Home
last modified time | relevance | path

Searched refs:algorithm (Results 1 – 25 of 34) sorted by relevance

12

/system/keymaster/
Dandroid_keymaster.cpp85 bool check_supported(const KeymasterContext& context, keymaster_algorithm_t algorithm, in check_supported() argument
87 if (context.GetKeyFactory(algorithm) == NULL) { in check_supported()
122 void GetSupported(const KeymasterContext& context, keymaster_algorithm_t algorithm, in GetSupported() argument
126 if (response == NULL || !check_supported(context, algorithm, response)) in GetSupported()
129 const OperationFactory* factory = context.GetOperationFactory(algorithm, purpose); in GetSupported()
142 GetSupported(*context_, request.algorithm, request.purpose, in SupportedBlockModes()
148 GetSupported(*context_, request.algorithm, request.purpose, in SupportedPaddingModes()
154 GetSupported(*context_, request.algorithm, request.purpose, &OperationFactory::SupportedDigests, in SupportedDigests()
160 if (response == NULL || !check_supported(*context_, request.algorithm, response)) in SupportedImportFormats()
165 context_->GetKeyFactory(request.algorithm)->SupportedImportFormats(&count); in SupportedImportFormats()
[all …]
Dsoft_keymaster_device.cpp83 static keymaster_error_t add_digests(keymaster1_device_t* dev, keymaster_algorithm_t algorithm, in add_digests() argument
86 auto key = std::make_pair(algorithm, purpose); in add_digests()
91 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests()
108 for (auto algorithm : sig_algorithms) in map_digests() local
110 keymaster_error_t error = add_digests(dev, algorithm, purpose, map); in map_digests()
117 for (auto algorithm : crypt_algorithms) in map_digests() local
119 keymaster_error_t error = add_digests(dev, algorithm, purpose, map); in map_digests()
339 bool FindAlgorithm(const keymaster_key_param_set_t& params, keymaster_algorithm_t* algorithm) { in FindAlgorithm() argument
342 *algorithm = static_cast<keymaster_algorithm_t>(params.params[i].enumerated); in FindAlgorithm()
350 keymaster_algorithm_t* algorithm) { in GetAlgorithm() argument
[all …]
Doperation.h42 : algorithm(alg), purpose(purp) {} in KeyType()
44 keymaster_algorithm_t algorithm; member
48 return algorithm == rhs.algorithm && purpose == rhs.purpose;
Doperation.cpp52 inline bool is_public_key_algorithm(keymaster_algorithm_t algorithm) { in is_public_key_algorithm() argument
53 switch (algorithm) { in is_public_key_algorithm()
70 if (!is_public_key_algorithm(key_type.algorithm)) in is_public_key_operation()
Drsa_key_factory.cpp161 keymaster_algorithm_t algorithm = KM_ALGORITHM_RSA; in UpdateImportKeyDescription() local
162 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm)) in UpdateImportKeyDescription()
164 if (algorithm != KM_ALGORITHM_RSA) in UpdateImportKeyDescription()
Dec_key_factory.cpp178 keymaster_algorithm_t algorithm = KM_ALGORITHM_EC; in UpdateImportKeyDescription() local
179 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm)) in UpdateImportKeyDescription()
181 if (algorithm != KM_ALGORITHM_EC) in UpdateImportKeyDescription()
Dopenssl_utils.cpp71 static int convert_to_evp(keymaster_algorithm_t algorithm) { in convert_to_evp() argument
72 switch (algorithm) { in convert_to_evp()
Dsoft_keymaster_context.cpp364 KeyFactory* SoftKeymasterContext::GetKeyFactory(keymaster_algorithm_t algorithm) const { in GetKeyFactory()
365 switch (algorithm) { in GetKeyFactory()
388 OperationFactory* SoftKeymasterContext::GetOperationFactory(keymaster_algorithm_t algorithm, in GetOperationFactory() argument
390 KeyFactory* key_factory = GetKeyFactory(algorithm); in GetOperationFactory()
751 EVP_PKEY* SoftKeymasterContext::AttestationKey(keymaster_algorithm_t algorithm, in AttestationKey() argument
758 switch (algorithm) { in AttestationKey()
783 keymaster_cert_chain_t* SoftKeymasterContext::AttestationChain(keymaster_algorithm_t algorithm, in AttestationChain() argument
802 switch (algorithm) { in AttestationChain()
Dkeymaster_enforcement.cpp79 keymaster_algorithm_t algorithm; in is_public_key_algorithm() local
80 return auth_set.GetTagValue(TAG_ALGORITHM, &algorithm) && in is_public_key_algorithm()
81 (algorithm == KM_ALGORITHM_RSA || algorithm == KM_ALGORITHM_EC); in is_public_key_algorithm()
Dandroid_keymaster_test_utils.cpp750 keymaster_algorithm_t algorithm, in get_supported_block_modes() argument
754 return unwrap(dev)->get_supported_block_modes(unwrap(dev), algorithm, purpose, modes, in get_supported_block_modes()
758 keymaster_algorithm_t algorithm, in get_supported_padding_modes() argument
762 return unwrap(dev)->get_supported_padding_modes(unwrap(dev), algorithm, purpose, modes, in get_supported_padding_modes()
767 keymaster_algorithm_t algorithm, in get_supported_digests() argument
772 unwrap(dev), algorithm, purpose, digests, digests_length); in get_supported_digests()
790 keymaster_algorithm_t algorithm, in get_supported_import_formats() argument
793 return unwrap(dev)->get_supported_import_formats(unwrap(dev), algorithm, formats, in get_supported_import_formats()
797 keymaster_algorithm_t algorithm, in get_supported_export_formats() argument
800 return unwrap(dev)->get_supported_export_formats(unwrap(dev), algorithm, formats, in get_supported_export_formats()
Dattestation_record.cpp82 ASN1_INTEGER* algorithm; member
108 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.masked_tag()),
254 integer_ptr = &record->algorithm; in build_auth_list()
579 if (!get_enum(record->algorithm, TAG_ALGORITHM, auth_list)) in extract_auth_list()
Dandroid_keymaster_messages_test.cpp87 req.algorithm = KM_ALGORITHM_EC; in TEST()
90 EXPECT_EQ(KM_ALGORITHM_EC, deserialized->algorithm); in TEST()
97 req.algorithm = KM_ALGORITHM_EC; in TEST()
101 EXPECT_EQ(KM_ALGORITHM_EC, deserialized->algorithm); in TEST()
/system/keymaster/include/keymaster/
Dsoft_keymaster_device.h89 bool FindUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose,
92 bool RequiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose,
96 static void StoreDefaultNewKeyParams(keymaster_algorithm_t algorithm,
99 keymaster_algorithm_t* algorithm);
113 keymaster_algorithm_t algorithm,
118 keymaster_algorithm_t algorithm,
123 keymaster_algorithm_t algorithm,
128 keymaster_algorithm_t algorithm,
132 keymaster_algorithm_t algorithm,
Dkeymaster_context.h90 virtual KeyFactory* GetKeyFactory(keymaster_algorithm_t algorithm) const = 0;
91 virtual OperationFactory* GetOperationFactory(keymaster_algorithm_t algorithm,
166 virtual EVP_PKEY* AttestationKey(keymaster_algorithm_t algorithm,
174 virtual keymaster_cert_chain_t* AttestationChain(keymaster_algorithm_t algorithm,
Dsoft_keymaster_context.h63 KeyFactory* GetKeyFactory(keymaster_algorithm_t algorithm) const override;
64 OperationFactory* GetOperationFactory(keymaster_algorithm_t algorithm,
83 EVP_PKEY* AttestationKey(keymaster_algorithm_t algorithm,
85 keymaster_cert_chain_t* AttestationChain(keymaster_algorithm_t algorithm,
Dandroid_keymaster_messages.h137 return append_uint32_to_buf(buf, end, algorithm); in Serialize()
140 return copy_uint32_from_buf(buf_ptr, end, &algorithm); in Deserialize()
143 keymaster_algorithm_t algorithm; member
162 buf = append_uint32_to_buf(buf, end, algorithm); in Serialize()
166 return copy_uint32_from_buf(buf_ptr, end, &algorithm) && in Deserialize()
170 keymaster_algorithm_t algorithm; member
/system/security/keystore/
Dauth_token_table.cpp63 inline bool is_secret_key_operation(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose) { in is_secret_key_operation() argument
64 if ((algorithm != KM_ALGORITHM_RSA || algorithm != KM_ALGORITHM_EC)) in is_secret_key_operation()
73 keymaster_algorithm_t algorithm = KM_ALGORITHM_AES; in KeyRequiresAuthentication() local
74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); in KeyRequiresAuthentication()
75 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_NO_AUTH_REQUIRED) == -1; in KeyRequiresAuthentication()
80 keymaster_algorithm_t algorithm = KM_ALGORITHM_AES; in KeyRequiresAuthPerOperation() local
81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); in KeyRequiresAuthPerOperation()
82 return is_secret_key_operation(algorithm, purpose) && key_info.find(TAG_AUTH_TIMEOUT) == -1; in KeyRequiresAuthPerOperation()
Dkeystore_client_impl.cpp476 keymaster_algorithm_t algorithm = KM_ALGORITHM_RSA; in verifyEncryptionKeyAttributes() local
477 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm) && in verifyEncryptionKeyAttributes()
478 !software_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm)) || in verifyEncryptionKeyAttributes()
479 algorithm != KM_ALGORITHM_AES) { in verifyEncryptionKeyAttributes()
521 keymaster_algorithm_t algorithm = KM_ALGORITHM_RSA; in verifyAuthenticationKeyAttributes() local
522 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm) && in verifyAuthenticationKeyAttributes()
523 !software_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm)) || in verifyAuthenticationKeyAttributes()
524 algorithm != KM_ALGORITHM_HMAC) { in verifyAuthenticationKeyAttributes()
/system/tpm/trunks/generator/
Draw_structures.txt1417 associated with some algorithm (MY algorithm). In the implementation section (Annex B a named list
1606 In many cases, the input values are algorithm IDs. When two collections of algorithm IDs differ only
2315 an enumerated type that indicates an algorithm
2685 The TCG maintains a registry of all algorithms that have an assigned algorithm ID. That registry is…
2689 Inclusion of an algorithm does NOT indicate that the necessary claims of the algorithm are av ailab…
2697 TCG admin to verify that Table 7 is the same as the algorithm registry table published by the TCG.}}
2698 An algorithm ID is often used like a tag to determine the type of a structure in a context-sensitiv…
2704 algorithm ID to 16 bits. The TPM_ALGORITHM_ID data type will continue to be a 32-bit number.
2706 An algorithm shall not be assigned a value in the range 00 C116 – 00 C616 in order to prevent any o…
2709 a dependency, the algorithm that is required is listed in column labeled "D" (dependent) in Table 7.
[all …]
Draw_structures_fixed.txt1417 associated with some algorithm (MY algorithm). In the implementation section (Annex B a named list
1606 In many cases, the input values are algorithm IDs. When two collections of algorithm IDs differ only
2315 an enumerated type that indicates an algorithm
2687 The TCG maintains a registry of all algorithms that have an assigned algorithm ID. That registry is…
2691 Inclusion of an algorithm does NOT indicate that the necessary claims of the algorithm are av ailab…
2699 TCG admin to verify that Table 7 is the same as the algorithm registry table published by the TCG.}}
2700 An algorithm ID is often used like a tag to determine the type of a structure in a context-sensitiv…
2706 algorithm ID to 16 bits. The TPM_ALGORITHM_ID data type will continue to be a 32-bit number.
2708 An algorithm shall not be assigned a value in the range 00 C116 – 00 C616 in order to prevent any o…
2711 a dependency, the algorithm that is required is listed in column labeled "D" (dependent) in Table 7.
[all …]
Draw_commands_fixed.txt970 an algorithm selector.
1617 a parameter that should be an asymmetric algorithm selection does not have a
1632 a parameter that should be a hash algorithm selection does not have a value that
1669 a parameter that should be a symmetric algorithm selection does not have a
3179 If toTest contains an algorithm that has already been tested, it will not be tested again.
3182 The only way to force retesting of an algorithm is with TPM2_SelfTest( fullTest = YES).
3712 the algorithm and key size for parameter encryption
3719 hash algorithm to use for the session
3720 Shall be a hash algorithm supported by the TPM and
3986 in->symmetric.algorithm != TPM_ALG_NULL
[all …]
Draw_commands.txt970 an algorithm selector.
1617 a parameter that should be an asymmetric algorithm selection does not have a
1632 a parameter that should be a hash algorithm selection does not have a value that
1669 a parameter that should be a symmetric algorithm selection does not have a
3179 If toTest contains an algorithm that has already been tested, it will not be tested again.
3182 The only way to force retesting of an algorithm is with TPM2_SelfTest( fullTest = YES).
3710 the algorithm and key size for parameter encryption
3717 hash algorithm to use for the session
3718 Shall be a hash algorithm supported by the TPM and
3984 in->symmetric.algorithm != TPM_ALG_NULL
[all …]
/system/connectivity/shill/wifi/
Dwifi_service.cc866 CryptoAlgorithm algorithm = kCryptoNone; in UpdateSecurity() local
873 algorithm = kCryptoRc4; in UpdateSecurity()
878 algorithm = kCryptoRc4; in UpdateSecurity()
882 algorithm = kCryptoAes; in UpdateSecurity()
886 algorithm = cipher_8021x_; in UpdateSecurity()
890 SetSecurity(algorithm, key_rotation, endpoint_auth); in UpdateSecurity()
/system/tpm/trunks/
Dsession_manager_impl.cc104 symmetric_algorithm.algorithm = TPM_ALG_AES; in StartSession()
/system/tpm/attestation/common/
Dattestation_ca.proto136 // by the enterprise server using a hard-coded key. The signature algorithm is
153 // signature algorithm is RSASSA-PKCS1-v1_5-SHA256.

12