/system/keymaster/ |
D | android_keymaster.cpp | 85 bool check_supported(const KeymasterContext& context, keymaster_algorithm_t algorithm, in check_supported() argument 87 if (context.GetKeyFactory(algorithm) == NULL) { in check_supported() 122 void GetSupported(const KeymasterContext& context, keymaster_algorithm_t algorithm, in GetSupported() argument 126 if (response == NULL || !check_supported(context, algorithm, response)) in GetSupported() 129 const OperationFactory* factory = context.GetOperationFactory(algorithm, purpose); in GetSupported() 142 GetSupported(*context_, request.algorithm, request.purpose, in SupportedBlockModes() 148 GetSupported(*context_, request.algorithm, request.purpose, in SupportedPaddingModes() 154 GetSupported(*context_, request.algorithm, request.purpose, &OperationFactory::SupportedDigests, in SupportedDigests() 160 if (response == NULL || !check_supported(*context_, request.algorithm, response)) in SupportedImportFormats() 165 context_->GetKeyFactory(request.algorithm)->SupportedImportFormats(&count); in SupportedImportFormats() [all …]
|
D | soft_keymaster_device.cpp | 83 static keymaster_error_t add_digests(keymaster1_device_t* dev, keymaster_algorithm_t algorithm, in add_digests() argument 86 auto key = std::make_pair(algorithm, purpose); in add_digests() 91 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests() 108 for (auto algorithm : sig_algorithms) in map_digests() local 110 keymaster_error_t error = add_digests(dev, algorithm, purpose, map); in map_digests() 117 for (auto algorithm : crypt_algorithms) in map_digests() local 119 keymaster_error_t error = add_digests(dev, algorithm, purpose, map); in map_digests() 339 bool FindAlgorithm(const keymaster_key_param_set_t& params, keymaster_algorithm_t* algorithm) { in FindAlgorithm() argument 342 *algorithm = static_cast<keymaster_algorithm_t>(params.params[i].enumerated); in FindAlgorithm() 350 keymaster_algorithm_t* algorithm) { in GetAlgorithm() argument [all …]
|
D | operation.h | 42 : algorithm(alg), purpose(purp) {} in KeyType() 44 keymaster_algorithm_t algorithm; member 48 return algorithm == rhs.algorithm && purpose == rhs.purpose;
|
D | operation.cpp | 52 inline bool is_public_key_algorithm(keymaster_algorithm_t algorithm) { in is_public_key_algorithm() argument 53 switch (algorithm) { in is_public_key_algorithm() 70 if (!is_public_key_algorithm(key_type.algorithm)) in is_public_key_operation()
|
D | rsa_key_factory.cpp | 161 keymaster_algorithm_t algorithm = KM_ALGORITHM_RSA; in UpdateImportKeyDescription() local 162 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm)) in UpdateImportKeyDescription() 164 if (algorithm != KM_ALGORITHM_RSA) in UpdateImportKeyDescription()
|
D | ec_key_factory.cpp | 178 keymaster_algorithm_t algorithm = KM_ALGORITHM_EC; in UpdateImportKeyDescription() local 179 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm)) in UpdateImportKeyDescription() 181 if (algorithm != KM_ALGORITHM_EC) in UpdateImportKeyDescription()
|
D | openssl_utils.cpp | 71 static int convert_to_evp(keymaster_algorithm_t algorithm) { in convert_to_evp() argument 72 switch (algorithm) { in convert_to_evp()
|
D | soft_keymaster_context.cpp | 364 KeyFactory* SoftKeymasterContext::GetKeyFactory(keymaster_algorithm_t algorithm) const { in GetKeyFactory() 365 switch (algorithm) { in GetKeyFactory() 388 OperationFactory* SoftKeymasterContext::GetOperationFactory(keymaster_algorithm_t algorithm, in GetOperationFactory() argument 390 KeyFactory* key_factory = GetKeyFactory(algorithm); in GetOperationFactory() 751 EVP_PKEY* SoftKeymasterContext::AttestationKey(keymaster_algorithm_t algorithm, in AttestationKey() argument 758 switch (algorithm) { in AttestationKey() 783 keymaster_cert_chain_t* SoftKeymasterContext::AttestationChain(keymaster_algorithm_t algorithm, in AttestationChain() argument 802 switch (algorithm) { in AttestationChain()
|
D | keymaster_enforcement.cpp | 79 keymaster_algorithm_t algorithm; in is_public_key_algorithm() local 80 return auth_set.GetTagValue(TAG_ALGORITHM, &algorithm) && in is_public_key_algorithm() 81 (algorithm == KM_ALGORITHM_RSA || algorithm == KM_ALGORITHM_EC); in is_public_key_algorithm()
|
D | android_keymaster_test_utils.cpp | 750 keymaster_algorithm_t algorithm, in get_supported_block_modes() argument 754 return unwrap(dev)->get_supported_block_modes(unwrap(dev), algorithm, purpose, modes, in get_supported_block_modes() 758 keymaster_algorithm_t algorithm, in get_supported_padding_modes() argument 762 return unwrap(dev)->get_supported_padding_modes(unwrap(dev), algorithm, purpose, modes, in get_supported_padding_modes() 767 keymaster_algorithm_t algorithm, in get_supported_digests() argument 772 unwrap(dev), algorithm, purpose, digests, digests_length); in get_supported_digests() 790 keymaster_algorithm_t algorithm, in get_supported_import_formats() argument 793 return unwrap(dev)->get_supported_import_formats(unwrap(dev), algorithm, formats, in get_supported_import_formats() 797 keymaster_algorithm_t algorithm, in get_supported_export_formats() argument 800 return unwrap(dev)->get_supported_export_formats(unwrap(dev), algorithm, formats, in get_supported_export_formats()
|
D | attestation_record.cpp | 82 ASN1_INTEGER* algorithm; member 108 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.masked_tag()), 254 integer_ptr = &record->algorithm; in build_auth_list() 579 if (!get_enum(record->algorithm, TAG_ALGORITHM, auth_list)) in extract_auth_list()
|
D | android_keymaster_messages_test.cpp | 87 req.algorithm = KM_ALGORITHM_EC; in TEST() 90 EXPECT_EQ(KM_ALGORITHM_EC, deserialized->algorithm); in TEST() 97 req.algorithm = KM_ALGORITHM_EC; in TEST() 101 EXPECT_EQ(KM_ALGORITHM_EC, deserialized->algorithm); in TEST()
|
/system/keymaster/include/keymaster/ |
D | soft_keymaster_device.h | 89 bool FindUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, 92 bool RequiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, 96 static void StoreDefaultNewKeyParams(keymaster_algorithm_t algorithm, 99 keymaster_algorithm_t* algorithm); 113 keymaster_algorithm_t algorithm, 118 keymaster_algorithm_t algorithm, 123 keymaster_algorithm_t algorithm, 128 keymaster_algorithm_t algorithm, 132 keymaster_algorithm_t algorithm,
|
D | keymaster_context.h | 90 virtual KeyFactory* GetKeyFactory(keymaster_algorithm_t algorithm) const = 0; 91 virtual OperationFactory* GetOperationFactory(keymaster_algorithm_t algorithm, 166 virtual EVP_PKEY* AttestationKey(keymaster_algorithm_t algorithm, 174 virtual keymaster_cert_chain_t* AttestationChain(keymaster_algorithm_t algorithm,
|
D | soft_keymaster_context.h | 63 KeyFactory* GetKeyFactory(keymaster_algorithm_t algorithm) const override; 64 OperationFactory* GetOperationFactory(keymaster_algorithm_t algorithm, 83 EVP_PKEY* AttestationKey(keymaster_algorithm_t algorithm, 85 keymaster_cert_chain_t* AttestationChain(keymaster_algorithm_t algorithm,
|
D | android_keymaster_messages.h | 137 return append_uint32_to_buf(buf, end, algorithm); in Serialize() 140 return copy_uint32_from_buf(buf_ptr, end, &algorithm); in Deserialize() 143 keymaster_algorithm_t algorithm; member 162 buf = append_uint32_to_buf(buf, end, algorithm); in Serialize() 166 return copy_uint32_from_buf(buf_ptr, end, &algorithm) && in Deserialize() 170 keymaster_algorithm_t algorithm; member
|
/system/security/keystore/ |
D | auth_token_table.cpp | 63 inline bool is_secret_key_operation(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose) { in is_secret_key_operation() argument 64 if ((algorithm != KM_ALGORITHM_RSA || algorithm != KM_ALGORITHM_EC)) in is_secret_key_operation() 73 keymaster_algorithm_t algorithm = KM_ALGORITHM_AES; in KeyRequiresAuthentication() local 74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); in KeyRequiresAuthentication() 75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1; in KeyRequiresAuthentication() 80 keymaster_algorithm_t algorithm = KM_ALGORITHM_AES; in KeyRequiresAuthPerOperation() local 81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); in KeyRequiresAuthPerOperation() 82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1; in KeyRequiresAuthPerOperation()
|
D | keystore_client_impl.cpp | 476 keymaster_algorithm_t algorithm = KM_ALGORITHM_RSA; in verifyEncryptionKeyAttributes() local 477 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm) && in verifyEncryptionKeyAttributes() 478 !software_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm)) || in verifyEncryptionKeyAttributes() 479 algorithm != KM_ALGORITHM_AES) { in verifyEncryptionKeyAttributes() 521 keymaster_algorithm_t algorithm = KM_ALGORITHM_RSA; in verifyAuthenticationKeyAttributes() local 522 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm) && in verifyAuthenticationKeyAttributes() 523 !software_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm)) || in verifyAuthenticationKeyAttributes() 524 algorithm != KM_ALGORITHM_HMAC) { in verifyAuthenticationKeyAttributes()
|
/system/tpm/trunks/generator/ |
D | raw_structures.txt | 1417 associated with some algorithm (MY algorithm). In the implementation section (Annex B a named list 1606 In many cases, the input values are algorithm IDs. When two collections of algorithm IDs differ only 2315 an enumerated type that indicates an algorithm 2685 The TCG maintains a registry of all algorithms that have an assigned algorithm ID. That registry is… 2689 Inclusion of an algorithm does NOT indicate that the necessary claims of the algorithm are av ailab… 2697 TCG admin to verify that Table 7 is the same as the algorithm registry table published by the TCG.}} 2698 An algorithm ID is often used like a tag to determine the type of a structure in a context-sensitiv… 2704 algorithm ID to 16 bits. The TPM_ALGORITHM_ID data type will continue to be a 32-bit number. 2706 An algorithm shall not be assigned a value in the range 00 C116 – 00 C616 in order to prevent any o… 2709 a dependency, the algorithm that is required is listed in column labeled "D" (dependent) in Table 7. [all …]
|
D | raw_structures_fixed.txt | 1417 associated with some algorithm (MY algorithm). In the implementation section (Annex B a named list 1606 In many cases, the input values are algorithm IDs. When two collections of algorithm IDs differ only 2315 an enumerated type that indicates an algorithm 2687 The TCG maintains a registry of all algorithms that have an assigned algorithm ID. That registry is… 2691 Inclusion of an algorithm does NOT indicate that the necessary claims of the algorithm are av ailab… 2699 TCG admin to verify that Table 7 is the same as the algorithm registry table published by the TCG.}} 2700 An algorithm ID is often used like a tag to determine the type of a structure in a context-sensitiv… 2706 algorithm ID to 16 bits. The TPM_ALGORITHM_ID data type will continue to be a 32-bit number. 2708 An algorithm shall not be assigned a value in the range 00 C116 – 00 C616 in order to prevent any o… 2711 a dependency, the algorithm that is required is listed in column labeled "D" (dependent) in Table 7. [all …]
|
D | raw_commands_fixed.txt | 970 an algorithm selector. 1617 a parameter that should be an asymmetric algorithm selection does not have a 1632 a parameter that should be a hash algorithm selection does not have a value that 1669 a parameter that should be a symmetric algorithm selection does not have a 3179 If toTest contains an algorithm that has already been tested, it will not be tested again. 3182 The only way to force retesting of an algorithm is with TPM2_SelfTest( fullTest = YES). 3712 the algorithm and key size for parameter encryption 3719 hash algorithm to use for the session 3720 Shall be a hash algorithm supported by the TPM and 3986 in->symmetric.algorithm != TPM_ALG_NULL [all …]
|
D | raw_commands.txt | 970 an algorithm selector. 1617 a parameter that should be an asymmetric algorithm selection does not have a 1632 a parameter that should be a hash algorithm selection does not have a value that 1669 a parameter that should be a symmetric algorithm selection does not have a 3179 If toTest contains an algorithm that has already been tested, it will not be tested again. 3182 The only way to force retesting of an algorithm is with TPM2_SelfTest( fullTest = YES). 3710 the algorithm and key size for parameter encryption 3717 hash algorithm to use for the session 3718 Shall be a hash algorithm supported by the TPM and 3984 in->symmetric.algorithm != TPM_ALG_NULL [all …]
|
/system/connectivity/shill/wifi/ |
D | wifi_service.cc | 866 CryptoAlgorithm algorithm = kCryptoNone; in UpdateSecurity() local 873 algorithm = kCryptoRc4; in UpdateSecurity() 878 algorithm = kCryptoRc4; in UpdateSecurity() 882 algorithm = kCryptoAes; in UpdateSecurity() 886 algorithm = cipher_8021x_; in UpdateSecurity() 890 SetSecurity(algorithm, key_rotation, endpoint_auth); in UpdateSecurity()
|
/system/tpm/trunks/ |
D | session_manager_impl.cc | 104 symmetric_algorithm.algorithm = TPM_ALG_AES; in StartSession()
|
/system/tpm/attestation/common/ |
D | attestation_ca.proto | 136 // by the enterprise server using a hard-coded key. The signature algorithm is 153 // signature algorithm is RSASSA-PKCS1-v1_5-SHA256.
|