/system/keymaster/ |
D | ecdsa_operation.h | 31 EcdsaOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) in EcdsaOperation() argument 32 : Operation(purpose), digest_(digest), ecdsa_key_(key) { in EcdsaOperation() 52 EcdsaSignOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) in EcdsaSignOperation() argument 53 : EcdsaOperation(purpose, digest, key) {} in EcdsaSignOperation() 65 EcdsaVerifyOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) in EcdsaVerifyOperation() argument 66 : EcdsaOperation(purpose, digest, key) {} in EcdsaVerifyOperation() 78 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_EC, purpose()); } in registry_key() 83 virtual keymaster_purpose_t purpose() const = 0; 89 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } in purpose() function 91 return new (std::nothrow) EcdsaSignOperation(purpose(), digest, key); in InstantiateOperation() [all …]
|
D | operation.h | 42 : algorithm(alg), purpose(purp) {} in KeyType() 45 keymaster_purpose_t purpose; member 48 return algorithm == rhs.algorithm && purpose == rhs.purpose; 90 Operation(keymaster_purpose_t purpose) : purpose_(purpose) {} in Operation() argument 93 keymaster_purpose_t purpose() const { return purpose_; } in purpose() function
|
D | keymaster_enforcement.cpp | 84 static keymaster_error_t authorized_purpose(const keymaster_purpose_t purpose, in authorized_purpose() argument 86 switch (purpose) { in authorized_purpose() 91 if (auth_set.Contains(TAG_PURPOSE, purpose)) in authorized_purpose() 100 inline bool is_origination_purpose(keymaster_purpose_t purpose) { in is_origination_purpose() argument 101 return purpose == KM_PURPOSE_ENCRYPT || purpose == KM_PURPOSE_SIGN; in is_origination_purpose() 104 inline bool is_usage_purpose(keymaster_purpose_t purpose) { in is_usage_purpose() argument 105 return purpose == KM_PURPOSE_DECRYPT || purpose == KM_PURPOSE_VERIFY; in is_usage_purpose() 118 keymaster_error_t KeymasterEnforcement::AuthorizeOperation(const keymaster_purpose_t purpose, in AuthorizeOperation() argument 125 switch (purpose) { in AuthorizeOperation() 138 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); in AuthorizeOperation() [all …]
|
D | hmac_operation.h | 28 HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, size_t key_data_size, 57 virtual KeyType registry_key() const { return KeyType(KM_ALGORITHM_HMAC, purpose()); } in registry_key() 64 virtual keymaster_purpose_t purpose() const = 0; 68 keymaster_purpose_t purpose() const { return KM_PURPOSE_SIGN; } in purpose() function 72 keymaster_purpose_t purpose() const { return KM_PURPOSE_VERIFY; } in purpose() function
|
D | rsa_key.cpp | 36 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { in SupportedMode() argument 37 switch (purpose) { in SupportedMode() 51 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) { in SupportedMode() argument 52 switch (purpose) { in SupportedMode()
|
D | hmac_operation.cpp | 48 if (purpose() == KM_PURPOSE_VERIFY) { in CreateOperation() 54 if (purpose() == KM_PURPOSE_SIGN) { in CreateOperation() 70 purpose(), symmetric_key->key_data(), symmetric_key->key_data_size(), digest, in CreateOperation() 91 HmacOperation::HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, in HmacOperation() argument 94 : Operation(purpose), error_(KM_ERROR_OK), mac_length_(mac_length), in HmacOperation() 127 if (purpose == KM_PURPOSE_SIGN) { in HmacOperation() 171 switch (purpose()) { in Finish()
|
D | rsa_operation.h | 36 RsaOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, in RsaOperation() argument 38 : Operation(purpose), rsa_key_(key), padding_(padding), digest_(digest), in RsaOperation() 75 RsaDigestingOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, 172 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_RSA, purpose()); } in registry_key() 173 virtual keymaster_purpose_t purpose() const = 0; 217 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } in purpose() function 228 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; } in purpose() function 239 keymaster_purpose_t purpose() const override { return KM_PURPOSE_ENCRYPT; } in purpose() function 250 keymaster_purpose_t purpose() const override { return KM_PURPOSE_DECRYPT; } in purpose() function
|
D | aes_operation.h | 33 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_AES, purpose()); } in registry_key() 40 virtual keymaster_purpose_t purpose() const = 0; 47 keymaster_purpose_t purpose() const override { return KM_PURPOSE_ENCRYPT; } in purpose() function 54 keymaster_purpose_t purpose() const override { return KM_PURPOSE_DECRYPT; } in purpose() function 61 AesEvpOperation(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode,
|
D | rsa_key.h | 35 bool SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding); 36 bool SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest);
|
D | android_keymaster.cpp | 100 keymaster_purpose_t purpose, in GetSupported() argument 106 const OperationFactory* factory = context.GetOperationFactory(algorithm, purpose); in GetSupported() 119 GetSupported(*context_, request.algorithm, request.purpose, in SupportedBlockModes() 125 GetSupported(*context_, request.algorithm, request.purpose, in SupportedPaddingModes() 131 GetSupported(*context_, request.algorithm, request.purpose, &OperationFactory::SupportedDigests, in SupportedDigests() 233 OperationFactory* factory = key_factory->GetOperationFactory(request.purpose); in BeginOperation() 249 request.purpose, key_id, key->authorizations(), request.additional_params, in BeginOperation() 276 operation->purpose(), operation->key_id(), operation->authorizations(), in UpdateOperation() 303 operation->purpose(), operation->key_id(), operation->authorizations(), in FinishOperation()
|
D | aes_key.cpp | 33 OperationFactory* AesKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory() 34 switch (purpose) { in GetOperationFactory()
|
D | hmac_key.cpp | 31 OperationFactory* HmacKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory() 32 switch (purpose) { in GetOperationFactory()
|
D | android_keymaster_test_utils.cpp | 209 keymaster_error_t Keymaster1Test::BeginOperation(keymaster_purpose_t purpose) { in BeginOperation() argument 213 device()->begin(device(), purpose, &blob_, &in_params, &out_params, &op_handle_); in BeginOperation() 219 keymaster_error_t Keymaster1Test::BeginOperation(keymaster_purpose_t purpose, in BeginOperation() argument 224 device()->begin(device(), purpose, &blob_, &input_set, &out_params, &op_handle_); in BeginOperation() 308 string Keymaster1Test::ProcessMessage(keymaster_purpose_t purpose, const string& message) { in ProcessMessage() argument 309 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, client_params(), NULL /* output_params */)); in ProcessMessage() 319 string Keymaster1Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, in ProcessMessage() argument 323 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, begin_out_params)); in ProcessMessage() 334 string Keymaster1Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, in ProcessMessage() argument 338 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, output_params)); in ProcessMessage() [all …]
|
D | soft_keymaster_device.cpp | 381 begin_request.purpose = KM_PURPOSE_SIGN; in sign_data() 432 begin_request.purpose = KM_PURPOSE_VERIFY; in verify_data() 497 keymaster_purpose_t purpose, in get_supported_block_modes() argument 508 request.purpose = purpose; in get_supported_block_modes() 529 keymaster_purpose_t purpose, in get_supported_padding_modes() argument 540 request.purpose = purpose; in get_supported_padding_modes() 560 keymaster_purpose_t purpose, in get_supported_digests() argument 571 request.purpose = purpose; in get_supported_digests() 823 keymaster_purpose_t purpose, in begin() argument 838 request.purpose = purpose; in begin()
|
D | android_keymaster_test_utils.h | 185 keymaster_error_t BeginOperation(keymaster_purpose_t purpose); 186 keymaster_error_t BeginOperation(keymaster_purpose_t purpose, const AuthorizationSet& input_set, 209 std::string ProcessMessage(keymaster_purpose_t purpose, const std::string& message); 210 std::string ProcessMessage(keymaster_purpose_t purpose, const std::string& message, 214 std::string ProcessMessage(keymaster_purpose_t purpose, const std::string& message, 218 std::string ProcessMessage(keymaster_purpose_t purpose, const std::string& message,
|
D | hmac_key.h | 35 OperationFactory* GetOperationFactory(keymaster_purpose_t purpose) const override;
|
D | aes_key.h | 40 OperationFactory* GetOperationFactory(keymaster_purpose_t purpose) const override;
|
D | ec_key_factory.cpp | 32 OperationFactory* EcKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory() 33 switch (purpose) { in GetOperationFactory()
|
D | rsa_key_factory.cpp | 37 OperationFactory* RsaKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory() 38 switch (purpose) { in GetOperationFactory()
|
/system/security/keystore/ |
D | auth_token_table.cpp | 63 inline bool is_secret_key_operation(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose) { in is_secret_key_operation() argument 66 if (purpose == KM_PURPOSE_SIGN || purpose == KM_PURPOSE_DECRYPT) in is_secret_key_operation() 72 keymaster_purpose_t purpose) { in KeyRequiresAuthentication() argument 75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1; in KeyRequiresAuthentication() 79 keymaster_purpose_t purpose) { in KeyRequiresAuthPerOperation() argument 82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1; in KeyRequiresAuthPerOperation() 86 keymaster_purpose_t purpose, in FindAuthorization() argument 89 if (!KeyRequiresAuthentication(key_info, purpose)) in FindAuthorization() 98 if (KeyRequiresAuthPerOperation(key_info, purpose)) in FindAuthorization()
|
D | operation.h | 51 keymaster_purpose_t purpose, const keymaster1_device_t* dev, 71 Operation(keymaster_operation_handle_t handle, uint64_t keyid, keymaster_purpose_t purpose, 76 keymaster_purpose_t purpose; member
|
D | operation.cpp | 28 uint64_t keyid, keymaster_purpose_t purpose, in addOperation() argument 34 mMap[token] = std::move(Operation(handle, keyid, purpose, dev, characteristics, appToken)); in addOperation() 60 *outPurpose = entry->second.purpose; in getOperation() 157 purpose(purpose_), in Operation()
|
D | auth_token_table.h | 73 Error FindAuthorization(const AuthorizationSet& key_info, keymaster_purpose_t purpose, 87 keymaster_purpose_t purpose, keymaster_operation_handle_t op_handle, in FindAuthorization() argument 89 return FindAuthorization(AuthorizationSet(params, params_count), purpose, op_handle, found); in FindAuthorization()
|
/system/keymaster/include/keymaster/ |
D | soft_keymaster_device.h | 111 keymaster_purpose_t purpose, 116 keymaster_purpose_t purpose, 121 keymaster_purpose_t purpose, 158 static keymaster_error_t begin(const keymaster1_device_t* dev, keymaster_purpose_t purpose,
|
D | keymaster_enforcement.h | 52 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, 63 keymaster_error_t AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid,
|