/system/keymaster/android_keymaster/ |
D | pure_soft_secure_key_storage.cpp | 31 bool WriteKey(km_id_t keyid); 34 bool KeyExists(km_id_t keyid) const; 37 void DeleteKey(km_id_t keyid); 50 bool PureSoftSecureStorageMap::WriteKey(km_id_t keyid) { in WriteKey() argument 52 keyid_list_.push_back(keyid); in WriteKey() 56 bool PureSoftSecureStorageMap::KeyExists(km_id_t keyid) const { in KeyExists() 58 if (key_id == keyid) return true; in KeyExists() 62 void PureSoftSecureStorageMap::DeleteKey(km_id_t keyid) { in DeleteKey() argument 65 if (*iter == keyid) in DeleteKey() 87 keymaster_error_t PureSoftSecureKeyStorage::WriteKey(const km_id_t keyid, in WriteKey() argument [all …]
|
D | keymaster_enforcement.cpp | 38 bool LastKeyAccessTime(km_id_t keyid, uint32_t* last_access_time) const; 42 bool UpdateKeyAccessTime(km_id_t keyid, uint32_t current_time, uint32_t timeout); 46 km_id_t keyid; member 60 bool KeyAccessCount(km_id_t keyid, uint32_t* count) const; 64 bool IncrementKeyAccessCount(km_id_t keyid); 68 km_id_t keyid; member 117 const km_id_t keyid, in AuthorizeOperation() argument 140 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); in AuthorizeOperation() 201 const km_id_t keyid, in AuthorizeBegin() argument 259 if (!MinTimeBetweenOpsPassed(min_ops_timeout, keyid)) in AuthorizeBegin() [all …]
|
/system/keymaster/include/keymaster/ |
D | secure_key_storage.h | 43 virtual keymaster_error_t WriteKey(const km_id_t keyid, const KeymasterKeyBlob& blob) = 0; 49 virtual keymaster_error_t KeyExists(const km_id_t keyid, bool* exists) = 0; 54 virtual keymaster_error_t DeleteKey(const km_id_t keyid) = 0;
|
D | pure_soft_secure_key_storage.h | 37 keymaster_error_t WriteKey(const km_id_t keyid, const KeymasterKeyBlob& blob) override; 42 keymaster_error_t KeyExists(const km_id_t keyid, bool* exists) override; 47 keymaster_error_t DeleteKey(const km_id_t keyid) override;
|
D | keymaster_enforcement.h | 55 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, 66 keymaster_error_t AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid, 190 virtual bool CreateKeyId(const keymaster_key_blob_t& key_blob, km_id_t* keyid) const = 0; 213 bool MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid); 214 bool MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses);
|
/system/security/keystore2/src/crypto/ |
D | certificate_utils.cpp | 78 std::vector<uint8_t> keyid(20); in makeKeyId() local 80 if (!X509_pubkey_digest(cert, EVP_sha1(), keyid.data(), &len)) { in makeKeyId() 83 return keyid; in makeKeyId() 87 makeAuthorityKeyExtension(const std::vector<uint8_t>& keyid) { in makeAuthorityKeyExtension() argument 93 auth_key->keyid = ASN1_OCTET_STRING_new(); in makeAuthorityKeyExtension() 94 if (auth_key->keyid == nullptr) { in makeAuthorityKeyExtension() 98 if (!ASN1_OCTET_STRING_set(auth_key->keyid, keyid.data(), keyid.size())) { in makeAuthorityKeyExtension() 106 makeSubjectKeyExtension(const std::vector<uint8_t>& keyid) { in makeSubjectKeyExtension() argument 110 if (!keyid_str || !ASN1_OCTET_STRING_set(keyid_str.get(), keyid.data(), keyid.size())) { in makeSubjectKeyExtension() 345 auto& keyid = std::get<std::vector<uint8_t>>(keyidV); in makeCert() local [all …]
|
/system/bt/test/mock/ |
D | mock_stack_crypto_toolbox.h | 58 std::function<Octet16(const Octet16& w, std::array<uint8_t, 4> keyid)> body{ 59 [this](const Octet16& w, std::array<uint8_t, 4> keyid) { 62 Octet16 operator()(const Octet16& w, std::array<uint8_t, 4> keyid) { in operator() 63 return body(w, keyid); in operator()
|
D | mock_stack_crypto_toolbox.cc | 60 Octet16 h6(const Octet16& w, std::array<uint8_t, 4> keyid) { in h6() argument 62 return test::mock::stack_crypto_toolbox::h6(w, keyid); in h6()
|
/system/keymaster/contexts/ |
D | pure_soft_keymaster_context.cpp | 203 km_id_t keyid; in CreateKeyBlob() local 204 if (!soft_keymaster_enforcement_.CreateKeyId(*blob, &keyid)) return KM_ERROR_UNKNOWN_ERROR; in CreateKeyBlob() 206 return pure_soft_secure_key_storage_->WriteKey(keyid, *blob); in CreateKeyBlob() 264 km_id_t keyid; in ParseKeyBlob() local 266 if (!soft_keymaster_enforcement_.CreateKeyId(blob, &keyid)) in ParseKeyBlob() 268 error = pure_soft_secure_key_storage_->KeyExists(keyid, &exists); in ParseKeyBlob() 303 km_id_t keyid; in DeleteKey() local 304 if (!soft_keymaster_enforcement_.CreateKeyId(blob, &keyid)) return KM_ERROR_UNKNOWN_ERROR; in DeleteKey() 305 return pure_soft_secure_key_storage_->DeleteKey(keyid); in DeleteKey()
|
/system/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.cpp | 63 km_id_t* keyid) const { in CreateKeyId() 71 assert(hash_len >= sizeof(*keyid)); in CreateKeyId() 72 memcpy(keyid, hash, sizeof(*keyid)); in CreateKeyId()
|
/system/bt/stack/smp/ |
D | crypto_toolbox.h | 35 extern Octet16 smp_calculate_h6(const Octet16& w, std::array<uint8_t, 4> keyid);
|
/system/keymaster/include/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.h | 40 bool CreateKeyId(const keymaster_key_blob_t& key_blob, km_id_t* keyid) const override;
|
/system/bt/stack/crypto_toolbox/ |
D | crypto_toolbox.cc | 29 Octet16 h6(const Octet16& w, std::array<uint8_t, 4> keyid) { in h6() argument 30 return aes_cmac(w, keyid.data(), keyid.size()); in h6()
|
D | crypto_toolbox.h | 33 extern Octet16 h6(const Octet16& w, std::array<uint8_t, 4> keyid);
|
/system/bt/gd/crypto_toolbox/ |
D | crypto_toolbox.cc | 30 Octet16 h6(const Octet16& w, std::array<uint8_t, 4> keyid) { in h6() argument 31 return aes_cmac(w, keyid.data(), keyid.size()); in h6()
|
D | crypto_toolbox.h | 47 extern Octet16 h6(const Octet16& w, std::array<uint8_t, 4> keyid);
|
/system/ca-certificates/files/ |
D | 83e9984f.0 | 46 keyid:87:11:15:08:D1:AA:C1:78:0C:B1:AF:CE:C6:C9:90:EF:BF:30:04:C0
|
D | 88950faa.0 | 46 keyid:82:D1:85:73:30:E7:35:04:D3:8E:02:92:FB:E5:A4:D1:C4:21:E8:CD
|
D | 7892ad52.0 | 46 keyid:5B:CA:5E:E5:DE:D2:81:AA:CD:A8:2D:64:51:B6:D9:72:9B:97:E6:4F
|
D | 343eb6cb.0 | 70 keyid:B6:08:7B:0D:7A:CC:AC:20:4C:86:56:32:5E:CF:AB:6E:85:2D:70:57
|
/system/core/fs_mgr/libdm/include/libdm/ |
D | dm_target.h | 144 const std::string& keyid) in DmTargetAndroidVerity() argument 145 : DmTarget(start, length), keyid_(keyid), block_device_(block_device) {} in DmTargetAndroidVerity()
|
/system/ca-certificates/google/files/ |
D | 594f1775.0 | 55 keyid:48:E6:68:F9:2B:D2:B2:95:D7:47:D8:23:20:10:4F:33:98:90:9F:D4
|
D | 57692373.0 | 61 keyid:71:38:36:F2:02:31:53:47:2B:6E:BA:65:46:A9:10:15:58:20:05:09
|
D | 7999be0d.0 | 60 keyid:C0:7A:98:68:8D:89:FB:AB:05:64:0C:11:7D:AA:7D:65:B8:CA:CC:4E
|
/system/core/fs_mgr/tools/ |
D | dmctl.cpp | 112 std::string keyid = NextArg(); in Next() local 114 return std::make_unique<DmTargetAndroidVerity>(start_sector, num_sectors, keyid, in Next()
|