| /system/keymaster/ |
| D | android_keymaster.cpp | 85 bool check_supported(const KeymasterContext& context, keymaster_algorithm_t algorithm, in check_supported() argument 87 if (context.GetKeyFactory(algorithm) == NULL) { in check_supported() 122 void GetSupported(const KeymasterContext& context, keymaster_algorithm_t algorithm, in GetSupported() argument 126 if (response == NULL || !check_supported(context, algorithm, response)) in GetSupported() 129 const OperationFactory* factory = context.GetOperationFactory(algorithm, purpose); in GetSupported() 142 GetSupported(*context_, request.algorithm, request.purpose, in SupportedBlockModes() 148 GetSupported(*context_, request.algorithm, request.purpose, in SupportedPaddingModes() 154 GetSupported(*context_, request.algorithm, request.purpose, &OperationFactory::SupportedDigests, in SupportedDigests() 160 if (response == NULL || !check_supported(*context_, request.algorithm, response)) in SupportedImportFormats() 165 context_->GetKeyFactory(request.algorithm)->SupportedImportFormats(&count); in SupportedImportFormats() [all …]
|
| D | soft_keymaster_device.cpp | 108 static keymaster_error_t add_digests(keymaster1_device_t* dev, keymaster_algorithm_t algorithm, in add_digests() argument 111 auto key = std::make_pair(algorithm, purpose); in add_digests() 116 dev->get_supported_digests(dev, algorithm, purpose, &digests, &digests_length); in add_digests() 136 for (auto algorithm : sig_algorithms) in map_digests() local 140 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests() 148 for (auto algorithm : crypt_algorithms) in map_digests() local 152 add_digests(dev, algorithm, purpose, map, &alg_purpose_supports_all); in map_digests() 443 keymaster_algorithm_t algorithm, in get_supported_block_modes() argument 455 return km1_dev->get_supported_block_modes(km1_dev, algorithm, purpose, modes, modes_length); in get_supported_block_modes() 458 request.algorithm = algorithm; in get_supported_block_modes() [all …]
|
| D | operation.h | 42 : algorithm(alg), purpose(purp) {} in KeyType() 44 keymaster_algorithm_t algorithm; member 48 return algorithm == rhs.algorithm && purpose == rhs.purpose;
|
| D | operation.cpp | 52 inline bool is_public_key_algorithm(keymaster_algorithm_t algorithm) { in is_public_key_algorithm() argument 53 switch (algorithm) { in is_public_key_algorithm() 70 if (!is_public_key_algorithm(key_type.algorithm)) in is_public_key_operation()
|
| D | rsa_key_factory.cpp | 167 keymaster_algorithm_t algorithm = KM_ALGORITHM_RSA; in UpdateImportKeyDescription() local 168 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm)) in UpdateImportKeyDescription() 170 if (algorithm != KM_ALGORITHM_RSA) in UpdateImportKeyDescription()
|
| D | openssl_utils.cpp | 71 static int convert_to_evp(keymaster_algorithm_t algorithm) { in convert_to_evp() argument 72 switch (algorithm) { in convert_to_evp()
|
| D | soft_keymaster_context.cpp | 362 KeyFactory* SoftKeymasterContext::GetKeyFactory(keymaster_algorithm_t algorithm) const { in GetKeyFactory() 363 switch (algorithm) { in GetKeyFactory() 386 OperationFactory* SoftKeymasterContext::GetOperationFactory(keymaster_algorithm_t algorithm, in GetOperationFactory() argument 388 KeyFactory* key_factory = GetKeyFactory(algorithm); in GetOperationFactory() 764 EVP_PKEY* SoftKeymasterContext::AttestationKey(keymaster_algorithm_t algorithm, in AttestationKey() argument 771 switch (algorithm) { in AttestationKey() 796 keymaster_cert_chain_t* SoftKeymasterContext::AttestationChain(keymaster_algorithm_t algorithm, in AttestationChain() argument 815 switch (algorithm) { in AttestationChain()
|
| D | ec_key_factory.cpp | 190 keymaster_algorithm_t algorithm = KM_ALGORITHM_EC; in UpdateImportKeyDescription() local 191 if (!updated_description->GetTagValue(TAG_ALGORITHM, &algorithm)) { in UpdateImportKeyDescription() 193 } else if (algorithm != KM_ALGORITHM_EC) { in UpdateImportKeyDescription()
|
| D | keymaster_enforcement.cpp | 79 keymaster_algorithm_t algorithm; in is_public_key_algorithm() local 80 return auth_set.GetTagValue(TAG_ALGORITHM, &algorithm) && in is_public_key_algorithm() 81 (algorithm == KM_ALGORITHM_RSA || algorithm == KM_ALGORITHM_EC); in is_public_key_algorithm()
|
| D | android_keymaster_test_utils.cpp | 743 keymaster_algorithm_t algorithm, in get_supported_block_modes() argument 747 return unwrap(dev)->get_supported_block_modes(unwrap(dev), algorithm, purpose, modes, in get_supported_block_modes() 751 keymaster_algorithm_t algorithm, in get_supported_padding_modes() argument 755 return unwrap(dev)->get_supported_padding_modes(unwrap(dev), algorithm, purpose, modes, in get_supported_padding_modes() 760 keymaster_algorithm_t algorithm, in get_supported_digests() argument 765 unwrap(dev), algorithm, purpose, digests, digests_length); in get_supported_digests() 783 keymaster_algorithm_t algorithm, in get_supported_import_formats() argument 786 return unwrap(dev)->get_supported_import_formats(unwrap(dev), algorithm, formats, in get_supported_import_formats() 790 keymaster_algorithm_t algorithm, in get_supported_export_formats() argument 793 return unwrap(dev)->get_supported_export_formats(unwrap(dev), algorithm, formats, in get_supported_export_formats()
|
| D | attestation_record.cpp | 63 ASN1_INTEGER* algorithm; member 98 ASN1_EXP_OPT(KM_AUTH_LIST, algorithm, ASN1_INTEGER, TAG_ALGORITHM.masked_tag()), 273 integer_ptr = &record->algorithm; in build_auth_list() 643 if (!get_enum(record->algorithm, TAG_ALGORITHM, auth_list)) in extract_auth_list()
|
| /system/keymaster/include/keymaster/ |
| D | soft_keymaster_device.h | 90 bool FindUnsupportedDigest(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, 93 bool RequiresSoftwareDigesting(keymaster_algorithm_t algorithm, keymaster_purpose_t purpose, 97 static void StoreDefaultNewKeyParams(keymaster_algorithm_t algorithm, 100 keymaster_algorithm_t* algorithm); 114 keymaster_algorithm_t algorithm, 119 keymaster_algorithm_t algorithm, 124 keymaster_algorithm_t algorithm, 129 keymaster_algorithm_t algorithm, 133 keymaster_algorithm_t algorithm,
|
| D | keymaster_context.h | 90 virtual KeyFactory* GetKeyFactory(keymaster_algorithm_t algorithm) const = 0; 91 virtual OperationFactory* GetOperationFactory(keymaster_algorithm_t algorithm, 166 virtual EVP_PKEY* AttestationKey(keymaster_algorithm_t algorithm, 173 virtual keymaster_cert_chain_t* AttestationChain(keymaster_algorithm_t algorithm,
|
| D | soft_keymaster_context.h | 63 KeyFactory* GetKeyFactory(keymaster_algorithm_t algorithm) const override; 64 OperationFactory* GetOperationFactory(keymaster_algorithm_t algorithm, 83 EVP_PKEY* AttestationKey(keymaster_algorithm_t algorithm, 85 keymaster_cert_chain_t* AttestationChain(keymaster_algorithm_t algorithm,
|
| D | android_keymaster_messages.h | 137 return append_uint32_to_buf(buf, end, algorithm); in Serialize() 140 return copy_uint32_from_buf(buf_ptr, end, &algorithm); in Deserialize() 143 keymaster_algorithm_t algorithm; member 162 buf = append_uint32_to_buf(buf, end, algorithm); in Serialize() 166 return copy_uint32_from_buf(buf_ptr, end, &algorithm) && in Deserialize() 170 keymaster_algorithm_t algorithm; member
|
| /system/security/keystore/ |
| D | auth_token_table.cpp | 89 inline bool is_secret_key_operation(Algorithm algorithm, KeyPurpose purpose) { in is_secret_key_operation() argument 90 if ((algorithm != Algorithm::RSA && algorithm != Algorithm::EC)) in is_secret_key_operation() 98 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES); in KeyRequiresAuthentication() local 99 return is_secret_key_operation(algorithm, purpose) && in KeyRequiresAuthentication() 104 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES); in KeyRequiresAuthPerOperation() local 105 return is_secret_key_operation(algorithm, purpose) && key_info.find(Tag::AUTH_TIMEOUT) == -1; in KeyRequiresAuthPerOperation()
|
| D | keystore_client_impl.cpp | 451 auto algorithm = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_ALGORITHM), in verifyEncryptionKeyAttributes() local 453 if (!algorithm.isOk() || algorithm.value() != Algorithm::AES) { in verifyEncryptionKeyAttributes() 492 auto algorithm = NullOrOr(hardware_enforced_characteristics.GetTagValue(TAG_ALGORITHM), in verifyAuthenticationKeyAttributes() local 494 if (!algorithm.isOk() || algorithm.value() != Algorithm::HMAC){ in verifyAuthenticationKeyAttributes()
|
| D | keymaster_enforcement.cpp | 78 auto algorithm = auth_set.GetTagValue(TAG_ALGORITHM); in is_public_key_algorithm() local 79 return algorithm.isOk() && in is_public_key_algorithm() 80 (algorithm.value() == Algorithm::RSA || algorithm.value() == Algorithm::EC); in is_public_key_algorithm()
|
| /system/tpm/trunks/ |
| D | tpm_state_impl.cc | 180 bool TpmStateImpl::GetAlgorithmProperties(TPM_ALG_ID algorithm, in GetAlgorithmProperties() argument 183 if (algorithm_properties_.count(algorithm) == 0) { in GetAlgorithmProperties() 187 *properties = algorithm_properties_[algorithm]; in GetAlgorithmProperties()
|
| D | tpm_state.h | 97 virtual bool GetAlgorithmProperties(TPM_ALG_ID algorithm,
|
| D | tpm_state_impl.h | 60 bool GetAlgorithmProperties(TPM_ALG_ID algorithm,
|
| /system/core/trusty/keymaster/ |
| D | trusty_keymaster_device.cpp | 209 keymaster_algorithm_t algorithm; in import_keypair() local 210 keymaster_error_t err = GetPkcs8KeyAlgorithm(key, key_length, &algorithm); in import_keypair() 213 request.key_description.push_back(TAG_ALGORITHM, algorithm); in import_keypair() 231 keymaster_algorithm_t* algorithm) { in GetPkcs8KeyAlgorithm() argument 252 *algorithm = KM_ALGORITHM_RSA; in GetPkcs8KeyAlgorithm() 255 *algorithm = KM_ALGORITHM_EC; in GetPkcs8KeyAlgorithm()
|
| D | trusty_keymaster_device.h | 94 keymaster_algorithm_t* algorithm);
|
| /system/tpm/trunks/generator/ |
| D | raw_structures.txt | 1417 associated with some algorithm (MY algorithm). In the implementation section (Annex B a named list 1606 In many cases, the input values are algorithm IDs. When two collections of algorithm IDs differ only 2315 an enumerated type that indicates an algorithm 2685 The TCG maintains a registry of all algorithms that have an assigned algorithm ID. That registry is… 2689 Inclusion of an algorithm does NOT indicate that the necessary claims of the algorithm are av ailab… 2697 TCG admin to verify that Table 7 is the same as the algorithm registry table published by the TCG.}} 2698 An algorithm ID is often used like a tag to determine the type of a structure in a context-sensitiv… 2704 algorithm ID to 16 bits. The TPM_ALGORITHM_ID data type will continue to be a 32-bit number. 2706 An algorithm shall not be assigned a value in the range 00 C116 – 00 C616 in order to prevent any o… 2709 a dependency, the algorithm that is required is listed in column labeled "D" (dependent) in Table 7. [all …]
|
| D | raw_structures_fixed.txt | 1417 associated with some algorithm (MY algorithm). In the implementation section (Annex B a named list 1606 In many cases, the input values are algorithm IDs. When two collections of algorithm IDs differ only 2315 an enumerated type that indicates an algorithm 2687 The TCG maintains a registry of all algorithms that have an assigned algorithm ID. That registry is… 2691 Inclusion of an algorithm does NOT indicate that the necessary claims of the algorithm are av ailab… 2699 TCG admin to verify that Table 7 is the same as the algorithm registry table published by the TCG.}} 2700 An algorithm ID is often used like a tag to determine the type of a structure in a context-sensitiv… 2706 algorithm ID to 16 bits. The TPM_ALGORITHM_ID data type will continue to be a 32-bit number. 2708 An algorithm shall not be assigned a value in the range 00 C116 – 00 C616 in order to prevent any o… 2711 a dependency, the algorithm that is required is listed in column labeled "D" (dependent) in Table 7. [all …]
|