Home
last modified time | relevance | path

Searched refs:purpose (Results 1 – 25 of 145) sorted by relevance

123456

/system/keymaster/
Doperation.h42 : algorithm(alg), purpose(purp) {} in KeyType()
45 keymaster_purpose_t purpose; member
48 return algorithm == rhs.algorithm && purpose == rhs.purpose;
90 explicit Operation(keymaster_purpose_t purpose) : purpose_(purpose) {} in Operation() argument
93 keymaster_purpose_t purpose() const { return purpose_; } in purpose() function
Dkeymaster_enforcement.cpp84 static keymaster_error_t authorized_purpose(const keymaster_purpose_t purpose, in authorized_purpose() argument
86 switch (purpose) { in authorized_purpose()
91 if (auth_set.Contains(TAG_PURPOSE, purpose)) in authorized_purpose()
100 inline bool is_origination_purpose(keymaster_purpose_t purpose) { in is_origination_purpose() argument
101 return purpose == KM_PURPOSE_ENCRYPT || purpose == KM_PURPOSE_SIGN; in is_origination_purpose()
104 inline bool is_usage_purpose(keymaster_purpose_t purpose) { in is_usage_purpose() argument
105 return purpose == KM_PURPOSE_DECRYPT || purpose == KM_PURPOSE_VERIFY; in is_usage_purpose()
118 keymaster_error_t KeymasterEnforcement::AuthorizeOperation(const keymaster_purpose_t purpose, in AuthorizeOperation() argument
125 switch (purpose) { in AuthorizeOperation()
139 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); in AuthorizeOperation()
[all …]
Drsa_keymaster1_operation.h32 RsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) in RsaKeymaster1WrappedOperation() argument
33 : purpose_(purpose), operation_handle_(0), engine_(engine) {} in RsaKeymaster1WrappedOperation()
58 : BaseOperation(digest, padding, key), wrapped_operation_(super::purpose(), engine) { in RsaKeymaster1Operation()
60 assert(super::purpose() != KM_PURPOSE_VERIFY); in RsaKeymaster1Operation()
61 assert(super::purpose() != KM_PURPOSE_ENCRYPT); in RsaKeymaster1Operation()
103 RsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) in RsaKeymaster1OperationFactory() argument
104 : purpose_(purpose), engine_(engine) {} in RsaKeymaster1OperationFactory()
Decdsa_keymaster1_operation.h32 EcdsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) in EcdsaKeymaster1WrappedOperation() argument
33 : purpose_(purpose), operation_handle_(0), engine_(engine) {} in EcdsaKeymaster1WrappedOperation()
58 : BaseOperation(digest, key), wrapped_operation_(super::purpose(), engine) { in EcdsaKeymaster1Operation()
60 assert(super::purpose() != KM_PURPOSE_VERIFY); in EcdsaKeymaster1Operation()
61 assert(super::purpose() != KM_PURPOSE_ENCRYPT); in EcdsaKeymaster1Operation()
103 EcdsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) in EcdsaKeymaster1OperationFactory() argument
104 : purpose_(purpose), engine_(engine) {} in EcdsaKeymaster1OperationFactory()
Drsa_key.cpp36 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { in SupportedMode() argument
37 switch (purpose) { in SupportedMode()
53 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) { in SupportedMode() argument
54 switch (purpose) { in SupportedMode()
Dhmac_operation.h28 HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, size_t key_data_size,
57 virtual KeyType registry_key() const { return KeyType(KM_ALGORITHM_HMAC, purpose()); } in registry_key()
64 virtual keymaster_purpose_t purpose() const = 0;
68 keymaster_purpose_t purpose() const { return KM_PURPOSE_SIGN; } in purpose() function
72 keymaster_purpose_t purpose() const { return KM_PURPOSE_VERIFY; } in purpose() function
Dhmac_operation.cpp48 if (purpose() == KM_PURPOSE_VERIFY) { in CreateOperation()
54 if (purpose() == KM_PURPOSE_SIGN) { in CreateOperation()
70 purpose(), symmetric_key->key_data(), symmetric_key->key_data_size(), digest, in CreateOperation()
91 HmacOperation::HmacOperation(keymaster_purpose_t purpose, const uint8_t* key_data, in HmacOperation() argument
94 : Operation(purpose), error_(KM_ERROR_OK), mac_length_(mac_length), in HmacOperation()
127 if (purpose == KM_PURPOSE_SIGN) { in HmacOperation()
175 switch (purpose()) { in Finish()
Drsa_operation.h36 RsaOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, in RsaOperation() argument
38 : Operation(purpose), rsa_key_(key), padding_(padding), digest_(digest), in RsaOperation()
75 RsaDigestingOperation(keymaster_purpose_t purpose, keymaster_digest_t digest,
134 RsaCryptOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, in RsaCryptOperation() argument
136 : RsaOperation(purpose, digest, padding, key) {} in RsaCryptOperation()
176 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_RSA, purpose()); } in registry_key()
177 virtual keymaster_purpose_t purpose() const = 0;
219 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } in purpose() function
230 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; } in purpose() function
241 keymaster_purpose_t purpose() const override { return KM_PURPOSE_ENCRYPT; } in purpose() function
[all …]
Decdsa_operation.h31 EcdsaOperation(keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) in EcdsaOperation() argument
32 : Operation(purpose), digest_(digest), ecdsa_key_(key) { in EcdsaOperation()
80 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_EC, purpose()); } in registry_key()
85 virtual keymaster_purpose_t purpose() const = 0;
91 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } in purpose() function
99 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; } in purpose() function
Daes_operation.h33 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_AES, purpose()); } in registry_key()
40 virtual keymaster_purpose_t purpose() const = 0;
47 keymaster_purpose_t purpose() const override { return KM_PURPOSE_ENCRYPT; } in purpose() function
54 keymaster_purpose_t purpose() const override { return KM_PURPOSE_DECRYPT; } in purpose() function
61 AesEvpOperation(keymaster_purpose_t purpose, keymaster_block_mode_t block_mode,
Dsoft_keymaster_device.cpp109 keymaster_purpose_t purpose, in add_digests() argument
111 auto key = std::make_pair(algorithm, purpose); in add_digests()
116 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests()
137 for (auto purpose : sig_purposes) { in map_digests() local
140 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests()
149 for (auto purpose : crypt_purposes) { in map_digests() local
152 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests()
444 keymaster_purpose_t purpose, in get_supported_block_modes() argument
455 return km1_dev->get_supported_block_modes(km1_dev, algorithm, purpose, modes, modes_length); in get_supported_block_modes()
459 request.purpose = purpose; in get_supported_block_modes()
[all …]
Drsa_key.h35 bool SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding);
36 bool SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest);
Dandroid_keymaster_test_utils.cpp236 keymaster_error_t Keymaster2Test::BeginOperation(keymaster_purpose_t purpose) { in BeginOperation() argument
240 device()->begin(device(), purpose, &blob_, &in_params, &out_params, &op_handle_); in BeginOperation()
246 keymaster_error_t Keymaster2Test::BeginOperation(keymaster_purpose_t purpose, in BeginOperation() argument
251 device()->begin(device(), purpose, &blob_, &input_set, &out_params, &op_handle_); in BeginOperation()
358 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message) { in ProcessMessage() argument
359 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, client_params(), NULL /* output_params */)); in ProcessMessage()
366 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, in ProcessMessage() argument
370 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, begin_out_params)); in ProcessMessage()
377 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, in ProcessMessage() argument
381 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, output_params)); in ProcessMessage()
[all …]
Daes_key.cpp33 OperationFactory* AesKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory()
34 switch (purpose) { in GetOperationFactory()
Dhmac_key.cpp31 OperationFactory* HmacKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory()
32 switch (purpose) { in GetOperationFactory()
Dandroid_keymaster.cpp123 keymaster_purpose_t purpose, in GetSupported() argument
129 const OperationFactory* factory = context.GetOperationFactory(algorithm, purpose); in GetSupported()
142 GetSupported(*context_, request.algorithm, request.purpose, in SupportedBlockModes()
148 GetSupported(*context_, request.algorithm, request.purpose, in SupportedPaddingModes()
154 GetSupported(*context_, request.algorithm, request.purpose, &OperationFactory::SupportedDigests, in SupportedDigests()
258 OperationFactory* factory = key_factory->GetOperationFactory(request.purpose); in BeginOperation()
274 request.purpose, key_id, key->authorizations(), request.additional_params, in BeginOperation()
301 operation->purpose(), operation->key_id(), operation->authorizations(), in UpdateOperation()
330 operation->purpose(), operation->key_id(), operation->authorizations(), in FinishOperation()
Dec_keymaster1_key.cpp118 EcdsaKeymaster1KeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory()
119 switch (purpose) { in GetOperationFactory()
/system/security/keystore/
Dkeymaster_enforcement.cpp83 static ErrorCode authorized_purpose(const KeyPurpose purpose, const AuthorizationSet& auth_set) { in authorized_purpose() argument
84 switch (purpose) { in authorized_purpose()
89 if (auth_set.Contains(TAG_PURPOSE, purpose)) return ErrorCode::OK; in authorized_purpose()
97 inline bool is_origination_purpose(KeyPurpose purpose) { in is_origination_purpose() argument
98 return purpose == KeyPurpose::ENCRYPT || purpose == KeyPurpose::SIGN; in is_origination_purpose()
101 inline bool is_usage_purpose(KeyPurpose purpose) { in is_usage_purpose() argument
102 return purpose == KeyPurpose::DECRYPT || purpose == KeyPurpose::VERIFY; in is_usage_purpose()
115 ErrorCode KeymasterEnforcement::AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid, in AuthorizeOperation() argument
120 switch (purpose) { in AuthorizeOperation()
136 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); in AuthorizeOperation()
[all …]
Dauth_token_table.cpp89 inline bool is_secret_key_operation(Algorithm algorithm, KeyPurpose purpose) { in is_secret_key_operation() argument
92 if (purpose == KeyPurpose::SIGN || purpose == KeyPurpose::DECRYPT) in is_secret_key_operation()
97 inline bool KeyRequiresAuthentication(const AuthorizationSet& key_info, KeyPurpose purpose) { in KeyRequiresAuthentication() argument
99 return is_secret_key_operation(algorithm, purpose) && in KeyRequiresAuthentication()
103 inline bool KeyRequiresAuthPerOperation(const AuthorizationSet& key_info, KeyPurpose purpose) { in KeyRequiresAuthPerOperation() argument
105 return is_secret_key_operation(algorithm, purpose) && key_info.find(Tag::AUTH_TIMEOUT) == -1; in KeyRequiresAuthPerOperation()
109 KeyPurpose purpose, uint64_t op_handle, in FindAuthorization() argument
111 if (!KeyRequiresAuthentication(key_info, purpose)) return AUTH_NOT_REQUIRED; in FindAuthorization()
119 if (KeyRequiresAuthPerOperation(key_info, purpose)) in FindAuthorization()
Doperation.h45 android::sp<android::IBinder> addOperation(uint64_t handle, uint64_t keyid, KeyPurpose purpose,
71 Operation(uint64_t handle, uint64_t keyid, KeyPurpose purpose, const km_device_t& device,
75 KeyPurpose purpose; member
Doperation.cpp28 sp<IBinder> OperationMap::addOperation(uint64_t handle, uint64_t keyid, KeyPurpose purpose, in addOperation() argument
33 mMap[token] = Operation(handle, keyid, purpose, dev, std::move(characteristics), appToken); in addOperation()
58 *outPurpose = entry->second.purpose; in getOperation()
152 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_), in Operation()
Dkeymaster_enforcement.h52 ErrorCode AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid,
62 ErrorCode AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid,
Dkey_store_service.cpp1005 void KeyStoreService::begin(const sp<IBinder>& appToken, const String16& name, KeyPurpose purpose, in begin() argument
1077 result->resultCode = getAuthToken(characteristics, 0, purpose, &authToken, in begin()
1108 purpose, keyid, key_auths, opParams, 0 /* op_handle */, true /* is_begin_operation */); in begin()
1132 ErrorCode rc = KS_HANDLE_HIDL_ERROR(dev->begin(purpose, key, opParams.hidl_data(), hidlCb)); in begin()
1144 rc = KS_HANDLE_HIDL_ERROR(dev->begin(purpose, key, opParams.hidl_data(), hidlCb)); in begin()
1154 result->handle, keyid, purpose, dev, appToken, std::move(characteristics), pruneable); in begin()
1178 KeyPurpose purpose; in update() local
1181 if (!mOperationMap.getOperation(token, &handle, &keyid, &purpose, &dev, &characteristics)) { in update()
1196 purpose, keyid, key_auths, opParams, handle, false /* is_begin_operation */); in update()
1230 KeyPurpose purpose; in finish() local
[all …]
/system/keymaster/include/keymaster/
Dsoft_keymaster_device.h90 bool FindUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose,
93 bool RequiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose,
115 keymaster_purpose_t purpose,
120 keymaster_purpose_t purpose,
125 keymaster_purpose_t purpose,
162 static keymaster_error_t begin(const keymaster1_device_t* dev, keymaster_purpose_t purpose,
219 static keymaster_error_t begin(const keymaster2_device_t* dev, keymaster_purpose_t purpose,
Dkeymaster_enforcement.h52 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid,
63 keymaster_error_t AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid,

123456