ |
D | android_keymaster_test.cpp | 555 AuthorizationSet begin_params(client_params()); in TEST_P() local 556 begin_params.push_back(TAG_DIGEST, KM_DIGEST_NONE); in TEST_P() 557 begin_params.push_back(TAG_PADDING, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P() 558 EXPECT_EQ(KM_ERROR_INCOMPATIBLE_PADDING_MODE, BeginOperation(KM_PURPOSE_SIGN, begin_params)); in TEST_P() 594 AuthorizationSet begin_params(client_params()); in TEST_P() local 595 begin_params.push_back(TAG_DIGEST, KM_DIGEST_NONE); in TEST_P() 596 begin_params.push_back(TAG_PADDING, KM_PAD_RSA_PKCS1_1_5_SIGN); in TEST_P() 597 EXPECT_EQ(KM_ERROR_OK, BeginOperation(KM_PURPOSE_SIGN, begin_params)); in TEST_P() 618 AuthorizationSet begin_params(client_params()); in TEST_P() local 619 begin_params.push_back(TAG_DIGEST, KM_DIGEST_SHA_2_256); in TEST_P() [all …]
|
D | android_keymaster_test_utils.cpp | 320 const AuthorizationSet& begin_params, in ProcessMessage() argument 323 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, begin_out_params)); in ProcessMessage() 335 const string& signature, const AuthorizationSet& begin_params, in ProcessMessage() argument 338 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, output_params)); in ProcessMessage() 428 AuthorizationSet begin_params(client_params()), output_params; in EncryptMessage() local 429 begin_params.push_back(TAG_PADDING, padding); in EncryptMessage() 432 ProcessMessage(KM_PURPOSE_ENCRYPT, message, begin_params, update_params, &output_params); in EncryptMessage() 459 AuthorizationSet begin_params(client_params()), output_params; in EncryptMessage() local 460 begin_params.push_back(TAG_PADDING, padding); in EncryptMessage() 461 begin_params.push_back(TAG_DIGEST, digest); in EncryptMessage() [all …]
|
D | operation.cpp | 87 bool OperationFactory::GetAndValidatePadding(const AuthorizationSet& begin_params, const Key& key, in GetAndValidatePadding() argument 91 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { in GetAndValidatePadding() 92 LOG_E("%d padding modes specified in begin params", begin_params.GetTagCount(TAG_PADDING)); in GetAndValidatePadding() 112 bool OperationFactory::GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key, in GetAndValidateDigest() argument 116 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) { in GetAndValidateDigest() 117 LOG_E("%d digests specified in begin params", begin_params.GetTagCount(TAG_DIGEST)); in GetAndValidateDigest()
|
D | operation.h | 54 virtual Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params, 79 bool GetAndValidatePadding(const AuthorizationSet& begin_params, const Key& key, 81 bool GetAndValidateDigest(const AuthorizationSet& begin_params, const Key& key,
|
D | hmac_operation.cpp | 37 const AuthorizationSet& begin_params, in CreateOperation() argument 47 if (begin_params.GetTagValue(TAG_MAC_LENGTH, &mac_length_bits)) { in CreateOperation() 63 begin_params.GetTagCount(TAG_DIGEST)); in CreateOperation()
|
D | aes_operation.cpp | 53 static keymaster_error_t GetAndValidateGcmTagLength(const AuthorizationSet& begin_params, in GetAndValidateGcmTagLength() argument 57 if (!begin_params.GetTagValue(TAG_MAC_LENGTH, &tag_length_bits)) { in GetAndValidateGcmTagLength() 81 const AuthorizationSet& begin_params, in CreateOperation() argument 97 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) { in CreateOperation() 98 LOG_E("%d block modes specified in begin params", begin_params.GetTagCount(TAG_BLOCK_MODE)); in CreateOperation() 113 *error = GetAndValidateGcmTagLength(begin_params, key.authorizations(), &tag_length); in CreateOperation() 120 if (!GetAndValidatePadding(begin_params, key, &padding, error)) { in CreateOperation()
|
D | rsa_operation.h | 175 Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params, in CreateOperation() argument 177 return CreateRsaOperation(key, begin_params, error); in CreateOperation() 183 virtual RsaOperation* CreateRsaOperation(const Key& key, const AuthorizationSet& begin_params, 207 RsaOperation* CreateRsaOperation(const Key& key, const AuthorizationSet& begin_params,
|
D | rsa_operation.cpp | 67 const AuthorizationSet& begin_params, in CreateRsaOperation() argument 70 if (!GetAndValidatePadding(begin_params, key, &padding, error)) in CreateRsaOperation() 77 if (require_digest && !GetAndValidateDigest(begin_params, key, &digest, error)) in CreateRsaOperation() 79 if (!require_digest && begin_params.find(TAG_DIGEST) != -1) { in CreateRsaOperation() 103 const AuthorizationSet& begin_params, in CreateRsaOperation() argument 105 UniquePtr<RsaOperation> op(RsaOperationFactory::CreateRsaOperation(key, begin_params, error)); in CreateRsaOperation()
|
D | ecdsa_operation.cpp | 32 const AuthorizationSet& begin_params, in CreateOperation() argument 47 if (!GetAndValidateDigest(begin_params, key, &digest, error)) in CreateOperation()
|
D | hmac_operation.h | 59 virtual Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
|
D | ecdsa_operation.h | 79 Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
|
D | keymaster_enforcement_test.cpp | 482 AuthorizationSet begin_params(AuthorizationSetBuilder().Authorization(TAG_NONCE, "foo", 3)); in TEST_F() local 485 kmen.AuthorizeOperation(KM_PURPOSE_ENCRYPT, key_id, caller_nonce, begin_params, in TEST_F() 488 kmen.AuthorizeOperation(KM_PURPOSE_DECRYPT, key_id, caller_nonce, begin_params, in TEST_F() 491 kmen.AuthorizeOperation(KM_PURPOSE_ENCRYPT, key_id, no_caller_nonce, begin_params, in TEST_F() 494 kmen.AuthorizeOperation(KM_PURPOSE_DECRYPT, key_id, no_caller_nonce, begin_params, in TEST_F()
|
D | android_keymaster_test_utils.h | 211 const AuthorizationSet& begin_params, 215 const std::string& signature, const AuthorizationSet& begin_params, 245 const AuthorizationSet& begin_params,
|
D | aes_operation.h | 35 Operation* CreateOperation(const Key& key, const AuthorizationSet& begin_params,
|