| /system/core/trusty/keymaster/set_attestation_key/ |
| D | set_attestation_key.cpp | 78 buf = keymaster::append_uint32_to_buf(buf, end, algorithm); in Serialize() 82 return keymaster::copy_uint32_from_buf(buf_ptr, end, &algorithm) && in Deserialize() 86 keymaster_algorithm_t algorithm; member 107 return keymaster::append_uint32_to_buf(buf, end, algorithm); in Serialize() 110 return keymaster::copy_uint32_from_buf(buf_ptr, end, &algorithm); in Deserialize() 113 keymaster_algorithm_t algorithm; member 118 static int set_attestation_key_or_cert_bin(uint32_t cmd, keymaster_algorithm_t algorithm, in set_attestation_key_or_cert_bin() argument 123 req.algorithm = algorithm; in set_attestation_key_or_cert_bin() 136 static int set_attestation_key_or_cert_pem(uint32_t cmd, keymaster_algorithm_t algorithm, in set_attestation_key_or_cert_pem() argument 163 ret = set_attestation_key_or_cert_bin(cmd, algorithm, key, keylen); in set_attestation_key_or_cert_pem() [all …]
|
| /system/keymaster/legacy_support/ |
| D | keymaster1_legacy_support.cpp | 59 keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, in add_digests() argument 61 auto key = std::make_pair(algorithm, purpose); in add_digests() 66 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests() 86 for (auto algorithm : sig_algorithms) in map_digests() local 90 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests() 97 for (auto algorithm : crypt_algorithms) in map_digests() local 101 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests() 118 static bool findUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, in findUnsupportedDigest() argument 121 auto supported_digests = digest_map.find(std::make_pair(algorithm, purpose)); in findUnsupportedDigest() 142 bool requiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, in requiresSoftwareDigesting() argument [all …]
|
| /system/keymaster/contexts/ |
| D | keymaster2_passthrough_context.cpp | 44 KeyFactory* Keymaster2PassthroughContext::GetKeyFactory(keymaster_algorithm_t algorithm) const { in GetKeyFactory() 45 auto& result = factories_[algorithm]; in GetKeyFactory() 47 result.reset(new (std::nothrow) KeymasterPassthroughKeyFactory(engine_.get(), algorithm)); in GetKeyFactory() 52 Keymaster2PassthroughContext::GetOperationFactory(keymaster_algorithm_t algorithm, in GetOperationFactory() argument 54 auto keyfactory = GetKeyFactory(algorithm); in GetOperationFactory() 102 keymaster_algorithm_t algorithm; in ParseKeyBlob() local 103 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) && in ParseKeyBlob() 104 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) { in ParseKeyBlob() 109 auto factory = GetKeyFactory(algorithm); in ParseKeyBlob()
|
| D | soft_attestation_cert.cpp | 281 const keymaster_key_blob_t* getAttestationKey(keymaster_algorithm_t algorithm, in getAttestationKey() argument 286 switch (algorithm) { in getAttestationKey() 299 CertificateChain getAttestationChain(keymaster_algorithm_t algorithm, keymaster_error_t* error) { in getAttestationChain() argument 304 switch (algorithm) { in getAttestationChain()
|
| D | keymaster1_passthrough_context.cpp | 58 KeyFactory* Keymaster1PassthroughContext::GetKeyFactory(keymaster_algorithm_t algorithm) const { in GetKeyFactory() 59 auto& result = factories_[algorithm]; in GetKeyFactory() 61 switch (algorithm) { in GetKeyFactory() 90 Keymaster1PassthroughContext::GetOperationFactory(keymaster_algorithm_t algorithm, in GetOperationFactory() argument 92 auto keyfactory = GetKeyFactory(algorithm); in GetOperationFactory() 169 keymaster_algorithm_t algorithm; in ParseKeyBlob() local 170 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) && in ParseKeyBlob() 171 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) { in ParseKeyBlob() 174 auto factory = GetKeyFactory(algorithm); in ParseKeyBlob()
|
| D | soft_keymaster_device.cpp | 109 static keymaster_error_t add_digests(keymaster1_device_t* dev, keymaster_algorithm_t algorithm, in add_digests() argument 112 auto key = std::make_pair(algorithm, purpose); in add_digests() 117 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests() 137 for (auto algorithm : sig_algorithms) in map_digests() local 141 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests() 148 for (auto algorithm : crypt_algorithms) in map_digests() local 152 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests() 404 keymaster_algorithm_t algorithm, in get_supported_block_modes() argument 414 return km1_dev->get_supported_block_modes(km1_dev, algorithm, purpose, modes, modes_length); in get_supported_block_modes() 418 request.algorithm = algorithm; in get_supported_block_modes() [all …]
|
| D | soft_keymaster_context.cpp | 97 KeyFactory* SoftKeymasterContext::GetKeyFactory(keymaster_algorithm_t algorithm) const { in GetKeyFactory() 98 switch (algorithm) { in GetKeyFactory() 123 OperationFactory* SoftKeymasterContext::GetOperationFactory(keymaster_algorithm_t algorithm, in GetOperationFactory() argument 125 KeyFactory* key_factory = GetKeyFactory(algorithm); in GetOperationFactory() 270 keymaster_algorithm_t algorithm; in ParseKeyBlob() local 271 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm) && in ParseKeyBlob() 272 !sw_enforced.GetTagValue(TAG_ALGORITHM, &algorithm)) { in ParseKeyBlob() 275 auto factory = GetKeyFactory(algorithm); in ParseKeyBlob()
|
| /system/keymaster/include/keymaster/contexts/ |
| D | soft_attestation_context.h | 35 KeymasterKeyBlob GetAttestationKey(keymaster_algorithm_t algorithm, in GetAttestationKey() argument 37 return KeymasterKeyBlob(*getAttestationKey(algorithm, error)); in GetAttestationKey() 40 CertificateChain GetAttestationChain(keymaster_algorithm_t algorithm, in GetAttestationChain() argument 42 return getAttestationChain(algorithm, error); in GetAttestationChain()
|
| D | soft_attestation_cert.h | 26 const keymaster_key_blob_t* getAttestationKey(keymaster_algorithm_t algorithm, 28 CertificateChain getAttestationChain(keymaster_algorithm_t algorithm, keymaster_error_t* error);
|
| /system/keymaster/include/keymaster/ |
| D | soft_keymaster_device.h | 81 bool FindUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, 84 bool RequiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, 88 static void StoreDefaultNewKeyParams(keymaster_algorithm_t algorithm, 91 keymaster_algorithm_t* algorithm); 105 keymaster_algorithm_t algorithm, 110 keymaster_algorithm_t algorithm, 115 keymaster_algorithm_t algorithm, 120 keymaster_algorithm_t algorithm, 124 keymaster_algorithm_t algorithm,
|
| D | operation.h | 45 : algorithm(alg), purpose(purp) {} in KeyType() 47 keymaster_algorithm_t algorithm; member 51 return algorithm == rhs.algorithm && purpose == rhs.purpose;
|
| /system/tools/mkbootimg/gki/ |
| D | certify_bootimg.py | 44 def add_certificate(boot_img, algorithm, key, extra_args): argument 58 algorithm=algorithm, key=key, salt='d00df00d', 249 def certify_bootimg(boot_img, output_img, algorithm, key, extra_args, argument 257 add_certificate(boot_tmp, algorithm, key, extra_args) 267 algorithm, key, extra_args, extra_footer_args): argument 279 algorithm=algorithm, key=key, extra_args=extra_args, 302 args.algorithm, args.key, args.extra_args, 305 certify_bootimg(args.boot_img, args.output, args.algorithm,
|
| D | generate_gki_certificate.py | 25 def generate_gki_certificate(image, avbtool, name, algorithm, key, salt, argument 34 '--algorithm', algorithm, 84 algorithm=args.algorithm, key=args.key, salt=args.salt,
|
| /system/security/keystore2/tests/ |
| D | keystore2_client_authorizations_tests.rs | 53 .algorithm(Algorithm::EC) in gen_key_including_unique_id() 166 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_active_datetime_test_success() 196 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_future_active_datetime_test_op_fail() 226 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_future_origination_expire_datetime_test_success() 256 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_origination_expire_datetime_test_op_fail() 286 .algorithm(Algorithm::HMAC) in keystore2_gen_key_auth_future_usage_expire_datetime_hmac_verify_op_success() 315 .algorithm(Algorithm::HMAC) in keystore2_gen_key_auth_usage_expire_datetime_hmac_verify_op_fail() 353 .algorithm(Algorithm::AES) in keystore2_gen_key_auth_usage_future_expire_datetime_decrypt_op_success() 404 .algorithm(Algorithm::AES) in keystore2_gen_key_auth_usage_expire_datetime_decrypt_op_fail() 452 .algorithm(Algorithm::EC) in keystore2_gen_key_auth_early_boot_only_op_fail() [all …]
|
| D | keystore2_client_device_unique_attestation_tests.rs | 54 .algorithm(Algorithm::EC) in generate_ec_key_device_unique_attested_with_id_attest() 74 .algorithm(Algorithm::RSA) in generate_rsa_key_device_unique_attested_with_id_attest() 161 .algorithm(Algorithm::EC) in keystore2_gen_key_device_unique_attest_with_default_sec_level_unimplemented() 191 .algorithm(Algorithm::EC) in keystore2_gen_ec_key_device_unique_attest_with_strongbox_sec_level_test_success() 229 .algorithm(Algorithm::RSA) in keystore2_gen_rsa_key_device_unique_attest_with_strongbox_sec_level_test_success() 279 .algorithm(Algorithm::EC) in keystore2_device_unique_attest_key_fails_with_invalid_attestation_id()
|
| /system/sepolicy/prebuilts/api/30.0/private/ |
| D | fsverity_init.te | 18 # When kernel requests an algorithm, the crypto API first looks for an 19 # already registered algorithm with that name. If it fails, the kernel creates 20 # an implementation of the algorithm from templates.
|
| /system/sepolicy/prebuilts/api/34.0/private/ |
| D | fsverity_init.te | 18 # When kernel requests an algorithm, the crypto API first looks for an 19 # already registered algorithm with that name. If it fails, the kernel creates 20 # an implementation of the algorithm from templates.
|
| /system/security/keystore2/src/ |
| D | super_key.rs | 83 pub algorithm: SuperEncryptionAlgorithm, field 93 algorithm: SuperEncryptionAlgorithm::Aes256Gcm, 102 algorithm: SuperEncryptionAlgorithm::Aes256Gcm, 111 algorithm: SuperEncryptionAlgorithm::EcdhP521, 158 algorithm: SuperEncryptionAlgorithm, field 171 if self.algorithm == SuperEncryptionAlgorithm::Aes256Gcm { in decrypt() 179 if self.algorithm == SuperEncryptionAlgorithm::Aes256Gcm { in encrypt() 190 algorithm: SuperEncryptionAlgorithm, field 200 Ok(LockedKey { algorithm: to_encrypt.algorithm, id: to_encrypt.id, nonce, ciphertext }) in new() 236 Ok(Arc::new(SuperKey { algorithm: self.algorithm, key, id: self.id, reencrypt_with })) in decrypt() [all …]
|
| /system/sepolicy/prebuilts/api/29.0/private/ |
| D | fsverity_init.te | 22 # When kernel requests an algorithm, the crypto API first looks for an 23 # already registered algorithm with that name. If it fails, the kernel creates 24 # an implementation of the algorithm from templates.
|
| /system/sepolicy/prebuilts/api/33.0/private/ |
| D | fsverity_init.te | 21 # When kernel requests an algorithm, the crypto API first looks for an 22 # already registered algorithm with that name. If it fails, the kernel creates 23 # an implementation of the algorithm from templates.
|
| /system/sepolicy/prebuilts/api/32.0/private/ |
| D | fsverity_init.te | 22 # When kernel requests an algorithm, the crypto API first looks for an 23 # already registered algorithm with that name. If it fails, the kernel creates 24 # an implementation of the algorithm from templates.
|
| /system/sepolicy/prebuilts/api/31.0/private/ |
| D | fsverity_init.te | 22 # When kernel requests an algorithm, the crypto API first looks for an 23 # already registered algorithm with that name. If it fails, the kernel creates 24 # an implementation of the algorithm from templates.
|
| /system/security/keystore2/test_utils/ |
| D | key_generations.rs | 629 .algorithm(Algorithm::EC) in generate_ec_p256_signing_key() 679 .algorithm(Algorithm::EC) in generate_ec_key() 719 .algorithm(Algorithm::RSA) in generate_rsa_key() 801 algorithm: Algorithm, in generate_sym_key() 810 .algorithm(algorithm) in generate_sym_key() 853 .algorithm(Algorithm::HMAC) in generate_hmac_key() 891 algorithm: Algorithm, in generate_attestation_key() 894 assert!(algorithm == Algorithm::RSA || algorithm == Algorithm::EC); in generate_attestation_key() 896 if algorithm == Algorithm::RSA { in generate_attestation_key() 930 .algorithm(Algorithm::EC) in generate_ec_attestation_key() [all …]
|
| /system/keymaster/tests/ |
| D | wrapped_key_test.cpp | 97 keymaster_algorithm_t algorithm; in TEST() local 98 auth_list.GetTagValue(TAG_ALGORITHM, &algorithm); in TEST() 99 EXPECT_EQ(algorithm, KM_ALGORITHM_AES); in TEST()
|
| /system/keymaster/km_openssl/ |
| D | attestation_utils.cpp | 220 EVP_PKEY_Ptr get_attestation_key(keymaster_algorithm_t algorithm, const AttestationContext& context, in get_attestation_key() argument 222 KeymasterKeyBlob signing_key_blob = context.GetAttestationKey(algorithm, error); in get_attestation_key() 293 keymaster_algorithm_t algorithm; in generate_attestation() local 294 if (!proxy.GetTagValue(TAG_ALGORITHM, &algorithm)) { in generate_attestation() 300 attest_key ? CertificateChain() : context.GetAttestationChain(algorithm, error); in generate_attestation() 314 signing_key = get_attestation_key(algorithm, context, error); in generate_attestation()
|