/system/keymaster/legacy_support/ |
D | keymaster1_legacy_support.cpp | 58 keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, in add_digests() argument 60 auto key = std::make_pair(algorithm, purpose); in add_digests() 65 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests() 86 for (auto purpose : sig_purposes) { in map_digests() local 89 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests() 97 for (auto purpose : crypt_purposes) { in map_digests() local 100 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests() 117 static bool findUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, in findUnsupportedDigest() argument 120 auto supported_digests = digest_map.find(std::make_pair(algorithm, purpose)); in findUnsupportedDigest() 141 bool requiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, in requiresSoftwareDigesting() argument [all …]
|
D | ecdsa_keymaster1_operation.h | 32 EcdsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) in EcdsaKeymaster1WrappedOperation() argument 33 : purpose_(purpose), operation_handle_(0), engine_(engine) {} in EcdsaKeymaster1WrappedOperation() 60 wrapped_operation_(super::purpose(), engine) { in EcdsaKeymaster1Operation() 62 assert(super::purpose() != KM_PURPOSE_VERIFY); in EcdsaKeymaster1Operation() 63 assert(super::purpose() != KM_PURPOSE_ENCRYPT); in EcdsaKeymaster1Operation() 104 EcdsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) in EcdsaKeymaster1OperationFactory() argument 105 : purpose_(purpose), engine_(engine) {} in EcdsaKeymaster1OperationFactory()
|
D | rsa_keymaster1_operation.h | 31 RsaKeymaster1WrappedOperation(keymaster_purpose_t purpose, const Keymaster1Engine* engine) in RsaKeymaster1WrappedOperation() argument 32 : purpose_(purpose), operation_handle_(0), engine_(engine) {} in RsaKeymaster1WrappedOperation() 59 wrapped_operation_(super::purpose(), engine) { in RsaKeymaster1Operation() 61 assert(super::purpose() != KM_PURPOSE_VERIFY); in RsaKeymaster1Operation() 62 assert(super::purpose() != KM_PURPOSE_ENCRYPT); in RsaKeymaster1Operation() 103 RsaKeymaster1OperationFactory(keymaster_purpose_t purpose, const Keymaster1Engine* engine) in RsaKeymaster1OperationFactory() argument 104 : purpose_(purpose), engine_(engine) {} in RsaKeymaster1OperationFactory()
|
D | keymaster_passthrough_operation.h | 38 explicit KeymasterPassthroughOperation(keymaster_purpose_t purpose, in KeymasterPassthroughOperation() argument 40 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()), in KeymasterPassthroughOperation() 50 rc = km_device_->begin(km_device_, purpose(), &key_blob_, &input_params, &out_params, in Begin() 96 keymaster_purpose_t purpose, in KeymasterPassthroughOperationFactory() argument 98 : key_type_(algorithm, purpose), km_device_(km_device) {} in KeymasterPassthroughOperationFactory() 109 key_type_.purpose, km_device_, std::move(key))); in CreateOperation()
|
D | keymaster_passthrough_engine.cpp | 113 OperationFactory* GetOperationFactory(keymaster_purpose_t purpose, in GetOperationFactory() argument 117 switch (purpose) { in GetOperationFactory() 130 switch (purpose) { in GetOperationFactory() 145 switch (purpose) { in GetOperationFactory() 154 switch (purpose) { in GetOperationFactory() 163 switch (purpose) { in GetOperationFactory()
|
/system/keymaster/km_openssl/ |
D | hmac_operation.h | 27 HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest, 56 virtual KeyType registry_key() const { return KeyType(KM_ALGORITHM_HMAC, purpose()); } in registry_key() 63 virtual keymaster_purpose_t purpose() const = 0; 67 keymaster_purpose_t purpose() const { return KM_PURPOSE_SIGN; } in purpose() function 71 keymaster_purpose_t purpose() const { return KM_PURPOSE_VERIFY; } in purpose() function
|
D | rsa_key.cpp | 35 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding) { in SupportedMode() argument 36 switch (purpose) { in SupportedMode() 57 bool RsaKey::SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest) { in SupportedMode() argument 58 switch (purpose) { in SupportedMode()
|
D | hmac_operation.cpp | 46 if (purpose() == KM_PURPOSE_VERIFY) { in CreateOperation() 57 if (purpose() == KM_PURPOSE_SIGN) { in CreateOperation() 72 move(key), purpose(), digest, mac_length_bits / 8, min_mac_length_bits / 8)); in CreateOperation() 91 HmacOperation::HmacOperation(Key&& key, keymaster_purpose_t purpose, keymaster_digest_t digest, in HmacOperation() argument 93 : Operation(purpose, key.hw_enforced_move(), key.sw_enforced_move()), error_(KM_ERROR_OK), in HmacOperation() 126 if (purpose == KM_PURPOSE_SIGN) { in HmacOperation() 177 switch (purpose()) { in Finish()
|
D | triple_des_operation.h | 40 explicit TripleDesOperationFactory(keymaster_purpose_t purpose) in TripleDesOperationFactory() argument 41 : BlockCipherOperationFactory(purpose) {} in TripleDesOperationFactory()
|
D | aes_operation.h | 40 explicit AesOperationFactory(keymaster_purpose_t purpose) in AesOperationFactory() argument 41 : BlockCipherOperationFactory(purpose) {} in AesOperationFactory()
|
D | triple_des_key.cpp | 31 OperationFactory* TripleDesKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory() 32 switch (purpose) { in GetOperationFactory()
|
D | aes_key.cpp | 31 OperationFactory* AesKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory() 32 switch (purpose) { in GetOperationFactory()
|
D | hmac_key.cpp | 29 OperationFactory* HmacKeyFactory::GetOperationFactory(keymaster_purpose_t purpose) const { in GetOperationFactory() 30 switch (purpose) { in GetOperationFactory()
|
/system/keymaster/android_keymaster/ |
D | keymaster_enforcement.cpp | 81 static keymaster_error_t authorized_purpose(const keymaster_purpose_t purpose, in authorized_purpose() argument 83 switch (purpose) { in authorized_purpose() 90 if (auth_set.Contains(TAG_PURPOSE, purpose)) return KM_ERROR_OK; in authorized_purpose() 98 inline bool is_origination_purpose(keymaster_purpose_t purpose) { in is_origination_purpose() argument 99 return purpose == KM_PURPOSE_ENCRYPT || purpose == KM_PURPOSE_SIGN; in is_origination_purpose() 102 inline bool is_usage_purpose(keymaster_purpose_t purpose) { in is_usage_purpose() argument 103 return purpose == KM_PURPOSE_DECRYPT || purpose == KM_PURPOSE_VERIFY; in is_usage_purpose() 116 keymaster_error_t KeymasterEnforcement::AuthorizeOperation(const keymaster_purpose_t purpose, in AuthorizeOperation() argument 123 switch (purpose) { in AuthorizeOperation() 140 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); in AuthorizeOperation() [all …]
|
/system/keymaster/include/keymaster/ |
D | operation.h | 43 : algorithm(alg), purpose(purp) {} in KeyType() 46 keymaster_purpose_t purpose; member 49 return algorithm == rhs.algorithm && purpose == rhs.purpose; 94 explicit Operation(keymaster_purpose_t purpose, AuthorizationSet&& hw_enforced, in Operation() argument 96 : purpose_(purpose), hw_enforced_(move(hw_enforced)), sw_enforced_(move(sw_enforced)) {} in Operation() 102 keymaster_purpose_t purpose() const { return purpose_; } in purpose() function
|
D | soft_keymaster_device.h | 81 bool FindUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, 84 bool RequiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, 106 keymaster_purpose_t purpose, 111 keymaster_purpose_t purpose, 116 keymaster_purpose_t purpose, 153 static keymaster_error_t begin(const keymaster1_device_t* dev, keymaster_purpose_t purpose, 210 static keymaster_error_t begin(const keymaster2_device_t* dev, keymaster_purpose_t purpose,
|
/system/keymaster/include/keymaster/km_openssl/ |
D | ecdsa_operation.h | 33 keymaster_purpose_t purpose, keymaster_digest_t digest, EVP_PKEY* key) in EcdsaOperation() argument 34 : Operation(purpose, move(hw_enforced), move(sw_enforced)), digest_(digest), in EcdsaOperation() 85 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_EC, purpose()); } in registry_key() 90 virtual keymaster_purpose_t purpose() const = 0; 98 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } in purpose() function 108 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; } in purpose() function
|
D | rsa_operation.h | 37 keymaster_purpose_t purpose, keymaster_digest_t digest, in RsaOperation() argument 39 : Operation(purpose, move(hw_enforced), move(sw_enforced)), rsa_key_(key), in RsaOperation() 77 keymaster_purpose_t purpose, keymaster_digest_t digest, 141 keymaster_purpose_t purpose, keymaster_digest_t digest, in RsaCryptOperation() argument 143 : RsaOperation(move(hw_enforced), move(sw_enforced), purpose, digest, padding, key), in RsaCryptOperation() 195 KeyType registry_key() const override { return KeyType(KM_ALGORITHM_RSA, purpose()); } in registry_key() 196 virtual keymaster_purpose_t purpose() const = 0; 244 keymaster_purpose_t purpose() const override { return KM_PURPOSE_SIGN; } in purpose() function 257 keymaster_purpose_t purpose() const override { return KM_PURPOSE_VERIFY; } in purpose() function 270 keymaster_purpose_t purpose() const override { return KM_PURPOSE_ENCRYPT; } in purpose() function [all …]
|
D | rsa_key.h | 39 bool SupportedMode(keymaster_purpose_t purpose, keymaster_padding_t padding); 40 bool SupportedMode(keymaster_purpose_t purpose, keymaster_digest_t digest);
|
/system/security/ondevice-signing/ |
D | KeystoreHmacKey.cpp | 172 KeyParameter purpose; in getVerifyOpParameters() local 173 purpose.tag = Tag::PURPOSE; in getVerifyOpParameters() 174 purpose.value = KeyParameterValue::make<KeyParameterValue::keyPurpose>(KeyPurpose::VERIFY); in getVerifyOpParameters() 175 opParameters.push_back(purpose); in getVerifyOpParameters() 198 KeyParameter purpose; in getSignOpParameters() local 199 purpose.tag = Tag::PURPOSE; in getSignOpParameters() 200 purpose.value = KeyParameterValue::make<KeyParameterValue::keyPurpose>(KeyPurpose::SIGN); in getSignOpParameters() 201 opParameters.push_back(purpose); in getSignOpParameters()
|
D | KeystoreKey.cpp | 104 KeyParameter purpose; in createKey() local 105 purpose.tag = Tag::PURPOSE; in createKey() 106 purpose.value = KeyParameterValue::make<KeyParameterValue::keyPurpose>(KeyPurpose::SIGN); in createKey() 107 params.push_back(purpose); in createKey() 286 KeyParameter purpose; in getSignOpParameters() local 287 purpose.tag = Tag::PURPOSE; in getSignOpParameters() 288 purpose.value = KeyParameterValue::make<KeyParameterValue::keyPurpose>(KeyPurpose::SIGN); in getSignOpParameters() 289 opParameters.push_back(purpose); in getSignOpParameters()
|
/system/keymaster/contexts/ |
D | soft_keymaster_device.cpp | 110 keymaster_purpose_t purpose, in add_digests() argument 112 auto key = std::make_pair(algorithm, purpose); in add_digests() 117 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests() 138 for (auto purpose : sig_purposes) { in map_digests() local 141 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests() 149 for (auto purpose : crypt_purposes) { in map_digests() local 152 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests() 403 keymaster_purpose_t purpose, in get_supported_block_modes() argument 412 return km1_dev->get_supported_block_modes(km1_dev, algorithm, purpose, modes, modes_length); in get_supported_block_modes() 417 request.purpose = purpose; in get_supported_block_modes() [all …]
|
/system/keymaster/tests/ |
D | android_keymaster_test_utils.cpp | 237 keymaster_error_t Keymaster2Test::BeginOperation(keymaster_purpose_t purpose) { in BeginOperation() argument 241 device()->begin(device(), purpose, &blob_, &in_params, &out_params, &op_handle_); in BeginOperation() 247 keymaster_error_t Keymaster2Test::BeginOperation(keymaster_purpose_t purpose, in BeginOperation() argument 252 device()->begin(device(), purpose, &blob_, &input_set, &out_params, &op_handle_); in BeginOperation() 360 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message) { in ProcessMessage() argument 361 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, client_params(), nullptr /* output_params */)); in ProcessMessage() 368 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, in ProcessMessage() argument 372 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, begin_out_params)); in ProcessMessage() 379 string Keymaster2Test::ProcessMessage(keymaster_purpose_t purpose, const string& message, in ProcessMessage() argument 383 EXPECT_EQ(KM_ERROR_OK, BeginOperation(purpose, begin_params, output_params)); in ProcessMessage() [all …]
|
/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster_passthrough_key.h | 69 OperationFactory* GetOperationFactory(keymaster_purpose_t purpose) const override { in GetOperationFactory() argument 70 return engine_->GetOperationFactory(purpose, algorithm_); in GetOperationFactory()
|
/system/security/keystore2/aidl/android/security/metrics/ |
D | KeyOperationWithPurposeAndModesInfo.aidl | 27 Purpose purpose;
|