Home | History | Annotate | Download | only in keystore

Lines Matching full:keymaster

51 <p>In addition to the list above, there is one more service that Keymaster
111 if the hardware Keymaster implementation doesn't provide them.</p>
131 the caller specifies an authorization list. The Keymaster implementation
178 variety of approaches, Keymaster 1.0 distinguishes between secure and non-secure
248 <p>Keymaster supports export of public keys only, in X.509 format, and import of:</p>
267 <p>Secure Keymaster implementations do not implement user authentication, but
313 Keymaster. The caller must know it in order to use the key.</p>
320 key expirations can be associated with a key and Keymaster will refuse to
345 provided to the Keymaster secure hardware during startup, preferably by the
347 by Keymaster.</p>
352 none of the Keymaster-protected keys created by the previous system will be
356 attacker-installed operating system to use Keymaster keys.</p>
360 <p>Some Keymaster secure hardware may choose to store key material internally
363 system component is available. The Keymaster 1.0 HAL allows the caller to
365 meaning that no resources other than the blob and the running Keymaster system
403 not always be fully trustworthy, the Keymaster HAL provides an interface to