/system/keymaster/android_keymaster/ |
D | keymaster_enforcement.cpp | 38 bool LastKeyAccessTime(km_id_t keyid, uint32_t* last_access_time) const; 42 bool UpdateKeyAccessTime(km_id_t keyid, uint32_t current_time, uint32_t timeout); 46 km_id_t keyid; member 60 bool KeyAccessCount(km_id_t keyid, uint32_t* count) const; 64 bool IncrementKeyAccessCount(km_id_t keyid); 68 km_id_t keyid; member 117 const km_id_t keyid, in AuthorizeOperation() argument 138 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); in AuthorizeOperation() 201 const km_id_t keyid, in AuthorizeBegin() argument 262 if (!MinTimeBetweenOpsPassed(min_ops_timeout, keyid)) in AuthorizeBegin() [all …]
|
/system/security/keystore/ |
D | keymaster_enforcement.cpp | 72 ErrorCode KeymasterEnforcement::AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid, in AuthorizeOperation() argument 94 return AuthorizeBegin(purpose, keyid, auth_set, operation_params, auth_token); in AuthorizeOperation() 147 ErrorCode KeymasterEnforcement::AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid, in AuthorizeBegin() argument 214 if (min_ops_timeout.isOk() && !MinTimeBetweenOpsPassed(min_ops_timeout.value(), keyid)) in AuthorizeBegin() 221 if (max_users.isOk() && !MaxUsesPerBootNotExceeded(keyid, max_users.value())) in AuthorizeBegin() 347 if (!access_time_map_.UpdateKeyAccessTime(keyid, get_current_time(), min_ops_timeout)) { in AuthorizeBegin() 354 if (!access_count_map_.IncrementKeyAccessCount(keyid)) { in AuthorizeBegin() 377 km_id_t keyid; in CreateKeyId() local 384 assert(hash_len >= sizeof(keyid)); in CreateKeyId() 385 memcpy(&keyid, hash, sizeof(keyid)); in CreateKeyId() [all …]
|
D | keymaster_enforcement.h | 46 bool LastKeyAccessTime(km_id_t keyid, uint32_t* last_access_time) const; 50 bool UpdateKeyAccessTime(km_id_t keyid, uint32_t current_time, uint32_t timeout); 55 km_id_t keyid; member 69 bool KeyAccessCount(km_id_t keyid, uint32_t* count) const; 73 bool IncrementKeyAccessCount(km_id_t keyid); 78 km_id_t keyid; member 98 ErrorCode AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid, 109 ErrorCode AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid, 200 bool MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid); 201 bool MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses);
|
D | operation_struct.h | 42 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_), in Operation() 51 uint64_t keyid; member
|
D | operation.cpp | 29 sp<IBinder> OperationMap::addOperation(uint64_t handle, uint64_t keyid, KeyPurpose purpose, in addOperation() argument 34 mMap.emplace(token, std::make_shared<Operation>(handle, keyid, purpose, dev, in addOperation()
|
D | operation.h | 55 sp<IBinder> addOperation(uint64_t handle, uint64_t keyid, KeyPurpose purpose,
|
D | keymaster_worker.cpp | 392 auto keyid = KeymasterEnforcement::CreateKeyId(blob2hidlVec(keyBlob)); in begin() local 393 if (!keyid) { in begin() 404 purpose, *keyid, key_auths, opParams, authToken, 0 /* op_handle */, in begin() 468 operationMap_.addOperation(result.handle, *keyid, purpose, dev, appToken, in begin() 578 rc = keyStore_->getEnforcementPolicy().AuthorizeOperation(op->purpose, op->keyid, key_auths, in update() 672 rc = keyStore_->getEnforcementPolicy().AuthorizeOperation(op->purpose, op->keyid, key_auths, in finish()
|
/system/keymaster/include/keymaster/ |
D | keymaster_enforcement.h | 55 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, 66 keymaster_error_t AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid, 180 virtual bool CreateKeyId(const keymaster_key_blob_t& key_blob, km_id_t* keyid) const = 0; 187 bool MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid); 188 bool MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses);
|
/system/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.cpp | 63 km_id_t* keyid) const { in CreateKeyId() 71 assert(hash_len >= sizeof(*keyid)); in CreateKeyId() 72 memcpy(keyid, hash, sizeof(*keyid)); in CreateKeyId()
|
/system/keymaster/include/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.h | 40 bool CreateKeyId(const keymaster_key_blob_t& key_blob, km_id_t* keyid) const override;
|
/system/bt/stack/smp/ |
D | crypto_toolbox.h | 35 extern Octet16 smp_calculate_h6(const Octet16& w, std::array<uint8_t, 4> keyid);
|
/system/bt/stack/crypto_toolbox/ |
D | crypto_toolbox.cc | 29 Octet16 h6(const Octet16& w, std::array<uint8_t, 4> keyid) { in h6() argument 30 return aes_cmac(w, keyid.data(), keyid.size()); in h6()
|
D | crypto_toolbox.h | 31 extern Octet16 h6(const Octet16& w, std::array<uint8_t, 4> keyid);
|
/system/core/fs_mgr/libdm/include/libdm/ |
D | dm_target.h | 132 const std::string& keyid) in DmTargetAndroidVerity() argument 133 : DmTarget(start, length), keyid_(keyid), block_device_(block_device) {} in DmTargetAndroidVerity()
|
/system/core/fs_mgr/tools/ |
D | dmctl.cpp | 114 std::string keyid = NextArg(); in Next() local 116 return std::make_unique<DmTargetAndroidVerity>(start_sector, num_sectors, keyid, in Next()
|
/system/ca-certificates/files/ |
D | 559f7c71.0 | 47 keyid:47:77:C3:14:8B:62:39:0C:C9:6F:E1:50:4D:D0:10:58:DC:95:88:6D
|
D | 88950faa.0 | 46 keyid:82:D1:85:73:30:E7:35:04:D3:8E:02:92:FB:E5:A4:D1:C4:21:E8:CD
|
D | d8317ada.0 | 47 keyid:DA:83:63:02:79:8E:DA:4C:C6:3C:23:14:D8:8F:C3:20:AB:28:60:59
|
D | 7892ad52.0 | 46 keyid:5B:CA:5E:E5:DE:D2:81:AA:CD:A8:2D:64:51:B6:D9:72:9B:97:E6:4F
|
D | 7999be0d.0 | 60 keyid:C0:7A:98:68:8D:89:FB:AB:05:64:0C:11:7D:AA:7D:65:B8:CA:CC:4E
|
D | 343eb6cb.0 | 70 keyid:B6:08:7B:0D:7A:CC:AC:20:4C:86:56:32:5E:CF:AB:6E:85:2D:70:57
|
/system/ca-certificates/google/files/ |
D | 594f1775.0 | 55 keyid:48:E6:68:F9:2B:D2:B2:95:D7:47:D8:23:20:10:4F:33:98:90:9F:D4
|
D | 57692373.0 | 61 keyid:71:38:36:F2:02:31:53:47:2B:6E:BA:65:46:A9:10:15:58:20:05:09
|
D | 7999be0d.0 | 60 keyid:C0:7A:98:68:8D:89:FB:AB:05:64:0C:11:7D:AA:7D:65:B8:CA:CC:4E
|
D | 81b9768f.0 | 66 keyid:B1:3E:C3:69:03:F8:BF:47:01:D4:98:26:1A:08:02:EF:63:64:2B:C3
|