Home
last modified time | relevance | path

Searched refs:purpose (Results 1 – 25 of 71) sorted by relevance

123

/system/keymaster/
Decdsa_operation.h31 EcdsaOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) in EcdsaOperation() argument
32 : Operation(purpose), digest_(digest), ecdsa_key_(key) { in EcdsaOperation()
52 EcdsaSignOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) in EcdsaSignOperation() argument
53 : EcdsaOperation(purpose, digest, key) {} in EcdsaSignOperation()
65 EcdsaVerifyOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) in EcdsaVerifyOperation() argument
66 : EcdsaOperation(purpose, digest, key) {} in EcdsaVerifyOperation()
78 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_EC, purpose()); } in registry_key()
83 virtual keymaster_purpose_t purpose() const = 0;
89 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } in purpose() function
91 return new (std::nothrow) EcdsaSignOperation(purpose(), digest, key); in InstantiateOperation()
[all …]
Doperation.h42 : algorithm(alg), purpose(purp) {} in KeyType()
45 keymaster_purpose_t purpose; member
48 return algorithm == rhs.algorithm && purpose == rhs.purpose;
90 Operation(keymaster_purpose_t purpose) : purpose_(purpose) {} in Operation() argument
93 keymaster_purpose_t purpose() const { return purpose_; } in purpose() function
Dkeymaster_enforcement.cpp84 static keymaster_error_t authorized_purpose(const keymaster_purpose_t purpose, in authorized_purpose() argument
86 switch (purpose) { in authorized_purpose()
91 if (auth_set.Contains(TAG_PURPOSE, purpose)) in authorized_purpose()
100 inline bool is_origination_purpose(keymaster_purpose_t purpose) { in is_origination_purpose() argument
101 return purpose == KM_PURPOSE_ENCRYPT || purpose == KM_PURPOSE_SIGN; in is_origination_purpose()
104 inline bool is_usage_purpose(keymaster_purpose_t purpose) { in is_usage_purpose() argument
105 return purpose == KM_PURPOSE_DECRYPT || purpose == KM_PURPOSE_VERIFY; in is_usage_purpose()
118 keymaster_error_t KeymasterEnforcement::AuthorizeOperation(const keymaster_purpose_t purpose, in AuthorizeOperation() argument
125 switch (purpose) { in AuthorizeOperation()
138 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); in AuthorizeOperation()
[all …]
Dhmac_operation.h28 HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, size_t key_data_size,
57 virtual KeyType registry_key() const { return KeyType(KM_ALGORITHM_HMAC, purpose()); } in registry_key()
64 virtual keymaster_purpose_t purpose() const = 0;
68 keymaster_purpose_t purpose() const { return KM_PURPOSE_SIGN; } in purpose() function
72 keymaster_purpose_t purpose() const { return KM_PURPOSE_VERIFY; } in purpose() function
Drsa_key.cpp36 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { in SupportedMode() argument
37 switch (purpose) { in SupportedMode()
51 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) { in SupportedMode() argument
52 switch (purpose) { in SupportedMode()
Dhmac_operation.cpp48 if (purpose() == KM_PURPOSE_VERIFY) { in CreateOperation()
54 if (purpose() == KM_PURPOSE_SIGN) { in CreateOperation()
70 purpose(), symmetric_key->key_data(), symmetric_key->key_data_size(), digest, in CreateOperation()
91 HmacOperation::HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, in HmacOperation() argument
94 : Operation(purpose), error_(KM_ERROR_OK), mac_length_(mac_length), in HmacOperation()
127 if (purpose == KM_PURPOSE_SIGN) { in HmacOperation()
171 switch (purpose()) { in Finish()
Drsa_operation.h36 RsaOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, in RsaOperation() argument
38 : Operation(purpose), rsa_key_(key), padding_(padding), digest_(digest), in RsaOperation()
75 RsaDigestingOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,
172 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_RSA, purpose()); } in registry_key()
173 virtual keymaster_purpose_t purpose() const = 0;
217 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } in purpose() function
228 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; } in purpose() function
239 keymaster_purpose_t purpose() const override { return KM_PURPOSE_ENCRYPT; } in purpose() function
250 keymaster_purpose_t purpose() const override { return KM_PURPOSE_DECRYPT; } in purpose() function
Daes_operation.h33 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_AES, purpose()); } in registry_key()
40 virtual keymaster_purpose_t purpose() const = 0;
47 keymaster_purpose_t purpose() const override { return KM_PURPOSE_ENCRYPT; } in purpose() function
54 keymaster_purpose_t purpose() const override { return KM_PURPOSE_DECRYPT; } in purpose() function
61 AesEvpOperation(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode,
Drsa_key.h35 bool SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding);
36 bool SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest);
Dandroid_keymaster.cpp100 keymaster_purpose_t purpose, in GetSupported() argument
106 const OperationFactory* factory = context.GetOperationFactory(algorithm, purpose); in GetSupported()
119 GetSupported(*context_, request.algorithm, request.purpose, in SupportedBlockModes()
125 GetSupported(*context_, request.algorithm, request.purpose, in SupportedPaddingModes()
131 GetSupported(*context_, request.algorithm, request.purpose, &OperationFactory::SupportedDigests, in SupportedDigests()
233 OperationFactory* factory = key_factory->GetOperationFactory(request.purpose); in BeginOperation()
249 request.purpose, key_id, key->authorizations(), request.additional_params, in BeginOperation()
276 operation->purpose(), operation->key_id(), operation->authorizations(), in UpdateOperation()
303 operation->purpose(), operation->key_id(), operation->authorizations(), in FinishOperation()
Daes_key.cpp33 OperationFactory* AesKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory()
34 switch (purpose) { in GetOperationFactory()
Dhmac_key.cpp31 OperationFactory* HmacKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory()
32 switch (purpose) { in GetOperationFactory()
Dandroid_keymaster_test_utils.cpp209 keymaster_error_t Keymaster1Test::BeginOperation(keymaster_purpose_t purpose) { in BeginOperation() argument
213 device()->begin(device(), purpose, &blob_, &in_params, &out_params, &op_handle_); in BeginOperation()
219 keymaster_error_t Keymaster1Test::BeginOperation(keymaster_purpose_t purpose, in BeginOperation() argument
224 device()->begin(device(), purpose, &blob_, &input_set, &out_params, &op_handle_); in BeginOperation()
308 string Keymaster1Test::ProcessMessage(keymaster_purpose_t purpose, const string& message) { in ProcessMessage() argument
309 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, client_params(), NULL /* output_params */)); in ProcessMessage()
319 string Keymaster1Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, in ProcessMessage() argument
323 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, begin_out_params)); in ProcessMessage()
334 string Keymaster1Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, in ProcessMessage() argument
338 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, output_params)); in ProcessMessage()
[all …]
Dsoft_keymaster_device.cpp381 begin_request.purpose = KM_PURPOSE_SIGN; in sign_data()
432 begin_request.purpose = KM_PURPOSE_VERIFY; in verify_data()
497 keymaster_purpose_t purpose, in get_supported_block_modes() argument
508 request.purpose = purpose; in get_supported_block_modes()
529 keymaster_purpose_t purpose, in get_supported_padding_modes() argument
540 request.purpose = purpose; in get_supported_padding_modes()
560 keymaster_purpose_t purpose, in get_supported_digests() argument
571 request.purpose = purpose; in get_supported_digests()
823 keymaster_purpose_t purpose, in begin() argument
838 request.purpose = purpose; in begin()
Dandroid_keymaster_test_utils.h185 keymaster_error_t BeginOperation(keymaster_purpose_t purpose);
186 keymaster_error_t BeginOperation(keymaster_purpose_t purpose, const AuthorizationSet& input_set,
209 std::string ProcessMessage(keymaster_purpose_t purpose, const std::string& message);
210 std::string ProcessMessage(keymaster_purpose_t purpose, const std::string& message,
214 std::string ProcessMessage(keymaster_purpose_t purpose, const std::string& message,
218 std::string ProcessMessage(keymaster_purpose_t purpose, const std::string& message,
Dhmac_key.h35 OperationFactory* GetOperationFactory(keymaster_purpose_t purpose) const override;
Daes_key.h40 OperationFactory* GetOperationFactory(keymaster_purpose_t purpose) const override;
Dec_key_factory.cpp32 OperationFactory* EcKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory()
33 switch (purpose) { in GetOperationFactory()
Drsa_key_factory.cpp37 OperationFactory* RsaKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory()
38 switch (purpose) { in GetOperationFactory()
/system/security/keystore/
Dauth_token_table.cpp63 inline bool is_secret_key_operation(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose) { in is_secret_key_operation() argument
66 if (purpose == KM_PURPOSE_SIGN || purpose == KM_PURPOSE_DECRYPT) in is_secret_key_operation()
72 keymaster_purpose_t purpose) { in KeyRequiresAuthentication() argument
75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1; in KeyRequiresAuthentication()
79 keymaster_purpose_t purpose) { in KeyRequiresAuthPerOperation() argument
82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1; in KeyRequiresAuthPerOperation()
86 keymaster_purpose_t purpose, in FindAuthorization() argument
89 if (!KeyRequiresAuthentication(key_info, purpose)) in FindAuthorization()
98 if (KeyRequiresAuthPerOperation(key_info, purpose)) in FindAuthorization()
Doperation.h51 keymaster_purpose_t purpose, const keymaster1_device_t* dev,
71 Operation(keymaster_operation_handle_t handle, uint64_t keyid, keymaster_purpose_t purpose,
76 keymaster_purpose_t purpose; member
Doperation.cpp28 uint64_t keyid, keymaster_purpose_t purpose, in addOperation() argument
34 mMap[token] = std::move(Operation(handle, keyid, purpose, dev, characteristics, appToken)); in addOperation()
60 *outPurpose = entry->second.purpose; in getOperation()
157 purpose(purpose_), in Operation()
Dauth_token_table.h73 Error FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose,
87 keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, in FindAuthorization() argument
89 return FindAuthorization(AuthorizationSet(params, params_count), purpose, op_handle, found); in FindAuthorization()
/system/keymaster/include/keymaster/
Dsoft_keymaster_device.h111 keymaster_purpose_t purpose,
116 keymaster_purpose_t purpose,
121 keymaster_purpose_t purpose,
158 static keymaster_error_t begin(const keymaster1_device_t* dev, keymaster_purpose_t purpose,
Dkeymaster_enforcement.h52 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid,
63 keymaster_error_t AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid,

123