Home
last modified time | relevance | path

Searched refs:purpose (Results 1 – 25 of 178) sorted by relevance

12345678

/system/keymaster/legacy_support/
Dkeymaster1_legacy_support.cpp58 keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, in add_digests() argument
60 auto key = std::make_pair(algorithm, purpose); in add_digests()
65 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests()
86 for (auto purpose : sig_purposes) { in map_digests() local
89 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests()
97 for (auto purpose : crypt_purposes) { in map_digests() local
100 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests()
117 static bool findUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, in findUnsupportedDigest() argument
120 auto supported_digests = digest_map.find(std::make_pair(algorithm, purpose)); in findUnsupportedDigest()
141 bool requiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, in requiresSoftwareDigesting() argument
[all …]
Decdsa_keymaster1_operation.h32 EcdsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) in EcdsaKeymaster1WrappedOperation() argument
33 : purpose_(purpose), operation_handle_(0), engine_(engine) {} in EcdsaKeymaster1WrappedOperation()
60 wrapped_operation_(super::purpose(), engine) { in EcdsaKeymaster1Operation()
62 assert(super::purpose() != KM_PURPOSE_VERIFY); in EcdsaKeymaster1Operation()
63 assert(super::purpose() != KM_PURPOSE_ENCRYPT); in EcdsaKeymaster1Operation()
104 EcdsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) in EcdsaKeymaster1OperationFactory() argument
105 : purpose_(purpose), engine_(engine) {} in EcdsaKeymaster1OperationFactory()
Drsa_keymaster1_operation.h31 RsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) in RsaKeymaster1WrappedOperation() argument
32 : purpose_(purpose), operation_handle_(0), engine_(engine) {} in RsaKeymaster1WrappedOperation()
59 wrapped_operation_(super::purpose(), engine) { in RsaKeymaster1Operation()
61 assert(super::purpose() != KM_PURPOSE_VERIFY); in RsaKeymaster1Operation()
62 assert(super::purpose() != KM_PURPOSE_ENCRYPT); in RsaKeymaster1Operation()
103 RsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) in RsaKeymaster1OperationFactory() argument
104 : purpose_(purpose), engine_(engine) {} in RsaKeymaster1OperationFactory()
Dkeymaster_passthrough_operation.h38 explicit KeymasterPassthroughOperation(keymaster_purpose_t purpose, in KeymasterPassthroughOperation() argument
40 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()), in KeymasterPassthroughOperation()
50 rc = km_device_->begin(km_device_, purpose(), &key_blob_, &input_params, &out_params, in Begin()
96 keymaster_purpose_t purpose, in KeymasterPassthroughOperationFactory() argument
98 : key_type_(algorithm, purpose), km_device_(km_device) {} in KeymasterPassthroughOperationFactory()
109 key_type_.purpose, km_device_, std::move(key))); in CreateOperation()
Dkeymaster_passthrough_engine.cpp113 OperationFactory* GetOperationFactory(keymaster_purpose_t purpose, in GetOperationFactory() argument
117 switch (purpose) { in GetOperationFactory()
130 switch (purpose) { in GetOperationFactory()
145 switch (purpose) { in GetOperationFactory()
154 switch (purpose) { in GetOperationFactory()
163 switch (purpose) { in GetOperationFactory()
/system/keymaster/km_openssl/
Dhmac_operation.h27 HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest,
56 virtual KeyType registry_key() const { return KeyType(KM_ALGORITHM_HMAC, purpose()); } in registry_key()
63 virtual keymaster_purpose_t purpose() const = 0;
67 keymaster_purpose_t purpose() const { return KM_PURPOSE_SIGN; } in purpose() function
71 keymaster_purpose_t purpose() const { return KM_PURPOSE_VERIFY; } in purpose() function
Drsa_key.cpp35 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { in SupportedMode() argument
36 switch (purpose) { in SupportedMode()
57 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) { in SupportedMode() argument
58 switch (purpose) { in SupportedMode()
Dhmac_operation.cpp46 if (purpose() == KM_PURPOSE_VERIFY) { in CreateOperation()
57 if (purpose() == KM_PURPOSE_SIGN) { in CreateOperation()
72 move(key), purpose(), digest, mac_length_bits / 8, min_mac_length_bits / 8)); in CreateOperation()
91 HmacOperation::HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest, in HmacOperation() argument
93 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()), error_(KM_ERROR_OK), in HmacOperation()
126 if (purpose == KM_PURPOSE_SIGN) { in HmacOperation()
177 switch (purpose()) { in Finish()
Dtriple_des_operation.h40 explicit TripleDesOperationFactory(keymaster_purpose_t purpose) in TripleDesOperationFactory() argument
41 : BlockCipherOperationFactory(purpose) {} in TripleDesOperationFactory()
Daes_operation.h40 explicit AesOperationFactory(keymaster_purpose_t purpose) in AesOperationFactory() argument
41 : BlockCipherOperationFactory(purpose) {} in AesOperationFactory()
Dtriple_des_key.cpp31 OperationFactory* TripleDesKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory()
32 switch (purpose) { in GetOperationFactory()
Daes_key.cpp31 OperationFactory* AesKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory()
32 switch (purpose) { in GetOperationFactory()
Dhmac_key.cpp29 OperationFactory* HmacKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory()
30 switch (purpose) { in GetOperationFactory()
/system/keymaster/android_keymaster/
Dkeymaster_enforcement.cpp81 static keymaster_error_t authorized_purpose(const keymaster_purpose_t purpose, in authorized_purpose() argument
83 switch (purpose) { in authorized_purpose()
90 if (auth_set.Contains(TAG_PURPOSE, purpose)) return KM_ERROR_OK; in authorized_purpose()
98 inline bool is_origination_purpose(keymaster_purpose_t purpose) { in is_origination_purpose() argument
99 return purpose == KM_PURPOSE_ENCRYPT || purpose == KM_PURPOSE_SIGN; in is_origination_purpose()
102 inline bool is_usage_purpose(keymaster_purpose_t purpose) { in is_usage_purpose() argument
103 return purpose == KM_PURPOSE_DECRYPT || purpose == KM_PURPOSE_VERIFY; in is_usage_purpose()
116 keymaster_error_t KeymasterEnforcement::AuthorizeOperation(const keymaster_purpose_t purpose, in AuthorizeOperation() argument
123 switch (purpose) { in AuthorizeOperation()
140 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); in AuthorizeOperation()
[all …]
/system/keymaster/include/keymaster/
Doperation.h43 : algorithm(alg), purpose(purp) {} in KeyType()
46 keymaster_purpose_t purpose; member
49 return algorithm == rhs.algorithm && purpose == rhs.purpose;
94 explicit Operation(keymaster_purpose_t purpose, AuthorizationSet&& hw_enforced, in Operation() argument
96 : purpose_(purpose), hw_enforced_(move(hw_enforced)), sw_enforced_(move(sw_enforced)) {} in Operation()
102 keymaster_purpose_t purpose() const { return purpose_; } in purpose() function
Dsoft_keymaster_device.h81 bool FindUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose,
84 bool RequiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose,
106 keymaster_purpose_t purpose,
111 keymaster_purpose_t purpose,
116 keymaster_purpose_t purpose,
153 static keymaster_error_t begin(const keymaster1_device_t* dev, keymaster_purpose_t purpose,
210 static keymaster_error_t begin(const keymaster2_device_t* dev, keymaster_purpose_t purpose,
/system/keymaster/include/keymaster/km_openssl/
Decdsa_operation.h33 keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) in EcdsaOperation() argument
34 : Operation(purpose, move(hw_enforced), move(sw_enforced)), digest_(digest), in EcdsaOperation()
85 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_EC, purpose()); } in registry_key()
90 virtual keymaster_purpose_t purpose() const = 0;
98 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } in purpose() function
108 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; } in purpose() function
Drsa_operation.h37 keymaster_purpose_t purpose, keymaster_digest_t digest, in RsaOperation() argument
39 : Operation(purpose, move(hw_enforced), move(sw_enforced)), rsa_key_(key), in RsaOperation()
77 keymaster_purpose_t purpose, keymaster_digest_t digest,
141 keymaster_purpose_t purpose, keymaster_digest_t digest, in RsaCryptOperation() argument
143 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, padding, key), in RsaCryptOperation()
195 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_RSA, purpose()); } in registry_key()
196 virtual keymaster_purpose_t purpose() const = 0;
244 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } in purpose() function
257 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; } in purpose() function
270 keymaster_purpose_t purpose() const override { return KM_PURPOSE_ENCRYPT; } in purpose() function
[all …]
Drsa_key.h39 bool SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding);
40 bool SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest);
/system/security/ondevice-signing/
DKeystoreHmacKey.cpp172 KeyParameter purpose; in getVerifyOpParameters() local
173 purpose.tag = Tag::PURPOSE; in getVerifyOpParameters()
174 purpose.value = KeyParameterValue::make<KeyParameterValue::keyPurpose>(KeyPurpose::VERIFY); in getVerifyOpParameters()
175 opParameters.push_back(purpose); in getVerifyOpParameters()
198 KeyParameter purpose; in getSignOpParameters() local
199 purpose.tag = Tag::PURPOSE; in getSignOpParameters()
200 purpose.value = KeyParameterValue::make<KeyParameterValue::keyPurpose>(KeyPurpose::SIGN); in getSignOpParameters()
201 opParameters.push_back(purpose); in getSignOpParameters()
DKeystoreKey.cpp104 KeyParameter purpose; in createKey() local
105 purpose.tag = Tag::PURPOSE; in createKey()
106 purpose.value = KeyParameterValue::make<KeyParameterValue::keyPurpose>(KeyPurpose::SIGN); in createKey()
107 params.push_back(purpose); in createKey()
286 KeyParameter purpose; in getSignOpParameters() local
287 purpose.tag = Tag::PURPOSE; in getSignOpParameters()
288 purpose.value = KeyParameterValue::make<KeyParameterValue::keyPurpose>(KeyPurpose::SIGN); in getSignOpParameters()
289 opParameters.push_back(purpose); in getSignOpParameters()
/system/keymaster/contexts/
Dsoft_keymaster_device.cpp110 keymaster_purpose_t purpose, in add_digests() argument
112 auto key = std::make_pair(algorithm, purpose); in add_digests()
117 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests()
138 for (auto purpose : sig_purposes) { in map_digests() local
141 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests()
149 for (auto purpose : crypt_purposes) { in map_digests() local
152 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests()
403 keymaster_purpose_t purpose, in get_supported_block_modes() argument
412 return km1_dev->get_supported_block_modes(km1_dev, algorithm, purpose, modes, modes_length); in get_supported_block_modes()
417 request.purpose = purpose; in get_supported_block_modes()
[all …]
/system/keymaster/tests/
Dandroid_keymaster_test_utils.cpp237 keymaster_error_t Keymaster2Test::BeginOperation(keymaster_purpose_t purpose) { in BeginOperation() argument
241 device()->begin(device(), purpose, &blob_, &in_params, &out_params, &op_handle_); in BeginOperation()
247 keymaster_error_t Keymaster2Test::BeginOperation(keymaster_purpose_t purpose, in BeginOperation() argument
252 device()->begin(device(), purpose, &blob_, &input_set, &out_params, &op_handle_); in BeginOperation()
360 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message) { in ProcessMessage() argument
361 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, client_params(), nullptr /* output_params */)); in ProcessMessage()
368 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, in ProcessMessage() argument
372 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, begin_out_params)); in ProcessMessage()
379 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, in ProcessMessage() argument
383 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, output_params)); in ProcessMessage()
[all …]
/system/keymaster/include/keymaster/legacy_support/
Dkeymaster_passthrough_key.h69 OperationFactory* GetOperationFactory(keymaster_purpose_t purpose) const override { in GetOperationFactory() argument
70 return engine_->GetOperationFactory(purpose, algorithm_); in GetOperationFactory()
/system/security/keystore2/aidl/android/security/metrics/
DKeyOperationWithPurposeAndModesInfo.aidl27 Purpose purpose;

12345678