Home
last modified time | relevance | path

Searched refs:GetTagValue (Results 1 – 24 of 24) sorted by relevance

/system/keymaster/
Dhmac_key.cpp51 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) && in LoadKey()
52 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) { in LoadKey()
67 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) in validate_algorithm_specific_new_key_params()
71 if (!key_description.GetTagValue(TAG_DIGEST, &digest)) { in validate_algorithm_specific_new_key_params()
Daes_key.cpp56 if (!hw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length) && in LoadKey()
57 !sw_enforced.GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length)) { in LoadKey()
75 if (!key_description.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length)) in validate_algorithm_specific_new_key_params()
Drsa_key_factory.cpp62 if (!authorizations.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) { in GenerateKey()
68 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size)) { in GenerateKey()
144 if (!updated_description->GetTagValue(TAG_RSA_PUBLIC_EXPONENT, public_exponent)) in UpdateImportKeyDescription()
153 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size)) in UpdateImportKeyDescription()
162 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm)) in UpdateImportKeyDescription()
Dauthorization_set_test.cpp89 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &int_val)); in TEST()
93 EXPECT_TRUE(set.GetTagValue(TAG_APPLICATION_ID, &blob_val)); in TEST()
430 EXPECT_TRUE(set.GetTagValue(TAG_USER_ID, &val)); in TEST()
434 EXPECT_FALSE(set.GetTagValue(TAG_KEY_SIZE, &val)); in TEST()
450 EXPECT_TRUE(set1.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &val)); in TEST()
454 EXPECT_FALSE(set2.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &val)); in TEST()
472 EXPECT_TRUE(set1.GetTagValue(TAG_USER_SECURE_ID, 0, &val)); in TEST()
474 EXPECT_TRUE(set1.GetTagValue(TAG_USER_SECURE_ID, 1, &val)); in TEST()
478 EXPECT_FALSE(set2.GetTagValue(TAG_USER_SECURE_ID, &val)); in TEST()
492 EXPECT_TRUE(set.GetTagValue(TAG_ALGORITHM, &val)); in TEST()
[all …]
Dec_key_factory.cpp47 if (!key_description.GetTagValue(TAG_EC_CURVE, curve)) { in GetCurveAndSize()
49 if (!key_description.GetTagValue(TAG_KEY_SIZE, key_size_bits)) { in GetCurveAndSize()
63 if (key_description.GetTagValue(TAG_KEY_SIZE, &tag_key_size_bits) && in GetCurveAndSize()
173 if (!updated_description->GetTagValue(TAG_KEY_SIZE, key_size_bits)) in UpdateImportKeyDescription()
179 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm)) in UpdateImportKeyDescription()
Decies_kem.cpp27 if (!authorizations.GetTagValue(TAG_EC_CURVE, &curve_)) { in EciesKem()
46 if (!authorizations.GetTagValue(TAG_KDF, &kdf)) { in EciesKem()
65 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_bytes_to_generate_)) { in EciesKem()
71 single_hash_mode_ = authorizations.GetTagValue(TAG_ECIES_SINGLE_HASH_MODE); in EciesKem()
Dhmac_operation.cpp40 if (!key.authorizations().GetTagValue(TAG_MIN_MAC_LENGTH, &min_mac_length_bits)) { in CreateOperation()
47 if (begin_params.GetTagValue(TAG_MAC_LENGTH, &mac_length_bits)) { in CreateOperation()
61 if (!key.authorizations().GetTagValue(TAG_DIGEST, &digest)) { in CreateOperation()
Dandroid_keymaster.cpp55 if (tee_enforced.GetTagValue(TAG_OS_PATCHLEVEL, &key_os_patchlevel) || in CheckVersionInfo()
56 sw_enforced.GetTagValue(TAG_OS_PATCHLEVEL, &key_os_patchlevel)) { in CheckVersionInfo()
194 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) || in GenerateKey()
228 if (!hw_enforced.GetTagValue(TAG_ALGORITHM, algorithm) && in GetKeyFactory()
229 !sw_enforced.GetTagValue(TAG_ALGORITHM, algorithm)) in GetKeyFactory()
254 if (!key->authorizations().GetTagValue(TAG_ALGORITHM, &key_algorithm)) in BeginOperation()
428 if (!request.key_description.GetTagValue(TAG_ALGORITHM, &algorithm) || in ImportKey()
Dsymmetric_key.cpp42 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size_bits) || in GenerateKey()
77 if (!authorizations.GetTagValue(TAG_KEY_SIZE, &key_size_bits)) { in ImportKey()
Doperation.cpp92 if (!begin_params.GetTagValue(TAG_PADDING, padding)) { in GetAndValidatePadding()
117 if (!begin_params.GetTagValue(TAG_DIGEST, digest)) { in GetAndValidateDigest()
Drsa_keymaster0_key.cpp44 if (!key_description.GetTagValue(TAG_RSA_PUBLIC_EXPONENT, &public_exponent)) { in GenerateKey()
50 if (!key_description.GetTagValue(TAG_KEY_SIZE, &key_size)) { in GenerateKey()
Dasymmetric_key.cpp270 if ((!sw_enforced.GetTagValue(TAG_ALGORITHM, &sign_algorithm) && in GenerateAttestation()
271 !tee_enforced.GetTagValue(TAG_ALGORITHM, &sign_algorithm))) in GenerateAttestation()
312 authorizations().GetTagValue(TAG_ACTIVE_DATETIME, &activeDateTime); in GenerateAttestation()
319 authorizations().GetTagValue(TAG_USAGE_EXPIRE_DATETIME, &usageExpireDateTime); in GenerateAttestation()
Daes_operation.cpp55 if (!begin_params.GetTagValue(TAG_MAC_LENGTH, &tag_length_bits)) { in GetAndValidateGcmTagLength()
60 if (!key_params.GetTagValue(TAG_MIN_MAC_LENGTH, &min_tag_length_bits)) { in GetAndValidateGcmTagLength()
95 if (!begin_params.GetTagValue(TAG_BLOCK_MODE, &block_mode)) { in CreateOperation()
127 bool caller_nonce = key.authorizations().GetTagValue(TAG_CALLER_NONCE); in CreateOperation()
349 if (!input_params.GetTagValue(TAG_NONCE, &iv_blob)) { in GetIv()
383 if (input_params.GetTagValue(TAG_ASSOCIATED_DATA, &aad)) { in HandleAad()
Dattestation_record.cpp409 auth_list.GetTagValue(TAG_KEY_SIZE, &key_size)) { in build_auth_list()
478 if (!attestation_params.GetTagValue(TAG_ATTESTATION_CHALLENGE, &attestation_challenge)) in build_attestation_record()
494 if (tee_enforced.GetTagValue(TAG_INCLUDE_UNIQUE_ID)) { in build_attestation_record()
498 if (!sw_enforced.GetTagValue(TAG_CREATION_DATETIME, &creation_datetime)) { in build_attestation_record()
504 sw_enforced.GetTagValue(TAG_APPLICATION_ID, &application_id); in build_attestation_record()
509 attestation_params.GetTagValue(TAG_RESET_SINCE_ID_ROTATION), &unique_id); in build_attestation_record()
Dsoft_keymaster_context.cpp872 if (additional_params.GetTagValue(TAG_APPLICATION_ID, &client_id)) in ParseKeymaster1HwBlob()
874 if (additional_params.GetTagValue(TAG_APPLICATION_DATA, &app_data)) in ParseKeymaster1HwBlob()
989 if (input_set.GetTagValue(TAG_APPLICATION_ID, &entry)) in BuildHiddenAuthorizations()
991 if (input_set.GetTagValue(TAG_APPLICATION_DATA, &entry)) in BuildHiddenAuthorizations()
Dkeymaster_enforcement.cpp80 return auth_set.GetTagValue(TAG_ALGORITHM, &algorithm) && in is_public_key_algorithm()
441 if (!operation_params.GetTagValue(TAG_AUTH_TOKEN, &auth_token_blob)) { in AuthTokenMatches()
Dkeymaster1_engine.cpp369 if (additional_params.GetTagValue(TAG_APPLICATION_ID, &client_id)) in GetKeymaster1PublicKey()
371 if (additional_params.GetTagValue(TAG_APPLICATION_DATA, &app_data)) in GetKeymaster1PublicKey()
Dsoft_keymaster_device.cpp355 if (in_params.GetTagValue(TAG_APPLICATION_ID, &client_id)) in GetAlgorithm()
357 if (in_params.GetTagValue(TAG_APPLICATION_DATA, &app_data)) in GetAlgorithm()
610 if (!params_copy.GetTagValue(TAG_OS_VERSION, &os_version) || in configure()
611 !params_copy.GetTagValue(TAG_OS_PATCHLEVEL, &os_patchlevel)) { in configure()
714 if (!key_description.GetTagValue(TAG_ALGORITHM, &algorithm)) { in KeyRequiresSoftwareDigesting()
1065 request.attest_params.GetTagValue(TAG_ATTESTATION_CHALLENGE, &attestation_challenge); in attest_key()
Dandroid_keymaster_test_utils.cpp479 EXPECT_TRUE(output_params.GetTagValue(TAG_NONCE, &nonce_blob)); in EncryptMessage()
510 EXPECT_TRUE(output_params.GetTagValue(TAG_NONCE, &nonce_blob)); in EncryptMessage()
529 EXPECT_TRUE(output_params.GetTagValue(TAG_NONCE, &nonce_blob)); in EncryptMessage()
Dandroid_keymaster_test.cpp3416 EXPECT_TRUE(sw_enforced().GetTagValue(TAG_ALL_USERS)); in TEST_P()
3417 EXPECT_TRUE(sw_enforced().GetTagValue(TAG_NO_AUTH_REQUIRED)); in TEST_P()
3478 EXPECT_TRUE(sw_enforced().GetTagValue(TAG_ALL_USERS)); in TEST_P()
3479 EXPECT_TRUE(sw_enforced().GetTagValue(TAG_NO_AUTH_REQUIRED)); in TEST_P()
3586 if (expected_sw_enforced.GetTagValue(TAG_USER_ID, &user_id)) in verify_attestation_record()
3588 if (expected_tee_enforced.GetTagValue(TAG_USER_ID, &user_id)) in verify_attestation_record()
3593 if (expected_sw_enforced.GetTagValue(TAG_INCLUDE_UNIQUE_ID)) in verify_attestation_record()
3595 if (expected_tee_enforced.GetTagValue(TAG_INCLUDE_UNIQUE_ID)) in verify_attestation_record()
/system/security/keystore/
Dkeystore_client_impl.cpp103 if (!output_params.GetTagValue(keymaster::TAG_NONCE, &init_vector_blob)) { in encryptWithAuthentication()
477 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm) && in verifyEncryptionKeyAttributes()
478 !software_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm)) || in verifyEncryptionKeyAttributes()
484 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size) && in verifyEncryptionKeyAttributes()
485 !software_enforced_characteristics.GetTagValue(keymaster::TAG_KEY_SIZE, &key_size)) || in verifyEncryptionKeyAttributes()
491 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_BLOCK_MODE, &block_mode) && in verifyEncryptionKeyAttributes()
492 !software_enforced_characteristics.GetTagValue(keymaster::TAG_BLOCK_MODE, &block_mode)) || in verifyEncryptionKeyAttributes()
498 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_PADDING, &padding_mode) && in verifyEncryptionKeyAttributes()
499 !software_enforced_characteristics.GetTagValue(keymaster::TAG_PADDING, &padding_mode)) || in verifyEncryptionKeyAttributes()
522 if ((!hardware_enforced_characteristics.GetTagValue(keymaster::TAG_ALGORITHM, &algorithm) && in verifyAuthenticationKeyAttributes()
[all …]
Dauth_token_table.cpp74 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); in KeyRequiresAuthentication()
81 key_info.GetTagValue(TAG_ALGORITHM, &algorithm); in KeyRequiresAuthPerOperation()
93 key_info.GetTagValue(TAG_USER_AUTH_TYPE, &auth_type); in FindAuthorization()
136 key_info.GetTagValue(TAG_AUTH_TIMEOUT, &timeout); in FindTimedAuthorization()
141 if (key_info.GetTagValue(TAG_ALLOW_WHILE_ON_BODY)) { in FindTimedAuthorization()
/system/keymaster/include/keymaster/
Dauthorization_set.h257 inline bool GetTagValue(TypedTag<KM_UINT, T> tag, uint32_t* val) const { in GetTagValue() function
267 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance, uint32_t* val) const { in GetTagValue() function
276 inline bool GetTagValue(TypedTag<KM_ULONG, T> tag, uint64_t* val) const { in GetTagValue() function
286 bool GetTagValue(TypedTag<KM_ULONG_REP, Tag> tag, size_t instance, uint64_t* val) const { in GetTagValue() function
295 bool GetTagValue(TypedEnumTag<KM_ENUM, Tag, T> tag, T* val) const { in GetTagValue() function
305 bool GetTagValue(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, size_t instance, T* val) const { in GetTagValue() function
315 bool GetTagValue(TypedEnumTag<KM_ENUM_REP, Tag, T> tag, T* val) const { in GetTagValue() function
326 bool GetTagValue(TypedTag<KM_UINT_REP, Tag> tag, size_t instance, in GetTagValue() function
336 bool GetTagValue(TypedTag<KM_BYTES, Tag> tag, keymaster_blob_t* val) const { in GetTagValue() function
345 bool GetTagValue(TypedTag<KM_BIGNUM, Tag> tag, keymaster_blob_t* val) const { in GetTagValue() function
[all …]
/system/vold/
DKeyStorage.cpp147 if (!outParams.GetTagValue(keymaster::TAG_NONCE, &nonceBlob)) { in encryptWithKeymasterKey()