/system/keymaster/ |
D | keymaster_enforcement.cpp | 41 bool LastKeyAccessTime(km_id_t keyid, uint32_t* last_access_time) const; 45 bool UpdateKeyAccessTime(km_id_t keyid, uint32_t current_time, uint32_t timeout); 49 km_id_t keyid; member 63 bool KeyAccessCount(km_id_t keyid, uint32_t* count) const; 67 bool IncrementKeyAccessCount(km_id_t keyid); 71 km_id_t keyid; member 119 const km_id_t keyid, in AuthorizeOperation() argument 139 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); in AuthorizeOperation() 193 const km_id_t keyid, in AuthorizeBegin() argument 254 if (!MinTimeBetweenOpsPassed(min_ops_timeout, keyid)) in AuthorizeBegin() [all …]
|
/system/security/keystore/ |
D | keymaster_enforcement.cpp | 40 bool LastKeyAccessTime(km_id_t keyid, uint32_t* last_access_time) const; 44 bool UpdateKeyAccessTime(km_id_t keyid, uint32_t current_time, uint32_t timeout); 48 km_id_t keyid; member 62 bool KeyAccessCount(km_id_t keyid, uint32_t* count) const; 66 bool IncrementKeyAccessCount(km_id_t keyid); 70 km_id_t keyid; member 115 ErrorCode KeymasterEnforcement::AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid, in AuthorizeOperation() argument 136 return AuthorizeBegin(purpose, keyid, auth_set, operation_params); in AuthorizeOperation() 189 ErrorCode KeymasterEnforcement::AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid, in AuthorizeBegin() argument 253 if (min_ops_timeout.isOk() && !MinTimeBetweenOpsPassed(min_ops_timeout.value(), keyid)) in AuthorizeBegin() [all …]
|
D | keymaster_enforcement.h | 52 ErrorCode AuthorizeOperation(const KeyPurpose purpose, const km_id_t keyid, 62 ErrorCode AuthorizeBegin(const KeyPurpose purpose, const km_id_t keyid, 93 static bool CreateKeyId(const hidl_vec<uint8_t>& key_blob, km_id_t* keyid); 147 bool MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid); 148 bool MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses);
|
D | operation.cpp | 28 sp<IBinder> OperationMap::addOperation(uint64_t handle, uint64_t keyid, KeyPurpose purpose, in addOperation() argument 33 mMap[token] = Operation(handle, keyid, purpose, dev, std::move(characteristics), appToken); in addOperation() 57 *outKeyid = entry->second.keyid; in getOperation() 152 : handle(handle_), keyid(keyid_), purpose(purpose_), device(device_), in Operation() 156 : handle(0), keyid(0), device(nullptr), characteristics(), appToken(nullptr) {} in Operation()
|
D | operation.h | 45 android::sp<android::IBinder> addOperation(uint64_t handle, uint64_t keyid, KeyPurpose purpose, 71 Operation(uint64_t handle, uint64_t keyid, KeyPurpose purpose, const km_device_t& device, 74 uint64_t keyid; member
|
D | key_store_service.cpp | 1153 km_id_t keyid; in begin() local 1154 if (!enforcement_policy.CreateKeyId(key, &keyid)) { in begin() 1166 purpose, keyid, key_auths, opParams, 0 /* op_handle */, true /* is_begin_operation */); in begin() 1212 result->handle, keyid, purpose, dev, appToken, std::move(characteristics), pruneable); in begin() 1242 km_id_t keyid; in update() local 1244 if (!mOperationMap.getOperation(token, &handle, &keyid, &purpose, &dev, &characteristics)) { in update() 1259 purpose, keyid, key_auths, opParams, handle, false /* is_begin_operation */); in update() 1295 km_id_t keyid; in finish() local 1297 if (!mOperationMap.getOperation(token, &handle, &keyid, &purpose, &dev, &characteristics)) { in finish() 1319 purpose, keyid, key_auths, opParams, handle, false /* is_begin_operation */); in finish() [all …]
|
/system/keymaster/include/keymaster/ |
D | keymaster_enforcement.h | 52 keymaster_error_t AuthorizeOperation(const keymaster_purpose_t purpose, const km_id_t keyid, 63 keymaster_error_t AuthorizeBegin(const keymaster_purpose_t purpose, const km_id_t keyid, 96 static bool CreateKeyId(const keymaster_key_blob_t& key_blob, km_id_t* keyid); 151 bool MinTimeBetweenOpsPassed(uint32_t min_time_between, const km_id_t keyid); 152 bool MaxUsesPerBootNotExceeded(const km_id_t keyid, uint32_t max_uses);
|
/system/ca-certificates/files/ |
D | 559f7c71.0 | 46 keyid:47:77:C3:14:8B:62:39:0C:C9:6F:E1:50:4D:D0:10:58:DC:95:88:6D
|
D | d8317ada.0 | 46 keyid:DA:83:63:02:79:8E:DA:4C:C6:3C:23:14:D8:8F:C3:20:AB:28:60:59
|
D | 7999be0d.0 | 60 keyid:C0:7A:98:68:8D:89:FB:AB:05:64:0C:11:7D:AA:7D:65:B8:CA:CC:4E
|
D | c51c224c.0 | 60 keyid:BA:FA:71:25:79:8B:57:41:25:21:86:0B:71:EB:B2:64:0E:8B:21:67
|
D | fde84897.0 | 62 keyid:1A:ED:FE:41:39:90:B4:24:59:BE:01:F2:52:D5:45:F6:5A:39:DC:11
|
D | b872f2b4.0 | 61 keyid:A7:A5:06:B1:2C:A6:09:60:EE:D1:97:E9:70:AE:BC:3B:19:6C:DB:21
|
D | 343eb6cb.0 | 70 keyid:B6:08:7B:0D:7A:CC:AC:20:4C:86:56:32:5E:CF:AB:6E:85:2D:70:57
|
D | 81b9768f.0 | 66 keyid:B1:3E:C3:69:03:F8:BF:47:01:D4:98:26:1A:08:02:EF:63:64:2B:C3
|
/system/ca-certificates/google/files/ |
D | 594f1775.0 | 55 keyid:48:E6:68:F9:2B:D2:B2:95:D7:47:D8:23:20:10:4F:33:98:90:9F:D4
|
D | 7999be0d.0 | 60 keyid:C0:7A:98:68:8D:89:FB:AB:05:64:0C:11:7D:AA:7D:65:B8:CA:CC:4E
|
D | 57692373.0 | 61 keyid:71:38:36:F2:02:31:53:47:2B:6E:BA:65:46:A9:10:15:58:20:05:09
|
D | 3c58f906.0 | 67 keyid:AD:BD:98:7A:34:B4:26:F7:FA:C4:26:54:EF:03:BD:E0:24:CB:54:1A
|
D | 343eb6cb.0 | 70 keyid:B6:08:7B:0D:7A:CC:AC:20:4C:86:56:32:5E:CF:AB:6E:85:2D:70:57
|
D | 219d9499.0 | 62 keyid:D2:C4:B0:D2:91:D4:4C:11:71:B3:61:CB:3D:A1:FE:DD:A8:6A:D4:E3
|
D | a2df7ad7.0 | 66 keyid:81:3E:37:D8:92:B0:1F:77:9F:5C:B4:AB:73:AA:E7:F6:34:60:2F:FA
|
D | 5021a0a2.0 | 60 keyid:92:A4:75:2C:A4:9E:BE:81:44:EB:79:FC:8A:C5:95:A5:EB:10:75:73
|
D | 81b9768f.0 | 66 keyid:B1:3E:C3:69:03:F8:BF:47:01:D4:98:26:1A:08:02:EF:63:64:2B:C3
|
D | 3e7271e8.0 | 64 keyid:55:E4:81:D1:11:80:BE:D8:89:B9:08:A3:31:F9:A1:24:09:16:B9:70
|